diff --git a/i2p2www/__init__.py b/i2p2www/__init__.py index ee8a5b8b2ea9d5facffd086c262b9b45882aa713..9d2e1583f5641e34defdd0c22de056ec685c719d 100644 --- a/i2p2www/__init__.py +++ b/i2p2www/__init__.py @@ -23,8 +23,8 @@ except ImportError: # Constants CURRENT_I2P_VERSION = '1.7.0' -CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.07.2' -CURRENT_I2P_OSX_VERSION = CURRENT_I2P_VERSION +CURRENT_I2P_FIREFOX_PROFILE_VERSION = '1.7.4' +CURRENT_I2P_OSX_VERSION = '1.7.1' CANONICAL_DOMAIN = 'geti2p.net' diff --git a/i2p2www/meetings/helpers.py b/i2p2www/meetings/helpers.py index 622141f1768d7db70dcc810ba8f89b97e2631325..2dc58582f368627ecc16223d9180235a5b63951f 100644 --- a/i2p2www/meetings/helpers.py +++ b/i2p2www/meetings/helpers.py @@ -54,6 +54,7 @@ def get_meetings_ids(num=0): # iterate over all files for f in v[2]: # ignore all non-.rst files + print("Meeting file found", f) if not f.endswith('.rst'): continue try: diff --git a/i2p2www/meetings/logs/310.log b/i2p2www/meetings/logs/310.log index 85456183e3c4f269ed50f7bfc3d2f24a4d4e73d3..395cdb4a40a0d52760affffe2593a635c0f58228 100644 --- a/i2p2www/meetings/logs/310.log +++ b/i2p2www/meetings/logs/310.log @@ -87,4 +87,4 @@ (04:38:54 PM) eyedeekay: Anything else on 4? (04:39:07 PM) zlatinb: not from me, eot (04:40:26 PM) eyedeekay: Anything else for the meeting? timeout 1m -(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd +(04:41:43 PM) eyedeekay: All right thanks everybody for coming, looks like next month meeting will be May 3rd \ No newline at end of file diff --git a/i2p2www/meetings/logs/310.rst b/i2p2www/meetings/logs/310.rst index e01389cb8fab9d72889d0a0e2531562d1615b45b..31f3ade00f2293ac2caac997c4701acc08ae656b 100644 --- a/i2p2www/meetings/logs/310.rst +++ b/i2p2www/meetings/logs/310.rst @@ -8,4 +8,4 @@ Quick recap eyedeekay, zzz, -zlatinb +zlatinb \ No newline at end of file diff --git a/i2p2www/translations/ar/LC_MESSAGES/about.po b/i2p2www/translations/ar/LC_MESSAGES/about.po index ed3c25f69f05a4f70eb29e98da676830c864dd8b..64bcb96c60f4a8998c62ace89590a7fef1838cc2 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/about.po +++ b/i2p2www/translations/ar/LC_MESSAGES/about.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-09-04 16:25+0000\n" -"Last-Translator: Ù…Øيي الدين <tx99h4@hotmail.com>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -26,8 +26,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -50,8 +49,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -64,24 +62,158 @@ msgstr "مسرد المصطلØات" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -91,15 +223,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -113,12 +244,8 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -128,13 +255,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -143,15 +270,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -160,28 +287,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -190,36 +316,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -228,13 +353,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -243,15 +368,11 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -270,9 +391,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -329,8 +449,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -349,8 +468,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -359,8 +477,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -373,8 +490,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -383,8 +499,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -392,8 +508,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -408,15 +523,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -428,8 +541,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -484,16 +596,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -502,11 +612,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -559,16 +667,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -584,12 +690,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -603,35 +706,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -640,16 +737,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -666,11 +761,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -679,18 +820,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -701,84 +839,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -789,8 +904,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -798,27 +912,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -826,26 +936,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -856,10 +957,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -867,18 +966,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -889,10 +985,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1064,7 +1158,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1304,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1354,32 +1450,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1397,8 +1486,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1437,10 +1526,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1454,15 +1541,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1471,11 +1554,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1530,8 +1610,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1549,15 +1628,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1576,14 +1651,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1594,20 +1665,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1618,24 +1682,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1655,33 +1710,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1694,32 +1740,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1729,27 +1767,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1766,17 +1796,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1789,8 +1816,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1801,10 +1827,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1823,30 +1847,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1860,55 +1877,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1919,20 +1921,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1943,16 +1938,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1962,17 +1952,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -1983,20 +1970,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2010,26 +1990,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2038,18 +2008,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2057,16 +2021,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2082,52 +2041,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2142,102 +2082,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2250,4 +2149,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/ar/LC_MESSAGES/comparison.po b/i2p2www/translations/ar/LC_MESSAGES/comparison.po index b7083ab3507b4dd870fc100e9751fdfe4683fff7..25ad49484d279802c8188027979d4bb27aa15fce 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/ar/LC_MESSAGES/comparison.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: zzzi2p\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -24,34 +24,23 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." msgstr "" #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." @@ -59,20 +48,13 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -82,15 +64,11 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -105,10 +83,8 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -126,52 +102,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -179,19 +141,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -203,32 +161,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -237,36 +183,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -274,10 +207,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -291,7 +222,7 @@ msgstr "" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -497,8 +428,7 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -517,10 +447,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -528,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" #: i2p2www/pages/site/comparison/tor.html:96 @@ -567,8 +496,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -705,4 +634,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po index fe4500fc54d1c4927f4b2090f034d14bb8bec1ed..4f3dc246604665bf0d0ad35fe056000a1dc26029 100644 --- a/i2p2www/translations/ar/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/ar/LC_MESSAGES/get-involved.po @@ -1,22 +1,22 @@ -# Arabic translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: Emma Peel\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Arabic (http://www.transifex.com/otf/I2P/language/ar/)\n" -"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : " -"n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ar\n" +"Plural-Forms: nplurals=6; plural=n==0 ? 0 : n==1 ? 1 : n==2 ? 2 : n%100>=3 && n%100<=10 ? 3 : n%100>=11 && n%100<=99 ? 4 : 5;\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +31,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +48,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +113,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +144,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +160,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +194,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +208,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +221,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +233,12 @@ msgstr "التوثيق" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +249,11 @@ msgstr "جاري التجريب" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +266,10 @@ msgstr "الخدمات" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +279,9 @@ msgstr "اعادة التوزيع" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +325,7 @@ msgstr "التØليل" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +333,7 @@ msgstr "" msgid "Roadmap" msgstr "" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +394,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +457,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +470,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +494,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +564,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +619,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +633,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +674,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +734,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +756,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +780,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +789,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +803,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +847,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +871,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +885,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +904,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +916,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +933,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +955,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +982,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1026,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1053,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1073,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1102,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1388,8 +1183,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1402,24 +1196,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1429,22 +1214,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1480,21 +1257,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1518,10 +1290,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1532,8 +1302,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1546,10 +1315,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1559,7 +1326,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1580,7 +1348,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1588,13 +1357,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1602,7 +1372,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1611,8 +1382,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1644,35 +1414,28 @@ msgstr "أخريات" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1680,29 +1443,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1729,12 +1486,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1744,10 +1499,8 @@ msgstr "المجتمع" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1769,8 +1522,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1778,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1793,8 +1547,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1808,34 +1561,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1845,61 +1592,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1926,20 +1661,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1948,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1965,12 +1699,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1990,8 +1725,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2018,12 +1752,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2042,22 +1773,22 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2074,8 +1805,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2092,14 +1823,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2178,34 +1909,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2215,20 +1938,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2245,22 +1964,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2272,10 +1988,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2285,38 +1999,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2334,23 +2040,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2364,11 +2064,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2379,34 +2076,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2419,18 +2109,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2444,16 +2130,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2473,67 +2157,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2557,8 +2231,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2574,44 +2248,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2619,8 +2283,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2629,64 +2292,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "الترجمات" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "الأدوات" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2694,42 +2352,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2742,143 +2392,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2887,93 +2425,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2993,11 +2480,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3012,10 +2497,8 @@ msgstr "التجهيز" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3035,12 +2518,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3051,27 +2531,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3087,10 +2563,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3108,8 +2582,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3122,19 +2595,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3142,15 +2611,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3159,8 +2626,8 @@ msgstr "أسئلة متكررة" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3176,67 +2643,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3261,10 +2726,8 @@ msgstr "نظرة عامة" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3273,21 +2736,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3310,8 +2769,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3321,18 +2779,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3342,10 +2795,8 @@ msgstr "سياسة الخصوصية" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3354,17 +2805,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3373,10 +2822,8 @@ msgstr "ابدء" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3387,18 +2834,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/az/LC_MESSAGES/docs.po b/i2p2www/translations/az/LC_MESSAGES/docs.po index 6ca98797a882ce48a963c80a6e6a0671422e5585..1f8f5ee6d77a16f172502fc9cd2477a10c8417a9 100644 --- a/i2p2www/translations/az/LC_MESSAGES/docs.po +++ b/i2p2www/translations/az/LC_MESSAGES/docs.po @@ -1,23 +1,23 @@ -# Azerbaijani translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Nikafn <appone6@gmail.com>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-09-14 12:48+0000\n" -"Last-Translator: Nikafn <appone6@gmail.com>\n" -"Language-Team: Azerbaijani " -"(http://www.transifex.com/otf/I2P/language/az/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Nikafn <appone6@gmail.com>, 2018\n" +"Language-Team: Azerbaijani (http://www.transifex.com/otf/I2P/language/az/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: az\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24 msgid "Index to Technical Documentation" @@ -32,16 +32,14 @@ msgid "" "This index is ordered from the highest to lowest layers.\n" "The higher layers are for \"clients\" or applications;\n" "the lower layers are inside the router itself.\n" -"The interface between applications and the router is the I2CP (I2P " -"Control\n" +"The interface between applications and the router is the I2CP (I2P Control\n" "Protocol) API." msgstr "" #: i2p2www/pages/site/docs/index.html:18 #, python-format msgid "" -"The I2P Project is committed to maintaining accurate, current " -"documentation.\n" +"The I2P Project is committed to maintaining accurate, current documentation.\n" "If you find any inaccuracies in the documents linked below, please\n" "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>." msgstr "" @@ -98,11 +96,9 @@ msgstr "TÉ™qdimatlar, mÉ™qalÉ™lÉ™r, dÉ™rslÉ™r, videolar vÉ™ müsahibÉ™lÉ™r" #: i2p2www/pages/site/docs/index.html:36 #, python-format msgid "" -"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>" -" August 28, 2003 (pdf)" -msgstr "" -"<a href=\"%(pdf)s\"> Invisible Internet Project (I2P) layihÉ™sinin icmalı " -"</a> 28 Avqust, 2003 (pdf)" +"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> " +"August 28, 2003 (pdf)" +msgstr "<a href=\"%(pdf)s\"> Invisible Internet Project (I2P) layihÉ™sinin icmalı </a> 28 Avqust, 2003 (pdf)" #: i2p2www/pages/site/docs/index.html:39 msgid "Application-Layer Topics" @@ -130,7 +126,8 @@ msgstr "QoÅŸma xüsusiyyÉ™tlÉ™ri" msgid "Managed Clients" msgstr "Ä°darÉ™ olunan müştÉ™rilÉ™r" -#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240 +#: i2p2www/pages/site/docs/index.html:47 +#: i2p2www/pages/site/docs/index.html:240 msgid "Embedding the router in your application" msgstr "TÉ™tbiqinizÉ™ istiqamÉ™tlÉ™ndirici daxil edilir" @@ -147,7 +144,8 @@ msgstr "I2PControl Plugin API" msgid "hostsdb.blockfile Format" msgstr "hostsdb.blockfile Format" -#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206 +#: i2p2www/pages/site/docs/index.html:51 +#: i2p2www/pages/site/docs/index.html:206 msgid "Configuration File Format" msgstr "QuraÅŸdırma fayl formatı" @@ -159,9 +157,7 @@ msgstr "APÄ° TÉ™tbiq layı vÉ™ protokollar" msgid "" "High-level, easy-to-use APIs for applications written in any language to " "send and receive data." -msgstr "" -"Data göndÉ™rmÉ™k vÉ™ qÉ™bul etmÉ™k üçün hÉ™r hansı bir dildÉ™ yazılmış tÉ™tbiqlÉ™r" -" üçün yüksÉ™k sÉ™viyyÉ™li, asan istifadÉ™li API-lÉ™r." +msgstr "Data göndÉ™rmÉ™k vÉ™ qÉ™bul etmÉ™k üçün hÉ™r hansı bir dildÉ™ yazılmış tÉ™tbiqlÉ™r üçün yüksÉ™k sÉ™viyyÉ™li, asan istifadÉ™li API-lÉ™r." #: i2p2www/pages/site/docs/index.html:57 msgid "Application Development Overview and Guide" @@ -196,9 +192,7 @@ msgstr "Ä°kitÉ™rÉ™fli NÉ™qliyyat API vÉ™ protokollar" msgid "" "The end-to-end protocols used by clients for reliable and unreliable " "communication." -msgstr "" -"Ä°kitÉ™rÉ™fli protokollar müştÉ™rilÉ™r tÉ™rÉ™findÉ™n etibarlı vÉ™ etibarsız " -"É™laqÉ™lÉ™r üçün istifadÉ™ olunur." +msgstr "Ä°kitÉ™rÉ™fli protokollar müştÉ™rilÉ™r tÉ™rÉ™findÉ™n etibarlı vÉ™ etibarsız É™laqÉ™lÉ™r üçün istifadÉ™ olunur." #: i2p2www/pages/site/docs/index.html:89 #: i2p2www/pages/site/docs/api/streaming.html:2 @@ -228,8 +222,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:101 msgid "" -"The lowest-level API used for clients (applications) to send and receive " -"traffic to a router.\n" +"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n" "Traditionally used only by Java applications and higher-level APIs." msgstr "" @@ -288,8 +281,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:127 msgid "" -"Distributed storage and retrieval of information about routers and " -"clients." +"Distributed storage and retrieval of information about routers and clients." msgstr "" #: i2p2www/pages/site/docs/index.html:129 @@ -351,8 +343,8 @@ msgstr "TunellÉ™r" #: i2p2www/pages/site/docs/index.html:154 msgid "" -"Selecting peers, requesting tunnels through those peers, and encrypting " -"and routing messages through these tunnels." +"Selecting peers, requesting tunnels through those peers, and encrypting and " +"routing messages through these tunnels." msgstr "" #: i2p2www/pages/site/docs/index.html:156 @@ -407,7 +399,8 @@ msgid "Transport Layer" msgstr "" #: i2p2www/pages/site/docs/index.html:171 -msgid "The protocols for direct (point-to-point) router to router communication." +msgid "" +"The protocols for direct (point-to-point) router to router communication." msgstr "" #: i2p2www/pages/site/docs/index.html:173 @@ -545,31 +538,27 @@ msgstr "" msgid "Bug tracker" msgstr "XÉ™ta indikatoru" -#: i2p2www/pages/site/docs/index.html:257 -msgid "Viewmtn inside I2P" -msgstr "" - -#: i2p2www/pages/site/docs/index.html:260 +#: i2p2www/pages/site/docs/index.html:256 msgid "I2P Source exported to GitHub" msgstr "" -#: i2p2www/pages/site/docs/index.html:262 +#: i2p2www/pages/site/docs/index.html:258 msgid "I2P Source Git Repo inside I2P" msgstr "" -#: i2p2www/pages/site/docs/index.html:264 +#: i2p2www/pages/site/docs/index.html:260 msgid "Source translation at Transifex" msgstr "" -#: i2p2www/pages/site/docs/index.html:266 +#: i2p2www/pages/site/docs/index.html:262 msgid "Roadmap" msgstr "Yol xÉ™ritÉ™si" -#: i2p2www/pages/site/docs/index.html:268 +#: i2p2www/pages/site/docs/index.html:264 msgid "To Do List" msgstr "" -#: i2p2www/pages/site/docs/index.html:268 +#: i2p2www/pages/site/docs/index.html:264 msgid "not current" msgstr "" @@ -577,43 +566,30 @@ msgstr "" msgid "" "I2P ships with a generic naming library and a base implementation \n" "designed to work off a local name to destination mapping, as well as an\n" -"add-on application called the <a href=\"#addressbook\">address book</a>." -" \n" -"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to " -"Tor's .onion addresses." +"add-on application called the <a href=\"#addressbook\">address book</a>. \n" +"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses." msgstr "" #: i2p2www/pages/site/docs/naming.html:15 msgid "" "The address book is a web-of-trust\n" -"driven secure, distributed, and human readable naming system, sacrificing" -" only\n" -"the call for all human readable names to be globally unique by mandating " -"only\n" -"local uniqueness. While all messages in I2P are cryptographically " -"addressed\n" -"by their destination, different people can have local address book " -"entries for\n" -"\"Alice\" which refer to different destinations. People can still " -"discover new\n" -"names by importing published address books of peers specified in their " -"web of trust,\n" -"by adding in the entries provided through a third party, or (if some " -"people organize\n" -"a series of published address books using a first come first serve " -"registration\n" -"system) people can choose to treat these address books as name servers, " -"emulating\n" +"driven secure, distributed, and human readable naming system, sacrificing only\n" +"the call for all human readable names to be globally unique by mandating only\n" +"local uniqueness. While all messages in I2P are cryptographically addressed\n" +"by their destination, different people can have local address book entries for\n" +"\"Alice\" which refer to different destinations. People can still discover new\n" +"names by importing published address books of peers specified in their web of trust,\n" +"by adding in the entries provided through a third party, or (if some people organize\n" +"a series of published address books using a first come first serve registration\n" +"system) people can choose to treat these address books as name servers, emulating\n" "traditional DNS." msgstr "" #: i2p2www/pages/site/docs/naming.html:29 #, python-format msgid "" -"NOTE: For the reasoning behind the I2P naming system, common arguments " -"against it\n" -"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming" -" discussion</a>\n" +"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n" +"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n" "page." msgstr "" @@ -643,34 +619,31 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:55 msgid "" -"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for " -"lookups and points\n" +"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n" "the user to remote jump services to assist with failed lookups." msgstr "" #: i2p2www/pages/site/docs/naming.html:59 msgid "" -"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to " -"add hosts to their local hosts.txt" +"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add " +"hosts to their local hosts.txt" msgstr "" #: i2p2www/pages/site/docs/naming.html:62 msgid "" -"HTTP <a href=\"#jump-services\">jump services</a> which provide their own" -" lookups and redirection." +"HTTP <a href=\"#jump-services\">jump services</a> which provide their own " +"lookups and redirection." msgstr "" #: i2p2www/pages/site/docs/naming.html:65 msgid "" -"The <a href=\"#addressbook\">address book</a> application which merges " -"external\n" +"The <a href=\"#addressbook\">address book</a> application which merges external\n" "host lists, retrieved via HTTP, with the local list." msgstr "" #: i2p2www/pages/site/docs/naming.html:69 msgid "" -"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web " -"front-end\n" +"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n" "for address book configuration and viewing of the local host lists." msgstr "" @@ -682,15 +655,11 @@ msgstr "" #, python-format msgid "" "All destinations in I2P are 516-byte (or longer) keys.\n" -"(To be more precise, it is a 256-byte public key plus a 128-byte signing " -"key\n" -"plus a 3-or-more byte certificate, which in Base64 representation is 516 " -"or more bytes.\n" -"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> " -"are in use now\n" +"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n" +"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n" +"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n" "for signature type indication.\n" -"Therefore, certificates in recently-generated destinations are more than " -"3 bytes." +"Therefore, certificates in recently-generated destinations are more than 3 bytes." msgstr "" #: i2p2www/pages/site/docs/naming.html:87 @@ -709,8 +678,7 @@ msgid "" "The hosts.txt Naming Service does a simple linear search through\n" "text files. This naming service was the default until\n" "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n" -"The hosts.txt format had become too slow after the file grew to thousands" -" of entries." +"The hosts.txt format had become too slow after the file grew to thousands of entries." msgstr "" #: i2p2www/pages/site/docs/naming.html:102 @@ -718,8 +686,7 @@ msgstr "" msgid "" "It does a linear search through three local files, in order, to\n" "look up host names and convert them to a 516-byte destination key.\n" -"Each file is in a simple <a href=\"%(configuration)s\">configuration file" -" format</a>, with hostname=base64, one per line.\n" +"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n" "The files are:" msgstr "" @@ -729,8 +696,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:116 msgid "" -"The Blockfile Naming Service stores multiple \"address books\" in a " -"single\n" +"The Blockfile Naming Service stores multiple \"address books\" in a single\n" "database file named hostsdb.blockfile.\n" "This Naming Service is the default since release 0.8.8." msgstr "" @@ -738,32 +704,22 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:122 #, python-format msgid "" -"A blockfile is simply on-disk storage of multiple sorted maps (key-value " -"pairs),\n" +"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n" "implemented as skiplists.\n" -"The blockfile format is specified on the <a " -"href=\"%(blockfile)s\">Blockfile page</a>.\n" -"It provides fast Destination lookup in a compact format. While the " -"blockfile overhead is substantial,\n" -"the destinations are stored in binary rather than in Base 64 as in the " -"hosts.txt format.\n" -"In addition, the blockfile provides the capability of arbitrary metadata " -"storage\n" -"(such as added date, source, and comments) for each entry to implement " -"advanced address book features.\n" -"The blockfile storage requirement is a modest increase over the hosts.txt" -" format, and the blockfile provides\n" +"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n" +"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n" +"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n" +"In addition, the blockfile provides the capability of arbitrary metadata storage\n" +"(such as added date, source, and comments) for each entry to implement advanced address book features.\n" +"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n" "approximately 10x reduction in lookup times." msgstr "" #: i2p2www/pages/site/docs/naming.html:134 msgid "" -"On creation, the naming service imports entries from the three files used" -" by the hosts.txt Naming Service.\n" -"The blockfile mimics the previous implementation by maintaining three " -"maps that\n" -"are searched in-order, named privatehosts.txt, userhosts.txt, and " -"hosts.txt.\n" +"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n" +"The blockfile mimics the previous implementation by maintaining three maps that\n" +"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n" "It also maintains a reverse-lookup map to implement rapid reverse lookups." msgstr "" @@ -793,31 +749,24 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:158 #, python-format msgid "" -"The naming service is specified with the configuration property " -"<tt>i2p.naming.impl=class</tt>.\n" +"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n" "Other implementations are possible. For example,\n" -"there is an experimental facility for real-time lookups (a la DNS) over " -"the network within the router.\n" -"For more information see the <a " -"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion" -" page</a>." +"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n" +"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:165 msgid "" -"The HTTP proxy does a lookup via the router for all hostnames ending in " -"'.i2p'.\n" +"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n" "Otherwise, it forwards the request to a configured HTTP outproxy.\n" -"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-" -"Top Level Domain '.i2p'." +"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'." msgstr "" #: i2p2www/pages/site/docs/naming.html:171 #, python-format msgid "" "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n" -"following the procedures specified in <a href=\"%(rfc6761)s\">RFC " -"6761</a>." +"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:177 @@ -856,14 +805,11 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:202 msgid "" "For this reason, the only subscription configured by\n" -"default is <code>http://i2p-projekt.i2p/hosts.txt " -"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>," -" \n" +"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n" "which contains a copy of the hosts.txt included\n" "in the I2P release.\n" "Users must configure additional subscriptions in their\n" -"local address book application (via subscriptions.txt or <a " -"href=\"#susidns\">SusiDNS</a>)." +"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)." msgstr "" #: i2p2www/pages/site/docs/naming.html:211 @@ -872,8 +818,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:218 msgid "" -"The operators of these services may have various policies for listing " -"hosts.\n" +"The operators of these services may have various policies for listing hosts.\n" "Presence on this list does not imply endorsement." msgstr "" @@ -884,12 +829,10 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:224 msgid "" -"While there are hopefully not any technical limitations within I2P on " -"host names,\n" +"While there are hopefully not any technical limitations within I2P on host names,\n" "the address book enforces several restrictions on host names\n" "imported from subscriptions.\n" -"It does this for basic typographical sanity and compatibility with " -"browsers,\n" +"It does this for basic typographical sanity and compatibility with browsers,\n" "and for security.\n" "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n" "Any hostnames violating these rules may not be propagated\n" @@ -902,13 +845,13 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:243 msgid "" -"Names are checked for conflict with existing names in the existing " -"userhosts.txt and hosts.txt\n" +"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n" "(but not privatehosts.txt) after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:248 -msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." +msgid "" +"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:252 @@ -944,8 +887,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:280 msgid "" "Certain hostnames reserved for project use are not allowed\n" -"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, " -"*.console.i2p, and others)" +"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)" msgstr "" #: i2p2www/pages/site/docs/naming.html:285 @@ -968,8 +910,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:302 msgid "" -"Any name received via subscription that passes all the checks is added " -"via the local naming service." +"Any name received via subscription that passes all the checks is added via " +"the local naming service." msgstr "" #: i2p2www/pages/site/docs/naming.html:306 @@ -986,19 +928,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:317 msgid "" -"International Domain Names (IDN) also work in i2p (using punycode 'xn--' " -"form).\n" -"To see IDN .i2p domain names rendered correctly in Firefox's location " -"bar,\n" +"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n" +"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n" "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config." msgstr "" #: i2p2www/pages/site/docs/naming.html:323 msgid "" -"As the address book application does not use privatehosts.txt at all, in " -"practice\n" -"this file is the only place where it is appropriate to place private " -"aliases or\n" +"As the address book application does not use privatehosts.txt at all, in practice\n" +"this file is the only place where it is appropriate to place private aliases or\n" "\"pet names\" for sites already in hosts.txt." msgstr "" @@ -1013,16 +951,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:338 msgid "" "Address Book will publish the merged hosts.txt to a location\n" -"(traditionally hosts.txt in the local I2P Site's home directory) to be " -"accessed by others\n" +"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n" "for their subscriptions.\n" "This step is optional and is disabled by default." msgstr "" #: i2p2www/pages/site/docs/naming.html:346 msgid "" -"The address book application, together with eepget, saves the Etag and/or" -" Last-Modified\n" +"The address book application, together with eepget, saves the Etag and/or Last-Modified\n" "information returned by the web server of the subscription.\n" "This greatly reduces the bandwidth required, as the web server will\n" "return a '304 Not Modified' on the next fetch if nothing has changed." @@ -1039,8 +975,7 @@ msgid "" "Hosts serving a static hosts.txt or an equivalent CGI application\n" "are strongly encouraged to deliver\n" "a Content-Length header, and either an Etag or Last-Modified header.\n" -"Also ensure that the server delivers a '304 Not Modified' when " -"appropriate.\n" +"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n" "This will dramatically reduce the network bandwidth, and\n" "reduce chances of corruption." msgstr "" @@ -1051,8 +986,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:368 msgid "" -"A host add service is a simple CGI application that takes a hostname and " -"a Base64 key as parameters\n" +"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n" "and adds that to its local hosts.txt.\n" "If other routers subscribe to that hosts.txt, the new hostname/key\n" "will be propagated through the network." @@ -1060,10 +994,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:375 msgid "" -"It is recommended that host add services impose, at a minimum, the " -"restrictions imposed by the address book application listed above.\n" -"Host add services may impose additional restrictions on hostnames and " -"keys, for example:" +"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n" +"Host add services may impose additional restrictions on hostnames and keys, for example:" msgstr "" #: i2p2www/pages/site/docs/naming.html:380 @@ -1116,10 +1048,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:426 msgid "" -"A jump service is a simple CGI application that takes a hostname as a " -"parameter\n" -"and returns a 301 redirect to the proper URL with a " -"<code>?i2paddresshelper=key</code>\n" +"A jump service is a simple CGI application that takes a hostname as a parameter\n" +"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n" "string appended.\n" "The HTTP proxy will interpret the appended string and\n" "use that key as the actual destination.\n" @@ -1142,16 +1072,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:448 msgid "" -"SusiDNS is simply a web interface front-end to configuring address book " -"subscriptions\n" +"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n" "and accessing the four address book files.\n" "All the real work is done by the 'address book' application." msgstr "" #: i2p2www/pages/site/docs/naming.html:454 msgid "" -"Currently, there is little enforcement of address book naming rules " -"within SusiDNS,\n" +"Currently, there is little enforcement of address book naming rules within SusiDNS,\n" "so a user may enter hostnames locally that would be rejected by\n" "the address book subscription rules." msgstr "" @@ -1165,36 +1093,29 @@ msgid "" "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n" "Base32 addresses are much shorter and easier to handle than the\n" "full 516-character Base64 Destinations or addresshelpers.\n" -"Example: " -"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" +"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" msgstr "" #: i2p2www/pages/site/docs/naming.html:468 #, python-format msgid "" -"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 " -"hash.\n" +"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n" "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n" "The form is {52 chars}.b32.i2p.\n" "Tor has a\n" -"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94" -"-december-4th-2013\">proposal</a>\n" -"to convert to an identical format of {52 chars}.onion for their hidden " -"services.\n" +"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n" +"to convert to an identical format of {52 chars}.onion for their hidden services.\n" "Base32 is implemented in the naming service, which queries the\n" "router over I2CP to lookup the LeaseSet to get the full Destination.\n" -"Base32 lookups will only be successful when the Destination is up and " -"publishing\n" +"Base32 lookups will only be successful when the Destination is up and publishing\n" "a LeaseSet.\n" -"Because resolution may require a network database lookup, it may take " -"significantly\n" +"Because resolution may require a network database lookup, it may take significantly\n" "longer than a local address book lookup." msgstr "" #: i2p2www/pages/site/docs/naming.html:483 msgid "" -"Base32 addresses can be used in most places where hostnames or full " -"destinations\n" +"Base32 addresses can be used in most places where hostnames or full destinations\n" "are used, however there are some exceptions where they may fail if the\n" "name does not immediately resolve. I2PTunnel will fail, for example, if\n" "the name does not resolve to a destination." @@ -1220,8 +1141,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:12 msgid "" -"There are now plugins available that support distributed email, blogs, " -"IRC\n" +"There are now plugins available that support distributed email, blogs, IRC\n" "clients, distributed file storage, wikis, and more." msgstr "" @@ -1241,8 +1161,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:31 msgid "" -"Support large or special-purpose applications that would never be bundled" -"\n" +"Support large or special-purpose applications that would never be bundled\n" "with the I2P installation" msgstr "" @@ -1256,8 +1175,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:44 msgid "" -"Separate initial install and update packages, if desired, for smaller " -"update downloads" +"Separate initial install and update packages, if desired, for smaller update" +" downloads" msgstr "" #: i2p2www/pages/site/docs/plugins.html:48 @@ -1287,7 +1206,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/plugins.html:70 -msgid "Automatic integration and startup of webapps into console Jetty instance" +msgid "" +"Automatic integration and startup of webapps into console Jetty instance" msgstr "" #: i2p2www/pages/site/docs/plugins.html:74 @@ -1327,32 +1247,21 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:101 msgid "" -"To install and start a plugin, copy the <code>.xpi2p</code> install link " -"to\n" +"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n" "the form at the bottom of\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp" -" in\n" -"your router console</a> and click the \"install plugin\" button. After a" -"\n" -"plugin is installed and started, a link to the plugin will usually appear" -" at\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n" +"your router console</a> and click the \"install plugin\" button. After a\n" +"plugin is installed and started, a link to the plugin will usually appear at\n" "the top of your summary bar." msgstr "" #: i2p2www/pages/site/docs/plugins.html:110 msgid "" -"To update a plugin to the latest version, just click the update button on" -"\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>." -"\n" -"There is also a button to check if the plugin has a more recent version, " -"as\n" -"well as a button to check for updates for all plugins. Plugins will be " -"checked\n" -"for updates automatically when updating to a new I2P release (not " -"including dev\n" +"To update a plugin to the latest version, just click the update button on\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n" +"There is also a button to check if the plugin has a more recent version, as\n" +"well as a button to check for updates for all plugins. Plugins will be checked\n" +"for updates automatically when updating to a new I2P release (not including dev\n" "builds)." msgstr "" @@ -1363,25 +1272,21 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:121 #, python-format msgid "" -"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and " -"the\n" +"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n" "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s." msgstr "" #: i2p2www/pages/site/docs/plugins.html:126 #, python-format msgid "" -"See also the sources for plugins developed by various people. Some " -"plugins, such\n" -"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were " -"developed\n" +"See also the sources for plugins developed by various people. Some plugins, such\n" +"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n" "specifically as examples." msgstr "" #: i2p2www/pages/site/docs/plugins.html:132 msgid "" -"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P" -"\n" +"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n" "or easily add some feature." msgstr "" @@ -1393,8 +1298,7 @@ msgstr "" #, python-format msgid "" "To create a plugin from an existing binary package you will need to get\n" -"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in " -"monotone</a>." +"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:144 @@ -1410,8 +1314,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:151 msgid "" "Updates of a plugin with included jars (not wars) won't be recognized if\n" -"the plugin was already run, as it requires class loader trickery to flush" -" the\n" +"the plugin was already run, as it requires class loader trickery to flush the\n" "class cache; a full router restart is required." msgstr "" @@ -1421,32 +1324,27 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:161 msgid "" -"Plugins running in a separate JVM create a <code>logs/</code> directory " -"in\n" +"Plugins running in a separate JVM create a <code>logs/</code> directory in\n" "<code>$CWD</code>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:166 msgid "" -"No initial keys are present, except for those of jrandom and zzz (using " -"the\n" +"No initial keys are present, except for those of jrandom and zzz (using the\n" "same keys as for router update), so the first key seen for a signer is\n" "automatically accepted—there is no signing key authority." msgstr "" #: i2p2www/pages/site/docs/plugins.html:172 msgid "" -"When deleting a plugin, the directory is not always deleted, especially " -"on\n" +"When deleting a plugin, the directory is not always deleted, especially on\n" "Windows." msgstr "" #: i2p2www/pages/site/docs/plugins.html:177 msgid "" -"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result " -"in a\n" -"\"plugin is corrupt\" message if pack200 compression of the plugin file " -"is used." +"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n" +"\"plugin is corrupt\" message if pack200 compression of the plugin file is used." msgstr "" #: i2p2www/pages/site/docs/plugins.html:182 @@ -1463,8 +1361,7 @@ msgstr "" #: i2p2www/pages/site/docs/ports.html:7 msgid "" -"These are the ports used or reserved by I2P, including those for known " -"plugins,\n" +"These are the ports used or reserved by I2P, including those for known plugins,\n" "common alternates,\n" "and some typical related applications." msgstr "" @@ -1489,8 +1386,8 @@ msgid "Reseed Hosts" msgstr "" #: i2p2www/pages/site/docs/reseed.html:3 -msgid "January 2016" -msgstr "Yanvar 2016" +msgid "September 2021" +msgstr "" #: i2p2www/pages/site/docs/reseed.html:8 msgid "About Reseed hosts" @@ -1498,49 +1395,57 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:10 msgid "" -"Reseed hosts are needed to for bootstrapping, that is, providing the " -"initial set of I2P nodes for your I2P node to talk to. Depending on the " -"status of your node it may need to bootstrap every now and then if many " -"of the nodes it knows of aren't contactable." +"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n" +"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n" +"it may need to bootstrap every now and then if many of the nodes it knows of\n" +"aren't contactable." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:14 +#: i2p2www/pages/site/docs/reseed.html:17 msgid "" -"Reseeding is done over an encrypted connection and all of the bootstrap " -"information is signed by the reseed host you connect to, making it " -"impossible for an unauthenticated source to provide you with false " -"information." +"Reseeding is done over an encrypted connection and all of the bootstrap\n" +"information is signed by the reseed host you connect to, making it impossible\n" +"for an unauthenticated source to provide you with false information." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:19 +#: i2p2www/pages/site/docs/reseed.html:24 msgid "Running a Reseed host" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:21 +#: i2p2www/pages/site/docs/reseed.html:26 msgid "" -"The more reseed hosts that are run, the more resilient the I2P network " -"becomes, and the harder it is to prevent users of I2P from connecting to " -"the network." +"Operating a reseed server can be accessible to any sysadmin familiar\n" +"with I2P, and we encourage new reseed operators to get in contact with us at\n" +"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n" +"are run, the more resilient the I2P network becomes, and the harder it is to\n" +"prevent users of I2P from connecting to the network." +msgstr "" + +#: i2p2www/pages/site/docs/reseed.html:39 +msgid "Other ways of Reseeding" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:25 +#: i2p2www/pages/site/docs/reseed.html:42 msgid "" -"There have also been cases where the reseed hosts we had, have been under" -" heavy load due to botnet activities." +"In order to make I2P more reslient, other kinds of reseeding are possible. One\n" +"important way of carrying out a reseed is the file-based reseed, where a user\n" +"with a running I2P router generates a reseed file for a friend and transfers it\n" +"to them as a .zip file. Others use cloud-based infrastructure to resist\n" +"censorship. These reseed methods provide functionality which aids people in\n" +"situations where reseeds are restricted." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:33 -msgid "Thank you" +#: i2p2www/pages/site/docs/reseed.html:58 +msgid "Thank you Reseed Operators" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:35 +#: i2p2www/pages/site/docs/reseed.html:60 msgid "" -"If you are running a reseed server, We would like to thank you for " -"helping to\n" +"If you are running a reseed server, We would like to thank you for helping to\n" "make the I2P network stronger and more resilient than ever." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:41 +#: i2p2www/pages/site/docs/reseed.html:66 msgid "Thank you." msgstr "SaÄŸ olun." @@ -1550,12 +1455,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:12 msgid "" -"At this point, most of the good ideas from BOB have been incorporated " -"into\n" -"SAMv3, which has more features and more real-world use. BOB still works, " -"but it\n" -"is not gaining the advanced features available to SAMv3 and is " -"essentially\n" +"At this point, most of the good ideas from BOB have been incorporated into\n" +"SAMv3, which has more features and more real-world use. BOB still works, but it\n" +"is not gaining the advanced features available to SAMv3 and is essentially\n" "unsupported at this time." msgstr "" @@ -1570,27 +1472,25 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:35 msgid "" "<code>ERROR</code> as is implied returns the message <code>\"ERROR " -"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what" -" went wrong." +"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what " +"went wrong." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:38 msgid "" -"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be " -"returned, it is on the same line. <code>OK</code> means the command is " -"finished." +"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, " +"it is on the same line. <code>OK</code> means the command is finished." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:41 msgid "" -"<code>DATA</code> lines contain information that you requested. There may" -" be multiple <code>DATA</code> lines per request." +"<code>DATA</code> lines contain information that you requested. There may be" +" multiple <code>DATA</code> lines per request." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:45 msgid "" -"<b>NOTE:</b> The help command is the ONLY command that has an exception " -"to\n" +"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n" "the rules... it can actually return nothing! This is intentional, since\n" "help is a HUMAN and not an APPLICATION command." msgstr "" @@ -1601,8 +1501,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:53 msgid "" -"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated," -" depending on the system.\n" +"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n" "On connection, BOB outputs two lines:" msgstr "" @@ -1612,8 +1511,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:67 msgid "" -"Note that previous versions used upper-case hex digits and did not " -"conform to I2P versioning standards.\n" +"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n" "It is recommended that subsequent versions use digits 0-9 only." msgstr "" @@ -1649,16 +1547,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:91 msgid "" "<b>PLEASE NOTE:</b>\n" -"For CURRENT details on the commands PLEASE use the built-in help command." -"\n" -"Just telnet to localhost 2827 and type help and you can get full " -"documentation on each command." +"For CURRENT details on the commands PLEASE use the built-in help command.\n" +"Just telnet to localhost 2827 and type help and you can get full documentation on each command." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:97 msgid "" -"Commands never get obsoleted or changed, however new commands do get " -"added from time to time." +"Commands never get obsoleted or changed, however new commands do get added " +"from time to time." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:102 @@ -1675,36 +1571,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:130 msgid "" -"Once set up, all TCP sockets can and will block as needed, and there is " -"no need for any\n" -"additional messages to/from the command channel. This allows the router " -"to pace the\n" -"stream without exploding with OOM like SAM does as it chokes on " -"attempting to shove\n" -"many streams in or out one socket -- that can't scale when you have alot " -"of connections!" +"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n" +"additional messages to/from the command channel. This allows the router to pace the\n" +"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n" +"many streams in or out one socket -- that can't scale when you have alot of connections!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:137 msgid "" -"What is also nice about this particular interface is that writing " -"anything to interface\n" -"to it, is much much easier than SAM. There is no other processing to do " -"after the set up.\n" -"It's configuration is so simple, that very simple tools, such as nc " -"(netcat) can be used\n" -"to point to some application. The value there is that one could schedule " -"up and down times\n" -"for an application, and not have to change the application to do that, or" -" to even have\n" -"to stop that application. Instead, you can literally \"unplug\" the " -"destination, and\n" -"\"plug it in\" again. As long as the same IP/port addresses and " -"destination keys are used\n" -"when bringing the bridge up, the normal TCP application won't care, and " -"won't notice.\n" -"It will simply be fooled -- the destinations are not reachable, and that " -"nothing is coming in." +"What is also nice about this particular interface is that writing anything to interface\n" +"to it, is much much easier than SAM. There is no other processing to do after the set up.\n" +"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n" +"to point to some application. The value there is that one could schedule up and down times\n" +"for an application, and not have to change the application to do that, or to even have\n" +"to stop that application. Instead, you can literally \"unplug\" the destination, and\n" +"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n" +"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n" +"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:149 @@ -1713,12 +1596,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:151 msgid "" -"For the following example, we'll setup a very simple local loopback " -"connection,\n" -"with two destinations. Destination \"mouth\" will be the CHARGEN service " -"from\n" -"the INET superserver daemon. Destination \"ear\" will be a local port " -"that you\n" +"For the following example, we'll setup a very simple local loopback connection,\n" +"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n" +"the INET superserver daemon. Destination \"ear\" will be a local port that you\n" "can telnet into, and watch the pretty ASCII test puke forth." msgstr "" @@ -1767,30 +1647,28 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:186 msgid "" -"At this point, there was no error, a destination with a nickname of " -"\"mouth\"\n" -"is set up. When you contact the destination provided, you actually " -"connect\n" +"At this point, there was no error, a destination with a nickname of \"mouth\"\n" +"is set up. When you contact the destination provided, you actually connect\n" "to the <code>CHARGEN</code> service on <code>19/TCP</code>." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:192 -msgid "Now for the other half, so that we can actually contact this destination." +msgid "" +"Now for the other half, so that we can actually contact this destination." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:214 msgid "" "Now all we need to do is telnet into 127.0.0.1, port 37337,\n" -"send the destination key or host address from address book we want to " -"contact.\n" +"send the destination key or host address from address book we want to contact.\n" "In this case, we want to contact \"mouth\", all we do is paste in the\n" "key and it goes." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:221 msgid "" -"<b>NOTE:</b> The \"quit\" command in the command channel does NOT " -"disconnect the tunnels like SAM." +"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect" +" the tunnels like SAM." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:238 @@ -1807,14 +1685,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:291 msgid "" -"Pretty cool isn't it? Try some other well known I2P SITES if you like, " -"nonexistent ones,\n" -"etc, to get a feel for what kind of output to expect in different " -"situations.\n" -"For the most part, it is suggested that you ignore any of the error " -"messages.\n" -"They would be meaningless to the application, and are only presented for " -"human debugging." +"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n" +"etc, to get a feel for what kind of output to expect in different situations.\n" +"For the most part, it is suggested that you ignore any of the error messages.\n" +"They would be meaningless to the application, and are only presented for human debugging." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:298 @@ -1831,8 +1705,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:328 msgid "" -"Now to remove \"ear\", note that this is what happens when you type too " -"fast,\n" +"Now to remove \"ear\", note that this is what happens when you type too fast,\n" "and shows you what typical ERROR messages looks like." msgstr "" @@ -1887,16 +1760,11 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:7 #, python-format msgid "" -"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide " -"authenticated\n" -"and repliable messages in a standard format. This lets applications " -"reliably read\n" -"the \"from\" address out of a datagram and know that the address really " -"sent the\n" -"message. This is necessary for some applications since the base I2P " -"message is\n" -"completely raw - it has no \"from\" address (unlike IP packets). In " -"addition, the\n" +"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n" +"and repliable messages in a standard format. This lets applications reliably read\n" +"the \"from\" address out of a datagram and know that the address really sent the\n" +"message. This is necessary for some applications since the base I2P message is\n" +"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n" "message and sender are authenticated by signing the payload." msgstr "" @@ -1905,8 +1773,7 @@ msgstr "" msgid "" "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n" "are an application-level construct.\n" -"These protocols are independent of the low-level <a " -"href=\"%(transports)s\">transports</a>;\n" +"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n" "the protocols are converted to I2NP messages by the router, and\n" "either protocol may be carried by either transport." msgstr "" @@ -1922,8 +1789,7 @@ msgid "" "<a href=\"%(url)s\">datagram API</a>,\n" "while applications in other languages \n" "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n" -"There is also limited support in i2ptunnel in the <a " -"href=\"%(socks)s\">SOCKS proxy</a>,\n" +"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n" "the 'streamr' tunnel types, and udpTunnel classes." msgstr "" @@ -1933,34 +1799,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:38 msgid "" -"The application designer should carefully consider the tradeoff of " -"repliable vs. non-repliable\n" -"datagrams. Also, the datagram size will affect reliability, due to tunnel" -" fragmentation into 1KB\n" -"tunnel messages. The more message fragments, the more likely that one of " -"them will be dropped\n" -"by an intermediate hop. Messages larger than a few KB are not " -"recommended.\n" +"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n" +"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n" +"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n" +"by an intermediate hop. Messages larger than a few KB are not recommended.\n" "Over about 10 KB, the delivery probablility drops dramatically.\n" -"Messages over 16 KB cannot be delivered over NTCP, dropping delivery " -"chances even more." +"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:47 #, python-format msgid "" -"Also note that the various overheads added by lower layers, in particular" -" asymmetric\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on " -"intermittent messages\n" -"such as used by a Kademlia-over-UDP application. The implementations are " -"currently tuned\n" -"for frequent traffic using the streaming library. There are a high number" -"\n" -"of session tags delivered, and a short session tag lifetime, for example." -"\n" -"There are currently no configuration parameters available within I2CP to " -"tune\n" +"Also note that the various overheads added by lower layers, in particular asymmetric\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n" +"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n" +"for frequent traffic using the streaming library. There are a high number\n" +"of session tags delivered, and a short session tag lifetime, for example.\n" +"There are currently no configuration parameters available within I2CP to tune\n" "the ElGamal Session Tag parameters." msgstr "" @@ -1973,38 +1828,30 @@ msgid "" "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n" "Applications may or may not choose to set the\n" "protocol in the I2CP header. It is not set by default.\n" -"It must be set to demultiplex datagram and streaming traffic received on " -"the same Destination." +"It must be set to demultiplex datagram and streaming traffic received on the same Destination." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:65 #, python-format msgid "" "As datagrams are not connection-oriented, the application may require\n" -"port numbers to correlate datagrams with particular peers or " -"communications sessions,\n" +"port numbers to correlate datagrams with particular peers or communications sessions,\n" "as is traditional with UDP over IP.\n" -"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as " -"described in\n" +"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n" "the <a href=\"%(i2cp)s#format\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:73 #, python-format msgid "" -"There is no method within the datagram API to specify whether it is non-" -"repliable (raw)\n" -"or repliable. The application should be designed to expect the " -"appropriate type.\n" +"There is no method within the datagram API to specify whether it is non-repliable (raw)\n" +"or repliable. The application should be designed to expect the appropriate type.\n" "The I2CP protocol number or port should be used by the application to\n" "indicate datagram type.\n" -"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW " -"are defined in the\n" +"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n" "<a href=\"%(i2psession)s\">I2PSession API</a>\n" -"for this purpose. A common design pattern in client/server datagram " -"applications is to\n" -"use signed datagrams for a request which includes a nonce, and use a raw " -"datagram\n" +"for this purpose. A common design pattern in client/server datagram applications is to\n" +"use signed datagrams for a request which includes a nonce, and use a raw datagram\n" "for the reply, returning the nonce from the request." msgstr "" @@ -2038,19 +1885,17 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:107 #, python-format msgid "" -"Each datagram is sent through I2P as a single message (or as an " -"individual clove in a\n" +"Each datagram is sent through I2P as a single message (or as an individual clove in a\n" "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n" "Message encapsulation is implemented in the underlying\n" "<a href=\"%(i2cp)s\">I2CP</a>,\n" "<a href=\"%(i2np)s\">I2NP</a>, and\n" "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n" -"There is no packet delimiter mechanism or length field in the datagram " -"protocol." +"There is no packet delimiter mechanism or length field in the datagram protocol." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:120 -#: i2p2www/pages/site/docs/transport/ssu.html:675 +#: i2p2www/pages/site/docs/transport/ssu.html:680 msgid "Specification" msgstr "" @@ -2065,17 +1910,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:5 #, python-format msgid "" -"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-" -"RPC\">JSONRPC2</a> interface via the plugin <a " -"href=\"%(itoopie)s\">I2PControl</a>.\n" -"The aim of the interface is to provide simple way to interface with a " -"running I2P node. A client, itoopie, has been developed in parallel.\n" -"The JSONRPC2 implementation for the client as well as the plugin is " -"provided by the java libraries <a href=\"http://software.dzhuvinov.com" -"/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" -"A list of implementations of JSON-RPC for various languages can be found " -"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC " -"wiki</a>." +"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n" +"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n" +"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" +"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:12 @@ -2130,8 +1968,8 @@ msgstr "Açıqlama" #: i2p2www/pages/site/docs/api/i2pcontrol.html:48 msgid "" -"Token used for authenticating every request (excluding the 'Authenticate'" -" RPC method)" +"Token used for authenticating every request (excluding the 'Authenticate' " +"RPC method)" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:56 @@ -2140,8 +1978,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:57 msgid "" -"Creates and returns an authentication token used for further " -"communication." +"Creates and returns an authentication token used for further communication." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:59 @@ -2174,8 +2011,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:117 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:73 @@ -2237,7 +2074,8 @@ msgid "Returns true if any changes were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:98 -msgid "Returns true if any changes requiring a restart to take effect were made." +msgid "" +"Returns true if any changes requiring a restart to take effect were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:101 @@ -2310,8 +2148,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:157 msgid "" -"Initiates a router reseed, fetching peers into our NetDB from a remote " -"host." +"Initiates a router reseed, fetching peers into our NetDB from a remote host." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:158 @@ -2320,8 +2157,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:159 msgid "" -"Restarts the router gracefully (waits for participating tunnels to " -"expire)." +"Restarts the router gracefully (waits for participating tunnels to expire)." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:160 @@ -2367,7 +2203,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:175 -msgid "Fetches or sets various network related settings. Ports, addresses etc." +msgid "" +"Fetches or sets various network related settings. Ports, addresses etc." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:177 @@ -2378,8 +2215,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:178 msgid "" -"What hostname is used for the TCP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the TCP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:179 @@ -2396,8 +2233,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:181 msgid "" -"What hostname is used for the UDP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the UDP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:182 @@ -2411,19 +2248,20 @@ msgid "What ip has been detected by the UDP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:184 -msgid "Is UPnP enabled. If null is submitted, current setting will be returned." +msgid "" +"Is UPnP enabled. If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:185 msgid "" -"How many percent of bandwidth is usable for participating tunnels. If " -"null is submitted, current setting will be returned." +"How many percent of bandwidth is usable for participating tunnels. If null " +"is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:186 msgid "" -"How many KB/s of inbound bandwidth is allowed. If null is submitted, " -"current setting will be returned." +"How many KB/s of inbound bandwidth is allowed. If null is submitted, current" +" setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:187 @@ -2434,15 +2272,15 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:188 msgid "" -"Is laptop mode enabled (change router identity and UDP port when IP " -"changes ). If null is submitted, current setting will be returned." +"Is laptop mode enabled (change router identity and UDP port when IP changes " +"). If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:189 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method. If null is submitted, current setting will" -" be returned." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method. If null is submitted, current setting will be " +"returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:192 @@ -2455,8 +2293,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:194 msgid "" -"If requested, returns the method used for automatically detecting ip for " -"the TCP transport." +"If requested, returns the method used for automatically detecting ip for the" +" TCP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:195 @@ -2469,8 +2307,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:197 msgid "" -"If requested, returns methods used for detecting the ip address of the " -"UDP transport." +"If requested, returns methods used for detecting the ip address of the UDP " +"transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:198 @@ -2601,34 +2439,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:237 msgid "" -"The version of the I2PControl API used wasn't specified, but is required " -"to be specified." +"The version of the I2PControl API used wasn't specified, but is required to " +"be specified." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:238 msgid "" -"The version of the I2PControl API specified is not supported by " -"I2PControl." +"The version of the I2PControl API specified is not supported by I2PControl." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:8 #, python-format msgid "" "I2PTunnel is a tool for interfacing with and providing services on I2P.\n" -"Destination of an I2PTunnel can be defined using a <a " -"href=\"%(naming)s\">hostname</a>,\n" -"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination " -"key.\n" -"An established I2PTunnel will be available on your client machine as " -"localhost:port.\n" -"If you wish to provide a service on I2P network, you simply create " -"I2PTunnel to the\n" -"appropriate ip_address:port. A corresponding 516-byte destination key " -"will be generated\n" +"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n" +"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n" +"An established I2PTunnel will be available on your client machine as localhost:port.\n" +"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n" +"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n" "for the service and it will become avaliable throughout I2P.\n" "A web interface for I2PTunnel management is avaliable on\n" -"<a " -"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." +"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:20 @@ -2642,8 +2473,7 @@ msgstr "Server tunellÉ™ri" #: i2p2www/pages/site/docs/api/i2ptunnel.html:23 msgid "" "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n" -"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient " -"and quick hosting on I2P.\n" +"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n" "<br>The document root is:" msgstr "" @@ -2653,10 +2483,8 @@ msgstr "MüştÉ™ri tunellÉ™ri" #: i2p2www/pages/site/docs/api/i2ptunnel.html:33 msgid "" -"A HTTP proxy used for browsing I2P and the regular internet anonymously " -"through I2P. \n" -"Browsing internet through I2P uses a random proxy specified by the " -"\"Outproxies:\" option." +"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n" +"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:37 @@ -2699,31 +2527,26 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:56 msgid "" -"Opens a local TCP port that connects to a service (like HTTP, FTP or " -"SMTP) on a destination inside of I2P.\n" -"The tunnel is directed to a random host from the comma seperated (\", \")" -" list of destinations." +"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n" +"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:62 msgid "" -"A HTTP-client tunnel. The tunnel connects to the destination specified by" -" the URL\n" -"in a HTTP request. Supports proxying onto internet if an outproxy is " -"provided. Strips HTTP connections of the following headers:" +"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n" +"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:67 msgid "" "<b>Accept, Accept-Charset, Accept-Language\n" -" and Accept-Ranges</b> as they vary greatly between browsers and can be " -"used as an identifier." +" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:90 msgid "" -"Depending on if the tunnel is using an outproxy or not it will append the" -" following User-Agent:" +"Depending on if the tunnel is using an outproxy or not it will append the " +"following User-Agent:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:94 @@ -2736,10 +2559,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:100 msgid "" -"Creates a connection to a random IRC server specified by the comma " -"seprated (\", \") \n" -"list of destinations. Only a whitelisted subset of IRC commands are " -"allowed due to anonymity concerns." +"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n" +"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:105 @@ -2752,8 +2573,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:144 msgid "" -"Enables using the I2P router as a SOCKS proxy with the command whitelist " -"specified by\n" +"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n" "<a href=\"#client-mode-irc\">IRC</a> client mode." msgstr "" @@ -2765,8 +2585,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:156 msgid "" -"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr " -"client tunnel will \n" +"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n" "subscribe to a streamr server tunnel." msgstr "" @@ -2780,32 +2599,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:171 msgid "" -"Creates a destination to a local HTTP server ip:port. Supports gzip for " -"requests with \n" -"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in" -" such a request." +"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n" +"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:177 msgid "" -"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client " -"with no outproxying\n" -"capabilities. An example application would be a web application that does" -" client-type\n" +"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n" +"capabilities. An example application would be a web application that does client-type\n" "requests, or loopback-testing an I2P Site as a diagnostic tool." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:184 msgid "" -"Creates a destination that filters the reqistration sequence of a client " -"and passes \n" +"Creates a destination that filters the reqistration sequence of a client and passes \n" "the clients destination key as a hostname to the IRC-server." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:190 msgid "" -"A UDP-client that connects to a media server is created. The UDP-Client " -"is coupled with a Streamr server I2PTunnel." +"A UDP-client that connects to a media server is created. The UDP-Client is " +"coupled with a Streamr server I2PTunnel." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:2 @@ -2822,14 +2636,11 @@ msgstr "" msgid "" "The ministreaming library has been enhanced and extended by the\n" "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n" -"Ministreaming is deprecated and is incompatible with today's " -"applications.\n" +"Ministreaming is deprecated and is incompatible with today's applications.\n" "The following documentation is old.\n" -"Also note that streaming extends ministreaming in the same Java package " -"(net.i2p.client.streaming),\n" +"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n" "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n" -"Obsolete ministreaming classes and methods are clearly marked as " -"deprecated in the Javadocs." +"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:19 @@ -2837,17 +2648,12 @@ msgstr "" msgid "" "\n" "The ministreaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" @@ -2855,42 +2661,29 @@ msgstr "" #, python-format msgid "" "The ministreaming library was written by mihi as a part of his \n" -"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out" -" and released\n" -"under the BSD license. It is called the \"mini\"streaming library " -"because it makes\n" -"some simplifications in the implementation, while a more robust streaming" -" library\n" -"could be further optimized for operation over I2P. The two main issues " -"with \n" +"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n" +"under the BSD license. It is called the \"mini\"streaming library because it makes\n" +"some simplifications in the implementation, while a more robust streaming library\n" +"could be further optimized for operation over I2P. The two main issues with \n" "the ministreaming library are its use of the traditional TCP two phase \n" -"establishment protocol and the current fixed window size of 1. The " -"establishment\n" -"issue is minor for long lived streams, but for short ones, such as quick " -"HTTP\n" -"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As " -"for the window\n" -"size, the ministreaming library doesn't maintain any ID or ordering " -"within the \n" -"messages sent (or include any application level ACK or SACK), so it must " -"wait \n" -"on average twice the time it takes to send a message before sending " -"another." +"establishment protocol and the current fixed window size of 1. The establishment\n" +"issue is minor for long lived streams, but for short ones, such as quick HTTP\n" +"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As for the window\n" +"size, the ministreaming library doesn't maintain any ID or ordering within the \n" +"messages sent (or include any application level ACK or SACK), so it must wait \n" +"on average twice the time it takes to send a message before sending another." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:45 #, python-format msgid "" -"Even with those issues, the ministreaming library performs quite well in " -"many\n" +"Even with those issues, the ministreaming library performs quite well in many\n" "situations, and its <a href=\"%(api)s\">API</a>\n" -"is both quite simple and capable of remaining unchanged as different " -"streaming\n" +"is both quite simple and capable of remaining unchanged as different streaming\n" "implementations are introduced. The library is deployed in its own \n" "ministreaming.jar.\n" "Developers in Java who would like to use it can\n" -"access the API directly, while developers in other languages can use it " -"through\n" +"access the API directly, while developers in other languages can use it through\n" "<a href=\"%(samv3)s\">SAM</a>'s streaming support." msgstr "" @@ -2929,8 +2722,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:5 msgid "" "\n" -"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are " -"supported.\n" +"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n" "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n" "Both shared-clients and non-shared are supported.\n" "There is no SOCKS outproxy so it is of limited use." @@ -2951,8 +2743,7 @@ msgid "" "information as content, I2P has no way to protect your anonymity. For\n" "example, some mail applications will send the IP address of the machine\n" "they are running on to a mail server. There is no way for I2P to filter\n" -"this, thus using I2P to 'socksify' existing applications is possible, but" -"\n" +"this, thus using I2P to 'socksify' existing applications is possible, but\n" "extremely dangerous." msgstr "" @@ -3031,47 +2822,34 @@ msgstr "" #, python-format msgid "" "The streaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:29 msgid "" "In consideration of the relatively high cost of messages, \n" -"the streaming library's protocol for scheduling and delivering those " -"messages has been optimized to\n" -"allow individual messages passed to contain as much information as is " -"available.\n" -"For instance, a small HTTP transaction proxied through the streaming " -"library can\n" -"be completed in a single round trip - the first messages bundle a SYN, " -"FIN, and\n" +"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n" +"allow individual messages passed to contain as much information as is available.\n" +"For instance, a small HTTP transaction proxied through the streaming library can\n" +"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n" "the small HTTP request payload, and the reply bundles the SYN,\n" "FIN, ACK, and the HTTP response payload. While an additional\n" -"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has " -"been\n" -"received, the local HTTP proxy can often deliver the full response to the" -" browser \n" +"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n" +"received, the local HTTP proxy can often deliver the full response to the browser \n" "immediately." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:42 msgid "" "The streaming library bears much resemblance to an \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms\n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK,\n" +"abstraction of TCP, with its sliding windows, congestion control algorithms\n" +"(both slow start and congestion avoidance), and general packet behavior (ACK,\n" "SYN, FIN, RST, rto calculation, etc)." msgstr "" @@ -3091,29 +2869,21 @@ msgstr "APÄ°" #: i2p2www/pages/site/docs/api/streaming.html:60 #, python-format msgid "" -"The streaming library API provides a standard socket paradigm to Java " -"applications.\n" -"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, " -"except that\n" -"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> " -"through the\n" +"The streaming library API provides a standard socket paradigm to Java applications.\n" +"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n" +"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n" "streaming library, to be interpreted by I2CP." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:67 #, python-format msgid "" -"The standard interface to the streaming lib is for the application to use" -" the\n" +"The standard interface to the streaming lib is for the application to use the\n" "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n" -"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks " -"the\n" -"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will " -"cause\n" -"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The " -"application\n" -"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> " -"or\n" +"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n" +"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n" +"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n" +"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n" "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>." msgstr "" @@ -3134,17 +2904,12 @@ msgstr "" #, python-format msgid "" "The options and current default values are listed below.\n" -"Options are case-sensitive and may be set for the whole router, for a " -"particular client, or for an individual socket on a\n" +"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n" "per-connection basis.\n" -"Many values are tuned for HTTP performance over typical I2P conditions. " -"Other applications such\n" +"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n" "as peer-to-peer services are strongly encouraged to\n" -"modify as necessary, by setting the options and passing them via the call" -" to\n" -"<a " -"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost," -" _i2cpPort, opts).\n" +"modify as necessary, by setting the options and passing them via the call to\n" +"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n" "Time values are in ms." msgstr "" @@ -3152,17 +2917,14 @@ msgstr "" #, python-format msgid "" "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n" -"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>," -"\n" +"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" "may override these defaults with their own defaults.\n" -"Also note that many options only apply to servers listening for incoming " -"connections." +"Also note that many options only apply to servers listening for incoming connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:110 msgid "" -"As of release 0.9.1, most, but not all, options may be changed on an " -"active socket manager or session.\n" +"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n" "See the javadocs for details." msgstr "" @@ -3186,8 +2948,8 @@ msgstr "QeydlÉ™r" #: i2p2www/pages/site/docs/api/streaming.html:119 msgid "" -"Comma- or space-separated list of Base64 peer Hashes used for either " -"access list or blacklist." +"Comma- or space-separated list of Base64 peer Hashes used for either access " +"list or blacklist." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:121 @@ -3237,24 +2999,21 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes to be\n" "blacklisted for incoming connections to ALL destinations in the context.\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:175 msgid "" -"How much transmit data (in bytes) will be accepted that hasn't been " -"written out yet." +"How much transmit data (in bytes) will be accepted that hasn't been written " +"out yet." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:179 msgid "" "When we're in congestion avoidance, we grow the window size at the rate\n" -"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are" -" in bytes,\n" +"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are in bytes,\n" "while in I2P, window sizes are in messages.\n" "A higher number means slower growth." msgstr "" @@ -3263,16 +3022,15 @@ msgstr "" msgid "" "How long to wait after instantiating a new con \n" "before actually attempting to connect. If this is\n" -"<= 0, connect immediately with no initial data. If greater than 0, " -"wait\n" +"<= 0, connect immediately with no initial data. If greater than 0, wait\n" "until the output stream is flushed, the buffer fills, \n" "or that many milliseconds pass, and include any initial data with the SYN." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:194 msgid "" -"How long to block on connect, in milliseconds. Negative means " -"indefinitely. Default is 5 minutes." +"How long to block on connect, in milliseconds. Negative means indefinitely. " +"Default is 5 minutes." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:198 @@ -3285,30 +3043,24 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes or host names to be\n" "contacted using an alternate DSA destination.\n" -"Only applies if multisession is enabled and the primary session is non-" -"DSA\n" +"Only applies if multisession is enabled and the primary session is non-DSA\n" "(generally for shared clients only).\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:216 msgid "" "Whether to listen only for the streaming protocol.\n" -"Setting to true will prohibit communication with Destinations earlier " -"than release 0.7.1\n" -"(released March 2009). Set to true if running multiple protocols on this " -"Destination." +"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n" +"(released March 2009). Set to true if running multiple protocols on this Destination." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:226 msgid "" "(0=noop, 1=disconnect)\n" -"What to do on an inactivity timeout - do nothing, disconnect, or send a " -"duplicate ack." +"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:232 @@ -3321,8 +3073,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:237 msgid "" -"The initial value of the resend delay field in the packet header, times " -"1000.\n" +"The initial value of the resend delay field in the packet header, times 1000.\n" "Not fully implemented; see below." msgstr "" @@ -3345,8 +3096,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:255 msgid "" -"In standard TCP, window sizes are in bytes, while in I2P, window sizes " -"are in messages." +"In standard TCP, window sizes are in bytes, while in I2P, window sizes are " +"in messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:279 @@ -3388,12 +3139,12 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:333 msgid "" "(2=interactive not supported)\n" -"This doesn't currently do anything, but setting it to a value other than " -"1 will cause an error." +"This doesn't currently do anything, but setting it to a value other than 1 will cause an error." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:338 -msgid "How long to block on read, in milliseconds. Negative means indefinitely." +msgid "" +"How long to block on read, in milliseconds. Negative means indefinitely." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:342 @@ -3436,19 +3187,15 @@ msgstr "QuraÅŸdırma" #: i2p2www/pages/site/docs/api/streaming.html:387 msgid "" -"The initiator sends a packet with the SYNCHRONIZE flag set. This packet " -"may contain the initial data as well.\n" -"The peer replies with a packet with the SYNCHRONIZE flag set. This packet" -" may contain the initial response data as well." +"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n" +"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:392 msgid "" -"The initiator may send additional data packets, up to the initial window " -"size, before receiving the SYNCHRONIZE response.\n" +"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n" "These packets will also have the send Stream ID field set to 0.\n" -"Recipients must buffer packets received on unknown streams for a short " -"period of time, as they may\n" +"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n" "arrive out of order, in advance of the SYNCHRONIZE packet." msgstr "" @@ -3458,33 +3205,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:400 msgid "" -"The maximum message size (also called the MTU / MRU) is negotiated to the" -" lower value supported by\n" -"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection" -" will lead to\n" +"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n" +"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n" "a large amount of overhead.\n" "The MTU is specified by the option i2p.streaming.maxMessageSize.\n" -"The current default MTU of 1730 was chosen to fit precisely into two 1K " -"I2NP tunnel messages,\n" +"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n" "including overhead for the typical case." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:417 msgid "" -"The first message in a connection includes a 387 byte (typical) " -"Destination added by the streaming layer,\n" -"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in " -"the Garlic message by the router.\n" -"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session " -"was previously established).\n" -"Therefore, the goal of fitting a complete HTTP request in a single 1KB " -"I2NP message is not always attainable.\n" -"However, the selection of the MTU, together with careful implementation " -"of fragmentation\n" -"and batching strategies in the tunnel gateway processor, are important " -"factors in network bandwidth,\n" -"latency, reliability, and efficiency, especially for long-lived " -"connections." +"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n" +"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n" +"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n" +"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n" +"However, the selection of the MTU, together with careful implementation of fragmentation\n" +"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n" +"latency, reliability, and efficiency, especially for long-lived connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:428 @@ -3498,14 +3235,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:436 #, python-format msgid "" -"Each packet is sent through I2P as a single message (or as an individual " -"clove in a\n" -"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation " -"is implemented\n" -"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a " -"href=\"%(i2np)s\">I2NP</a>, and\n" -"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no " -"packet delimiter\n" +"Each packet is sent through I2P as a single message (or as an individual clove in a\n" +"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n" +"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n" +"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n" "mechanism or payload length field in the streaming protocol." msgstr "" @@ -3515,17 +3248,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:447 msgid "" -"Data packets may include an optional delay field specifying the requested" -" delay,\n" +"Data packets may include an optional delay field specifying the requested delay,\n" "in ms, before the receiver should ack the packet.\n" "Valid values are 0 to 60000 inclusive.\n" "A value of 0 requests an immediate ack.\n" "This is advisory only, and receivers should delay slightly so that\n" "additional packets may be acknowledged with a single ack.\n" -"Some implementations may include an advisory value of (measured RTT / 2) " -"in this field.\n" -"For nonzero optional delay values, receivers should limit the maximum " -"delay\n" +"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n" +"For nonzero optional delay values, receivers should limit the maximum delay\n" "before sending an ack to a few seconds at most.\n" "Optional delay values greater than 60000 indicate choking, see below." msgstr "" @@ -3537,46 +3267,33 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:462 msgid "" "TCP headers include the receive window in bytes.\n" -"The streaming protocol does not contain a receive window, it uses only a " -"simple choke/unchoke indication.\n" -"Each endpoint must maintain its own estimate of the far-end receive " -"window, in either bytes or packets.\n" -"The recommended minimum buffer size for receiver implementations is 128 " -"packets or 217 KB (approximately 128x1730).\n" -"Because of I2P netowrk latency, packet drops, and the resulting " -"congestion control,\n" +"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n" +"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n" +"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n" +"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n" "a buffer of this size is rarely filled.\n" -"Overflow is, however, likely to occur on high-bandwidth \"local " -"loopback\" (same-router) connections." +"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:471 msgid "" "To quickly indicate and smoothly recover from overflow conditions,\n" "there is a simple mechanism for pushback in the streaming protocol.\n" -"If a packet is received with an optional delay field of value of 60001 or" -" higher,\n" +"If a packet is received with an optional delay field of value of 60001 or higher,\n" "that indicates \"choking\" or a receive window of zero.\n" -"A packet with an optional delay field of value of 60000 or less indicates" -" \"unchoking\".\n" -"Packets without an optional delay field do not affect the choke/unchoke " -"state." +"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n" +"Packets without an optional delay field do not affect the choke/unchoke state." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:479 msgid "" -"After being choked, no more packets with data should be sent until the " -"transmitter is unchoked,\n" -"except for occasional \"probe\" data packets to compensate for possible " -"lost unchoke packets.\n" -"The choked endpoint should start a \"persist timer\" to control the " -"probing, as in TCP.\n" +"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n" +"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n" +"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n" "The unchoking endpoint should send several packets with this field set,\n" -"or continue sending them periodically until data packets are received " -"again.\n" +"or continue sending them periodically until data packets are received again.\n" "Maximum time to wait for unchoking is implementation-dependent.\n" -"Transmitter window size and congestion control strategy after being " -"unchoked is implementation-dependent." +"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:490 @@ -3585,8 +3302,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:491 msgid "" -"The streaming lib uses standard slow-start (exponential window growth) " -"and congestion avoidance (linear window growth)\n" +"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n" "phases, with exponential backoff.\n" "Windowing and acknowledgments use packet count, not byte count." msgstr "" @@ -3597,53 +3313,44 @@ msgstr "BaÄŸla" #: i2p2www/pages/site/docs/api/streaming.html:499 msgid "" -"Any packet, including one with the SYNCHRONIZE flag set, may have the " -"CLOSE flag sent as well.\n" -"The connection is not closed until the peer responds with the CLOSE flag." -"\n" +"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n" +"The connection is not closed until the peer responds with the CLOSE flag.\n" "CLOSE packets may contain data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:507 msgid "" -"There is no ping function at the I2CP layer (equivalent to ICMP echo) or " -"in datagrams.\n" +"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n" "This function is provided in streaming.\n" "Pings and pongs may not be combined with a standard streaming packet;\n" "if the ECHO option is set, then\n" -"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are " -"ignored." +"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:515 msgid "" -"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED " -"flags set.\n" -"The sendStreamId must be greater than zero, and the receiveStreamId is " -"ignored.\n" +"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n" +"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n" "The sendStreamId may or may not correspond to an existing connection." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:521 msgid "" "A pong packet must have the ECHO flag set.\n" -"The sendStreamId must be zero, and the receiveStreamId is the " -"sendStreamId from the ping.\n" -"Prior to release 0.9.18, the pong packet does not include any payload " -"that was contained in the ping." +"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n" +"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:527 msgid "" "As of release 0.9.18, pings and pongs may contain a payload.\n" -"The payload in the ping, up to a maximum of 32 bytes, is returned in the " -"pong." +"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:532 msgid "" -"Streaming may be configured to disable sending pongs with the " -"configuration i2p.streaming.answerPings=false." +"Streaming may be configured to disable sending pongs with the configuration " +"i2p.streaming.answerPings=false." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:537 @@ -3659,8 +3366,7 @@ msgid "" "This is used for \"temporal\" sharing at connection open/close time,\n" "not \"ensemble\" sharing during a connection (See\n" "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n" -"There is a separate share per ConnectionManager (i.e. per local " -"Destination)\n" +"There is a separate share per ConnectionManager (i.e. per local Destination)\n" "so that there is no information leakage to other Destinations on the\n" "same router.\n" "The share data for a given peer expires after a few minutes.\n" @@ -3673,8 +3379,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:560 msgid "" -"The following parameters are hardcoded, but may be of interest for " -"analysis:" +"The following parameters are hardcoded, but may be of interest for analysis:" msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:579 @@ -3684,25 +3389,16 @@ msgstr "Tarixçə" #: i2p2www/pages/site/docs/api/streaming.html:580 msgid "" -"The streaming library has grown organically for I2P - first mihi " -"implemented the\n" -"\"mini streaming library\" as part of I2PTunnel, which was limited to a " -"window\n" -"size of 1 message (requiring an ACK before sending the next one), and " -"then it was\n" -"refactored out into a generic streaming interface (mirroring TCP sockets)" -" and the\n" -"full streaming implementation was deployed with a sliding window protocol" -" and \n" -"optimizations to take into account the high bandwidth x delay product. " -"Individual\n" -"streams may adjust the maximum packet size and other options. The default" -"\n" -"message size is selected to fit precisely in two 1K I2NP tunnel messages," -"\n" +"The streaming library has grown organically for I2P - first mihi implemented the\n" +"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n" +"size of 1 message (requiring an ACK before sending the next one), and then it was\n" +"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n" +"full streaming implementation was deployed with a sliding window protocol and \n" +"optimizations to take into account the high bandwidth x delay product. Individual\n" +"streams may adjust the maximum packet size and other options. The default\n" +"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n" "and is a reasonable tradeoff between the bandwidth costs of \n" -"retransmitting lost messages, and the latency and overhead of multiple " -"messages." +"retransmitting lost messages, and the latency and overhead of multiple messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:594 @@ -3714,7 +3410,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:975 #: i2p2www/pages/site/docs/protocol/i2np.html:233 #: i2p2www/pages/site/docs/transport/ntcp.html:544 -#: i2p2www/pages/site/docs/transport/ssu.html:610 +#: i2p2www/pages/site/docs/transport/ssu.html:615 #: i2p2www/pages/site/docs/tunnels/implementation.html:506 msgid "Future Work" msgstr "" @@ -3733,20 +3429,16 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:604 #, python-format msgid "" -"Another area for research is the interaction of the streaming lib with " -"the\n" +"Another area for research is the interaction of the streaming lib with the\n" "NTCP and SSU transport layers.\n" "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:609 msgid "" -"The interaction of the routing algorithms with the streaming lib strongly" -" affects performance.\n" -"In particular, random distribution of messages to multiple tunnels in a " -"pool\n" -"leads to a high degree of out-of-order delivery which results in smaller " -"window\n" +"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n" +"In particular, random distribution of messages to multiple tunnels in a pool\n" +"leads to a high degree of out-of-order delivery which results in smaller window\n" "sizes than would otherwise be the case. The router currently routes \n" "messages for a single from/to destination pair through a consistent set \n" "of tunnels, until tunnel expiration or delivery failure. The router's \n" @@ -3781,11 +3473,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:636 msgid "" -"zzz has added debug code to the streaming library to log packets in a " -"wireshark-compatible\n" +"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n" "(pcap) format; Use this to further analyze performance.\n" -"The format may require enhancement to map more streaming lib parameters " -"to TCP fields." +"The format may require enhancement to map more streaming lib parameters to TCP fields." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:641 @@ -3804,18 +3494,15 @@ msgstr "Yanvar 2017" msgid "" "There are several bittorrent clients and trackers on I2P.\n" "As I2P addressing uses a Destination instead of an IP and port, minor\n" -"changes are required to tracker and client software for operation on I2P." -"\n" +"changes are required to tracker and client software for operation on I2P.\n" "These changes are specified below.\n" -"Note carefully the guidelines for compatibility with older I2P clients " -"and trackers." +"Note carefully the guidelines for compatibility with older I2P clients and trackers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:15 msgid "" "This page specifies protocol details common to all clients and trackers.\n" -"Specific clients and trackers may implement other unique features or " -"protocols." +"Specific clients and trackers may implement other unique features or protocols." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:20 @@ -3828,8 +3515,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:27 msgid "" -"Clients generally include a fake port=6881 parameter in the announce, for" -" compatibility with older trackers.\n" +"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n" "Trackers may ignore the port parameter, and should not require it." msgstr "" @@ -3841,8 +3527,7 @@ msgid "" "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "are 387+ bytes, so the Base 64 is 516+ bytes.\n" -"Clients generally append \".i2p\" to the Base 64 Destination for " -"compatibility with older trackers.\n" +"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n" "Trackers should not require an appended \".i2p\"." msgstr "" @@ -3852,18 +3537,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:46 msgid "" -"Current Destinations for clients are 387 or more bytes (516 or more in " -"Base 64 encoding).\n" +"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n" "A reasonable maximum to assume, for now, is 475 bytes.\n" -"As the tracker must decode the Base64 to deliver compact responses (see " -"below),\n" +"As the tracker must decode the Base64 to deliver compact responses (see below),\n" "the tracker should probably decode and reject bad Base64 when announced." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:53 msgid "" -"The default response type is non-compact. Clients may request a compact " -"response with\n" +"The default response type is non-compact. Clients may request a compact response with\n" "the parameter compact=1. A tracker may, but is not required to, return\n" "a compact response when requested." msgstr "" @@ -3871,10 +3553,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:59 msgid "" "Developers of new I2P clients\n" -"are strongly encouraged to implemenent announces over their own tunnel " -"rather than\n" -"the HTTP client proxy at port 4444. Doing so is both more efficient and " -"it allows\n" +"are strongly encouraged to implemenent announces over their own tunnel rather than\n" +"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n" "destination enforcement by the tracker (see below)." msgstr "" @@ -3896,8 +3576,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:76 msgid "" -"Trackers generally include a fake port key, or use the port from the " -"announce, for compatibility with older clients.\n" +"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n" "Clients must ignore the port parameter, and should not require it." msgstr "" @@ -3905,10 +3584,8 @@ msgstr "" #, python-format msgid "" "The value of the ip key is the base 64 of the client's\n" -"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as " -"described above.\n" -"Trackers generally append \".i2p\" to the Base 64 Destination if it " -"wasn't in the announce ip, for compatibility with older clients.\n" +"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n" +"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n" "Clients should not require an appended \".i2p\" in the responses." msgstr "" @@ -3923,26 +3600,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:95 #, python-format msgid "" -"In the compact response, the value of the \"peers\" dictionary key is a " -"single byte string,\n" +"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n" "whose length is a multiple of 32 bytes.\n" "This string contains the concatenated\n" "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n" "of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This hash must be computed by the tracker, unless destination enforcement" -"\n" -"(see below) is used, in which case the hash delivered in the X-I2P-" -"DestHash\n" +"This hash must be computed by the tracker, unless destination enforcement\n" +"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n" "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n" "The peers key may be absent, or the peers value may be zero-length." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:109 msgid "" -"While compact response support is optional for both clients and trackers," -" it is highly\n" +"While compact response support is optional for both clients and trackers, it is highly\n" "recommended as it reduces the nominal response size by over 90%." msgstr "" @@ -3953,34 +3626,27 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:117 #, python-format msgid "" -"Some, but not all, I2P bittorrent clients announce over their own " -"tunnels.\n" -"Trackers may choose to prevent spoofing by requiring this, and verifying " -"the\n" +"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n" +"Trackers may choose to prevent spoofing by requiring this, and verifying the\n" "client's\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n" -"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which " -"are\n" +"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n" "different formats for the same information.\n" "These headers cannot be spoofed by the client.\n" -"A tracker enforcing destinations need not require the ip announce " -"parameter at all." +"A tracker enforcing destinations need not require the ip announce parameter at all." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:129 msgid "" -"As several clients use the HTTP proxy instead of their own tunnel for " -"announces,\n" -"destination enforcement will prevent usage by those clients unless or " -"until\n" +"As several clients use the HTTP proxy instead of their own tunnel for announces,\n" +"destination enforcement will prevent usage by those clients unless or until\n" "those clients are converted to announcing over their own tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:135 msgid "" -"Unfortunately, as the network grows, so will the amount of maliciousness," -"\n" +"Unfortunately, as the network grows, so will the amount of maliciousness,\n" "so we expect that all trackers will eventually enforce destinations.\n" "Both tracker and client developers should anticipate it." msgstr "" @@ -3994,12 +3660,9 @@ msgstr "" msgid "" "Announce URL host names in torrent files generally follow the\n" "<a href=\"%(naming)s\">I2P naming standards</a>.\n" -"In addition to host names from address books and \".b32.i2p\" Base 32 " -"hostnames,\n" -"the full Base 64 Destination (with [or without?] \".i2p\" appended) " -"should be supported.\n" -"Non-open trackers should recognize their own host name in any of these " -"formats." +"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n" +"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n" +"Non-open trackers should recognize their own host name in any of these formats." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:152 @@ -4021,27 +3684,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:165 #, python-format msgid "" -"I2P uses 387+ byte <a " -"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" +"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "for addresses, as explained above." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:170 msgid "" -"If the client has only the hash of the destination (such as from a " -"compact response or PEX), it must perform a lookup\n" -"by encoding it with Base 32, appending \".b32.i2p\", and querying the " -"Naming Service,\n" +"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n" +"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n" "which will return the full Destination if available." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:176 msgid "" -"If the client has a peer's full Destination it received in a non-compact " -"response, it should use it\n" +"If the client has a peer's full Destination it received in a non-compact response, it should use it\n" "directly in the connection setup.\n" -"Do not convert a Destination back to a Base 32 hash for lookup, this is " -"quite inefficient." +"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:183 @@ -4051,40 +3709,32 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:184 msgid "" "To preserve anonymity,\n" -"I2P bittorrent clients generally do not support non-I2P announces or peer" -" connections.\n" +"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n" "I2P HTTP outproxies often block announces.\n" "There are no known SOCKS outproxies supporting bittorrent traffic." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:191 msgid "" -"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers " -"often\n" +"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n" "block accesses or announces that contain an X-Forwarded-For HTTP header.\n" -"Trackers should reject standard network announces with IPv4 or IPv6 IPs, " -"and not deliver them in responses." +"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:200 #, python-format msgid "" "I2P PEX is based on ut_pex.\n" -"As there does not appear to be a formal specification of ut_pex " -"available,\n" +"As there does not appear to be a formal specification of ut_pex available,\n" "it may be necessary to review the libtorrent source for assistance.\n" "It is an extension message, identified as \"i2p_pex\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with up to 3 keys, \"added\", " -"\"added.f\", and \"dropped\".\n" -"The added and dropped values are each a single byte string, whose length " -"is a multiple of 32 bytes.\n" +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n" +"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n" "These byte strings are the concatenated SHA-256 Hashes of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This is the same format as the peers dictionary value in the i2p compact " -"response format specified above.\n" +"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n" "The added.f value, if present, is the same as in ut_pex." msgstr "" @@ -4099,13 +3749,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:226 msgid "" -"Unlike standard DHT, I2P DHT does not use a bit in the options handshake," -" or the PORT message.\n" +"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n" "It is advertised with an extension message, identified as \"i2p_dht\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", " -"both integers." +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:235 @@ -4139,14 +3786,12 @@ msgstr "" msgid "" "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n" "instead of 4 byte IP + 2 byte port. There is no peer port.\n" -"In a response, the \"values\" key is a list of strings, each containing a" -" single compact peer info." +"In a response, the \"values\" key is a list of strings, each containing a single compact peer info." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:264 msgid "" -"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + " -"2 byte port)\n" +"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n" "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n" "In a response, the \"nodes\" key is a\n" "single byte string with concatenated compact node info." @@ -4155,10 +3800,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:271 msgid "" "Secure node ID requirement: To make various DHT attacks more difficult,\n" -"the first 4 bytes of the Node ID must match the first 4 bytes of the " -"destination Hash,\n" -"and the next two bytes of the Node ID must match the next two bytes of " -"the\n" +"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n" +"and the next two bytes of the Node ID must match the next two bytes of the\n" "destination hash exclusive-ORed with the port." msgstr "" @@ -4183,51 +3826,38 @@ msgid "" "Preliminary differences from\n" "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n" "are described below, and are subject to change.\n" -"Contact the I2P developers if you wish to develop a client or tracker " -"supporting datagram announces." +"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:299 msgid "" "A UDP tracker listens on two ports.\n" -"The \"query port\" is the advertised port, and is used to receive " -"repliable (signed) datagrams, for the connect request only.\n" -"The \"response port\" is used to receive unsigned (raw) datagrams, and is" -" the source port for all replies.\n" +"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n" +"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n" "The response port is arbitrary.\n" "A client sends and receives on a single port only.\n" "It receives only unsigned (raw) datagrams.\n" -"Raw datagrams provides increased efficiency for replies since they " -"contain tokens sent in the query, and need not be signed." +"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:309 msgid "" -"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and" -" the port is still present,\n" +"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n" "although it may be ignored by the tracker.\n" -"In the announce response, each 4-byte IP and 2-byte port is replaced by a" -" 32-byte hash (compact peer info), and no port is present.\n" -"The client sends the announce request and scrape request to the source " -"port in the announce response packet.\n" -"The connect request, connect response, scrape request, scrape response, " -"and error response are the same as in BEP 15." +"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n" +"The client sends the announce request and scrape request to the source port in the announce response packet.\n" +"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:317 msgid "" -"Source addresses in I2P cannot be spoofed, so it is possible to use a " -"simplified protocol\n" +"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n" "with 2 packets instead of 4, omitting the connect request and response.\n" -"In this case, the announce request would be a repliable datagram sent to " -"the tracker's query port,\n" +"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n" "and the tracker would not require a response port.\n" -"While this is more efficient, it would be more difficult to modify an " -"existing tracker to support this mode.\n" -"The URL for the 4-packet-mode tracker would use standard \"udp://\" " -"prefix.\n" -"The URL for a modified 2-packet-mode tracker would require a different " -"prefix if both modes are supported in I2P." +"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n" +"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n" +"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:330 @@ -4267,19 +3897,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:8 msgid "" -"This page is about bundling the entire I2P router binary with your " -"application.\n" -"It is not about writing an application to work with I2P (either bundled " -"or external)." +"This page is about bundling the entire I2P router binary with your application.\n" +"It is not about writing an application to work with I2P (either bundled or external)." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:13 msgid "" -"Lots of projects are bundling, or talking about bundling, I2P. That's " -"great if done right.\n" +"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n" "If done wrong, it could cause real harm to our network.\n" -"The I2P router is complex, and it can be a challenge to hide all the " -"complexity from your users.\n" +"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n" "This page discusses some general guidelines." msgstr "" @@ -4289,10 +3915,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:24 msgid "" -"Start a dialog. We're here to help. Applications that embed I2P are the " -"most promising - and exciting -\n" -"opportunities for us to grow the network and improve anonymity for " -"everyone." +"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n" +"opportunities for us to grow the network and improve anonymity for everyone." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:30 @@ -4301,11 +3925,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:31 msgid "" -"If your application is in Java or Scala, it's an easy choice - use the " -"Java router.\n" +"If your application is in Java or Scala, it's an easy choice - use the Java router.\n" "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n" -"For apps in other languages, best to use SAM or BOB or SOCKS and bundle " -"the Java router as a separate process.\n" +"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n" "Some of the following only applies to the Java router." msgstr "" @@ -4314,7 +3936,8 @@ msgid "Licensing" msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:40 -msgid "Ensure you meet the license requirements of the software you are bundling." +msgid "" +"Ensure you meet the license requirements of the software you are bundling." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:45 @@ -4323,29 +3946,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:46 msgid "" -"A correct default configuration is crucial. Most users will not change " -"the defaults.\n" -"The defaults for your application may need to be different than the " -"defaults for the router you are bundling.\n" +"A correct default configuration is crucial. Most users will not change the defaults.\n" +"The defaults for your application may need to be different than the defaults for the router you are bundling.\n" "Override the router defaults if necessary." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:51 msgid "" -"Some important defaults to review: Max bandwidth, tunnel quantity and " -"length, max participating tunnels.\n" -"A lot of this depends on the expected bandwidth and usage patterns of " -"your app." +"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n" +"A lot of this depends on the expected bandwidth and usage patterns of your app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:55 msgid "" -"Configure enough bandwidth and tunnels to allow your users to contribute " -"to the network.\n" -"Consider disabling external I2CP, as you probably don't need it and it " -"would conflict with any other running I2P instance.\n" -"Also look at the configs for disabling killing of the JVM on exit, for " -"example." +"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n" +"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n" +"Also look at the configs for disabling killing of the JVM on exit, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:62 @@ -4355,32 +3971,25 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:63 msgid "" "It may be tempting for you to disable participating traffic.\n" -"There's several ways to do this (hidden mode, setting max tunnels to 0, " -"setting shared bandwidth below 12 KBytes/sec).\n" -"Without participating traffic, you don't have to worry about graceful " -"shutdown,\n" +"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n" +"Without participating traffic, you don't have to worry about graceful shutdown,\n" "your users don't see bandwidth usage not generated by them, etc.\n" -"However, there's lots of reasons why you should allow participating " -"tunnels." +"However, there's lots of reasons why you should allow participating tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:70 msgid "" -"First of all, the router doesn't work that well if it doesn't have a " -"chance to \"integrate\" with the network,\n" +"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n" "which is helped tremendously by others building tunnels through you." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:74 msgid "" -"Secondly, over 90% of the routers in the current network allow " -"participating traffic.\n" +"Secondly, over 90% of the routers in the current network allow participating traffic.\n" "It's the default in the Java router.\n" -"If your application doesn't route for others and it gets really popular, " -"then it's a leech on the network,\n" +"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n" "and it upsets the balance we have now.\n" -"If it gets really big, then we become Tor, and spend our time begging for" -" people to enable relaying." +"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:81 @@ -4391,10 +4000,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:84 msgid "" -"We strongly discourage you from disabling participating traffic by " -"default.\n" -"If you do this and your application gets hugely popular, it could break " -"the network." +"We strongly discourage you from disabling participating traffic by default.\n" +"If you do this and your application gets hugely popular, it could break the network." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:90 @@ -4403,12 +4010,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:91 msgid "" -"You must save the router's data (netdb, configuration, etc.) between runs" -" of the router.\n" -"I2P does not work well if you must reseed each startup, and that's a huge" -" load on our reseed servers, and not very good for anonymity either.\n" -"Even if you bundle router infos, I2P needs saved profile data for best " -"performance." +"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n" +"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n" +"Even if you bundle router infos, I2P needs saved profile data for best performance." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:99 @@ -4417,12 +4021,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:100 msgid "" -"Give your users a way to change the configuration of the important " -"settings.\n" -"We understand that you will probably want to hide most of I2P's " -"complexity, but it's important to show some basic settings.\n" -"In addition to the defaults above, some network settings such as UPnP, " -"IP/port may be helpful." +"Give your users a way to change the configuration of the important settings.\n" +"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n" +"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:108 @@ -4431,12 +4032,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:109 msgid "" -"Above a certain bandwidth setting, and meeting other health criteria, " -"your router will become floodfill,\n" -"which may cause a large increase in connections and memory usage (at " -"least with the Java router).\n" -"Think about whether that's OK. You can disable floodfill, but then your " -"fastest users aren't contributing what they could.\n" +"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n" +"which may cause a large increase in connections and memory usage (at least with the Java router).\n" +"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n" "It also depends on the typical uptime for your application." msgstr "" @@ -4447,8 +4045,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:120 msgid "" "Decide if you are bundling router infos or using our reseed hosts.\n" -"The Java reseed host list is in the source code, so if you keep your " -"source up to date, the host list will be also.\n" +"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n" "Be aware of possible blocking by hostile governments." msgstr "" @@ -4458,12 +4055,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:130 msgid "" -"Consider setting your application tunnels to delay-open, reduce-on-idle " -"and/or close-on-idle.\n" -"This is straightforward if using i2ptunnel but you'll have to implement " -"some of it yourself if using I2CP directly.\n" -"See i2psnark for code that reduces tunnel count and then closes the " -"tunnel, even in the presence of some background DHT activity." +"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n" +"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n" +"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:138 @@ -4472,16 +4066,11 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:139 msgid "" -"Have an auto-update feature if at all possible, or at least auto-" -"notification of a new version.\n" -"Our biggest fear is a huge number of routers out there that can't be " -"updated.\n" -"We have about 6-8 releases a year of the Java router, and it's critical " -"to the health of the network that the users keep up.\n" -"We usually have over 80% of the network on the latest release within " -"6 weeks after the release, and we'd like to keep it that way.\n" -"You don't need to worry about disabling the router's built-in auto-update" -" function, as that code is in the router console,\n" +"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n" +"Our biggest fear is a huge number of routers out there that can't be updated.\n" +"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n" +"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n" +"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n" "which you presumably are not bundling." msgstr "" @@ -4492,17 +4081,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:151 msgid "" "Have a gradual rollout plan. Don't overwhelm the network all at once.\n" -"We currently have approximately 25K unique users per day and 40K uniques " -"per month.\n" -"We are probably able to handle growth of 2-3X per year without too much " -"issue.\n" -"If you anticipate a faster rampup than that, OR the bandwidth " -"distribution (or uptime distribution,\n" -"or any other significant characteristic) of your userbase is " -"significantly different from our current userbase,\n" +"We currently have approximately 25K unique users per day and 40K uniques per month.\n" +"We are probably able to handle growth of 2-3X per year without too much issue.\n" +"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n" +"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n" "we really need to have a discussion.\n" -"The bigger your growth plans, the more important everthing else in this " -"checklist is." +"The bigger your growth plans, the more important everthing else in this checklist is." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:163 @@ -4512,10 +4096,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:164 msgid "" "Tell your users that I2P works best if it keeps running.\n" -"It may be several minutes after startup before it works well, and even " -"more after first install.\n" -"If your average uptime is less than an hour, I2P is probably the wrong " -"solution." +"It may be several minutes after startup before it works well, and even more after first install.\n" +"If your average uptime is less than an hour, I2P is probably the wrong solution." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:172 @@ -4524,8 +4106,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:173 msgid "" -"Provide some indication to the user that the application tunnels are " -"ready. Encourage patience." +"Provide some indication to the user that the application tunnels are ready. " +"Encourage patience." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:178 @@ -4535,8 +4117,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:179 msgid "" "If possible, delay the shutdown until your participating tunnels expire.\n" -"Don't let your users break tunnels easily, or at least ask them to " -"confirm." +"Don't let your users break tunnels easily, or at least ask them to confirm." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:185 @@ -4545,8 +4126,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:186 msgid "" -"It would be nice if you give your users links to learn more about I2P and" -" to donate." +"It would be nice if you give your users links to learn more about I2P and to" +" donate." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:192 @@ -4556,8 +4137,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:193 msgid "" "Depending on your user base and application,\n" -"it may be helpful to provide an option or a separate package to use an " -"external router." +"it may be helpful to provide an option or a separate package to use an external router." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:200 @@ -4566,8 +4146,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:201 msgid "" -"If you plan to use or link to other common I2P services (news feeds, " -"hosts.txt subscriptions, trackers, outproxies, etc.),\n" +"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n" "make sure you aren't overloading them,\n" "and talk to the people who are running them to make sure it's ok." msgstr "" @@ -4579,10 +4158,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:210 msgid "" "I2P includes an SNTP client. I2P requires correct time to operate.\n" -"It will compensate for a skewed system clock but this may delay startup. " -"You may disable I2P's SNTP queries,\n" -"but this isn't advised unless your application makes sure the system " -"clock is correct." +"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n" +"but this isn't advised unless your application makes sure the system clock is correct." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:218 @@ -4591,41 +4168,30 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:219 msgid "" -"At a minimum you will need i2p.jar, router.jar, streaming.jar, and " -"mstreaming.jar.\n" +"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n" "You may omit the two streaming jars for a datagram-only app.\n" "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n" -"Don't forget jbigi.jar, or a subset of it for the platforms you support, " -"to make the crypto much faster.\n" +"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n" "Java 7 or higher is required to build.\n" -"If you're building Debian / Ubuntu packages, you should require the I2P " -"package from our PPA instead of bundling it.\n" -"You almost certainly do not need susimail, susidns, the router console, " -"and i2psnark, for example." +"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n" +"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:228 msgid "" -"The following files should be included in the I2P installation directory," -" specified with the \"i2p.dir.base\" property.\n" -"Don't forget the certificates/ directory, which is required for " -"reseeding, and blocklist.txt for IP validation.\n" -"The geoip directory is optional, but recommended so the router can make " -"decisions based on location.\n" -"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that" -" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)." -"\n" -"The hosts.txt file may be necessary, you may modify it to include any " -"hosts your application uses.\n" -"You may add a router.config file to the base directory to override " -"initial defaults.\n" +"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n" +"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n" +"The geoip directory is optional, but recommended so the router can make decisions based on location.\n" +"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n" +"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n" +"You may add a router.config file to the base directory to override initial defaults.\n" "Review and edit or remove the clients.config and i2ptunnel.config files." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:237 msgid "" -"License requirements may require you to include the LICENSES.txt file and" -" the licenses directory." +"License requirements may require you to include the LICENSES.txt file and " +"the licenses directory." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:243 @@ -4643,17 +4209,14 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:255 msgid "" "Our Android router app may be shared by multiple clients.\n" -"If it is not installed, the user will be prompted when he starts a client" -" app." +"If it is not installed, the user will be prompted when he starts a client app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:259 msgid "" -"Some developers have expressed concern that this is a poor user " -"experience,\n" +"Some developers have expressed concern that this is a poor user experience,\n" "and they wish to embed the router in their app.\n" -"We do have an Android router service library on our roadmap, which could " -"make embedding easier.\n" +"We do have an Android router service library on our roadmap, which could make embedding easier.\n" "More information needed." msgstr "" @@ -4668,11 +4231,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:272 msgid "" -"We have a limited number of our jars on <a " -"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven" -" Central</a>.\n" -"There are numerous trac tickets for us to address that will improve and " -"expand the released jars on Maven Central." +"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n" +"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:282 @@ -4682,17 +4242,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:283 msgid "" "If your application is using I2P datagrams, e.g. for a DHT,\n" -"there's lots of advanced options available to reduce overhead and " -"increase reliability.\n" +"there's lots of advanced options available to reduce overhead and increase reliability.\n" "This may take some time and experimentation to get working well.\n" "Be aware of size/reliability tradeoffs. Talk to us for help.\n" -"It is possible - and recommended - to use Datagrams and Streaming on the " -"same Destination.\n" +"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n" "Don't create separate Destinations for this.\n" -"Don't try to store your unrelated data in the existing network DHTs " -"(iMule, bote, bittorrent, and router).\n" -"Build your own. If you are hardcoding seed nodes, we recommend that you " -"have several." +"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n" +"Build your own. If you are hardcoding seed nodes, we recommend that you have several." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:296 @@ -4702,8 +4258,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:297 msgid "" "Let's work together. Don't wait until it's done.\n" -"Give us your Twitter handle and start tweeting about it, we will return " -"the favor." +"Give us your Twitter handle and start tweeting about it, we will return the favor." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:303 @@ -4722,8 +4277,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:311 msgid "" -"This may be obvious, but join the community. Run I2P 24/7. Start an I2P " -"Site about your project.\n" +"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n" "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n" "We can help get you users, testers, translators, or even coders." msgstr "" @@ -4734,12 +4288,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:320 msgid "" -"You may wish to install and play with the I2P Android app, and look at " -"its code, for an example of an application that bundles the router.\n" +"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n" "See what we expose to the user and what we hide.\n" "Look at the state machine we use to start and stop the router.\n" -"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak," -" and Monero." +"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:328 @@ -4754,10 +4306,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:359 msgid "" -"This code is for the case where your application starts the router, as in" -" our Android app.\n" -"You could also have the router start the application via the " -"clients.config and i2ptunnel.config files,\n" +"This code is for the case where your application starts the router, as in our Android app.\n" +"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n" "together with Jetty webapps,\n" "as is done in our Java packages.\n" "As always, state management is the difficult part." @@ -4775,13 +4325,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:7 msgid "" -"Cloning large software repositories over I2P can be difficult, and using " -"git can sometimes make this harder. Fortunately, it can also sometimes " -"make it easier. Git has a <code>git bundle</code> command which can be " -"used to turn a git repository into a file which git can then clone, " -"fetch, or import from a location on your local disk. By combining this " -"capability with bittorrent downloads, we can solve our remaining problems" -" with <code>git clone</code>." +"Cloning large software repositories over I2P can be difficult, and using git" +" can sometimes make this harder. Fortunately, it can also sometimes make it " +"easier. Git has a <code>git bundle</code> command which can be used to turn " +"a git repository into a file which git can then clone, fetch, or import from" +" a location on your local disk. By combining this capability with bittorrent" +" downloads, we can solve our remaining problems with <code>git clone</code>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:8 @@ -4790,13 +4339,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:9 msgid "" -"If you intend to generate a git bundle, you <strong>must</strong> already" -" possess a full copy of the <strong>git</strong> repository, not the mtn " -"repository. You can get it from github or from git.idk.i2p, but a shallow" -" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will" -" fail silently, creating what looks like a bundle, but when you try to " -"clone it it will fail. If you are just retrieving a pre-generated git " -"bundle, then this section does not apply to you." +"If you intend to generate a git bundle, you <strong>must</strong> already " +"possess a full copy of the <strong>git</strong> repository, not the mtn " +"repository. You can get it from github or from git.idk.i2p, but a shallow " +"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will " +"fail silently, creating what looks like a bundle, but when you try to clone " +"it it will fail. If you are just retrieving a pre-generated git bundle, then" +" this section does not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:10 @@ -4806,23 +4355,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:11 msgid "" "Someone will need to supply you with a torrent file or a magnet link " -"corresponding to an existing <code>git bundle</code> that they have " -"already generated for you. A recent, correctly-generated bundle of the " -"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be " -"found inside of I2P at my pastebin <a " +"corresponding to an existing <code>git bundle</code> that they have already " +"generated for you. A recent, correctly-generated bundle of the mainline " +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of " +"I2P at my pastebin <a " "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:12 msgid "" "Once you have a bundle, you will need to use git to create a working " -"repository from it. If you’re using GNU/Linux and i2psnark, the git " -"bundle should be located in $HOME/.i2p/i2psnark or, as a service on " -"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on " -"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/†instead. The " -"examples here assume I2PSnark on GNU/Linux, if you use something else, " -"replace the path to the bundle with the download directory preferred by " -"your client and platform." +"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle " +"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, " +"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it " +"is probably at “$HOME/BiglyBT Downloads/†instead. The examples here assume " +"I2PSnark on GNU/Linux, if you use something else, replace the path to the " +"bundle with the download directory preferred by your client and platform." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:13 @@ -4835,8 +4383,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:16 msgid "" -"If you get the following error, try using git init and git fetch manually" -" instead." +"If you get the following error, try using git init and git fetch manually " +"instead." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:18 @@ -4871,10 +4419,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:29 msgid "" -"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you " -"have a successfully <code>--unshallow</code>ed clone of clone of the " -"i2p.i2p repository. If you already have a clone, make sure you run " -"<code>git fetch --unshallow</code> before you generate a torrent bundle." +"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have " +"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p " +"repository. If you already have a clone, make sure you run <code>git fetch " +"--unshallow</code> before you generate a torrent bundle." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:30 @@ -4883,8 +4431,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:32 msgid "" -"and copy the resulting bundle into your I2PSnark downloads directory. For" -" instance:" +"and copy the resulting bundle into your I2PSnark downloads directory. For " +"instance:" msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:34 @@ -4895,14 +4443,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:7 msgid "" -"Tutorial for setting up git access through an I2P Tunnel. This tunnel " -"will act as your access point to a single git service on I2P." +"Tutorial for setting up git access through an I2P Tunnel. This tunnel will " +"act as your access point to a single git service on I2P." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:8 msgid "" -"If you intend to use the service at i2pgit.org/git.idk.i2p, then you " -"probably already have a tunnel configured and much of this\n" +"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n" "tutorial will not apply to you." msgstr "" @@ -4913,22 +4460,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:11 msgid "" "To create your repositories on a remote git service, sign up for a user " -"account at that service. Of course it’s also possible to create " -"repositories locally and push them to a remote git service, but most will" -" require an account and for you to create a space for the repository on " -"the server. Gitlab has a very simple sign-up form:" +"account at that service. Of course it’s also possible to create repositories" +" locally and push them to a remote git service, but most will require an " +"account and for you to create a space for the repository on the server. " +"Gitlab has a very simple sign-up form:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:12 msgid "" -"These are generic instructions for any in-i2p Git instance with HTTP and " -"SSH gateways.\n" -"If you intend to contribute to I2P, you should create an account at the " -"I2P gitlab, which is open to the\n" -"community. Account registration may take a few days to complete, as the " -"admin needs to sort through a large\n" -"number of spam registrations. You can help this by getting in touch with " -"the admin to confirm you are human\n" +"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n" +"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n" +"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n" +"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n" "using the instructions on the home page." msgstr "" @@ -4942,10 +4485,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:27 msgid "" -"To make sure the setup process works, it helps to make a repository to " -"test with from the server, and for the sake of this tutorial, we’re going" -" to use a fork of the I2P router. First, browse to the i2p-" -"hackers/i2p.i2p repository:" +"To make sure the setup process works, it helps to make a repository to test " +"with from the server, and for the sake of this tutorial, we’re going to use " +"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p " +"repository:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:34 @@ -4954,20 +4497,20 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:42 msgid "" -"To have read-write access to my server, you’ll need to set up a tunnel " -"for your SSH client. As an example, we’re going to use the HTTP tunnel " -"instead, but if all you need is read-only, HTTP/S cloning, then you can " -"skip all this and just use the http_proxy environment variable to " -"configure git to use the pre-configured I2P HTTP Proxy. For example:" +"To have read-write access to my server, you’ll need to set up a tunnel for " +"your SSH client. As an example, we’re going to use the HTTP tunnel instead, " +"but if all you need is read-only, HTTP/S cloning, then you can skip all this" +" and just use the http_proxy environment variable to configure git to use " +"the pre-configured I2P HTTP Proxy. For example:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:50 msgid "" -"Then, add the address you will be pushing and pulling from. Note that " -"this example address is for Read-Only HTTP-over-I2P clones, if your admin" -" does not allow the git HTTP(Smart HTTP) protocol, then you will need to " -"get the SSH clone base32 from them. If you have an SSH clone base32, " -"substitute it for the base32 in this step, which will fail." +"Then, add the address you will be pushing and pulling from. Note that this " +"example address is for Read-Only HTTP-over-I2P clones, if your admin does " +"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the " +"SSH clone base32 from them. If you have an SSH clone base32, substitute it " +"for the base32 in this step, which will fail." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:54 @@ -4995,8 +4538,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:68 msgid "" "Git Privacy: Committing to git adds a timestamp to git commit messages, " -"which may be configured to reflect your local time zone. To enforce the " -"use of UTC for all commits, you are advised to use a git alias, such as:" +"which may be configured to reflect your local time zone. To enforce the use " +"of UTC for all commits, you are advised to use a git alias, such as:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:70 @@ -5014,33 +4557,33 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:78 msgid "" "You might get an error where the remote end hangs up unexpectedly. " -"Unfortunately git still doesn’t support resumable cloning. Until it does," -" there are a couple fairly easy ways to handle this. The first and " -"easiest is to try and clone to a shallow depth:" +"Unfortunately git still doesn’t support resumable cloning. Until it does, " +"there are a couple fairly easy ways to handle this. The first and easiest is" +" to try and clone to a shallow depth:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:81 msgid "" -"Once you’ve performed a shallow clone, you can fetch the rest resumably " -"by changing to the repo directory and running:" +"Once you’ve performed a shallow clone, you can fetch the rest resumably by " +"changing to the repo directory and running:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:83 msgid "" -"At this point, you still don’t have all your branches yet. You can get " -"them by running the following commands:" +"At this point, you still don’t have all your branches yet. You can get them " +"by running the following commands:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:86 msgid "" -"Which tells git to alter the repository configuration so that fetching " -"from origin fetches all branches." +"Which tells git to alter the repository configuration so that fetching from " +"origin fetches all branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:87 msgid "" -"If that doesn’t work, you can try opening the tunnel configuration menu " -"and adding some backup tunnels." +"If that doesn’t work, you can try opening the tunnel configuration menu and " +"adding some backup tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:91 @@ -5058,26 +4601,26 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:96 msgid "" -"Revision control can make your life easier, but it works best if you use " -"it well! In light of this, we strongly suggest a fork-first, feature-" -"branch workflow as many are familiar with from Github. In such a " -"workflow, the master branch is used as a sort of “Trunk†for updates and " -"is never touched by the programmmer, instead, all changes to the master " -"are merged from branches. In order to do set up your workspace for this, " -"take the following steps:" +"Revision control can make your life easier, but it works best if you use it " +"well! In light of this, we strongly suggest a fork-first, feature-branch " +"workflow as many are familiar with from Github. In such a workflow, the " +"master branch is used as a sort of “Trunk†for updates and is never touched " +"by the programmmer, instead, all changes to the master are merged from " +"branches. In order to do set up your workspace for this, take the following " +"steps:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:98 msgid "" -"<strong>Never make changes to the Master Branch</strong>. You will be " -"using the master branch to periodially obtain updates to the official " -"source code. All changes should be made in feature branches." +"<strong>Never make changes to the Master Branch</strong>. You will be using " +"the master branch to periodially obtain updates to the official source code." +" All changes should be made in feature branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:101 msgid "" -"Set up a second remote in your local repository using the upstream source" -" code." +"Set up a second remote in your local repository using the upstream source " +"code." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:103 @@ -5086,33 +4629,31 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:105 msgid "" -"Before making any changes to the source code, check out a new feature " -"branch to develop on:" +"Before making any changes to the source code, check out a new feature branch" +" to develop on:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:107 msgid "" -"When you’re done with your changes, commit them and push them to your " -"branch" +"When you’re done with your changes, commit them and push them to your branch" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:110 msgid "" -"Submit a merge request. When the merge request is approved and brought " -"into the upstream master, check out the master locally and pull in the " -"changes:" +"Submit a merge request. When the merge request is approved and brought into " +"the upstream master, check out the master locally and pull in the changes:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:113 msgid "" -"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, " -"you can update your master code using this procedure as well." +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you " +"can update your master code using this procedure as well." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:117 msgid "" -"The git utccommit alias solution to git timestamp issue was arrived at " -"from the information first published here" +"The git utccommit alias solution to git timestamp issue was arrived at from " +"the information first published here" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:6 @@ -5121,22 +4662,21 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:7 msgid "" -"Mirror I2P Git repositories and Bridge Non-private internet.repositories " -"for others." +"Mirror I2P Git repositories and Bridge Non-private internet.repositories for" +" others." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:10 msgid "" -"This is the setup process I use for configuring Gitlab and I2P, with " -"Docker in place to manage the service itself. Gitlab is very easy to host" -" on I2P in this fashion, it can be administered by one person without " -"much difficulty. In my configuration, I use a Debian VM to host docker " -"containers and an I2P router, on a Debian Host system, however, this may " -"be more than necessary for some people. These instructions should work on" -" any Debian-based system, regardless of whether it is in a VM or not, and" -" should easily translate to any system where Docker and an I2P router are" -" available. This guide starts at Docker and does not assume any VM " -"underneath." +"This is the setup process I use for configuring Gitlab and I2P, with Docker " +"in place to manage the service itself. Gitlab is very easy to host on I2P in" +" this fashion, it can be administered by one person without much difficulty." +" In my configuration, I use a Debian VM to host docker containers and an I2P" +" router, on a Debian Host system, however, this may be more than necessary " +"for some people. These instructions should work on any Debian-based system, " +"regardless of whether it is in a VM or not, and should easily translate to " +"any system where Docker and an I2P router are available. This guide starts " +"at Docker and does not assume any VM underneath." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:11 @@ -5145,15 +4685,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:12 msgid "" -"Because Gitlab runs in a container, we only need to install the " -"dependencies required for the container on our main system. Conveniently," -" you can install everything you need with:" +"Because Gitlab runs in a container, we only need to install the dependencies" +" required for the container on our main system. Conveniently, you can " +"install everything you need with:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:14 msgid "" -"on an otherwise unmodified Debian system, or if you have added Docker’s " -"own “Community†Debian repository, you may use:" +"on an otherwise unmodified Debian system, or if you have added Docker’s own " +"“Community†Debian repository, you may use:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:16 @@ -5166,62 +4706,61 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:18 msgid "" -"Once you have docker installed, you can fetch the docker containers " -"required for gitlab. <em>Don’t run them yet.</em>" +"Once you have docker installed, you can fetch the docker containers required" +" for gitlab. <em>Don’t run them yet.</em>" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:20 msgid "" -"For those who are concerned, the gitlab-ce Docker image is built using " -"only Ubuntu Docker images as a parent, which are built from scratch " -"images. Since there are no third-party images involved here, updates " -"should come as soon as they are available in the host images. To review " -"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com" -"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab " -"source code</a>." +"For those who are concerned, the gitlab-ce Docker image is built using only " +"Ubuntu Docker images as a parent, which are built from scratch images. Since" +" there are no third-party images involved here, updates should come as soon " +"as they are available in the host images. To review the Dockerfile for " +"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-" +"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:21 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:22 msgid "" "Gitlab servers inside of I2P can be run with or without the ability to " -"interact with servers on the internet outside of I2P. In the case where " -"the Gitlab server is <em>not allowed</em> to interact with servers " -"outside of I2P, they cannot be de-anonymized by cloning a git repository " -"from a git server on the internet outside of I2P. They can, however, " -"export and mirror repositories from other git services inside of I2P." +"interact with servers on the internet outside of I2P. In the case where the " +"Gitlab server is <em>not allowed</em> to interact with servers outside of " +"I2P, they cannot be de-anonymized by cloning a git repository from a git " +"server on the internet outside of I2P. They can, however, export and mirror " +"repositories from other git services inside of I2P." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:23 msgid "" "In the case where the Gitlab server is <em>allowed</em> to interact with " -"servers outside of I2P, it can act as a “Bridge†for the users, who can " -"use it to mirror content outside I2P to an I2P-accessible source, however" -" it <em>is not anonymous</em> in this case. Git services on the non-" -"anonymous internet will be connected to directly." +"servers outside of I2P, it can act as a “Bridge†for the users, who can use " +"it to mirror content outside I2P to an I2P-accessible source, however it " +"<em>is not anonymous</em> in this case. Git services on the non-anonymous " +"internet will be connected to directly." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:24 msgid "" -"<strong>If you want to have a bridged, non-anonymous Gitlab instance with" -" access to</strong> <strong>web repositories,</strong> no further " +"<strong>If you want to have a bridged, non-anonymous Gitlab instance with " +"access to</strong> <strong>web repositories,</strong> no further " "modification is necessary." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:25 msgid "" -"<strong>If you want to have an I2P-Only Gitlab instance with no access to" -" Web-Only</strong> <strong>Repositories</strong>, you will need to " -"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP " -"proxy only listens on <code>127.0.0.1</code>, you will need to set up a " -"new one for Docker that listens on the Host/Gateway address of the Docker" -" network, which is usually <code>172.17.0.1</code>. I configure mine on " -"port <code>4446</code>." +"<strong>If you want to have an I2P-Only Gitlab instance with no access to " +"Web-Only</strong> <strong>Repositories</strong>, you will need to configure " +"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only " +"listens on <code>127.0.0.1</code>, you will need to set up a new one for " +"Docker that listens on the Host/Gateway address of the Docker network, which" +" is usually <code>172.17.0.1</code>. I configure mine on port " +"<code>4446</code>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:26 @@ -5237,8 +4776,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:37 msgid "" "Visit your Local Gitlab instance and set up your admin account. Choose a " -"strong password, and configure user account limits to match your " -"resources." +"strong password, and configure user account limits to match your resources." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:38 @@ -5249,21 +4787,19 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:39 msgid "" -"It’s also possible to apply your HTTP Proxy settings in a more granular " -"way, so that you can only allow users to mirror repositories from the " -"domains that you choose. Since the domain is presumably operated by an " -"organization, you can use this to ensure that repositories that are " -"mirrorable follow a reasonable set of policies. After all, there is far " -"more abusive content on the non-anonymous internet than there is on I2P, " -"we wouldn’t want to make it too easy to introduce abusive content from " -"such a nefarious place." +"It’s also possible to apply your HTTP Proxy settings in a more granular way," +" so that you can only allow users to mirror repositories from the domains " +"that you choose. Since the domain is presumably operated by an organization," +" you can use this to ensure that repositories that are mirrorable follow a " +"reasonable set of policies. After all, there is far more abusive content on " +"the non-anonymous internet than there is on I2P, we wouldn’t want to make it" +" too easy to introduce abusive content from such a nefarious place." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:40 msgid "" -"Add the following lines to your gitlab.rb file inside the " -"/src/gitlab/config container. These settings will take effect when you " -"restart in a moment." +"Add the following lines to your gitlab.rb file inside the /src/gitlab/config" +" container. These settings will take effect when you restart in a moment." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:56 @@ -5272,10 +4808,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:57 msgid "" -"Once you have Gitlab set up locally, go to the I2P Router console. You " -"will need to set up two server tunnels, one leading to the Gitlab " -"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface" -" on TCP Port 8022." +"Once you have Gitlab set up locally, go to the I2P Router console. You will " +"need to set up two server tunnels, one leading to the Gitlab web(HTTP) " +"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port " +"8022." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:58 @@ -5286,8 +4822,7 @@ msgstr "" msgid "" "For the Web interface, use an “HTTP†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:61 @@ -5305,8 +4840,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:64 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:65 @@ -5325,19 +4860,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:69 msgid "" -"Web services on I2P can register hostnames for themselves by providing an" -" authentication string to a jump service provider like <a " +"Web services on I2P can register hostnames for themselves by providing an " +"authentication string to a jump service provider like <a " "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" again and click on the “Gitlab Web Service†item you just set up. Scroll" -" to the bottom of the “Edit Server Settings†section and click " -"Registration Authentication. Copy the field that says “Authentication for" -" adding Hostname†and visit <a " +" again and click on the “Gitlab Web Service†item you just set up. Scroll to" +" the bottom of the “Edit Server Settings†section and click Registration " +"Authentication. Copy the field that says “Authentication for adding " +"Hostname†and visit <a " "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your " -"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then" -" you will have to use the correct authentication string for your " -"subdomain, which is a little bit more complicated and merits it’s own " -"instructions." +"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then " +"you will have to use the correct authentication string for your subdomain, " +"which is a little bit more complicated and merits it’s own instructions." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:70 @@ -5348,8 +4882,7 @@ msgstr "" msgid "" "For the SSH interface, use a “Standard†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:74 @@ -5362,8 +4895,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:76 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:80 @@ -5372,9 +4905,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:81 msgid "" -"Finally, if you either modified <code>gitlab.rb</code> or you registered " -"a hostname, you will need to re-start the gitlab service for the settings" -" to take effect." +"Finally, if you either modified <code>gitlab.rb</code> or you registered a " +"hostname, you will need to re-start the gitlab service for the settings to " +"take effect." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:2 @@ -5392,20 +4925,16 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:15 msgid "" " There are many IRC clients that can be used with I2P. In\n" -"fact, all IRC clients can be connected to the Irc2P Service by connecting" -"\n" +"fact, all IRC clients can be connected to the Irc2P Service by connecting\n" "them to the IRC Tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:28 msgid "" "To configure any IRC client to chat on Irc2P, first, make sure that\n" -"your IRC tunnel is available. Visit the <a " -"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" -"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" " -"indicator on\n" -"the right-hand side is yellow or green, your Irc2P tunnel is ready and " -"you should \n" +"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" +"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n" +"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n" "proceed to the next step." msgstr "" @@ -5422,12 +4951,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:42 msgid "" "Pidgin is a very popular Instant Messaging client with built-in IRC\n" -"support. It is also possible to use it with many other kinds of chat " -"service, and\n" -"it supports using multiple accounts at once and has a variety of plugin-" -"ins. There\n" -"is a similar application for OSX called \"Adium.\" The instructions for " -"Pidgin are\n" +"support. It is also possible to use it with many other kinds of chat service, and\n" +"it supports using multiple accounts at once and has a variety of plugin-ins. There\n" +"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n" "similar in Adium.\n" msgstr "" @@ -5443,8 +4969,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:52 msgid "" "After launching Pidgin, you should see a \"Buddy List\" window. From\n" -"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage" -" Accounts\" to\n" +"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n" "begin configuring your I2P account." msgstr "" @@ -5459,10 +4984,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:59 msgid "" "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n" -"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and" -" password. IRC\n" -"does not require you to register a nickname to join, but you may if you " -"wish, after\n" +"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n" +"does not require you to register a nickname to join, but you may if you wish, after\n" "you connect to Irc2P." msgstr "" @@ -5477,8 +5000,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:67 msgid "" "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n" -"make sure that SSL is <em>disabled</em>, since your tunnel has encryption" -" provided\n" +"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n" "by I2P." msgstr "" @@ -5522,8 +5044,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:87 msgid "" "Change the value in \"Servers\" from the default to `localhost/6669`,\n" -"and configure the default channels you want to join. I suggest #i2p and " -"#i2p-dev\n" +"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n" msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:92 @@ -5623,8 +5144,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:143 msgid "" "Revolution IRC is an easy to use IRC client for Android. It's able to\n" -"handle multiple accounts on multiple services, so you can use it for " -"Irc2P and for\n" +"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n" "your non-I2P IRC networks as well." msgstr "" @@ -5685,15 +5205,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:196 msgid "" "Eris is an easy-to-configure IRC server with self-configuring support\n" -"for I2P. If you want to run a private IRC server it's one of the easiest " -"ways." +"for I2P. If you want to run a private IRC server it's one of the easiest ways." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:199 msgid "" " This is a valid configuration of the Eris IRC server, but it uses a\n" -"default password for the admin account(admin). You should change the " -"operator.admin.password\n" +"default password for the admin account(admin). You should change the operator.admin.password\n" "and account.admin.password before deploying to a real service." msgstr "" @@ -5718,24 +5236,18 @@ msgstr "" msgid "" "As of release 0.9.4, the router supports managed clients.\n" "Managed clients are instantiated and started by the ClientAppManager.\n" -"The ClientAppManager maintains a reference to the client and receives " -"updates on the client's state.\n" -"Managed clients are preferred, as it is much easier to implement state " -"tracking\n" -"and to start and stop a client. It also is much easier to avoid static " -"references in the client code\n" +"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n" +"Managed clients are preferred, as it is much easier to implement state tracking\n" +"and to start and stop a client. It also is much easier to avoid static references in the client code\n" "which could lead to excessive memory usage after a client is stopped.\n" -"Managed clients may be started and stopped by the user in the router " -"console,\n" +"Managed clients may be started and stopped by the user in the router console,\n" "and are stopped at router shutdown." msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:31 msgid "" -"Managed clients implement either the net.i2p.app.ClientApp or " -"net.i2p.router.app.RouterApp interface.\n" -"Clients implementing the ClientApp interface must provide the following " -"constructor:" +"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n" +"Clients implementing the ClientApp interface must provide the following constructor:" msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:38 @@ -5754,12 +5266,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:49 msgid "" -"If the main class specified in the clients.config file does not implement" -" a managed interface,\n" +"If the main class specified in the clients.config file does not implement a managed interface,\n" "it will be started with main() with the arguments specified,\n" "and stopped with main() with the arguments specified.\n" -"The router does not maintain a reference, since all interactions are via " -"the static main() method.\n" +"The router does not maintain a reference, since all interactions are via the static main() method.\n" "The console cannot provide accurate state information to the user." msgstr "" @@ -5769,8 +5279,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:58 msgid "" -"Clients, whether managed or unmanaged, may register with the " -"ClientAppManager\n" +"Clients, whether managed or unmanaged, may register with the ClientAppManager\n" "so that other clients may retrieve a reference to them.\n" "Registration is by name.\n" "Known registered clients are:" @@ -5782,12 +5291,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:69 msgid "" -"The router also provides a simple mechanism for clients to find an " -"internal socket service,\n" +"The router also provides a simple mechanism for clients to find an internal socket service,\n" "such as the HTTP proxy. This is provided by the Port Mapper.\n" "Registration is by name.\n" -"Clients that register generally provide an internal emulated socket on " -"that port." +"Clients that register generally provide an internal emulated socket on that port." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:2 @@ -5797,8 +5304,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:4 #, python-format msgid "" -"NOTE: The following is a discussion of the reasons behind the I2P naming " -"system,\n" +"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n" "common arguments and possible alternatives.\n" "See <a href=\"%(naming)s\">the naming page</a> for current documentation." msgstr "" @@ -5809,72 +5315,49 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:12 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning " -"with\n" -"advocates across the spectrum of possibilities. However, given I2P's " -"inherent\n" -"demand for secure communication and decentralized operation, the " -"traditional\n" -"DNS-style naming system is clearly out, as are \"majority rules\" voting " -"systems." +"Naming within I2P has been an oft-debated topic since the very beginning with\n" +"advocates across the spectrum of possibilities. However, given I2P's inherent\n" +"demand for secure communication and decentralized operation, the traditional\n" +"DNS-style naming system is clearly out, as are \"majority rules\" voting systems." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:19 msgid "" -"I2P does not promote the use of DNS-like services though, as the damage " -"done\n" -"by hijacking a site can be tremendous - and insecure destinations have no" -"\n" -"value. DNSsec itself still falls back on registrars and certificate " -"authorities,\n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the reply\n" -"spoofed, as they are encrypted to the destination's public keys, and a " -"destination\n" -"itself is just a pair of public keys and a certificate. DNS-style " -"systems on the\n" -"other hand allow any of the name servers on the lookup path to mount " -"simple denial\n" -"of service and spoofing attacks. Adding on a certificate authenticating " -"the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"I2P does not promote the use of DNS-like services though, as the damage done\n" +"by hijacking a site can be tremendous - and insecure destinations have no\n" +"value. DNSsec itself still falls back on registrars and certificate authorities,\n" +"while with I2P, requests sent to a destination cannot be intercepted or the reply\n" +"spoofed, as they are encrypted to the destination's public keys, and a destination\n" +"itself is just a pair of public keys and a certificate. DNS-style systems on the\n" +"other hand allow any of the name servers on the lookup path to mount simple denial\n" +"of service and spoofing attacks. Adding on a certificate authenticating the\n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:33 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness of\n" -"Sybil attacks in anonymous systems - the attacker can simply create an " -"arbitrarily\n" -"high number of peers and \"vote\" with each to take over a given name. " -"Proof-of-work\n" -"methods can be used to make identity non-free, but as the network grows " -"the load\n" -"required to contact everyone to conduct online voting is implausible, or " -"if the\n" +"Voting style naming is dangerous as well, especially given the effectiveness of\n" +"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n" +"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n" +"methods can be used to make identity non-free, but as the network grows the load\n" +"required to contact everyone to conduct online voting is implausible, or if the\n" "full network is not queried, different sets of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:42 msgid "" -"As with the Internet however, I2P is keeping the design and operation of " -"a \n" -"naming system out of the (IP-like) communication layer. The bundled " -"naming library\n" -"includes a simple service provider interface which <a " -"href=\"#alternatives\">alternate naming systems</a> can\n" -"plug into, allowing end users to drive what sort of naming tradeoffs they" -" prefer." +"As with the Internet however, I2P is keeping the design and operation of a \n" +"naming system out of the (IP-like) communication layer. The bundled naming library\n" +"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n" +"plug into, allowing end users to drive what sort of naming tradeoffs they prefer." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:50 msgid "" -"See also <a href=\"https://zooko.com/distnames.html\">Names: " -"Decentralized, Secure, Human-Meaningful: Choose Two</a>." +"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, " +"Secure, Human-Meaningful: Choose Two</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:55 @@ -5885,36 +5368,26 @@ msgstr "" msgid "" "Q:\n" "What to do if some hosts \n" -"do not agree on one address and if some addresses are working, others are" -" not? \n" +"do not agree on one address and if some addresses are working, others are not? \n" "Who is the right source of a name?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:64 msgid "" "A:\n" -"You don't. This is actually a critical difference between names on I2P " -"and how \n" -"DNS works - names in I2P are human readable, secure, but <b>not globally" -" \n" -"unique</b>. This is by design, and an inherent part of our need for " -"security." +"You don't. This is actually a critical difference between names on I2P and how \n" +"DNS works - names in I2P are human readable, secure, but <b>not globally \n" +"unique</b>. This is by design, and an inherent part of our need for security." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:70 msgid "" -"If I could somehow convince you to change the destination associated with" -" some \n" -"name, I'd successfully \"take over\" the site, and under no circumstances" -" is that \n" -"acceptable. Instead, what we do is make names <b>locally unique</b>: " -"they are \n" -"what <i>you</i> use to call a site, just as how you can call things " -"whatever \n" -"you want when you add them to your browser's bookmarks, or your IM " -"client's \n" -"buddy list. Who you call \"Boss\" may be who someone else calls " -"\"Sally\"." +"If I could somehow convince you to change the destination associated with some \n" +"name, I'd successfully \"take over\" the site, and under no circumstances is that \n" +"acceptable. Instead, what we do is make names <b>locally unique</b>: they are \n" +"what <i>you</i> use to call a site, just as how you can call things whatever \n" +"you want when you add them to your browser's bookmarks, or your IM client's \n" +"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:78 @@ -5930,44 +5403,33 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:89 msgid "" "<b>Inefficiency:</b>\n" -"The whole hosts.txt is downloaded (if it has changed, since eepget uses " -"the etag and last-modified headers).\n" +"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n" "It's about 400K right now for almost 800 hosts." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:94 msgid "" -"True, but this isn't a lot of traffic in the context of i2p, which is " -"itself wildly inefficient\n" -"(floodfill databases, huge encryption overhead and padding, garlic " -"routing, etc.).\n" -"If you downloaded a hosts.txt file from someone every 12 hours it " -"averages out to about 10 bytes/sec." +"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n" +"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n" +"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:99 msgid "" -"As is usually the case in i2p, there is a fundamental tradeoff here " -"between anonymity and efficiency.\n" -"Some would say that using the etag and last-modified headers is hazardous" -" because it exposes when you\n" +"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n" +"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n" "last requested the data.\n" -"Others have suggested asking for specific keys only (similar to what jump" -" services do, but\n" +"Others have suggested asking for specific keys only (similar to what jump services do, but\n" "in a more automated fashion), possibly at a further cost in anonymity." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:106 #, python-format msgid "" -"Possible improvements would be a replacement or supplement to address " -"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" -"or something simple like subscribing to http://example.i2p/cgi-" -"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" -"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 " -"hours, for example,\n" -"that could be both more efficient and more anonymous than the current " -"hosts.txt with last-modified and etag." +"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" +"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" +"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n" +"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:112 @@ -5977,17 +5439,14 @@ msgid "" "<a href=\"%(url)s\">%(url)s</a>.\n" "This script returns an Etag with a timestamp.\n" "When a request comes in with the If-None-Match etag,\n" -"the script ONLY returns new hosts since that timestamp, or 304 Not " -"Modified if there are none.\n" -"In this way, the script efficiently returns only the hosts the subscriber" -"\n" +"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n" +"In this way, the script efficiently returns only the hosts the subscriber\n" "does not know about, in an address book-compatible manner." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:121 msgid "" -"So the inefficiency is not a big issue and there are several ways to " -"improve things without\n" +"So the inefficiency is not a big issue and there are several ways to improve things without\n" "radical change." msgstr "" @@ -6001,38 +5460,30 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:132 msgid "" "As far as network traffic see above.\n" -"But unless you're going to do a slow real-time query over the network for" -"\n" -"a key, you need to have the whole set of keys stored locally, at a cost " -"of about 500 bytes per key." +"But unless you're going to do a slow real-time query over the network for\n" +"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:139 msgid "" "<b>Requires configuration and \"trust\":</b>\n" -"Out-of-the-box address book is only subscribed to " -"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" +"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" "leading to poor new-user experience." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:144 msgid "" -"This is very much intentional. jrandom wants a user to \"trust\" a " -"hosts.txt\n" +"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n" "provider, and as he likes to say, \"trust is not a boolean\".\n" -"The configuration step attempts to force users to think about issues of " -"trust in an anonymous network." +"The configuration step attempts to force users to think about issues of trust in an anonymous network." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:149 msgid "" -"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy" -"\n" -"lists some jump services, but doesn't \"recommend\" any one in " -"particular,\n" +"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n" +"lists some jump services, but doesn't \"recommend\" any one in particular,\n" "and it's up to the user to pick one (or not).\n" -"jrandom would say we trust the listed providers enough to list them but " -"not enough to\n" +"jrandom would say we trust the listed providers enough to list them but not enough to\n" "automatically go fetch the key from them." msgstr "" @@ -6049,14 +5500,13 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:166 msgid "" -"Unfortunately real-time lookups over i2p would significantly slow down " -"web browsing." +"Unfortunately real-time lookups over i2p would significantly slow down web " +"browsing." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:169 msgid "" -"Also, DNS is based on lookups with limited caching and time-to-live, " -"while i2p\n" +"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n" "keys are permanent." msgstr "" @@ -6075,26 +5525,21 @@ msgid "" "Yes it depends on a few servers that you have configured.\n" "Within i2p, servers and services come and go.\n" "Any other centralized system (for example DNS root servers) would\n" -"have the same problem. A completely decentralized system (everybody is " -"authoritative)\n" -"is possible by implementing an \"everybody is a root DNS server\" " -"solution, or by\n" -"something even simpler, like a script that adds everybody in your " -"hosts.txt to your address book." +"have the same problem. A completely decentralized system (everybody is authoritative)\n" +"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n" +"something even simpler, like a script that adds everybody in your hosts.txt to your address book." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:190 msgid "" -"People advocating all-authoritative solutions generally haven't thought " -"through\n" +"People advocating all-authoritative solutions generally haven't thought through\n" "the issues of conflicts and hijacking, however." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:196 msgid "" "<b>Awkward, not real-time:</b>\n" -"It's a patchwork of hosts.txt providers, key-add web form providers, jump" -" service providers,\n" +"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n" "I2P Site status reporters.\n" "Jump servers and subscriptions are a pain, it should just work like DNS." msgstr "" @@ -6105,8 +5550,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:207 msgid "" -"So, in summary, the current system is not horribly broken, inefficient, " -"or un-scalable,\n" +"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n" "and proposals to \"just use DNS\" aren't well thought-through." msgstr "" @@ -6116,8 +5560,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:213 msgid "" -"The I2P source contains several pluggable naming systems and supports " -"configuration options\n" +"The I2P source contains several pluggable naming systems and supports configuration options\n" "to enable experimentation with naming systems." msgstr "" @@ -6139,8 +5582,8 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:234 msgid "" -"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/" -" directory." +"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ " +"directory." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:237 @@ -6165,8 +5608,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:253 msgid "" -"The current naming system can be changed with the advanced config option " -"'i2p.naming.impl'\n" +"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n" "(restart required).\n" "See core/java/src/net/i2p/client/naming for details." msgstr "" @@ -6174,8 +5616,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:258 msgid "" "Any new system should be stacked with HostsTxt, or should\n" -"implement local storage and/or the address book subscription functions, " -"since address book\n" +"implement local storage and/or the address book subscription functions, since address book\n" "only knows about the hosts.txt files and format." msgstr "" @@ -6185,50 +5626,40 @@ msgstr "Certificates" #: i2p2www/pages/site/docs/discussions/naming.html:265 msgid "" -"I2P destinations contain a certificate, however at the moment that " -"certificate\n" +"I2P destinations contain a certificate, however at the moment that certificate\n" "is always null.\n" -"With a null certificate, base64 destinations are always 516 bytes ending " -"in \"AAAA\",\n" -"and this is checked in the address book merge mechanism, and possibly " -"other places.\n" -"Also, there is no method available to generate a certificate or add it to" -" a\n" +"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n" +"and this is checked in the address book merge mechanism, and possibly other places.\n" +"Also, there is no method available to generate a certificate or add it to a\n" "destination. So these will have to be updated to implement certificates." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:273 #, python-format msgid "" -"One possible use of certificates is for <a " -"href=\"%(todo)s#hashcash\">proof of work</a>." +"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof " +"of work</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:276 msgid "" -"Another is for \"subdomains\" (in quotes because there is really no such " -"thing,\n" -"i2p uses a flat naming system) to be signed by the 2nd level domain's " -"keys." +"Another is for \"subdomains\" (in quotes because there is really no such thing,\n" +"i2p uses a flat naming system) to be signed by the 2nd level domain's keys." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:280 msgid "" -"With any certificate implementation must come the method for verifying " -"the\n" +"With any certificate implementation must come the method for verifying the\n" "certificates.\n" "Presumably this would happen in the address book merge code.\n" -"Is there a method for multiple types of certificates, or multiple " -"certificates?" +"Is there a method for multiple types of certificates, or multiple certificates?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:286 msgid "" "Adding on a certificate authenticating the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" @@ -6247,91 +5678,58 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:11 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:19 #: i2p2www/pages/site/docs/how/tech-intro.html:508 msgid "" -"The first time a router wants to encrypt a garlic message to another " -"router, \n" -"they encrypt the keying material for an AES256 session key with ElGamal " -"and \n" -"append the AES256/CBC encrypted payload after that encrypted ElGamal " -"block. \n" -"In addition to the encrypted payload, the AES encrypted section contains " -"the \n" -"payload length, the SHA256 hash of the unencrypted payload, as well as a " -"number \n" -"of \"session tags\" - random 32 byte nonces. The next time the sender " -"wants \n" -"to encrypt a garlic message to another router, rather than ElGamal " -"encrypt \n" -"a new session key they simply pick one of the previously delivered " -"session \n" -"tags and AES encrypt the payload like before, using the session key used " -"with \n" -"that session tag, prepended with the session tag itself. When a router " -"receives \n" -"a garlic encrypted message, they check the first 32 bytes to see if it " -"matches \n" -"an available session tag - if it does, they simply AES decrypt the " -"message, \n" +"The first time a router wants to encrypt a garlic message to another router, \n" +"they encrypt the keying material for an AES256 session key with ElGamal and \n" +"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n" +"In addition to the encrypted payload, the AES encrypted section contains the \n" +"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n" +"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n" +"to encrypt a garlic message to another router, rather than ElGamal encrypt \n" +"a new session key they simply pick one of the previously delivered session \n" +"tags and AES encrypt the payload like before, using the session key used with \n" +"that session tag, prepended with the session tag itself. When a router receives \n" +"a garlic encrypted message, they check the first 32 bytes to see if it matches \n" +"an available session tag - if it does, they simply AES decrypt the message, \n" "but if it does not, they ElGamal decrypt the first block." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:35 #: i2p2www/pages/site/docs/how/tech-intro.html:524 msgid "" -"Each session tag can be used only once so as to prevent internal " -"adversaries \n" -"from unnecessarily correlating different messages as being between the " -"same \n" -"routers. The sender of an ElGamal/AES+SessionTag encrypted message " -"chooses \n" -"when and how many tags to deliver, prestocking the recipient with enough " -"tags \n" -"to cover a volley of messages. Garlic messages may detect the successful " -"tag \n" -"delivery by bundling a small additional message as a clove (a \"delivery " -"status \n" -"message\") - when the garlic message arrives at the intended recipient " -"and \n" -"is decrypted successfully, this small delivery status message is one of " -"the \n" -"cloves exposed and has instructions for the recipient to send the clove " -"back \n" -"to the original sender (through an inbound tunnel, of course). When the " -"original \n" -"sender receives this delivery status message, they know that the session " -"tags \n" +"Each session tag can be used only once so as to prevent internal adversaries \n" +"from unnecessarily correlating different messages as being between the same \n" +"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n" +"when and how many tags to deliver, prestocking the recipient with enough tags \n" +"to cover a volley of messages. Garlic messages may detect the successful tag \n" +"delivery by bundling a small additional message as a clove (a \"delivery status \n" +"message\") - when the garlic message arrives at the intended recipient and \n" +"is decrypted successfully, this small delivery status message is one of the \n" +"cloves exposed and has instructions for the recipient to send the clove back \n" +"to the original sender (through an inbound tunnel, of course). When the original \n" +"sender receives this delivery status message, they know that the session tags \n" "bundled in the garlic message were successfully delivered." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:50 msgid "" "Session tags themselves have a short lifetime, after which they are \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption.\n" -"A session will continue to exist until all its tags are exhausted or " -"expire." +"A session will continue to exist until all its tags are exhausted or expire." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:61 @@ -6346,8 +5744,7 @@ msgid "" "between a Router and a Destination.\n" "Each Router and Destination maintains its own Session Key Manager to\n" "keep track of Session Keys and Session Tags.\n" -"Separate Session Key Managers prevents correlation of multiple " -"Destinations\n" +"Separate Session Key Managers prevents correlation of multiple Destinations\n" "to each other or a Router by adversaries." msgstr "" @@ -6368,14 +5765,14 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:85 -msgid "It is for a new session and contains both ElGamal and AES encrypted blocks" +msgid "" +"It is for a new session and contains both ElGamal and AES encrypted blocks" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:88 msgid "" "When a router receives a message, it will first assume it is from\n" -"an existing session and attempt to look up the Session Tag and decrypt " -"the following data using AES.\n" +"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n" "If that fails, it will assume it is for a new session and attempt to\n" "decrypt it using ElGamal." msgstr "" @@ -6386,8 +5783,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:98 msgid "" -"A New Session ElGamal Message contains two parts, an encrypted ElGamal " -"block\n" +"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n" "and an encrypted AES block." msgstr "" @@ -6413,8 +5809,7 @@ msgid "" "The 32-byte\n" "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n" "is the identifier for the session.\n" -"The 32-byte Pre-IV will be used to generate the IV for the AES block that" -" follows;\n" +"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n" "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV." msgstr "" @@ -6443,18 +5838,16 @@ msgstr "" #, python-format msgid "" "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n" -"using the session key and IV (calculated from the pre-IV) from the " -"ElGamal section.\n" -"The encrypted AES Block length is variable but is always a multiple of 16" -" bytes.\n" +"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n" +"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n" "</p>" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:266 #, python-format msgid "" -"Actual max payload length, and max block length, is less than 64 KB; see " -"the <a href=\"%(i2np)s\">I2NP Overview</a>." +"Actual max payload length, and max block length, is less than 64 KB; see the" +" <a href=\"%(i2np)s\">I2NP Overview</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:269 @@ -6483,18 +5876,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:318 msgid "" "The session tag also serves as\n" -"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the " -"sessionTag." +"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:323 msgid "" -"To decode a message from an existing session, a router looks up the " -"Session Tag to find an\n" -"associated Session Key. If the Session Tag is found, the AES block is " -"decrypted using the associated Session Key.\n" -"If the tag is not found, the message is assumed to be a <a " -"href=\"#new\">New Session Message</a>." +"To decode a message from an existing session, a router looks up the Session Tag to find an\n" +"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n" +"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:331 @@ -6504,38 +5893,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:332 #, python-format msgid "" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"For brief streaming connections or datagrams, these options may be used " -"to significantly reduce bandwidth.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:353 msgid "" -"There are many possible areas to tune the Session Key Manager's " -"algorithms;\n" -"some may interact with the streaming library behavior, or have " -"significant\n" +"There are many possible areas to tune the Session Key Manager's algorithms;\n" +"some may interact with the streaming library behavior, or have significant\n" "impact on overall performance." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:360 msgid "" -"The number of tags delivered could depend on message size, keeping in " -"mind\n" +"The number of tags delivered could depend on message size, keeping in mind\n" "the eventual padding to 1KB at the tunnel message layer." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:365 msgid "" -"Clients could send an estimate of session lifetime to the router, as an " -"advisory\n" +"Clients could send an estimate of session lifetime to the router, as an advisory\n" "on the number of tags required." msgstr "" @@ -6547,15 +5928,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:374 msgid "" -"The router may assume delivery of Session Tags, or await acknowledgement " -"before using them;\n" +"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n" "there are tradeoffs for each strategy." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:379 msgid "" -"For very brief messages, almost the full 222 bytes of the pre-IV and " -"padding fields in the ElGamal block\n" +"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n" "could be used for the entire message, instead of establishing a session." msgstr "" @@ -6567,10 +5946,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:389 msgid "" -"Perhaps things could be more efficient if the Session Tag system was " -"bidirectional,\n" -"so tags delivered in the 'forward' path could be used in the 'reverse' " -"path,\n" +"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n" +"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n" "thus avoiding ElGamal in the initial response.\n" "The router currently plays some tricks like this when sending\n" "tunnel test messages to itself." @@ -6588,12 +5965,9 @@ msgstr "" msgid "" "Several of these ideas may require a new I2NP message type, or\n" "set a flag in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery" -" Instructions</a>,\n" +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n" "or set a magic number in the first few bytes of the Session Key field\n" -"and accept a small risk of the random Session Key matching the magic " -"number." +"and accept a small risk of the random Session Key matching the magic number." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:2 @@ -6610,8 +5984,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:7 msgid "" -"The terms \"garlic routing\" and \"garlic encryption\" are often used " -"rather loosely when referring to I2P's technology.\n" +"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n" "Here, we explain the history of the terms, the various meanings, and\n" "the usage of \"garlic\" methods in I2P." msgstr "" @@ -6621,20 +5994,16 @@ msgid "" "\"Garlic routing\" was first coined by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n" "in Roger Dingledine's Free Haven \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"Section 8.1.1 (June 2000), as derived from \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n" "<a href=\"http://www.onion-router.net/\">Onion Routing</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:21 msgid "" -"\"Garlic\" may have been used originally by I2P developers because I2P " -"implements a form of\n" -"bundling as Freedman describes, or simply to emphasize general " -"differences from Tor.\n" +"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n" +"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n" "The specific reasoning may be lost to history.\n" -"Generally, when referring to I2P, the term \"garlic\" may mean one of " -"three things:" +"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:28 @@ -6653,54 +6022,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:33 msgid "" -"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven " -"years has not always been precise; therefore the reader is\n" +"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n" "cautioned when encountering the term.\n" "Hopefully, the explanation below will make things clear." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:40 msgid "" -"Onion routing is a technique for building paths, or tunnels, through a " -"series of peers,\n" +"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n" "and then using that tunnel.\n" -"Messages are repeatedly encrypted by the originator, and then decrypted " -"by each hop.\n" -"During the building phase, only the routing instructions for the next hop" -" are exposed to each peer.\n" -"During the operating phase, messages are passed through the tunnel, and " -"the\n" -"message and its routing instructions are only exposed to the endpoint of " -"the tunnel." +"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n" +"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n" +"During the operating phase, messages are passed through the tunnel, and the\n" +"message and its routing instructions are only exposed to the endpoint of the tunnel." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:49 #, python-format msgid "" "This is similar to the way Mixmaster\n" -"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages " -"- taking a message, encrypting it\n" -"to the recipient's public key, taking that encrypted message and " -"encrypting\n" -"it (along with instructions specifying the next hop), and then taking " -"that\n" -"resulting encrypted message and so on, until it has one layer of " -"encryption\n" +"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n" +"to the recipient's public key, taking that encrypted message and encrypting\n" +"it (along with instructions specifying the next hop), and then taking that\n" +"resulting encrypted message and so on, until it has one layer of encryption\n" "per hop along the path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:58 msgid "" -"In this sense, \"garlic routing\" as a general concept is identical to " -"\"onion routing\".\n" -"As implemented in I2P, of course, there are several differences from the " -"implementation in Tor; see below.\n" -"Even so, there are substantial similarities such that I2P benefits from a" -"\n" -"<a href=\"http://www.onion-router.net/Publications.html\">large amount of" -" academic research on onion routing</a>,\n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar " -"mixnets</a>." +"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n" +"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n" +"Even so, there are substantial similarities such that I2P benefits from a\n" +"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:67 @@ -6709,15 +6063,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:68 msgid "" -"Michael Freedman defined \"garlic routing\" as an extension to onion " -"routing,\n" +"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n" "in which multiple messages are bundled together.\n" "He called each message a \"bulb\".\n" -"All the messages, each with its own delivery instructions, are exposed at" -" the\n" +"All the messages, each with its own delivery instructions, are exposed at the\n" "endpoint.\n" -"This allows the efficient bundling of an onion routing \"reply block\" " -"with the original message." +"This allows the efficient bundling of an onion routing \"reply block\" with the original message." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:77 @@ -6726,10 +6077,8 @@ msgid "" "Our term for garlic \"bulbs\" is \"cloves\".\n" "Any number of messages can be\n" "contained, instead of just a single message.\n" -"This is a significant distinction from the onion routing implemented in " -"Tor.\n" -"However, it is only one of many major architectural differences between " -"I2P and Tor;\n" +"This is a significant distinction from the onion routing implemented in Tor.\n" +"However, it is only one of many major architectural differences between I2P and Tor;\n" "perhaps it is not, by itself, enough to justify a change in terminology." msgstr "" @@ -6737,10 +6086,8 @@ msgstr "" msgid "" "Another difference\n" "from the method described by Freedman\n" -"is that the path is unidirectional - there is no \"turning point\" as " -"seen in onion routing\n" -"or mixmaster reply blocks, which greatly simplifies the algorithm and " -"allows for more flexible\n" +"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n" +"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n" "and reliable delivery." msgstr "" @@ -6774,16 +6121,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:113 msgid "" -"For publishing some network database entries (dampening the probability " -"of a successful traffic analysis attack) (ElGamal/AES)" +"For publishing some network database entries (dampening the probability of a" +" successful traffic analysis attack) (ElGamal/AES)" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:116 msgid "" -"There are also significant ways that this technique can be used to " -"improve the performance of the network, \n" -"exploiting transport latency/throughput tradeoffs, and branching data " -"through redundant paths to increase reliability." +"There are also significant ways that this technique can be used to improve the performance of the network, \n" +"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:122 @@ -6794,8 +6139,7 @@ msgstr "" msgid "" "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n" "one for outbound and one for inbound traffic.\n" -"Therefore, four tunnels are required for a single round-trip message and " -"reply." +"Therefore, four tunnels are required for a single round-trip message and reply." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:129 @@ -6815,12 +6159,10 @@ msgstr "" msgid "" "Tunnels are a general-purpose mechanism to transport all\n" "<a href=\"%(i2np)s\">I2NP messages</a>, and\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to " -"build tunnels.\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n" "We do not bundle multiple\n" "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at " -"the outbound tunnel endpoint;\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n" "the tunnel encryption is sufficient." msgstr "" @@ -6834,14 +6176,12 @@ msgid "" "At the layer above tunnels, I2P delivers end-to-end messages between\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n" "Just as within a single tunnel, we use\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption." -"\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n" "Each client message as delivered to the router through the\n" "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n" "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n" "with its own\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>,\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n" "inside a\n" "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n" "Delivery Instructions may specify a Destination, Router, or Tunnel." @@ -6864,18 +6204,13 @@ msgid "" "A\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n" "with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" -"specifying that it be sent back to the originating router as an " -"acknowledgment.\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" +"specifying that it be sent back to the originating router as an acknowledgment.\n" "This is similar to the \"reply block\" or \"reply onion\"\n" "described in the references.\n" -"It is used for determining the success or failure of end to end message " -"delivery.\n" -"The originating router may, upon failure to receive the Delivery Status " -"Message\n" -"within the expected time period, modify the routing to the far-end " -"Destination,\n" +"It is used for determining the success or failure of end to end message delivery.\n" +"The originating router may, upon failure to receive the Delivery Status Message\n" +"within the expected time period, modify the routing to the far-end Destination,\n" "or take other actions." msgstr "" @@ -6887,16 +6222,12 @@ msgid "" "containing a\n" "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n" "for the originating Destination, with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" "specifying the far-end destination's router.\n" -"By periodically bundling a LeaseSet, the router ensures that the far-end " -"will be able\n" +"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n" "to maintain communications.\n" -"Otherwise the far-end would have to query a floodfill router for the " -"network database entry,\n" -"and all LeaseSets would have to be published to the network database, as " -"explained on the\n" +"Otherwise the far-end would have to query a floodfill router for the network database entry,\n" +"and all LeaseSets would have to be published to the network database, as explained on the\n" "<a href=\"%(netdb)s\">network database page</a>." msgstr "" @@ -6906,31 +6237,24 @@ msgid "" "By default, the Delivery Status and Database Store Messages\n" "are bundled when the local LeaseSet changes, when additional\n" "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n" -"are delivered, or if the messages have not been bundled in the previous " -"minute.\n" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"are delivered, or if the messages have not been bundled in the previous minute.\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:224 msgid "" -"Obviously, the additional messages are currently bundled for specific " -"purposes,\n" +"Obviously, the additional messages are currently bundled for specific purposes,\n" "and not part of a general-purpose routing scheme." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:229 msgid "" -"As of release 0.9.12, the Delivery Status Message is wrapped in another " -"Garlic Message\n" -"by the originator so that the contents are encrypted and not visible to " -"routers on the return path." +"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n" +"by the originator so that the contents are encrypted and not visible to routers on the return path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:235 @@ -6954,35 +6278,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:252 #, python-format msgid "" -"The Garlic Message mechanism is very flexible and provides a structure " -"for\n" +"The Garlic Message mechanism is very flexible and provides a structure for\n" "implementing many types of mixnet delivery methods.\n" "Together with the unused delay option in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel" -" message Delivery Instructions</a>,\n" -"a wide spectrum of batching, delay, mixing, and routing strategies are " -"possible." +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n" +"a wide spectrum of batching, delay, mixing, and routing strategies are possible." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:260 msgid "" -"In particular, there is potential for much more flexibility at the " -"outbound tunnel endpoint.\n" +"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n" "Messages could possibly be routed from there to one of several tunnels\n" -"(thus minimizing point-to-point connections), or multicast to several " -"tunnels\n" +"(thus minimizing point-to-point connections), or multicast to several tunnels\n" "for redundancy, or streaming audio and video." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:267 msgid "" -"Such experiments may conflict with the need to ensure security and " -"anonymity, such\n" -"as limiting certain routing paths, restricting the types of I2NP messages" -" that may\n" -"be forwarded along various paths, and enforcing certain message " -"expiration times." +"Such experiments may conflict with the need to ensure security and anonymity, such\n" +"as limiting certain routing paths, restricting the types of I2NP messages that may\n" +"be forwarded along various paths, and enforcing certain message expiration times." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:273 @@ -6991,11 +6306,9 @@ msgid "" "As a part of\n" "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n" "a garlic message contains a sender\n" -"specified amount of padding data, allowing the sender to take active " -"countermeasures \n" +"specified amount of padding data, allowing the sender to take active countermeasures \n" "against traffic analysis.\n" -"This is not currently used, beyond the requirement to pad to a multiple " -"of 16 bytes." +"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:282 @@ -7012,10 +6325,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:292 msgid "" -"The term garlic routing was first coined in Roger Dingledine's Free Haven" -" \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"(June 2000),\n" +"The term garlic routing was first coined in Roger Dingledine's Free Haven \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n" "see Section 8.1.1 authored by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>." msgstr "" @@ -7045,8 +6356,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:313 msgid "" -"Onion routing was first described in <a href=\"http://www.onion-" -"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" +"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996." msgstr "" @@ -7056,79 +6366,51 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:4 msgid "" -"I2P is a project to build, deploy, and maintain a network supporting " -"secure and anonymous\n" -"communication. People using I2P are in control of the tradeoffs between " -"anonymity, reliability,\n" -"bandwidth usage, and latency. There is no central point in the network on" -" which pressure can be\n" -"exerted to compromise the integrity, security, or anonymity of the " -"system. The network supports\n" -"dynamic reconfiguration in response to various attacks, and has been " -"designed to make use of\n" -"additional resources as they become available. Of course, all aspects of " -"the network are open and\n" +"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n" +"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n" +"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n" +"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n" +"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n" +"additional resources as they become available. Of course, all aspects of the network are open and\n" "freely available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:14 msgid "" -"Unlike many other anonymizing networks, I2P doesn't try to provide " -"anonymity by hiding the\n" -"originator of some communication and not the recipient, or the other way " -"around. I2P is designed to\n" -"allow peers using I2P to communicate with each other anonymously — " -"both sender and recipient\n" -"are unidentifiable to each other as well as to third parties. For " -"example, today there are both\n" -"in-I2P web sites (allowing anonymous publishing / hosting) as well as " -"HTTP proxies to the normal web\n" -"(allowing anonymous web browsing). Having the ability to run servers " -"within I2P is essential, as it\n" -"is quite likely that any outbound proxies to the normal Internet will be " -"monitored, disabled, or\n" +"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n" +"originator of some communication and not the recipient, or the other way around. I2P is designed to\n" +"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n" +"are unidentifiable to each other as well as to third parties. For example, today there are both\n" +"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n" +"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n" +"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n" "even taken over to attempt more malicious attacks." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:25 #, python-format msgid "" -"The network itself is message oriented - it is essentially a secure and " -"anonymous IP layer, where\n" -"messages are addressed to cryptographic keys (Destinations) and can be " -"significantly larger than IP\n" -"packets. Some example uses of the network include \"I2P Sites\" " -"(webservers hosting normal web\n" -"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a " -"distributed data store. With the\n" -"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are " -"able to stream traditional\n" -"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even " -"streaming audio. Most people\n" -"will not use I2P directly, or even need to know they're using it. Instead" -" their view will be of one\n" -"of the I2P enabled applications, or perhaps as a little controller app to" -" turn on and off various\n" +"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n" +"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n" +"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n" +"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n" +"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n" +"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n" +"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n" +"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n" "proxies to enable the anonymizing functionality." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:37 #, python-format msgid "" -"An essential part of designing, developing, and testing an anonymizing " -"network is to define the <a\n" -"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing " -"as \"true\" anonymity, just\n" -"increasingly expensive costs to identify someone. Briefly, I2P's intent " -"is to allow people to\n" -"communicate in arbitrarily hostile environments by providing good " -"anonymity, mixed in with\n" -"sufficient cover traffic provided by the activity of people who require " -"less anonymity. This way,\n" -"some users can avoid detection by a very powerful adversary, while others" -" will try to evade a weaker\n" -"entity, <i>all on the same network</i>, where each one's messages are " -"essentially indistinguishable\n" +"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n" +"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n" +"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n" +"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n" +"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n" +"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n" +"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n" "from the others." msgstr "" @@ -7139,12 +6421,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:49 #, python-format msgid "" -"There are a multitude of reasons why we need a system to support " -"anonymous communication, and\n" -"everyone has their own personal rationale. There are many <a " -"href=\"%(comparisons)s\">other\n" -"efforts</a> working on finding ways to provide varying degrees of " -"anonymity to people through the\n" +"There are a multitude of reasons why we need a system to support anonymous communication, and\n" +"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n" +"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n" "Internet, but we could not find any that met our needs or threat model." msgstr "" @@ -7155,23 +6434,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:58 #, python-format msgid "" -"The network at a glance is made up of a set of nodes (\"routers\") with a" -" number of unidirectional\n" -"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a " -"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is " -"identified by a cryptographic RouterIdentity which is\n" -"typically long lived. These routers communicate with each other through " -"existing transport\n" -"mechanisms (TCP, UDP, etc), passing various messages. Client applications" -" have their own\n" -"cryptographic identifier (\"Destination\") which enables it to send and " -"receive messages. These\n" -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels\n" -"that will be used for sending and receiving messages through the network." -" I2P has its own internal\n" -"<a href=\"%(netdb)s\">network database</a> (using a modification of the " -"Kademlia algorithm) for\n" +"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n" +"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n" +"typically long lived. These routers communicate with each other through existing transport\n" +"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n" +"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n" +"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n" +"that will be used for sending and receiving messages through the network. I2P has its own internal\n" +"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n" "distributing routing and contact information securely." msgstr "" @@ -7181,91 +6451,62 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:73 msgid "" -"In the above, Alice, Bob, Charlie, and Dave are all running routers with " -"a single Destination on\n" -"their local router. They each have a pair of 2-hop inbound tunnels per " -"destination (labeled 1, 2, 3,\n" -"4, 5 and 6), and a small subset of each of those router's outbound tunnel" -" pool is shown with 2-hop\n" -"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's " -"outbound tunnels are not\n" -"shown, nor are the rest of each router's outbound tunnel pool (typically " -"stocked with a few tunnels\n" -"at a time). When Alice and Bob talk to each other, Alice sends a message " -"out one of her (pink)\n" -"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3" -" or 4). She knows to send\n" -"to those tunnels on the correct router by querying the network database, " -"which is constantly updated\n" +"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n" +"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n" +"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n" +"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n" +"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n" +"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n" +"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n" +"to those tunnels on the correct router by querying the network database, which is constantly updated\n" "as new leases are authorized and old ones expire." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:85 #, python-format msgid "" -"If Bob wants to reply to Alice, he simply goes through the same process -" -" send a message out one of\n" -"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 " -"or 2). To make things\n" -"easier, most messages sent between Alice and Bob are <a " -"href=\"%(garlicrouting)s\">garlic</a>\n" -"wrapped, bundling the sender's own current lease information so that the " -"recipient can reply\n" -"immediately without having to look in the network database for the " -"current data." +"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n" +"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n" +"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n" +"wrapped, bundling the sender's own current lease information so that the recipient can reply\n" +"immediately without having to look in the network database for the current data." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:93 #, python-format msgid "" -"To deal with a wide range of attacks, I2P is fully distributed with no " -"centralized resources - and\n" -"hence there are no directory servers keeping statistics regarding the " -"performance and reliability of\n" -"routers within the network. As such, each router must keep and maintain " -"profiles of various routers\n" -"and is responsible for selecting appropriate peers to meet the anonymity," -" performance, and\n" -"reliability needs of the users, as described in the <a " -"href=\"%(peerselection)s\">peer selection</a>\n" +"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n" +"hence there are no directory servers keeping statistics regarding the performance and reliability of\n" +"routers within the network. As such, each router must keep and maintain profiles of various routers\n" +"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n" +"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n" "page." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:102 #, python-format msgid "" -"The network itself makes use of a significant number of <a " -"href=\"%(cryptography)s\">cryptographic\n" -"techniques and algorithms</a> - a full laundry list includes 2048bit " -"ElGamal encryption, 256bit AES\n" -"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, " -"2048bit Diffie-Hellman\n" -"negotiated connections with station to station authentication, and <a " -"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." +"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n" +"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n" +"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n" +"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:110 msgid "" -"Content sent over I2P is encrypted through three layers garlic encryption" -" (used to verify the\n" -"delivery of the message to the recipient), tunnel encryption (all " -"messages passing through a tunnel\n" -"is encrypted by the tunnel gateway to the tunnel endpoint), and inter " -"router transport layer\n" +"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n" +"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n" +"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n" "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:117 msgid "" "End-to-end (I2CP) encryption (client application to\n" -"server application) was disabled in I2P release 0.6; end-to-end (garlic) " -"encryption (I2P client router\n" -"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" " -"remains. Notice the different use of\n" -"terms! All data from a to h is end-to-end encrypted, but the I2CP " -"connection between the I2P router and\n" -"the applications is not end-to-end encrypted! A and h are the routers of " -"Alice and Bob, while Alice and\n" +"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n" +"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n" +"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n" +"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n" "Bob in following chart are the applications running atop of I2P." msgstr "" @@ -7282,32 +6523,22 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:132 msgid "" -"The two main mechanisms for allowing people who need strong anonymity to " -"use the network are\n" -"explicitly delayed garlic routed messages and more comprehensive tunnels " -"to include support for\n" -"pooling and mixing messages. These are currently planned for release 3.0," -" but garlic routed messages\n" -"with no delays and FIFO tunnels are currently in place. Additionally, the" -" 2.0 release will allow\n" -"people to set up and operate behind restricted routes (perhaps with " -"trusted peers), as well as the\n" +"The two main mechanisms for allowing people who need strong anonymity to use the network are\n" +"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n" +"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n" +"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n" +"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n" "deployment of more flexible and anonymous transports." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:141 #, python-format msgid "" -"Some questions have been raised with regards to the scalability of I2P, " -"and reasonably so. There\n" -"will certainly be more analysis over time, but peer lookup and " -"integration should be bounded by\n" -"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network " -"database</a>'s algorithm, while end\n" -"to end messages should be <code>O(1)</code> (scale free), since messages " -"go out K hops through the\n" -"outbound tunnel and another K hops through the inbound tunnel, with K no " -"longer than 3. The size of\n" +"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n" +"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n" +"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n" +"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n" +"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n" "the network (N) bears no impact." msgstr "" @@ -7319,13 +6550,10 @@ msgstr "" #, python-format msgid "" "I2P initially began in Feb 2003 as a proposed modification to <a\n" -"href=\"http://freenetproject.org\">Freenet</a> to allow it to use " -"alternate transports, such as <a\n" +"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n" "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n" -"'anonCommFramework' in April 2003, turning into I2P in July, with code " -"being written in earnest\n" -"starting in August '03. I2P is currently under development, following the" -" <a href=\"%(roadmap)s\">roadmap</a>." +"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n" +"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:161 @@ -7335,22 +6563,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:162 #, python-format msgid "" -"We have a small <a href=\"%(team)s\">team</a> spread around several " -"continents, working to advance\n" -"different aspects of the project. We are very open to other developers " -"who want to get involved and\n" -"anyone else who would like to contribute in other ways, such as " -"critiques, peer review, testing,\n" -"writing I2P enabled applications, or documentation. The entire system is " -"open source - the router\n" -"and most of the SDK are outright public domain with some BSD and Cryptix " -"licensed code, while some\n" -"applications like I2PTunnel and I2PSnark are GPL. Almost everything is " -"written in Java (1.5+),\n" -"though some third party applications are being written in Python and " -"other languages. The code works\n" -"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual" -" Machines." +"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n" +"different aspects of the project. We are very open to other developers who want to get involved and\n" +"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n" +"writing I2P enabled applications, or documentation. The entire system is open source - the router\n" +"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n" +"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n" +"though some third party applications are being written in Python and other languages. The code works\n" +"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:173 @@ -7360,12 +6580,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:174 #, python-format msgid "" -"Anyone interested should join us on the IRC channel #i2p-dev (hosted " -"concurrently on irc.freenode.net,\n" -"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are" -" currently no\n" -"scheduled development meetings, however <a href=\"%(meetings)s\">archives" -" are available</a>." +"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n" +"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n" +"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:180 @@ -7389,39 +6606,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:8 msgid "" "I2P's netDb is a specialized distributed database, containing \n" -"just two types of data - router contact information (<b>RouterInfos</b>) " -"and destination contact\n" -"information (<b>LeaseSets</b>). Each piece of data is signed by the " -"appropriate party and verified\n" -"by anyone who uses or stores it. In addition, the data has liveliness " -"information\n" -"within it, allowing irrelevant entries to be dropped, newer entries to " -"replace\n" +"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n" +"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n" +"by anyone who uses or stores it. In addition, the data has liveliness information\n" +"within it, allowing irrelevant entries to be dropped, newer entries to replace\n" "older ones, and protection against certain classes of attack." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:17 msgid "" "The netDb is distributed with a simple technique called \"floodfill\",\n" -"where a subset of all routers, called \"floodfill routers\", maintains " -"the distributed database." +"where a subset of all routers, called \"floodfill routers\", maintains the distributed database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:25 msgid "" -"When an I2P router wants to contact another router, they need to know " -"some \n" -"key pieces of data - all of which are bundled up and signed by the router" -" into\n" -"a structure called the \"RouterInfo\", which is distributed with the " -"SHA256 of the router's identity\n" +"When an I2P router wants to contact another router, they need to know some \n" +"key pieces of data - all of which are bundled up and signed by the router into\n" +"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n" "as the key. The structure itself contains:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:32 msgid "" -"The router's identity (an encryption key, a signing key, and a " -"certificate)" +"The router's identity (an encryption key, a signing key, and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:33 @@ -7452,8 +6660,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:47 msgid "" -"Capabilities flags - used to indicate floodfill participation, " -"approximate bandwidth, and perceived reachability" +"Capabilities flags - used to indicate floodfill participation, approximate " +"bandwidth, and perceived reachability" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:49 @@ -7512,23 +6720,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:76 msgid "" -"Always sent as 90m, for compatibility with an older scheme where routers " -"published their actual uptime,\n" +"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n" "and only sent tunnel requests to peers whose uptime was more than 60m" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:82 msgid "" "These values are used by other routers for basic decisions.\n" -"Should we connect to this router? Should we attempt to route a tunnel " -"through this router?\n" -"The bandwidth capability flag, in particular, is used only to determine " -"whether\n" +"Should we connect to this router? Should we attempt to route a tunnel through this router?\n" +"The bandwidth capability flag, in particular, is used only to determine whether\n" "the router meets a minimum threshold for routing tunnels.\n" -"Above the minimum threshold, the advertised bandwidth is not used or " -"trusted anywhere\n" -"in the router, except for display in the user interface and for debugging" -" and network analysis." +"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n" +"in the router, except for display in the user interface and for debugging and network analysis." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:102 @@ -7539,13 +6742,11 @@ msgstr "" #, python-format msgid "" "Additional text options include\n" -"a small number of statistics about the router's health, which are " -"aggregated by\n" +"a small number of statistics about the router's health, which are aggregated by\n" "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n" "for network performance analysis and debugging.\n" "These statistics were chosen to provide data crucial to the developers,\n" -"such as tunnel build success rates, while balancing the need for such " -"data\n" +"such as tunnel build success rates, while balancing the need for such data\n" "with the side-effects that could result from revealing this data.\n" "Current statistics are limited to:" msgstr "" @@ -7560,18 +6761,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:119 msgid "" -"Floodfill routers publish additional data on the number of entries in " -"their network database." +"Floodfill routers publish additional data on the number of entries in their " +"network database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:123 msgid "" "The data published can be seen in the router's user interface,\n" "but is not used or trusted within the router.\n" -"As the network has matured, we have gradually removed most of the " -"published\n" -"statistics to improve anonymity, and we plan to remove more in future " -"releases." +"As the network has matured, we have gradually removed most of the published\n" +"statistics to improve anonymity, and we plan to remove more in future releases." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:130 @@ -7580,8 +6779,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:132 msgid "" -"As of release 0.9.24, routers may declare that they are part of a " -"\"family\", operated by the same entity.\n" +"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n" "Multiple routers in the same family will not be used in a single tunnel." msgstr "" @@ -7600,16 +6798,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:159 msgid "" "RouterInfos have no set expiration time.\n" -"Each router is free to maintain its own local policy to trade off the " -"frequency of RouterInfo lookups\n" +"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n" "with memory or disk usage.\n" "In the current implementation, there are the following general policies:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:166 msgid "" -"There is no expiration during the first hour of uptime, as the persistent" -" stored data may be old." +"There is no expiration during the first hour of uptime, as the persistent " +"stored data may be old." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:169 @@ -7618,25 +6815,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:172 msgid "" -"As the number of local RouterInfos grows, the expiration time shrinks, in" -" an attempt to maintain\n" -"a reasonable number RouterInfos. The expiration time with less than 120 " -"routers is 72 hours,\n" +"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n" +"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n" "while expiration time with 300 routers is around 30 hours." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:177 #, python-format msgid "" -"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in " -"about an hour, as\n" +"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n" "the introducer list expires in about that time." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:181 msgid "" -"Floodfills use a short expiration time (1 hour) for all local " -"RouterInfos, as valid RouterInfos will\n" +"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n" "be frequently republished to them." msgstr "" @@ -7652,8 +6845,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:192 msgid "" -"It may be desirable to persistently store Meta LeaseSets with long " -"expirations.\n" +"It may be desirable to persistently store Meta LeaseSets with long expirations.\n" "This is implementation-dependent." msgstr "" @@ -7667,10 +6859,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:212 msgid "" -"The second piece of data distributed in the netDb is a \"LeaseSet\" - " -"documenting\n" -"a group of <b>tunnel entry points (leases)</b> for a particular client " -"destination.\n" +"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n" +"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n" "Each of these leases specify the following information:" msgstr "" @@ -7696,8 +6886,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:454 msgid "" "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n" -"The SHA256 of the type byte (3) followed by the blinded public key is " -"used for the DHT key,\n" +"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n" "and then rotated as usual." msgstr "" @@ -7711,14 +6900,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:239 msgid "" -"The destination itself (an encryption key, a signing key and a " -"certificate)" +"The destination itself (an encryption key, a signing key and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:240 msgid "" -"Additional encryption public key: used for end-to-end encryption of " -"garlic messages" +"Additional encryption public key: used for end-to-end encryption of garlic " +"messages" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:241 @@ -7729,8 +6917,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:242 msgid "" -"Signature of all the LeaseSet data, to make sure the Destination " -"published the LeaseSet." +"Signature of all the LeaseSet data, to make sure the Destination published " +"the LeaseSet." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:246 @@ -7761,13 +6949,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:263 msgid "" -"A LeaseSet for a destination used only for outgoing connections is " -"<i>unpublished</i>.\n" +"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n" "It is never sent for publication to a floodfill router.\n" -"\"Client\" tunnels, such as those for web browsing and IRC clients, are " -"unpublished.\n" -"Servers will still be able to send messages back to those unpublished " -"destinations,\n" +"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n" +"Servers will still be able to send messages back to those unpublished destinations,\n" "because of <a href=\"#lsp\">I2NP storage messages</a>." msgstr "" @@ -7777,24 +6962,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:274 msgid "" -"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero " -"leases.\n" -"Revocations must be signed by the additional signing key in the LeaseSet." -"\n" -"Revocations are not fully implemented, and it is unclear if they have any" -" practical use.\n" -"This is the only planned use for that signing key, so it is currently " -"unused." +"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n" +"Revocations must be signed by the additional signing key in the LeaseSet.\n" +"Revocations are not fully implemented, and it is unclear if they have any practical use.\n" +"This is the only planned use for that signing key, so it is currently unused." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:283 msgid "" "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n" -"This structure is very similar to the old LeaseSet structure, and serves " -"the same purpose.\n" +"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n" "The new structure provides the flexibility required to support new\n" -"encryption types, multiple encryption types, options, offline signing " -"keys,\n" +"encryption types, multiple encryption types, options, offline signing keys,\n" "and other features.\n" "See proposal 123 for details." msgstr "" @@ -7803,15 +6982,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:715 msgid "" "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n" -"This structure provides a tree-like structure in the DHT, to refer to " -"other LeaseSets.\n" -"Using Meta LeaseSets, a site may implement large multihomed services, " -"where several\n" +"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n" +"Using Meta LeaseSets, a site may implement large multihomed services, where several\n" "different Destinations are used to provide a common service.\n" "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n" "and may have long expirations, up to 18.2 hours.\n" -"Using this facility, it should be possible to run hundreds or thousands " -"of Destinations hosting a common service.\n" +"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n" "See proposal 123 for details." msgstr "" @@ -7829,29 +7005,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:313 msgid "" -"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate" -" key.\n" -"The leases may only be decoded, and thus the destination may only be " -"contacted,\n" +"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n" +"The leases may only be decoded, and thus the destination may only be contacted,\n" "by those with the key.\n" -"There is no flag or other direct indication that the LeaseSet is " -"encrypted.\n" -"Encrypted LeaseSets are not widely used, and it is a topic for future " -"work to\n" -"research whether the user interface and implementation of encrypted " -"LeaseSets could be improved." +"There is no flag or other direct indication that the LeaseSet is encrypted.\n" +"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n" +"research whether the user interface and implementation of encrypted LeaseSets could be improved." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:324 msgid "" -"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet " -"structure.\n" -"The Destination is hidden, and only a blinded public key and an " -"expiration\n" +"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n" +"The Destination is hidden, and only a blinded public key and an expiration\n" "are visible to the floodfill.\n" "Only those that have the full Destination may decrypt the structure.\n" -"The structure is stored at a DHT location based on the hash of the " -"blinded public key,\n" +"The structure is stored at a DHT location based on the hash of the blinded public key,\n" "not the hash of the Destination.\n" "See proposal 123 for details." msgstr "" @@ -7862,12 +7030,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:336 msgid "" -"For regular LeaseSets, the expiration is the time of the latest " -"expiration of its leases.\n" -"For the new LeaseSet2 data structures, the expiration is specified in the" -" header.\n" -"For LeaseSet2, the expiration should match the latest expiration of its " -"leases.\n" +"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n" +"For the new LeaseSet2 data structures, the expiration is specified in the header.\n" +"For LeaseSet2, the expiration should match the latest expiration of its leases.\n" "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n" "and maximum expiration may be enforced, to be determined." msgstr "" @@ -7878,8 +7043,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:346 msgid "" -"No persistent storage of LeaseSet data is required, since they expire so " -"quickly.\n" +"No persistent storage of LeaseSet data is required, since they expire so quickly.\n" "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n" "with long expirations may be advisable." msgstr "" @@ -7905,42 +7069,30 @@ msgstr "" msgid "" "The netDb is decentralized, however you do need at\n" "least one reference to a peer so that the integration process\n" -"ties you in. This is accomplished by \"reseeding\" your router with the " -"RouterInfo\n" -"of an active peer - specifically, by retrieving their " -"<code>routerInfo-$hash.dat</code>\n" -"file and storing it in your <code>netDb/</code> directory. Anyone can " -"provide\n" -"you with those files - you can even provide them to others by exposing " -"your own\n" +"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n" +"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n" +"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n" +"you with those files - you can even provide them to others by exposing your own\n" "netDb directory. To simplify the process,\n" -"volunteers publish their netDb directories (or a subset) on the regular " -"(non-i2p) network,\n" +"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n" "and the URLs of these directories are hardcoded in I2P.\n" -"When the router starts up for the first time, it automatically fetches " -"from\n" +"When the router starts up for the first time, it automatically fetches from\n" "one of these URLs, selected at random." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:379 msgid "" -"The floodfill netDb is a simple distributed storage mechanism. The " -"storage\n" -"algorithm is simple: send the data to the closest peer that has " -"advertised\n" -"itself as a floodfill router. When the peer in the floodfill netDb " -"receives a\n" -"netDb store from a peer not in the floodfill netDb, they send it to a " -"subset of\n" -"the floodfill netDb-peers. The peers selected are the ones closest " -"(according\n" +"The floodfill netDb is a simple distributed storage mechanism. The storage\n" +"algorithm is simple: send the data to the closest peer that has advertised\n" +"itself as a floodfill router. When the peer in the floodfill netDb receives a\n" +"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n" +"the floodfill netDb-peers. The peers selected are the ones closest (according\n" "to the <a href=\"#kad\">XOR-metric</a>) to a specific key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:388 msgid "" -"Determining who is part of the floodfill netDb is trivial - it is exposed" -" in each \n" +"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n" "router's published routerInfo as a capability." msgstr "" @@ -7970,15 +7122,13 @@ msgid "" "Routers with high bandwidth limits (which must be manually configured,\n" "as the default is much lower) are presumed to be on lower-latency\n" "connections, and are more likely to be available 24/7.\n" -"The current minimum share bandwidth for a floodfill router is 128 " -"KBytes/sec." +"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:419 msgid "" "In addition, a router must pass several additional tests for health\n" -"(outbound message queue time, job lag, etc.) before floodfill operation " -"is\n" +"(outbound message queue time, job lag, etc.) before floodfill operation is\n" "automatically enabled." msgstr "" @@ -8005,13 +7155,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:441 msgid "" -"A floodfill router's only services that are in addition to those of non-" -"floodfill routers\n" +"A floodfill router's only services that are in addition to those of non-floodfill routers\n" "are in accepting netDb stores and responding to netDb queries.\n" -"Since they are generally high-bandwidth, they are more likely to " -"participate in a high number of tunnels\n" -"(i.e. be a \"relay\" for others), but this is not directly related to " -"their distributed database services." +"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n" +"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:449 @@ -8020,33 +7167,24 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:450 msgid "" -"The netDb uses a simple Kademlia-style XOR metric to determine closeness." -"\n" -"To create a Kademlia key, the SHA256 hash of the RouterIdentity or " -"Destination is computed." +"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n" +"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:459 msgid "" -"A modification to this algorithm is done to increase the costs of <a href" -"=\"#sybil-partial\">Sybil attacks</a>.\n" -"Instead of the SHA256 hash of the key being looked up of stored, the " -"SHA256 hash is taken\n" -"of the 32-byte binary search key appended with the UTC date represented " -"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" -"This is called the \"routing key\", and it changes every day at midnight " -"UTC.\n" -"Only the search key is modified in this way, not the floodfill router " -"hashes.\n" -"The daily transformation of the DHT is sometimes called \"keyspace " -"rotation\",\n" +"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n" +"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n" +"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" +"This is called the \"routing key\", and it changes every day at midnight UTC.\n" +"Only the search key is modified in this way, not the floodfill router hashes.\n" +"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n" "although it isn't strictly a rotation." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:469 msgid "" -"Routing keys are never sent on-the-wire in any I2NP message, they are " -"only used locally for\n" +"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n" "determination of distance." msgstr "" @@ -8061,8 +7199,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:479 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"RouterInfo are exchanged with peers\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n" "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n" "or <a href=\"%(ssu)s\">SSU</a> transport connection." msgstr "" @@ -8074,46 +7211,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:487 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"LeaseSet are periodically exchanged with peers\n" -"by bundling them in a garlic message along with normal traffic from the " -"related Destination.\n" -"This allows an initial response, and later responses, to be sent to an " -"appropriate Lease,\n" -"without requiring any LeaseSet lookups, or requiring the communicating " -"Destinations to have published LeaseSets at all." +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n" +"by bundling them in a garlic message along with normal traffic from the related Destination.\n" +"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n" +"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:495 msgid "" "The DatabaseStoreMessage should be sent to the floodfill that is closest\n" "to the current routing key for the RouterInfo or LeaseSet being stored.\n" -"Currently, the closest floodfill is found by a search in the local " -"database.\n" -"Even if that floodfill is not actually closest, it will flood it " -"\"closer\" by\n" +"Currently, the closest floodfill is found by a search in the local database.\n" +"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n" "sending it to multiple other floodfills.\n" "This provides a high degree of fault-tolerance." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:504 msgid "" -"In traditional Kademlia, a peer would do a \"find-closest\" search before" -" inserting\n" -"an item in the DHT to the closest target. As the verify operation will " -"tend to\n" -"discover closer floodfills if they are present, a router will quickly " -"improve\n" -"its knowledge of the DHT \"neighborhood\" for the RouterInfo and " -"LeaseSets it regularly publishes.\n" -"While I2NP does not define a \"find-closest\" message, if it becomes " -"necessary,\n" -"a router may simply do an iterative search for a key with the least " -"significant bit flipped\n" -"(i.e. key ^ 0x01) until no closer peers are received in the " -"DatabaseSearchReplyMessages.\n" -"This ensures that the true closest peer will be found even if a more-" -"distant peer had\n" +"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n" +"an item in the DHT to the closest target. As the verify operation will tend to\n" +"discover closer floodfills if they are present, a router will quickly improve\n" +"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n" +"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n" +"a router may simply do an iterative search for a key with the least significant bit flipped\n" +"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n" +"This ensures that the true closest peer will be found even if a more-distant peer had\n" "the netdb item." msgstr "" @@ -8124,11 +7247,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:518 #, python-format msgid "" -"A router publishes its own RouterInfo by directly connecting to a " -"floodfill router\n" +"A router publishes its own RouterInfo by directly connecting to a floodfill router\n" "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token. The message is not end-to-end garlic " -"encrypted,\n" +"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n" "as this is a direct connection, so there are no intervening routers\n" "(and no need to hide this data anyway).\n" "The floodfill router replies with a\n" @@ -8142,8 +7263,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:533 msgid "" -"Storage of LeaseSets is much more sensitive than for RouterInfos, as a " -"router\n" +"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n" "must take care that the LeaseSet cannot be associated with the router." msgstr "" @@ -8152,10 +7272,8 @@ msgstr "" msgid "" "A router publishes a local LeaseSet by\n" "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token over an outbound client tunnel for that " -"Destination.\n" -"The message is end-to-end garlic encrypted using the Destination's " -"Session Key Manager,\n" +"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n" +"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n" "to hide the message from the tunnel's outbound endpoint.\n" "The floodfill router replies with a\n" "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n" @@ -8171,17 +7289,12 @@ msgstr "" #, python-format msgid "" "After a floodfill router receives a DatabaseStoreMessage containing a\n" -"valid RouterInfo or LeaseSet which is newer than that previously stored " -"in its\n" +"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n" "local NetDb, it \"floods\" it.\n" -"To flood a NetDb entry, it looks up several (currently %(floodsize)s) " -"floodfill routers closest to the routing key\n" -"of the NetDb entry. (The routing key is the SHA256 Hash of the " -"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" -"By flooding to those closest to the key, not closest to itself, the " -"floodfill ensures that the storage\n" -"gets to the right place, even if the storing router did not have good " -"knowledge of the\n" +"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n" +"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" +"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n" +"gets to the right place, even if the storing router did not have good knowledge of the\n" "DHT \"neighborhood\" for the routing key." msgstr "" @@ -8203,17 +7316,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:574 #, python-format msgid "" -"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to " -"request a netdb entry from a floodfill router.\n" +"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n" "Lookups are sent out one of the router's outbound exploratory tunnels.\n" -"The replies are specified to return via one of the router's inbound " -"exploratory tunnels." +"The replies are specified to return via one of the router's inbound exploratory tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:580 msgid "" -"Lookups are generally sent to the two \"good\" (the connection doesn't " -"fail) floodfill routers closest to the requested key, in parallel." +"Lookups are generally sent to the two \"good\" (the connection doesn't fail)" +" floodfill routers closest to the requested key, in parallel." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:584 @@ -8221,8 +7332,7 @@ msgstr "" msgid "" "If the key is found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n" -"If the key is not found locally by the floodfill router, it responds with" -" a\n" +"If the key is not found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "containing a list of other floodfill routers close to the key." msgstr "" @@ -8230,22 +7340,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:592 msgid "" "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n" -"RouterInfo lookups are not encrypted and thus are vulnerable to snooping " -"by the outbound endpoint\n" -"(OBEP) of the client tunnel. This is due to the expense of the ElGamal " -"encryption.\n" +"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n" +"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n" "RouterInfo lookup encryption may be enabled in a future release." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:599 msgid "" -"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage" -" or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted by including the session key and tag in the lookup.\n" -"This hides the reply from the inbound gateway (IBGW) of the reply tunnel." -"\n" -"Responses to RouterInfo lookups will be encrypted if we enable the lookup" -" encryption." +"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n" +"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:606 @@ -8259,41 +7364,31 @@ msgstr "" msgid "" "Due to the relatively small size of the network and flooding redundancy,\n" "lookups are usually O(1) rather than O(log n).\n" -"A router is highly likely to know a floodfill router close enough to the " -"key to get the answer on the first try.\n" +"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n" "In releases prior to 0.8.9, routers used a lookup redundancy of two\n" -"(that is, two lookups were performed in parallel to different peers), and" -"\n" -"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was " -"implemented.\n" +"(that is, two lookups were performed in parallel to different peers), and\n" +"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n" "Queries were sent through <i>multiple routes simultaneously</i>\n" "to <i>reduce the chance of query failure</i>." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:621 msgid "" -"As of release 0.8.9, <i>iterative lookups</i> are implemented with no " -"lookup redundancy.\n" +"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n" "This is a more efficient and reliable lookup that will work much better\n" "when not all floodfill peers are known, and it removes a serious\n" -"limitation to network growth. As the network grows and each router knows " -"only a small\n" +"limitation to network growth. As the network grows and each router knows only a small\n" "subset of the floodfill peers, lookups will become O(log n).\n" -"Even if the peer does not return references closer to the key, the lookup" -" continues with\n" -"the next-closest peer, for added robustness, and to prevent a malicious " -"floodfill from\n" -"black-holing a part of the key space. Lookups continue until a total " -"lookup timeout is reached,\n" +"Even if the peer does not return references closer to the key, the lookup continues with\n" +"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n" +"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n" "or the maximum number of peers is queried." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:633 msgid "" -"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash " -"directly as both the node ID and the Kademlia key.\n" -"Incorrect responses that are not closer to the search key are generally " -"ignored.\n" +"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n" +"Incorrect responses that are not closer to the search key are generally ignored.\n" "Given the current size of the network, a router has\n" "<i>detailed knowledge of the neighborhood of the destination ID space</i>." msgstr "" @@ -8305,8 +7400,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:643 #, python-format msgid "" -"Note: RouterInfo verification is disabled as of release 0.9.7.1 to " -"prevent\n" +"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n" "the attack described in the paper\n" "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n" "It is not clear if verification can be redesigned to be done safely." @@ -8314,13 +7408,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:650 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" "Lookups sent out one of the router's outbound exploratory tunnels.\n" -"Lookups are end-to-end garlic encrypted to prevent snooping by the " -"outbound endpoint(OBEP)." +"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:658 @@ -8329,22 +7421,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:659 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" -"Lookups sent out one of the outbound client tunnels for the destination " -"of the LeaseSet being verified.\n" +"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n" "To prevent snooping by the OBEP of the outbound tunnel,\n" "lookups are end-to-end garlic encrypted.\n" -"The replies are specified to return via one of the client's inbound " -"tunnels." +"The replies are specified to return via one of the client's inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:669 msgid "" -"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a " -"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted,\n" "to hide the reply from the inbound gateway (IBGW) of the reply tunnel." msgstr "" @@ -8356,23 +7444,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:678 #, python-format msgid "" -"<i>Exploration</i> is a special form of netdb lookup, where a router " -"attempts to learn about\n" +"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n" "new routers.\n" -"It does this by sending a floodfill router a <a " -"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random " -"key.\n" +"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n" "As this lookup will fail, the floodfill would normally respond with a\n" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing " -"hashes of floodfill routers close to the key.\n" -"This would not be helpful, as the requesting router probably already " -"knows those floodfills,\n" -"and it would be impractical to add all floodfill routers to the \"don't " -"include\" field of the DatabaseLookup Message.\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n" +"This would not be helpful, as the requesting router probably already knows those floodfills,\n" +"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n" "For an exploration query, the requesting router sets a special flag in\n" "the DatabaseLookup Message.\n" -"The floodfill will then respond only with non-floodfill routers close to " -"the requested key." +"The floodfill will then respond only with non-floodfill routers close to the requested key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:692 @@ -8381,14 +7462,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:693 msgid "" -"The response to a lookup request is either a Database Store Message (on " -"success) or a\n" -"Database Search Reply Message (on failure). The DSRM contains a 'from' " -"router hash field\n" +"The response to a lookup request is either a Database Store Message (on success) or a\n" +"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n" "to indicate the source of the reply; the DSM does not.\n" "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n" -"There are no other response tags. Therefore, when making multiple " -"requests in parallel, it is\n" +"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n" "difficult to monitor the performance of the various floodfill routers." msgstr "" @@ -8398,19 +7476,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:705 msgid "" -"Destinations may be hosted on multiple routers simultaneously, by using " -"the same\n" +"Destinations may be hosted on multiple routers simultaneously, by using the same\n" "private and public keys (traditionally stored in eepPriv.dat files).\n" -"As both instances will periodically publish their signed LeaseSets to the" -" floodfill peers,\n" -"the most recently published LeaseSet will be returned to a peer " -"requesting a database lookup.\n" -"As LeaseSets have (at most) a 10 minute lifetime, should a particular " -"instance go down,\n" -"the outage will be 10 minutes at most, and generally much less than that." -"\n" -"The multihoming function has been verified and is in use by several " -"services on the network." +"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n" +"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n" +"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n" +"the outage will be 10 minutes at most, and generally much less than that.\n" +"The multihoming function has been verified and is in use by several services on the network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:727 @@ -8440,8 +7512,7 @@ msgstr "" #, python-format msgid "" "There are currently around %(ffcount)s floodfill routers in the network.\n" -"Most of the following attacks will become more difficult, or have less " -"impact,\n" +"Most of the following attacks will become more difficult, or have less impact,\n" "as the network size and number of floodfill routers increase." msgstr "" @@ -8452,8 +7523,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:748 #, python-format msgid "" -"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill" -" routers closest to the key." +"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill " +"routers closest to the key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:753 @@ -8474,8 +7545,7 @@ msgstr "" #, python-format msgid "" "Each router maintains an expanded set of statistics in the\n" -"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router," -"\n" +"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n" "covering various quality metrics for that peer.\n" "The set includes:" msgstr "" @@ -8506,14 +7576,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:775 msgid "" -"Each time a router needs to make a determination on which floodfill " -"router is closest to a key,\n" +"Each time a router needs to make a determination on which floodfill router is closest to a key,\n" "it uses these metrics to determine which floodfill routers are \"good\".\n" -"The methods, and thresholds, used to determine \"goodness\" are " -"relatively new, and\n" +"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n" "are subject to further analysis and improvement.\n" -"While a completely unresponsive router will quickly be identified and " -"avoided,\n" +"While a completely unresponsive router will quickly be identified and avoided,\n" "routers that are only sometimes malicious may be much harder to deal with." msgstr "" @@ -8525,8 +7592,7 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a large number of floodfill routers spread throughout the " -"keyspace." +"by creating a large number of floodfill routers spread throughout the keyspace." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:791 @@ -8534,35 +7600,29 @@ msgstr "" msgid "" "(In a related example, a researcher recently created a\n" "<a href=\"%(url)s\">large number of Tor relays</a>.)\n" -"If successful, this could be an effective DOS attack on the entire " -"network." +"If successful, this could be an effective DOS attack on the entire network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:797 msgid "" -"If the floodfills are not sufficiently misbehaving to be marked as " -"\"bad\" using the peer profile\n" +"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n" "metrics described above, this is a difficult scenario to handle.\n" -"Tor's response can be much more nimble in the relay case, as the " -"suspicious relays\n" +"Tor's response can be much more nimble in the relay case, as the suspicious relays\n" "can be manually removed from the consensus.\n" -"Some possible responses for the I2P network are listed below, however " -"none of them is completely satisfactory:" +"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:805 msgid "" -"Compile a list of bad router hashes or IPs, and announce the list through" -" various means\n" -"(console news, website, forum, etc.); users would have to manually " -"download the list and\n" +"Compile a list of bad router hashes or IPs, and announce the list through various means\n" +"(console news, website, forum, etc.); users would have to manually download the list and\n" "add it to their local \"blacklist\"." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:810 msgid "" -"Ask everyone in the network to enable floodfill manually (fight Sybil " -"with more Sybil)" +"Ask everyone in the network to enable floodfill manually (fight Sybil with " +"more Sybil)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:811 @@ -8571,8 +7631,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:812 msgid "" -"Release a new software version that improves the peer profile metrics and" -" thresholds,\n" +"Release a new software version that improves the peer profile metrics and thresholds,\n" "in an attempt to automatically identify the \"bad\" peers." msgstr "" @@ -8584,12 +7643,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:817 msgid "" -"Implement an automatic subscription-based blacklist controlled by a " -"single individual or group.\n" -"This would essentially implement a portion of the Tor \"consensus\" " -"model.\n" -"Unfortunately it would also give a single individual or group the power " -"to\n" +"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n" +"This would essentially implement a portion of the Tor \"consensus\" model.\n" +"Unfortunately it would also give a single individual or group the power to\n" "block participation of any particular router or IP in the network,\n" "or even to completely shutdown or destroy the entire network." msgstr "" @@ -8606,25 +7662,19 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a small number (8-15) of floodfill routers clustered closely " -"in the keyspace,\n" +"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n" "and distribute the RouterInfos for these routers widely.\n" -"Then, all lookups and stores for a key in that keyspace would be directed" -"\n" +"Then, all lookups and stores for a key in that keyspace would be directed\n" "to one of the attacker's routers.\n" -"If successful, this could be an effective DOS attack on a particular I2P " -"Site, for example." +"If successful, this could be an effective DOS attack on a particular I2P Site, for example." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:842 msgid "" -"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key," -"\n" -"an attacker must use a brute-force method to repeatedly generate router " -"hashes\n" +"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n" +"an attacker must use a brute-force method to repeatedly generate router hashes\n" "until he has enough that are sufficiently close to the key.\n" -"The amount of computational power required for this, which is dependent " -"on network\n" +"The amount of computational power required for this, which is dependent on network\n" "size, is unknown." msgstr "" @@ -8632,14 +7682,10 @@ msgstr "" msgid "" "As a partial defense against this attack,\n" "the algorithm used to determine Kademlia \"closeness\" varies over time.\n" -"Rather than using the Hash of the key (i.e. H(k)) to determine closeness," -"\n" -"we use the Hash of the key appended with the current date string, i.e. " -"H(k + YYYYMMDD).\n" -"A function called the \"routing key generator\" does this, which " -"transforms the original key into a \"routing key\".\n" -"In other words, the entire netdb keyspace \"rotates\" every day at UTC " -"midnight.\n" +"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n" +"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n" +"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n" +"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n" "Any partial-keyspace attack would have to be regenerated every day, for\n" "after the rotation, the attacking routers would no longer be close\n" "to the target key, or to each other." @@ -8648,8 +7694,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:862 msgid "" "This attack becomes more difficult as the network size grows.\n" -"However, recent research demonstrates that the keyspace rotation is not " -"particularly effective.\n" +"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n" "An attacker can precompute numerous router hashes in advance,\n" "and only a few routers are sufficient to \"eclipse\" a portion\n" "of the keyspace within a half hour after rotation." @@ -8657,11 +7702,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:870 msgid "" -"One consequence of daily keyspace rotation is that the distributed " -"network database\n" +"One consequence of daily keyspace rotation is that the distributed network database\n" "may become unreliable for a few minutes after the rotation --\n" -"lookups will fail because the new \"closest\" router has not received a " -"store yet.\n" +"lookups will fail because the new \"closest\" router has not received a store yet.\n" "The extent of the issue, and methods for mitigation\n" "(for example netdb \"handoffs\" at midnight)\n" "are a topic for further study." @@ -8724,24 +7767,19 @@ msgstr "" #, python-format msgid "" "See also <a href=\"#lookup\">lookup</a>\n" -"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections " -"2.2-2.3 for terms below in italics)" +"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:926 msgid "" -"Similar to a bootstrap attack, an attacker using a floodfill router could" -" attempt to \"steer\"\n" -"peers to a subset of routers controlled by him by returning their " -"references." +"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n" +"peers to a subset of routers controlled by him by returning their references." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:931 msgid "" -"This is unlikely to work via exploration, because exploration is a low-" -"frequency task.\n" -"Routers acquire a majority of their peer references through normal tunnel" -" building activity.\n" +"This is unlikely to work via exploration, because exploration is a low-frequency task.\n" +"Routers acquire a majority of their peer references through normal tunnel building activity.\n" "Exploration results are generally limited to a few router hashes,\n" "and each exploration query is directed to a random floodfill router." msgstr "" @@ -8753,18 +7791,13 @@ msgid "" "For floodfill router references returned in a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "response to a lookup,\n" -"these references are followed if they are closer (or the next closest) to" -" the lookup key.\n" +"these references are followed if they are closer (or the next closest) to the lookup key.\n" "The requesting router does not trust that the references are\n" "closer to the key (i.e. they are <i>verifiably correct</i>.\n" -"The lookup also does not stop when no closer key is found, but continues " -"by querying the\n" -"next-closet node, until the timeout or maximum number of queries is " -"reached.\n" -"This prevents a malicious floodfill from black-holing a part of the key " -"space.\n" -"Also, the daily keyspace rotation requires an attacker to regenerate a " -"router info\n" +"The lookup also does not stop when no closer key is found, but continues by querying the\n" +"next-closet node, until the timeout or maximum number of queries is reached.\n" +"This prevents a malicious floodfill from black-holing a part of the key space.\n" +"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n" "within the desired key space region.\n" "This design ensures that the query capture attack described in\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n" @@ -8802,43 +7835,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:973 #, python-format msgid "" -"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used " -"by Torsk and NISAN.\n" -"At first glance, these do not appear to apply to I2P. First, the use of " -"DHT by Torsk and NISAN\n" -"is significantly different from that in I2P. Second, I2P's network " -"database lookups are only\n" -"loosely correlated to the <a href=\"%(peerselection)s\">peer " -"selection</a> and\n" -"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only " -"previously-known peers\n" +"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n" +"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n" +"is significantly different from that in I2P. Second, I2P's network database lookups are only\n" +"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n" +"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n" "are used for tunnels.\n" "Also, peer selection is unrelated to any notion of DHT key-closeness." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:984 msgid "" -"Some of this may actually be more interesting when the I2P network gets " -"much larger.\n" -"Right now, each router knows a large proportion of the network, so " -"looking up a particular\n" -"Router Info in the network database is not strongly indicative of a " -"future intent to use\n" -"that router in a tunnel. Perhaps when the network is 100 times larger, " -"the lookup may be\n" -"more correlative. Of course, a larger network makes a Sybil attack that " -"much harder." +"Some of this may actually be more interesting when the I2P network gets much larger.\n" +"Right now, each router knows a large proportion of the network, so looking up a particular\n" +"Router Info in the network database is not strongly indicative of a future intent to use\n" +"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n" +"more correlative. Of course, a larger network makes a Sybil attack that much harder." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:992 #, python-format msgid "" -"However, the general issue of DHT information leakage in I2P needs " -"further investigation.\n" -"The floodfill routers are in a position to observe queries and gather " -"information.\n" -"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as " -"specifed in the paper)\n" +"However, the general issue of DHT information leakage in I2P needs further investigation.\n" +"The floodfill routers are in a position to observe queries and gather information.\n" +"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as specifed in the paper)\n" "we expect that many of the Sybil threats we describe\n" "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n" "<a href=\"#sybil\">here</a> and\n" @@ -8873,11 +7893,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:10 #, python-format msgid "" -"<b>Peer profiling</b> is the process of collecting data based on the " -"<b>observed</b> performance\n" +"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n" "of other routers or peers, and classifying those peers into groups.\n" -"Profiling does <b>not</b> use any claimed performance data published by " -"the peer itself\n" +"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n" "in the <a href=\"%(netdb)s\">network database</a>." msgstr "" @@ -8892,8 +7910,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:20 #, python-format msgid "" -"Choosing peers from the set of floodfill routers to use for network " -"database storage and queries,\n" +"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n" "which is discussed on the <a href=\"%(netdb)s\">network database</a> page" msgstr "" @@ -8906,11 +7923,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:28 msgid "" "<b>Peer selection</b> is the process of choosing which routers\n" -"on the network we want to relay our messages to go through (which peers " -"will we \n" +"on the network we want to relay our messages to go through (which peers will we \n" "ask to join our tunnels). To accomplish this, we keep track of how each\n" -"peer performs (the peer's \"profile\") and use that data to estimate how" -" \n" +"peer performs (the peer's \"profile\") and use that data to estimate how \n" "fast they are, how often they will be able to accept our requests, and \n" "whether they seem to be overloaded or otherwise unable to perform what\n" "they agree to reliably." @@ -8920,8 +7935,7 @@ msgstr "" #, python-format msgid "" "Unlike some other anonymous networks, in I2P,\n" -"claimed bandwidth is untrusted and is <b>only</b> used to avoid those " -"peers\n" +"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n" "advertising very low bandwidth insufficient for routing tunnels.\n" "All peer selection is done through profiling.\n" "This prevents simple attacks based on peers claiming high bandwidth\n" @@ -8933,10 +7947,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:50 msgid "" -"Peer selection is done quite frequently, as a router may maintain a large" -" number\n" -"of client and exploratory tunnels, and a tunnel lifetime is only 10 " -"minutes." +"Peer selection is done quite frequently, as a router may maintain a large number\n" +"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:56 @@ -8947,11 +7959,9 @@ msgstr "" #, python-format msgid "" "For more information see the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>\n" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n" "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n" -"See <a href=\"#notes\">below</a> for notes on minor changes since the " -"paper was published." +"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:65 @@ -8961,30 +7971,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:66 #, python-format msgid "" -"Each peer has a set of data points collected about them, including " -"statistics \n" -"about how long it takes for them to reply to a network database query, " -"how \n" -"often their tunnels fail, and how many new peers they are able to " -"introduce \n" -"us to, as well as simple data points such as when we last heard from them" -" or\n" -"when the last communication error occurred. The specific data points " -"gathered\n" +"Each peer has a set of data points collected about them, including statistics \n" +"about how long it takes for them to reply to a network database query, how \n" +"often their tunnels fail, and how many new peers they are able to introduce \n" +"us to, as well as simple data points such as when we last heard from them or\n" +"when the last communication error occurred. The specific data points gathered\n" "can be found in the <a href=\"%(url)s\">code</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:75 msgid "" -"Profiles are fairly small, a few KB. To control memory usage, the profile" -" expiration time\n" +"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n" "lessens as the number of profiles grows.\n" -"Profiles are kept in memory until router shutdown, when they are written " -"to disk.\n" -"At startup, the profiles are read so the router need not reinitialize all" -" profiles,\n" -"thus allowing a router to quickly re-integrate into the network after " -"startup." +"Profiles are kept in memory until router shutdown, when they are written to disk.\n" +"At startup, the profiles are read so the router need not reinitialize all profiles,\n" +"thus allowing a router to quickly re-integrate into the network after startup." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:85 @@ -8994,10 +7995,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:86 msgid "" "While the profiles themselves can be considered a summary of a peer's \n" -"performance, to allow for effective peer selection we break each summary " -"down \n" -"into four simple values, representing the peer's speed, its capacity, how" -" well \n" +"performance, to allow for effective peer selection we break each summary down \n" +"into four simple values, representing the peer's speed, its capacity, how well \n" "integrated into the network it is, and whether it is failing." msgstr "" @@ -9009,8 +8008,7 @@ msgstr "Speed" msgid "" "The speed calculation\n" "simply goes through the profile and estimates how much data we can\n" -"send or receive on a single tunnel through the peer in a minute. For " -"this estimate it just looks at\n" +"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n" "performance in the previous minute." msgstr "" @@ -9022,13 +8020,11 @@ msgstr "" msgid "" "The capacity calculation\n" "simply goes through the profile and estimates how many tunnels the peer\n" -"would agree to participate in over a given time period. For this " -"estimate it looks at \n" +"would agree to participate in over a given time period. For this estimate it looks at \n" "how many tunnel build requests\n" "the peer has accepted, rejected, and dropped, and how many\n" "of the agreed-to tunnels later failed.\n" -"While the calculation is time-weighted so that recent activity counts " -"more than later activity,\n" +"While the calculation is time-weighted so that recent activity counts more than later activity,\n" "statistics up to 48 hours old may be included." msgstr "" @@ -9036,10 +8032,8 @@ msgstr "" msgid "" "Recognizing and avoiding unreliable and unreachable\n" "peers is critically important.\n" -"Unfortunately, as the tunnel building and testing require the " -"participation of several peers,\n" -"it is difficult to positively identify the cause of a dropped build " -"request or test failure.\n" +"Unfortunately, as the tunnel building and testing require the participation of several peers,\n" +"it is difficult to positively identify the cause of a dropped build request or test failure.\n" "The router assigns a probability of failure to each of the\n" "peers, and uses that probability in the capacity calculation.\n" "Drops and test failures are weighted much higher than rejections." @@ -9051,10 +8045,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:124 msgid "" -"As mentioned above, we drill through each peer's profile to come up with " -"a \n" -"few key calculations, and based upon those, we organize each peer into " -"three\n" +"As mentioned above, we drill through each peer's profile to come up with a \n" +"few key calculations, and based upon those, we organize each peer into three\n" "groups - fast, high capacity, and standard." msgstr "" @@ -9064,15 +8056,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:134 msgid "" -"A peer is considered \"high capacity\" if its capacity calculation meets " -"or \n" +"A peer is considered \"high capacity\" if its capacity calculation meets or \n" "exceeds the median of all peers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:138 msgid "" -"A peer is considered \"fast\" if they are already \"high capacity\" and " -"their \n" +"A peer is considered \"fast\" if they are already \"high capacity\" and their \n" "speed calculation meets or exceeds the median of all peers." msgstr "" @@ -9098,25 +8088,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:156 msgid "" "The fast group is limited to 30 peers.\n" -"If there would be more, only the ones with the highest speed rating are " -"placed in the group." +"If there would be more, only the ones with the highest speed rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:160 msgid "" -"The high capacity group is limited to 75 peers (including the fast group)" -"\n" -"If there would be more, only the ones with the highest capacity rating " -"are placed in the group." +"The high capacity group is limited to 75 peers (including the fast group)\n" +"If there would be more, only the ones with the highest capacity rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:164 msgid "" -"The standard group has no fixed limit, but is somewhat smaller than the " -"number of RouterInfos\n" +"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n" "stored in the local network database.\n" -"On an active router in today's network, there may be about 1000 " -"RouterInfos and 500 peer profiles\n" +"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n" "(including those in the fast and high capacity groups)" msgstr "" @@ -9132,16 +8117,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:177 msgid "" -"The groups tend to be fairly stable, that is, there is not much \"churn\"" -" in the rankings\n" +"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n" "at each recalculation.\n" -"Peers in the fast and high capacity groups get more tunnels build through" -" them, which increases their speed and capacity ratings,\n" +"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n" "which reinforces their presence in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:188 -msgid "The router selects peers from the above groups to build tunnels through." +msgid "" +"The router selects peers from the above groups to build tunnels through." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:193 @@ -9150,19 +8134,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:194 msgid "" -"Client tunnels are used for application traffic, such as for HTTP proxies" -" and web servers." +"Client tunnels are used for application traffic, such as for HTTP proxies " +"and web servers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:198 msgid "" -"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog" -"/one-cell-enough\">some attacks</a>,\n" +"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n" "and increase performance,\n" -"peers for building client tunnels are chosen randomly from the smallest " -"group, which is the \"fast\" group.\n" -"There is no bias toward selecting peers that were previously participants" -" in a tunnel for the same client." +"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n" +"There is no bias toward selecting peers that were previously participants in a tunnel for the same client." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:206 @@ -9171,35 +8152,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:207 msgid "" -"Exploratory tunnels are used for router administrative purposes, such as " -"network database traffic\n" +"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n" "and testing client tunnels.\n" -"Exploratory tunnels are also used to contact previously unconnected " -"routers, which is why\n" +"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n" "they are called \"exploratory\".\n" "These tunnels are usually low-bandwidth." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:215 msgid "" -"Peers for building exploratory tunnels are generally chosen randomly from" -" the standard group.\n" -"If the success rate of these build attempts is low compared to the client" -" tunnel build success rate,\n" -"the router will select a weighted average of peers randomly from the high" -" capacity group instead.\n" -"This helps maintain a satisfactory build success rate even when network " -"performance is poor.\n" -"There is no bias toward selecting peers that were previously participants" -" in an exploratory tunnel." +"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n" +"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n" +"the router will select a weighted average of peers randomly from the high capacity group instead.\n" +"This helps maintain a satisfactory build success rate even when network performance is poor.\n" +"There is no bias toward selecting peers that were previously participants in an exploratory tunnel." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:223 msgid "" -"As the standard group includes a very large subset of all peers the " -"router knows about,\n" -"exploratory tunnels are essentially built through a random selection of " -"all peers,\n" +"As the standard group includes a very large subset of all peers the router knows about,\n" +"exploratory tunnels are essentially built through a random selection of all peers,\n" "until the build success rate becomes too low." msgstr "" @@ -9209,8 +8181,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:232 msgid "" -"To prevent some simple attacks, and for performance, there are the " -"following restrictions:" +"To prevent some simple attacks, and for performance, there are the following" +" restrictions:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:236 @@ -9219,8 +8191,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:239 msgid "" -"A peer may participate in a maximum of 33% of all tunnels created by " -"the router." +"A peer may participate in a maximum of 33% of all tunnels created by the" +" router." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:242 @@ -9241,18 +8213,18 @@ msgid "" "Peers are ordered within tunnels to\n" "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n" "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n" -"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel " -"page</a>." +"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:268 -msgid "Continue to analyze an tune speed and capacity calculations as necessary" +msgid "" +"Continue to analyze an tune speed and capacity calculations as necessary" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:271 msgid "" -"Implement a more aggressive ejection strategy if necessary to control " -"memory usage as the network grows" +"Implement a more aggressive ejection strategy if necessary to control memory" +" usage as the network grows" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:274 @@ -9267,10 +8239,8 @@ msgstr "" #, python-format msgid "" "For those reading the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>,\n" -"please keep in mind the following minor changes in I2P since the paper's " -"publication:" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n" +"please keep in mind the following minor changes in I2P since the paper's publication:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:289 @@ -9336,24 +8306,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:21 msgid "" "I2P is a scalable, self organizing, resilient packet switched anonymous \n" -"network layer, upon which any number of different anonymity or security " -"conscious \n" -"applications can operate. Each of these applications may make their own " -"anonymity, \n" -"latency, and throughput tradeoffs without worrying about the proper " -"implementation \n" -"of a free route mixnet, allowing them to blend their activity with the " -"larger \n" +"network layer, upon which any number of different anonymity or security conscious \n" +"applications can operate. Each of these applications may make their own anonymity, \n" +"latency, and throughput tradeoffs without worrying about the proper implementation \n" +"of a free route mixnet, allowing them to blend their activity with the larger \n" "anonymity set of users already running on top of I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:30 msgid "" -"Applications available already provide the full range of typical Internet" -" activities -\n" +"Applications available already provide the full range of typical Internet activities -\n" "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n" -"blogging and content syndication, newsgroups, as well as several other " -"applications under development." +"blogging and content syndication, newsgroups, as well as several other applications under development." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:36 @@ -9366,29 +8330,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:38 msgid "" -"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a " -"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" -"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a " -"href=\"#app.i2pbt\">I2P-bt</a>\n" +"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" +"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n" "and others." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:43 msgid "" -"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote" -"\">I2P-Bote</a>." +"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a " +"href=\"#app.i2pbote\">I2P-Bote</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:44 msgid "" -"Blog: using e.g. the pebble plugin or the distributed blogging software " -"<a href=\"#app.syndie\">Syndie</a>." +"Blog: using e.g. the pebble plugin or the distributed blogging software <a " +"href=\"#app.syndie\">Syndie</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:45 msgid "" -"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS " -"cloud over I2P." +"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud " +"over I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:46 @@ -9397,77 +8359,47 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:49 msgid "" -"Unlike web sites hosted within content distribution networks like <a " -"href=\"#similar.freenet\">Freenet</a> \n" -"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services " -"hosted on \n" -"I2P are fully interactive - there are traditional web-style search " -"engines, \n" -"bulletin boards, blogs you can comment on, database driven sites, and " -"bridges \n" -"to query static systems like Freenet without needing to install it " -"locally." +"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n" +"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n" +"I2P are fully interactive - there are traditional web-style search engines, \n" +"bulletin boards, blogs you can comment on, database driven sites, and bridges \n" +"to query static systems like Freenet without needing to install it locally." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:57 msgid "" "With all of these anonymity enabled applications, I2P takes on the role \n" -"of the message oriented middleware - applications say that they want to " -"send \n" -"some data to a cryptographic identifier (a \"destination\") and I2P takes" -" care \n" -"of making sure it gets there securely and anonymously. I2P also bundles a" -" \n" -"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's " -"anonymous \n" -"best-effort messages to transfer as reliable, in-order streams, " -"transparently \n" -"offering a TCP based congestion control algorithm tuned for the high " -"bandwidth \n" -"delay product of the network. While there have been several simple SOCKS " -"proxies \n" -"available to tie existing applications into the network, their value has " -"been \n" -"limited as nearly every application routinely exposes what, in an " -"anonymous \n" -"context, is sensitive information. The only safe way to go is to fully " -"audit \n" -"an application to ensure proper operation and to assist in that we " -"provide \n" -"a series of APIs in various languages which can be used to make the most " -"out \n" +"of the message oriented middleware - applications say that they want to send \n" +"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n" +"of making sure it gets there securely and anonymously. I2P also bundles a \n" +"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n" +"best-effort messages to transfer as reliable, in-order streams, transparently \n" +"offering a TCP based congestion control algorithm tuned for the high bandwidth \n" +"delay product of the network. While there have been several simple SOCKS proxies \n" +"available to tie existing applications into the network, their value has been \n" +"limited as nearly every application routinely exposes what, in an anonymous \n" +"context, is sensitive information. The only safe way to go is to fully audit \n" +"an application to ensure proper operation and to assist in that we provide \n" +"a series of APIs in various languages which can be used to make the most out \n" "of the network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:74 #, python-format msgid "" -"I2P is not a research project - academic, commercial, or governmental, " -"but \n" -"is instead an engineering effort aimed at doing whatever is necessary to " -"provide \n" -"a sufficient level of anonymity to those who need it. It has been in " -"active \n" -"development since early 2003 with one full time developer and a dedicated" -" \n" -"group of part time contributors from all over the world. All of the work " -"done \n" -"on I2P is open source and freely available on the <a " -"href=\"%(site)s\">website</a>, \n" -"with the majority of the code released outright into the public domain, " -"though \n" -"making use of a few cryptographic routines under BSD-style licenses. The " -"people \n" -"working on I2P do not control what people release client applications " -"under, \n" -"and there are several GPL'ed applications available (<a " -"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" -"<a href=\"#app.i2pmail\">susimail</a>, <a " -"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-" -"Bote</a>, \n" +"I2P is not a research project - academic, commercial, or governmental, but \n" +"is instead an engineering effort aimed at doing whatever is necessary to provide \n" +"a sufficient level of anonymity to those who need it. It has been in active \n" +"development since early 2003 with one full time developer and a dedicated \n" +"group of part time contributors from all over the world. All of the work done \n" +"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n" +"with the majority of the code released outright into the public domain, though \n" +"making use of a few cryptographic routines under BSD-style licenses. The people \n" +"working on I2P do not control what people release client applications under, \n" +"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" +"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n" "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n" -"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from " -"donations,\n" +"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n" "and does not receive any tax breaks in any jurisdiction at this time,\n" "as many of the developers are themselves anonymous." msgstr "" @@ -9478,40 +8410,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:94 msgid "" -"To understand I2P's operation, it is essential to understand a few key " -"concepts. \n" -"First, I2P makes a strict separation between the software participating " -"in \n" -"the network (a \"router\") and the anonymous endpoints (\"destinations\")" -" associated \n" -"with individual applications. The fact that someone is running I2P is not" -" \n" -"usually a secret. What is hidden is information on what the user is " -"doing, \n" -"if anything at all, as well as what router a particular destination is " -"connected \n" -"to. End users will typically have several local destinations on their " -"router \n" -"- for instance, one proxying in to IRC servers, another supporting the " -"user's \n" -"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, " -"another for \n" +"To understand I2P's operation, it is essential to understand a few key concepts. \n" +"First, I2P makes a strict separation between the software participating in \n" +"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n" +"with individual applications. The fact that someone is running I2P is not \n" +"usually a secret. What is hidden is information on what the user is doing, \n" +"if anything at all, as well as what router a particular destination is connected \n" +"to. End users will typically have several local destinations on their router \n" +"- for instance, one proxying in to IRC servers, another supporting the user's \n" +"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n" "torrents, etc." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:107 msgid "" "Another critical concept to understand is the \"tunnel\".\n" -"A tunnel is a directed path through an explicitly selected list of " -"routers.\n" -"Layered encryption is used, so each of the routers can only decrypt a " -"single layer.\n" +"A tunnel is a directed path through an explicitly selected list of routers.\n" +"Layered encryption is used, so each of the routers can only decrypt a single layer.\n" "The decrypted information contains the IP of the next router, along with\n" "the encrypted information to be forwarded.\n" -"Each tunnel has a starting point (the first router, also known as " -"\"gateway\")\n" -"and an end point. Messages can be sent only in one way. To send messages " -"back,\n" +"Each tunnel has a starting point (the first router, also known as \"gateway\")\n" +"and an end point. Messages can be sent only in one way. To send messages back,\n" "another tunnel is required." msgstr "" @@ -9531,15 +8450,12 @@ msgid "" "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n" "Combining these two tunnels allows users to send messages to each other.\n" "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n" -"while the receiver (\"Bob\" in the above image) creates an inbound " -"tunnel.\n" -"The gateway of an inbound tunnel can receive messages from any other user" -"\n" +"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n" +"The gateway of an inbound tunnel can receive messages from any other user\n" "and will send them on until the endpoint (\"Bob\").\n" "The endpoint of the outbound tunnel will need to send the message\n" "on to the gateway of the inbound tunnel.\n" -"To do this, the sender (\"Alice\") adds instructions to her encrypted " -"message.\n" +"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n" "Once the endpoint of the outbound tunnel decrypts the message,\n" "it will have instructions to forward the message to the correct\n" "inbound gateway (the gateway to \"Bob\")." @@ -9547,25 +8463,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:140 msgid "" -"A third critical concept to understand is I2P's <b>\"network " -"database\"</b> (or \"netDb\") \n" -"- a pair of algorithms used to share network metadata. The two types of " -"metadata \n" -"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the " -"routerInfo gives routers the \n" -"data necessary for contacting a particular router (their public keys, " -"transport \n" -"addresses, etc), while the leaseSet gives routers the information " -"necessary \n" -"for contacting a particular destination. A leaseSet contains a number of " -"\"leases\".\n" -"Each of this leases specifies a tunnel gateway, which allows reaching a " -"specific destination.\n" +"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n" +"- a pair of algorithms used to share network metadata. The two types of metadata \n" +"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n" +"data necessary for contacting a particular router (their public keys, transport \n" +"addresses, etc), while the leaseSet gives routers the information necessary \n" +"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n" +"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n" "The full information contained in a lease:" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:151 -msgid "Inbound gateway for a tunnel that allows reaching a specific destination." +msgid "" +"Inbound gateway for a tunnel that allows reaching a specific destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:152 @@ -9580,10 +8490,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:155 msgid "" -"Routers themselves send their routerInfo to the netDb directly, while " -"leaseSets are sent through outbound tunnels\n" -"(leaseSets need to be sent anonymously, to avoid correlating a router " -"with his leaseSets)." +"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" +"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:160 @@ -9594,13 +8502,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" -"To build up her own inbound and outbound tunnels, Alice does a lookup in " -"the netDb to collect routerInfo.\n" +"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" -"She can then send a build message to the first hop, requesting the " -"construction of a tunnel and asking\n" -"that router to send the construction message onward, until the tunnel has" -" been constructed." +"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" +"that router to send the construction message onward, until the tunnel has been constructed." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:171 @@ -9617,30 +8522,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" -"When Alice wants to send a message to Bob, she first does a lookup in the" -" \n" -"netDb to find Bob's leaseSet, giving her his current inbound tunnel " -"gateways. \n" -"She then picks one of her outbound tunnels and sends the message down it " -"with \n" -"instructions for the outbound tunnel's endpoint to forward the message on" -" \n" -"to one of Bob's inbound tunnel gateways. When the outbound tunnel " -"endpoint \n" -"receives those instructions, it forwards the message as requested, and " -"when \n" -"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel" -" \n" -"to Bob's router. If Alice wants Bob to be able to reply to the message, " -"she \n" -"needs to transmit her own destination explicitly as part of the message " -"itself.\n" -"This can be done by introducing a higher-level layer, which is done in " -"the\n" +"When Alice wants to send a message to Bob, she first does a lookup in the \n" +"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n" +"She then picks one of her outbound tunnels and sends the message down it with \n" +"instructions for the outbound tunnel's endpoint to forward the message on \n" +"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n" +"receives those instructions, it forwards the message as requested, and when \n" +"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n" +"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n" +"needs to transmit her own destination explicitly as part of the message itself.\n" +"This can be done by introducing a higher-level layer, which is done in the\n" "<a href=\"#app.streaming\">streaming</a> library.\n" "Alice may also cut down on the response time by bundling her most \n" -"recent LeaseSet with the message so that Bob doesn't need to do a netDb " -"lookup \n" +"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." msgstr "" @@ -9658,208 +8552,126 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:200 msgid "" -"While the tunnels themselves have layered encryption to prevent " -"unauthorized \n" -"disclosure to peers inside the network (as the transport layer itself " -"does \n" -"to prevent unauthorized disclosure to peers outside the network), it is " -"necessary \n" -"to add an additional end to end layer of encryption to hide the message " -"from \n" -"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a " -"href=\"#op.garlic\">garlic \n" -"encryption</a>\" lets Alice's router wrap up multiple messages into a " -"single \n" -"\"garlic message\", encrypted to a particular public key so that " -"intermediary \n" -"peers cannot determine either how many messages are within the garlic, " -"what \n" -"those messages say, or where those individual cloves are destined. For " -"typical \n" -"end to end communication between Alice and Bob, the garlic will be " -"encrypted \n" -"to the public key published in Bob's leaseSet, allowing the message to be" -" \n" +"While the tunnels themselves have layered encryption to prevent unauthorized \n" +"disclosure to peers inside the network (as the transport layer itself does \n" +"to prevent unauthorized disclosure to peers outside the network), it is necessary \n" +"to add an additional end to end layer of encryption to hide the message from \n" +"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n" +"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n" +"\"garlic message\", encrypted to a particular public key so that intermediary \n" +"peers cannot determine either how many messages are within the garlic, what \n" +"those messages say, or where those individual cloves are destined. For typical \n" +"end to end communication between Alice and Bob, the garlic will be encrypted \n" +"to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" -"Another important fact to keep in mind is that I2P is entirely message " -"based \n" -"and that some messages may be lost along the way. Applications using I2P " -"can \n" -"use the message oriented interfaces and take care of their own congestion" -" \n" -"control and reliability needs, but most would be best served by reusing " -"the \n" -"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as " -"a streams \n" +"Another important fact to keep in mind is that I2P is entirely message based \n" +"and that some messages may be lost along the way. Applications using I2P can \n" +"use the message oriented interfaces and take care of their own congestion \n" +"control and reliability needs, but most would be best served by reusing the \n" +"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n" "based network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" "Both inbound and outbound tunnels work along similar principles.\n" -"The tunnel gateway accumulates a number of tunnel messages, eventually " -"preprocessing \n" -"them into something for tunnel delivery. Next, the gateway encrypts that " -"preprocessed \n" -"data and forwards it to the first hop. That peer and subsequent tunnel " -"participants \n" -"add on a layer of encryption after verifying that it isn't a duplicate " -"before \n" -"forward it on to the next peer. Eventually, the message arrives at the " -"endpoint \n" -"where the messages are split out again and forwarded on as requested. The" -" \n" -"difference arises in what the tunnel's creator does - for inbound " -"tunnels, \n" -"the creator is the endpoint and they simply decrypt all of the layers " -"added, \n" -"while for outbound tunnels, the creator is the gateway and they pre-" -"decrypt \n" -"all of the layers so that after all of the layers of per-hop encryption " -"are \n" +"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n" +"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n" +"data and forwards it to the first hop. That peer and subsequent tunnel participants \n" +"add on a layer of encryption after verifying that it isn't a duplicate before \n" +"forward it on to the next peer. Eventually, the message arrives at the endpoint \n" +"where the messages are split out again and forwarded on as requested. The \n" +"difference arises in what the tunnel's creator does - for inbound tunnels, \n" +"the creator is the endpoint and they simply decrypt all of the layers added, \n" +"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" +"all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" -"The choice of specific peers to pass on messages as well as their " -"particular \n" -"ordering is important to understanding both I2P's anonymity and " -"performance \n" -"characteristics. While the network database (below) has its own criteria " -"for \n" -"picking what peers to query and store entries on, tunnel creators may use" -" any peers \n" -"in the network in any order (and even any number of times) in a single " -"tunnel. \n" -"If perfect latency and capacity data were globally known, selection and " -"ordering \n" -"would be driven by the particular needs of the client in tandem with " -"their \n" -"threat model. Unfortunately, latency and capacity data is not trivial to " -"gather \n" -"anonymously, and depending upon untrusted peers to provide this " -"information \n" +"The choice of specific peers to pass on messages as well as their particular \n" +"ordering is important to understanding both I2P's anonymity and performance \n" +"characteristics. While the network database (below) has its own criteria for \n" +"picking what peers to query and store entries on, tunnel creators may use any peers \n" +"in the network in any order (and even any number of times) in a single tunnel. \n" +"If perfect latency and capacity data were globally known, selection and ordering \n" +"would be driven by the particular needs of the client in tandem with their \n" +"threat model. Unfortunately, latency and capacity data is not trivial to gather \n" +"anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" -"From an anonymity perspective, the simplest technique would be to pick " -"peers \n" -"randomly from the entire network, order them randomly and use those peers" -" \n" -"in that order for all eternity. From a performance perspective, the " -"simplest \n" -"technique would be to pick the fastest peers with the necessary spare " -"capacity, \n" -"spreading the load across different peers to handle transparent failover," -" \n" -"and to rebuild the tunnel whenever capacity information changes. While " -"the \n" -"former is both brittle and inefficient, the later requires inaccessible " -"information \n" -"and offers insufficient anonymity. I2P is instead working on offering a " -"range \n" -"of peer selection strategies, coupled with anonymity aware measurement " -"code \n" +"From an anonymity perspective, the simplest technique would be to pick peers \n" +"randomly from the entire network, order them randomly and use those peers \n" +"in that order for all eternity. From a performance perspective, the simplest \n" +"technique would be to pick the fastest peers with the necessary spare capacity, \n" +"spreading the load across different peers to handle transparent failover, \n" +"and to rebuild the tunnel whenever capacity information changes. While the \n" +"former is both brittle and inefficient, the later requires inaccessible information \n" +"and offers insufficient anonymity. I2P is instead working on offering a range \n" +"of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" -"As a base, I2P is constantly profiling the peers with which it interacts" -" \n" -"with by measuring their indirect behavior - for instance, when a peer " -"responds \n" -"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in " -"the \n" -"profiles for all of the routers involved in the two tunnels (inbound and " -"outbound) \n" -"through which the request and response passed, as well as the queried " -"peer's \n" -"profile. Direct measurement, such as transport layer latency or " -"congestion, \n" -"is not used as part of the profile, as it can be manipulated and " -"associated \n" -"with the measuring router, exposing them to trivial attacks. While " -"gathering \n" -"these profiles, a series of calculations are run on each to summarize its" -" \n" -"performance - its latency, capacity to handle lots of activity, whether " -"they \n" -"are currently overloaded, and how well integrated into the network they " -"seem \n" -"to be. These calculations are then compared for active peers to organize " -"the \n" -"routers into four tiers - fast and high capacity, high capacity, not " -"failing, \n" -"and failing. The thresholds for those tiers are determined dynamically, " -"and \n" +"As a base, I2P is constantly profiling the peers with which it interacts \n" +"with by measuring their indirect behavior - for instance, when a peer responds \n" +"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n" +"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n" +"through which the request and response passed, as well as the queried peer's \n" +"profile. Direct measurement, such as transport layer latency or congestion, \n" +"is not used as part of the profile, as it can be manipulated and associated \n" +"with the measuring router, exposing them to trivial attacks. While gathering \n" +"these profiles, a series of calculations are run on each to summarize its \n" +"performance - its latency, capacity to handle lots of activity, whether they \n" +"are currently overloaded, and how well integrated into the network they seem \n" +"to be. These calculations are then compared for active peers to organize the \n" +"routers into four tiers - fast and high capacity, high capacity, not failing, \n" +"and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" -"Using this profile data, the simplest reasonable peer selection strategy " -"is to\n" -"pick peers randomly from the top tier (fast and high capacity), and this " -"is\n" -"currently deployed for client tunnels. Exploratory tunnels (used for " -"netDb and\n" -"tunnel management) pick peers randomly from the \"not failing\" tier " -"(which\n" +"Using this profile data, the simplest reasonable peer selection strategy is to\n" +"pick peers randomly from the top tier (fast and high capacity), and this is\n" +"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n" +"tunnel management) pick peers randomly from the \"not failing\" tier (which\n" "includes routers in 'better' tiers as well), allowing the peer to sample\n" -"routers more widely, in effect optimizing the peer selection through " -"randomized\n" -"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill " -"climbing</a>. These\n" +"routers more widely, in effect optimizing the peer selection through randomized\n" +"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n" "strategies alone do however leak information regarding the peers in the\n" -"router's top tier through predecessor and netDb harvesting attacks. In " -"turn,\n" -"several alternatives exist which, while not balancing the load as evenly," -" will\n" +"router's top tier through predecessor and netDb harvesting attacks. In turn,\n" +"several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" -"By picking a random key and ordering the peers according to their XOR " -"distance \n" -"from it, the information leaked is reduced in predecessor and harvesting " -"attacks \n" -"according to the peers' failure rate and the tier's churn. Another simple" -" \n" -"strategy for dealing with netDb harvesting attacks is to simply fix the " -"inbound \n" -"tunnel gateway(s) yet randomize the peers further on in the tunnels. To " -"deal \n" -"with predecessor attacks for adversaries which the client contacts, the " -"outbound \n" -"tunnel endpoints would also remain fixed. The selection of which peer to " -"fix \n" -"on the most exposed point would of course need to have a limit to the " -"duration, \n" -"as all peers fail eventually, so it could either be reactively adjusted " -"or \n" -"proactively avoided to mimic a measured mean time between failures of " -"other \n" -"routers. These two strategies can in turn be combined, using a fixed " -"exposed \n" -"peer and an XOR based ordering within the tunnels themselves. A more " -"rigid \n" -"strategy would fix the exact peers and ordering of a potential tunnel, " -"only \n" -"using individual peers if all of them agree to participate in the same " -"way \n" -"each time. This varies from the XOR based ordering in that the " -"predecessor \n" -"and successor of each peer is always the same, while the XOR only makes " -"sure \n" +"By picking a random key and ordering the peers according to their XOR distance \n" +"from it, the information leaked is reduced in predecessor and harvesting attacks \n" +"according to the peers' failure rate and the tier's churn. Another simple \n" +"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n" +"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n" +"with predecessor attacks for adversaries which the client contacts, the outbound \n" +"tunnel endpoints would also remain fixed. The selection of which peer to fix \n" +"on the most exposed point would of course need to have a limit to the duration, \n" +"as all peers fail eventually, so it could either be reactively adjusted or \n" +"proactively avoided to mimic a measured mean time between failures of other \n" +"routers. These two strategies can in turn be combined, using a fixed exposed \n" +"peer and an XOR based ordering within the tunnels themselves. A more rigid \n" +"strategy would fix the exact peers and ordering of a potential tunnel, only \n" +"using individual peers if all of them agree to participate in the same way \n" +"each time. This varies from the XOR based ordering in that the predecessor \n" +"and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." msgstr "" @@ -9868,10 +8680,8 @@ msgstr "" msgid "" "As mentioned before, I2P currently (release 0.8) includes the tiered \n" "random strategy above, with XOR-based ordering. A \n" -"more detailed discussion of the mechanics involved in tunnel operation, " -"management, \n" -"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel " -"spec</a>." +"more detailed discussion of the mechanics involved in tunnel operation, management, \n" +"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:326 @@ -9885,27 +8695,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" "A percentage of I2P users are appointed as 'floodfill peers'.\n" -"Currently, I2P installations that have a lot of bandwidth and are fast " -"enough,\n" -"will appoint themselves as floodfill as soon as the number of existing " -"floodfill routers\n" +"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" +"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format msgid "" -"Other I2P routers will store their data and lookup data by sending simple" -" 'store' and 'lookup' queries to the floodfills.\n" -"If a floodfill router receives a 'store' query, it will spread the " -"information to other floodfill routers\n" -"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia " -"algorithm</a>.\n" -"The 'lookup' queries currently function differently, to avoid an " -"important\n" +"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n" +"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n" +"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n" +"The 'lookup' queries currently function differently, to avoid an important\n" "<a href=\"%(netdb)s#lookup\">security issue</a>.\n" -"When a lookup is done, the floodfill router will not forward the lookup " -"to other peers,\n" +"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." msgstr "" @@ -9915,8 +8718,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" -"A <b>RouterInfo</b> stores information on a specific I2P router and how " -"to contact it" +"A <b>RouterInfo</b> stores information on a specific I2P router and how to " +"contact it" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:354 @@ -9927,14 +8730,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" -"All of this information is signed by the publishing party and verified by" -" any I2P router using or storing the information.\n" -"In addition, the data contains timing information, to avoid storage of " -"old entries and possible attacks.\n" -"This is also why I2P bundles the necessary code for maintaining the " -"correct time, occasionally querying some SNTP servers \n" -"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by" -" default)\n" +"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n" +"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n" +"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" +"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n" "and detecting skew between routers at the transport layer." msgstr "" @@ -9949,10 +8748,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:370 msgid "" "One could only want specific people to be able to reach a destination.\n" -"This is possible by not publishing the destination in the netDb. You will" -" however have to transmit the destination by other means.\n" -"An alternative are the 'encrypted leaseSets'. These leaseSets can only be" -" decoded by people with access to the decryption key." +"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" +"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:377 @@ -9961,13 +8758,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:378 msgid "" -"Bootstrapping the netDb is quite simple. Once a router manages to receive" -" a single routerInfo of a reachable peer,\n" +"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n" "it can query that router for references to other routers in the network.\n" -"Currently, a number of users post their routerInfo files to a website to " -"make this information available.\n" -"I2P automatically connects to one of these websites to gather routerInfo " -"files and bootstrap." +"Currently, a number of users post their routerInfo files to a website to make this information available.\n" +"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:386 @@ -9977,26 +8771,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:387 msgid "" "Lookups in the I2P network are not forwarded to other netDb routers.\n" -"Currently, this is not a major problem, since the network is not very " -"large.\n" -"However, as the network grows, not all routerInfo and leaseSet files will" -" be present\n" -"on each netDb router. This will cause a deterioration of the percentage " -"of successful lookups.\n" -"Because of this, refinements to the netDb will be done in the next " -"releases." +"Currently, this is not a major problem, since the network is not very large.\n" +"However, as the network grows, not all routerInfo and leaseSet files will be present\n" +"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" +"Because of this, refinements to the netDb will be done in the next releases." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" -"Communication between routers needs to provide confidentiality and " -"integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" -"is the one who should receive a given message. The particulars of how " -"routers \n" -"communicate with other routers aren't critical - three separate protocols" -" \n" +"Communication between routers needs to provide confidentiality and integrity \n" +"against external adversaries while authenticating that the router contacted \n" +"is the one who should receive a given message. The particulars of how routers \n" +"communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." msgstr "" @@ -10004,12 +8790,9 @@ msgstr "" #, python-format msgid "" "I2P started with a TCP-based protocol which \n" -"has since been disabled. Then, to accommodate the need for high degree " -"communication \n" -"(as a number of routers will end up speaking with many others), I2P moved" -" \n" -"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - " -"\"Secure \n" +"has since been disabled. Then, to accommodate the need for high degree communication \n" +"(as a number of routers will end up speaking with many others), I2P moved \n" +"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n" "Semireliable UDP\", or \"SSU\"." msgstr "" @@ -10021,46 +8804,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" "The goal of this protocol is to provide secure, authenticated, \n" -"semireliable and unordered message delivery, exposing only a minimal " -"amount \n" -"of data easily discernible to third parties. It should support high " -"degree \n" -"communication as well as TCP-friendly congestion control and may include" -" \n" -"PMTU detection. It should be capable of efficiently moving bulk data at " -"rates \n" -"sufficient for home users. In addition, it should support techniques for " -"addressing \n" +"semireliable and unordered message delivery, exposing only a minimal amount \n" +"of data easily discernible to third parties. It should support high degree \n" +"communication as well as TCP-friendly congestion control and may include \n" +"PMTU detection. It should be capable of efficiently moving bulk data at rates \n" +"sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format msgid "" -"Following the introduction of SSU, after issues with congestion collapse" -" \n" -"appeared, a new NIO-based TCP transport called <a " -"href=\"%(ntcp)s\">NTCP</a> \n" -"was implemented. It is enabled by default for outbound connections only. " -"Those \n" -"who configure their NAT/firewall to allow inbound connections and specify" -" \n" -"the external host and port (dyndns/etc is ok) on /config.jsp can receive " -"inbound \n" -"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread" -" \n" +"Following the introduction of SSU, after issues with congestion collapse \n" +"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n" +"was implemented. It is enabled by default for outbound connections only. Those \n" +"who configure their NAT/firewall to allow inbound connections and specify \n" +"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" +"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" "I2P supports multiple transports simultaneously. A particular transport \n" -"for an outbound connection is selected with \"bids\". Each transport bids" -" for \n" -"the connection and the relative value of these bids assigns the priority." -" \n" -"Transports may reply with different bids, depending on whether there is " -"already \n" +"for an outbound connection is selected with \"bids\". Each transport bids for \n" +"the connection and the relative value of these bids assigns the priority. \n" +"Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." msgstr "" @@ -10068,38 +8837,25 @@ msgstr "" #, python-format msgid "" "The current implementation ranks NTCP as the highest-priority transport \n" -"for outbound connections in most situations. SSU is enabled for both " -"outbound \n" -"and inbound connections. Your firewall and your I2P router must be " -"configured \n" -"to allow inbound NTCP connections. For further information see the <a " -"href=\"%(ntcp)s\">NTCP \n" +"for outbound connections in most situations. SSU is enabled for both outbound \n" +"and inbound connections. Your firewall and your I2P router must be configured \n" +"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n" "page</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" "A bare minimum set of cryptographic primitives are combined together to \n" -"provide I2P's layered defenses against a variety of adversaries. At the " -"lowest \n" -"level, inter router communication is protected by the transport layer " -"security \n" -"- SSU encrypts each packet with AES256/CBC with both an explicit IV and " -"MAC \n" -"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a " -"2048bit \n" -"Diffie-Hellman exchange, station-to-station authentication with the other" -" \n" -"router's DSA key, plus each network message has their own hash for local " -"integrity \n" -"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the " -"transports \n" -"have their own layered AES256/CBC encryption with an explicit IV and " -"verified \n" -"at the tunnel endpoint with an additional SHA256 hash. Various other " -"messages \n" -"are passed along inside \"garlic messages\", which are encrypted with " -"ElGamal/AES+SessionTags \n" +"provide I2P's layered defenses against a variety of adversaries. At the lowest \n" +"level, inter router communication is protected by the transport layer security \n" +"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n" +"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n" +"Diffie-Hellman exchange, station-to-station authentication with the other \n" +"router's DSA key, plus each network message has their own hash for local integrity \n" +"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n" +"have their own layered AES256/CBC encryption with an explicit IV and verified \n" +"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" +"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." msgstr "" @@ -10109,51 +8865,31 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:471 msgid "" -"Garlic messages are an extension of \"onion\" layered encryption, " -"allowing \n" -"the contents of a single message to contain multiple \"cloves\" - fully " -"formed \n" -"messages alongside their own instructions for delivery. Messages are " -"wrapped \n" -"into a garlic message whenever the message would otherwise be passing in " -"cleartext \n" -"through a peer who should not have access to the information - for " -"instance, \n" -"when a router wants to ask another router to participate in a tunnel, " -"they \n" -"wrap the request inside a garlic, encrypt that garlic to the receiving " -"router's \n" -"2048bit ElGamal public key, and forward it through a tunnel. Another " -"example \n" -"is when a client wants to send a message to a destination - the sender's " -"router \n" -"will wrap up that data message (alongside some other messages) into a " -"garlic, \n" -"encrypt that garlic to the 2048bit ElGamal public key published in the " -"recipient's \n" +"Garlic messages are an extension of \"onion\" layered encryption, allowing \n" +"the contents of a single message to contain multiple \"cloves\" - fully formed \n" +"messages alongside their own instructions for delivery. Messages are wrapped \n" +"into a garlic message whenever the message would otherwise be passing in cleartext \n" +"through a peer who should not have access to the information - for instance, \n" +"when a router wants to ask another router to participate in a tunnel, they \n" +"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n" +"2048bit ElGamal public key, and forward it through a tunnel. Another example \n" +"is when a client wants to send a message to a destination - the sender's router \n" +"will wrap up that data message (alongside some other messages) into a garlic, \n" +"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" -"The \"instructions\" attached to each clove inside the encryption layer " -"includes \n" -"the ability to request that the clove be forwarded locally, to a remote " -"router, \n" -"or to a remote tunnel on a remote router. There are fields in those " -"instructions \n" -"allowing a peer to request that the delivery be delayed until a certain " -"time \n" -"or condition has been met, though they won't be honored until the <a " -"href=\"#future.variablelatency\">nontrivial \n" -"delays</a> are deployed. It is possible to explicitly route garlic " -"messages \n" -"any number of hops without building tunnels, or even to reroute tunnel " -"messages \n" -"by wrapping them in garlic messages and forwarding them a number of hops " -"prior \n" -"to delivering them to the next hop in the tunnel, but those techniques " -"are \n" +"The \"instructions\" attached to each clove inside the encryption layer includes \n" +"the ability to request that the clove be forwarded locally, to a remote router, \n" +"or to a remote tunnel on a remote router. There are fields in those instructions \n" +"allowing a peer to request that the delivery be delayed until a certain time \n" +"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n" +"delays</a> are deployed. It is possible to explicitly route garlic messages \n" +"any number of hops without building tunnels, or even to reroute tunnel messages \n" +"by wrapping them in garlic messages and forwarding them a number of hops prior \n" +"to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." msgstr "" @@ -10163,54 +8899,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:500 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" -"Session tags themselves have a very short lifetime, after which they are" -" \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"Session tags themselves have a very short lifetime, after which they are \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" -"One alternative is to transmit only a single session tag, and from that," -" \n" -"seed a deterministic PRNG for determining what tags to use or expect. By " -"keeping \n" -"this PRNG roughly synchronized between the sender and recipient (the " -"recipient \n" -"precomputes a window of the next e.g. 50 tags), the overhead of " -"periodically \n" -"bundling a large number of tags is removed, allowing more options in the " -"space/time \n" -"tradeoff, and perhaps reducing the number of ElGamal encryptions " -"necessary. \n" -"However, it would depend upon the strength of the PRNG to provide the " -"necessary \n" -"cover against internal adversaries, though perhaps by limiting the amount" -" \n" -"of times each PRNG is used, any weaknesses can be minimized. At the " -"moment, \n" +"One alternative is to transmit only a single session tag, and from that, \n" +"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n" +"this PRNG roughly synchronized between the sender and recipient (the recipient \n" +"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n" +"bundling a large number of tags is removed, allowing more options in the space/time \n" +"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n" +"However, it would depend upon the strength of the PRNG to provide the necessary \n" +"cover against internal adversaries, though perhaps by limiting the amount \n" +"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." msgstr "" @@ -10220,12 +8937,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:563 msgid "" -"While I2P is currently functional and sufficient for many scenarios, " -"there \n" -"are several areas which require further improvement to meet the needs of " -"those \n" -"facing more powerful adversaries as well as substantial user experience " -"optimization." +"While I2P is currently functional and sufficient for many scenarios, there \n" +"are several areas which require further improvement to meet the needs of those \n" +"facing more powerful adversaries as well as substantial user experience optimization." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:569 @@ -10234,106 +8948,64 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:570 msgid "" -"I2P is an overlay network designed to be run on top of a functional " -"packet \n" -"switched network, exploiting the end to end principle to offer anonymity " -"and \n" -"security. While the Internet no longer fully embraces the end to end " -"principle\n" +"I2P is an overlay network designed to be run on top of a functional packet \n" +"switched network, exploiting the end to end principle to offer anonymity and \n" +"security. While the Internet no longer fully embraces the end to end principle\n" "(due to the usage of NAT), \n" -"I2P does require a substantial portion of the network to be reachable - " -"there \n" -"may be a number of peers along the edges running using restricted routes," -" \n" -"but I2P does not include an appropriate routing algorithm for the " -"degenerate \n" -"case where most peers are unreachable. It would, however work on top of a" -" \n" +"I2P does require a substantial portion of the network to be reachable - there \n" +"may be a number of peers along the edges running using restricted routes, \n" +"but I2P does not include an appropriate routing algorithm for the degenerate \n" +"case where most peers are unreachable. It would, however work on top of a \n" "network employing such an algorithm." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:582 msgid "" -"Restricted route operation, where there are limits to what peers are " -"reachable \n" -"directly, has several different functional and anonymity implications, " -"dependent \n" -"upon how the restricted routes are handled. At the most basic level, " -"restricted \n" -"routes exist when a peer is behind a NAT or firewall which does not allow" -" \n" -"inbound connections. This was largely addressed in I2P 0.6.0.6 by " -"integrating \n" -"distributed hole punching into the transport layer, allowing people " -"behind \n" -"most NATs and firewalls to receive unsolicited connections without any " -"configuration. \n" -"However, this does not limit the exposure of the peer's IP address to " -"routers \n" -"inside the network, as they can simply get introduced to the peer through" -" \n" +"Restricted route operation, where there are limits to what peers are reachable \n" +"directly, has several different functional and anonymity implications, dependent \n" +"upon how the restricted routes are handled. At the most basic level, restricted \n" +"routes exist when a peer is behind a NAT or firewall which does not allow \n" +"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n" +"distributed hole punching into the transport layer, allowing people behind \n" +"most NATs and firewalls to receive unsolicited connections without any configuration. \n" +"However, this does not limit the exposure of the peer's IP address to routers \n" +"inside the network, as they can simply get introduced to the peer through \n" "the published introducer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:595 msgid "" -"Beyond the functional handling of restricted routes, there are two levels" -" \n" -"of restricted operation that can be used to limit the exposure of one's " -"IP \n" -"address - using router-specific tunnels for communication, and offering " -"'client \n" -"routers'. For the former, routers can either build a new pool of tunnels " -"or \n" -"reuse their exploratory pool, publishing the inbound gateways to some of " -"them \n" -"as part of their routerInfo in place of their transport addresses. When a" -" \n" -"peer wants to get in touch with them, they see those tunnel gateways in " -"the \n" -"netDb and simply send the relevant message to them through one of the " -"published \n" -"tunnels. If the peer behind the restricted route wants to reply, it may " -"do \n" -"so either directly (if they are willing to expose their IP to the peer) " -"or \n" -"indirectly through their outbound tunnels. When the routers that the peer" -" \n" -"has direct connections to want to reach it (to forward tunnel messages, " -"for \n" -"instance), they simply prioritize their direct connection over the " -"published \n" -"tunnel gateway. The concept of 'client routers' simply extends the " -"restricted \n" -"route by not publishing any router addresses. Such a router would not " -"even \n" -"need to publish their routerInfo in the netDb, merely providing their " -"self \n" -"signed routerInfo to the peers that it contacts (necessary to pass the " -"router's \n" -"public keys). Both levels of restricted route operation are planned for " -"I2P \n" +"Beyond the functional handling of restricted routes, there are two levels \n" +"of restricted operation that can be used to limit the exposure of one's IP \n" +"address - using router-specific tunnels for communication, and offering 'client \n" +"routers'. For the former, routers can either build a new pool of tunnels or \n" +"reuse their exploratory pool, publishing the inbound gateways to some of them \n" +"as part of their routerInfo in place of their transport addresses. When a \n" +"peer wants to get in touch with them, they see those tunnel gateways in the \n" +"netDb and simply send the relevant message to them through one of the published \n" +"tunnels. If the peer behind the restricted route wants to reply, it may do \n" +"so either directly (if they are willing to expose their IP to the peer) or \n" +"indirectly through their outbound tunnels. When the routers that the peer \n" +"has direct connections to want to reach it (to forward tunnel messages, for \n" +"instance), they simply prioritize their direct connection over the published \n" +"tunnel gateway. The concept of 'client routers' simply extends the restricted \n" +"route by not publishing any router addresses. Such a router would not even \n" +"need to publish their routerInfo in the netDb, merely providing their self \n" +"signed routerInfo to the peers that it contacts (necessary to pass the router's \n" +"public keys). Both levels of restricted route operation are planned for I2P \n" "2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:617 msgid "" -"There are tradeoffs for those behind restricted routes, as they would " -"likely \n" -"participate in other people's tunnels less frequently, and the routers " -"which \n" -"they are connected to would be able to infer traffic patterns that would " -"not \n" -"otherwise be exposed. On the other hand, if the cost of that exposure is " -"less \n" -"than the cost of an IP being made available, it may be worthwhile. This, " -"of \n" -"course, assumes that the peers that the router behind a restricted route " -"contacts \n" -"are not hostile - either the network is large enough that the probability" -" \n" -"of using a hostile peer to get connected is small enough, or trusted (and" -" \n" +"There are tradeoffs for those behind restricted routes, as they would likely \n" +"participate in other people's tunnels less frequently, and the routers which \n" +"they are connected to would be able to infer traffic patterns that would not \n" +"otherwise be exposed. On the other hand, if the cost of that exposure is less \n" +"than the cost of an IP being made available, it may be worthwhile. This, of \n" +"course, assumes that the peers that the router behind a restricted route contacts \n" +"are not hostile - either the network is large enough that the probability \n" +"of using a hostile peer to get connected is small enough, or trusted (and \n" "perhaps temporary) peers are used instead." msgstr "" @@ -10343,45 +9015,28 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:630 msgid "" -"Even though the bulk of I2P's initial efforts have been on low latency " -"communication, \n" -"it was designed with variable latency services in mind from the " -"beginning. \n" -"At the most basic level, applications running on top of I2P can offer the" -" \n" -"anonymity of medium and high latency communication while still blending " -"their \n" -"traffic patterns in with low latency traffic. Internally though, I2P can " -"offer \n" -"its own medium and high latency communication through the garlic " -"encryption \n" -"- specifying that the message should be sent after a certain delay, at a " -"certain \n" -"time, after a certain number of messages have passed, or another mix " -"strategy. \n" -"With the layered encryption, only the router that the clove exposed the " -"delay \n" -"request would know that the message requires high latency, allowing the " -"traffic \n" -"to blend in further with the low latency traffic. Once the transmission " -"precondition \n" -"is met, the router holding on to the clove (which itself would likely be " -"a \n" -"garlic message) simply forwards it as requested - to a router, to a " -"tunnel, \n" +"Even though the bulk of I2P's initial efforts have been on low latency communication, \n" +"it was designed with variable latency services in mind from the beginning. \n" +"At the most basic level, applications running on top of I2P can offer the \n" +"anonymity of medium and high latency communication while still blending their \n" +"traffic patterns in with low latency traffic. Internally though, I2P can offer \n" +"its own medium and high latency communication through the garlic encryption \n" +"- specifying that the message should be sent after a certain delay, at a certain \n" +"time, after a certain number of messages have passed, or another mix strategy. \n" +"With the layered encryption, only the router that the clove exposed the delay \n" +"request would know that the message requires high latency, allowing the traffic \n" +"to blend in further with the low latency traffic. Once the transmission precondition \n" +"is met, the router holding on to the clove (which itself would likely be a \n" +"garlic message) simply forwards it as requested - to a router, to a tunnel, \n" "or, most likely, to a remote client destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:647 msgid "" -"There are a substantial number of ways to exploit this capacity for high" -" \n" -"latency comm in I2P, but for the moment, doing so has been scheduled for " -"the \n" -"I2P 3.0 release. In the meantime, those requiring the anonymity that high" -" \n" -"latency comm can offer should look towards the application layer to " -"provide \n" +"There are a substantial number of ways to exploit this capacity for high \n" +"latency comm in I2P, but for the moment, doing so has been scheduled for the \n" +"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n" +"latency comm can offer should look towards the application layer to provide \n" "it." msgstr "" @@ -10415,18 +9070,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:665 msgid "" -"I2P's architecture builds on the concepts of message oriented middleware," -" \n" -"the topology of DHTs, the anonymity and cryptography of free route " -"mixnets, \n" -"and the adaptability of packet switched networking. The value comes not " -"from \n" -"novel concepts of algorithms though, but from careful engineering " -"combining \n" -"the research results of existing systems and papers. While there are a " -"few \n" -"similar efforts worth reviewing, both for technical and functional " -"comparisons, \n" +"I2P's architecture builds on the concepts of message oriented middleware, \n" +"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n" +"and the adaptability of packet switched networking. The value comes not from \n" +"novel concepts of algorithms though, but from careful engineering combining \n" +"the research results of existing systems and papers. While there are a few \n" +"similar efforts worth reviewing, both for technical and functional comparisons, \n" "two in particular are pulled out here - Tor and Freenet." msgstr "" @@ -10443,209 +9092,127 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:682 msgid "" "At first glance, Tor and I2P have many functional and anonymity related \n" -"similarities. While I2P's development began before we were aware of the " -"early \n" -"stage efforts on Tor, many of the lessons of the original onion routing " -"and \n" -"ZKS efforts were integrated into I2P's design. Rather than building an " -"essentially \n" -"trusted, centralized system with directory servers, I2P has a self " -"organizing \n" -"network database with each peer taking on the responsibility of profiling" -" \n" -"other routers to determine how best to exploit available resources. " -"Another \n" -"key difference is that while both I2P and Tor use layered and ordered " -"paths \n" -"(tunnels and circuits/streams), I2P is fundamentally a packet switched " -"network, \n" -"while Tor is fundamentally a circuit switched one, allowing I2P to " -"transparently \n" -"route around congestion or other network failures, operate redundant " -"pathways, \n" -"and load balance the data across available resources. While Tor offers " -"the \n" -"useful outproxy functionality by offering integrated outproxy discovery " -"and \n" -"selection, I2P leaves such application layer decisions up to applications" -" \n" -"running on top of I2P - in fact, I2P has even externalized the TCP-like " -"streaming \n" -"library itself to the application layer, allowing developers to " -"experiment \n" -"with different strategies, exploiting their domain specific knowledge to " -"offer \n" +"similarities. While I2P's development began before we were aware of the early \n" +"stage efforts on Tor, many of the lessons of the original onion routing and \n" +"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n" +"trusted, centralized system with directory servers, I2P has a self organizing \n" +"network database with each peer taking on the responsibility of profiling \n" +"other routers to determine how best to exploit available resources. Another \n" +"key difference is that while both I2P and Tor use layered and ordered paths \n" +"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n" +"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n" +"route around congestion or other network failures, operate redundant pathways, \n" +"and load balance the data across available resources. While Tor offers the \n" +"useful outproxy functionality by offering integrated outproxy discovery and \n" +"selection, I2P leaves such application layer decisions up to applications \n" +"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n" +"library itself to the application layer, allowing developers to experiment \n" +"with different strategies, exploiting their domain specific knowledge to offer \n" "better performance." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:703 msgid "" -"From an anonymity perspective, there is much similarity when the core " -"networks \n" -"are compared. However, there are a few key differences. When dealing with" -" \n" -"an internal adversary or most external adversaries, I2P's simplex tunnels" -" \n" -"expose half as much traffic data than would be exposed with Tor's duplex " -"circuits \n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels. \n" -"While I2P's peer selection and ordering strategies should sufficiently " -"address \n" -"predecessor attacks, should a switch to bidirectional tunnels be " -"necessary,\n" -"we could simply build an inbound and outbound tunnel along the same " -"routers." +"From an anonymity perspective, there is much similarity when the core networks \n" +"are compared. However, there are a few key differences. When dealing with \n" +"an internal adversary or most external adversaries, I2P's simplex tunnels \n" +"expose half as much traffic data than would be exposed with Tor's duplex circuits \n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels. \n" +"While I2P's peer selection and ordering strategies should sufficiently address \n" +"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n" +"we could simply build an inbound and outbound tunnel along the same routers." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:717 msgid "" -"Another anonymity issue comes up in Tor's use of telescopic tunnel " -"creation, \n" -"as simple packet counting and timing measurements as the cells in a " -"circuit \n" -"pass through an adversary's node exposes statistical information " -"regarding \n" -"where the adversary is within the circuit. I2P's unidirectional tunnel " -"creation \n" -"with a single message so that this data is not exposed. Protecting the " -"position \n" -"in a tunnel is important, as an adversary would otherwise be able to " -"mount \n" -"a series of powerful predecessor, intersection, and traffic confirmation " -"attacks." +"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n" +"as simple packet counting and timing measurements as the cells in a circuit \n" +"pass through an adversary's node exposes statistical information regarding \n" +"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n" +"with a single message so that this data is not exposed. Protecting the position \n" +"in a tunnel is important, as an adversary would otherwise be able to mount \n" +"a series of powerful predecessor, intersection, and traffic confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:727 msgid "" -"Tor's support for a second tier of \"onion proxies\" does offer a non-" -"trivial \n" -"degree of anonymity while requiring a low cost of entry, while I2P will " -"not \n" +"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n" +"degree of anonymity while requiring a low cost of entry, while I2P will not \n" "offer this topology until <a href=\"#future.restricted\">2.0</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:733 msgid "" -"On the whole, Tor and I2P complement each other in their focus - Tor " -"works \n" -"towards offering high speed anonymous Internet outproxying, while I2P " -"works \n" -"towards offering a decentralized resilient network in itself. In theory, " -"both \n" -"can be used to achieve both purposes, but given limited development " -"resources, \n" -"they both have their strengths and weaknesses. The I2P developers have " -"considered \n" -"the steps necessary to modify Tor to take advantage of I2P's design, but " -"concerns \n" -"of Tor's viability under resource scarcity suggest that I2P's packet " -"switching \n" +"On the whole, Tor and I2P complement each other in their focus - Tor works \n" +"towards offering high speed anonymous Internet outproxying, while I2P works \n" +"towards offering a decentralized resilient network in itself. In theory, both \n" +"can be used to achieve both purposes, but given limited development resources, \n" +"they both have their strengths and weaknesses. The I2P developers have considered \n" +"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n" +"of Tor's viability under resource scarcity suggest that I2P's packet switching \n" "architecture will be able to exploit scarce resources more effectively." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:747 msgid "" -"Freenet played a large part in the initial stages of I2P's design - " -"giving \n" -"proof to the viability of a vibrant pseudonymous community completely " -"contained \n" -"within the network, demonstrating that the dangers inherent in outproxies" -" \n" -"could be avoided. The first seed of I2P began as a replacement " -"communication \n" -"layer for Freenet, attempting to factor out the complexities of a " -"scalable, \n" -"anonymous and secure point to point communication from the complexities " -"of \n" -"a censorship resistant distributed data store. Over time however, some of" -" \n" -"the anonymity and scalability issues inherent in Freenet's algorithms " -"made \n" -"it clear that I2P's focus should stay strictly on providing a generic " -"anonymous \n" -"communication layer, rather than as a component of Freenet. Over the " -"years, \n" -"the Freenet developers have come to see the weaknesses in the older " -"design, \n" -"prompting them to suggest that they will require a \"premix\" layer to " -"offer \n" -"substantial anonymity. In other words, Freenet needs to run on top of a " -"mixnet \n" -"such as I2P or Tor, with \"client nodes\" requesting and publishing data " -"through \n" -"the mixnet to the \"server nodes\" which then fetch and store the data " -"according \n" +"Freenet played a large part in the initial stages of I2P's design - giving \n" +"proof to the viability of a vibrant pseudonymous community completely contained \n" +"within the network, demonstrating that the dangers inherent in outproxies \n" +"could be avoided. The first seed of I2P began as a replacement communication \n" +"layer for Freenet, attempting to factor out the complexities of a scalable, \n" +"anonymous and secure point to point communication from the complexities of \n" +"a censorship resistant distributed data store. Over time however, some of \n" +"the anonymity and scalability issues inherent in Freenet's algorithms made \n" +"it clear that I2P's focus should stay strictly on providing a generic anonymous \n" +"communication layer, rather than as a component of Freenet. Over the years, \n" +"the Freenet developers have come to see the weaknesses in the older design, \n" +"prompting them to suggest that they will require a \"premix\" layer to offer \n" +"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n" +"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n" +"the mixnet to the \"server nodes\" which then fetch and store the data according \n" "to Freenet's heuristic distributed data storage algorithms." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:766 msgid "" -"Freenet's functionality is very complementary to I2P's, as Freenet " -"natively \n" -"provides many of the tools for operating medium and high latency systems," -" \n" -"while I2P natively provides the low latency mix network suitable for " -"offering \n" -"adequate anonymity. The logic of separating the mixnet from the " -"censorship-\n" -"resistant distributed data store still seems self-evident from an " -"engineering, \n" -"anonymity, security, and resource allocation perspective, so hopefully " -"the \n" -"Freenet team will pursue efforts in that direction, if not simply reusing" -" \n" +"Freenet's functionality is very complementary to I2P's, as Freenet natively \n" +"provides many of the tools for operating medium and high latency systems, \n" +"while I2P natively provides the low latency mix network suitable for offering \n" +"adequate anonymity. The logic of separating the mixnet from the censorship-\n" +"resistant distributed data store still seems self-evident from an engineering, \n" +"anonymity, security, and resource allocation perspective, so hopefully the \n" +"Freenet team will pursue efforts in that direction, if not simply reusing \n" "(or helping to improve, as necessary) existing mixnets like I2P or Tor." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:777 msgid "" "It is worth mentioning that there has recently been discussion and work \n" -"by the Freenet developers on a \"globally scalable darknet\" using " -"restricted \n" -"routes between peers of various trust. While insufficient information has" -" \n" -"been made publicly available regarding how such a system would operate " -"for \n" -"a full review, from what has been said the anonymity and scalability " -"claims \n" -"seem highly dubious. In particular, the appropriateness for use in " -"hostile \n" -"regimes against state level adversaries has been tremendously overstated," -" \n" -"and any analysis on the implications of resource scarcity upon the " -"scalability \n" -"of the network has seemingly been avoided. Further questions regarding " -"susceptibility \n" -"to traffic analysis, trust and other topics do exist, but a more in-depth" -" \n" -"review of this \"globally scalable darknet\" will have to wait until the " -"Freenet \n" +"by the Freenet developers on a \"globally scalable darknet\" using restricted \n" +"routes between peers of various trust. While insufficient information has \n" +"been made publicly available regarding how such a system would operate for \n" +"a full review, from what has been said the anonymity and scalability claims \n" +"seem highly dubious. In particular, the appropriateness for use in hostile \n" +"regimes against state level adversaries has been tremendously overstated, \n" +"and any analysis on the implications of resource scarcity upon the scalability \n" +"of the network has seemingly been avoided. Further questions regarding susceptibility \n" +"to traffic analysis, trust and other topics do exist, but a more in-depth \n" +"review of this \"globally scalable darknet\" will have to wait until the Freenet \n" "team makes more information available." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:793 msgid "" -"I2P itself doesn't really do much - it simply sends messages to remote " -"destinations \n" -"and receives messages targeting local destinations - most of the " -"interesting \n" -"work goes on at the layers above it. By itself, I2P could be seen as an " -"anonymous \n" -"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming" -" library</a> \n" -"as an implementation of an anonymous and secure TCP layer on top of it. " -"Beyond \n" -"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP " -"proxying \n" -"system for either getting into or out of the I2P network, plus a variety " -"of \n" +"I2P itself doesn't really do much - it simply sends messages to remote destinations \n" +"and receives messages targeting local destinations - most of the interesting \n" +"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n" +"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n" +"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n" +"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n" +"system for either getting into or out of the I2P network, plus a variety of \n" "network applications provide further functionality for end users." msgstr "" @@ -10655,51 +9222,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:805 msgid "" -"The I2P streaming library can be viewed as a generic streaming interface " -"(mirroring TCP sockets),\n" -"and the implementation supports a <a " -"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding " -"window protocol</a>\n" -"with several optimizations, to take into account the high delay over I2P." -"\n" +"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n" +"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n" +"with several optimizations, to take into account the high delay over I2P.\n" "Individual streams may adjust the maximum packet size and \n" -"other options, though the default of 4KB compressed seems a reasonable " -"tradeoff \n" -"between the bandwidth costs of retransmitting lost messages and the " -"latency \n" +"other options, though the default of 4KB compressed seems a reasonable tradeoff \n" +"between the bandwidth costs of retransmitting lost messages and the latency \n" "of multiple messages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:815 msgid "" "In addition, in consideration of the relatively high cost of subsequent \n" -"messages, the streaming library's protocol for scheduling and delivering " -"messages \n" -"has been optimized to allow individual messages passed to contain as much" -" \n" -"information as is available. For instance, a small HTTP transaction " -"proxied \n" -"through the streaming library can be completed in a single round trip - " -"the \n" -"first message bundles a SYN, FIN and the small payload (an HTTP request " -"typically \n" -"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many" -" \n" -"HTTP responses fit). While an additional ACK must be transmitted to tell " -"the \n" -"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy " -"can \n" +"messages, the streaming library's protocol for scheduling and delivering messages \n" +"has been optimized to allow individual messages passed to contain as much \n" +"information as is available. For instance, a small HTTP transaction proxied \n" +"through the streaming library can be completed in a single round trip - the \n" +"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n" +"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n" +"HTTP responses fit). While an additional ACK must be transmitted to tell the \n" +"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n" "deliver the full response to the browser immediately." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:828 msgid "" -"On the whole, however, the streaming library bears much resemblance to an" -" \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms \n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK, \n" +"On the whole, however, the streaming library bears much resemblance to an \n" +"abstraction of TCP, with its sliding windows, congestion control algorithms \n" +"(both slow start and congestion avoidance), and general packet behavior (ACK, \n" "SYN, FIN, RST, etc)." msgstr "" @@ -10729,227 +9279,142 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:842 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning" -" \n" -"with advocates across the spectrum of possibilities. However, given I2P's" -" \n" -"inherent demand for secure communication and decentralized operation, the" -" \n" -"traditional DNS-style naming system is clearly out, as are \"majority " -"rules\" \n" -"voting systems. Instead, I2P ships with a generic naming library and a " -"base \n" -"implementation designed to work off a local name to destination mapping, " -"as \n" -"well as an optional add-on application called the \"Address Book\". The " -"address book \n" -"is a web-of-trust-driven secure, distributed, and human readable naming " -"system, \n" -"sacrificing only the call for all human readable names to be globally " -"unique \n" -"by mandating only local uniqueness. While all messages in I2P are " -"cryptographically \n" -"addressed by their destination, different people can have local address " -"book \n" -"entries for \"Alice\" which refer to different destinations. People can " -"still \n" -"discover new names by importing published address books of peers " -"specified \n" -"in their web of trust, by adding in the entries provided through a third " -"party, \n" -"or (if some people organize a series of published address books using a " -"first \n" -"come first serve registration system) people can choose to treat these " -"address books \n" +"Naming within I2P has been an oft-debated topic since the very beginning \n" +"with advocates across the spectrum of possibilities. However, given I2P's \n" +"inherent demand for secure communication and decentralized operation, the \n" +"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n" +"voting systems. Instead, I2P ships with a generic naming library and a base \n" +"implementation designed to work off a local name to destination mapping, as \n" +"well as an optional add-on application called the \"Address Book\". The address book \n" +"is a web-of-trust-driven secure, distributed, and human readable naming system, \n" +"sacrificing only the call for all human readable names to be globally unique \n" +"by mandating only local uniqueness. While all messages in I2P are cryptographically \n" +"addressed by their destination, different people can have local address book \n" +"entries for \"Alice\" which refer to different destinations. People can still \n" +"discover new names by importing published address books of peers specified \n" +"in their web of trust, by adding in the entries provided through a third party, \n" +"or (if some people organize a series of published address books using a first \n" +"come first serve registration system) people can choose to treat these address books \n" "as name servers, emulating traditional DNS." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:862 msgid "" "I2P does not promote the use of DNS-like services though, as the damage \n" -"done by hijacking a site can be tremendous - and insecure destinations " -"have \n" -"no value. DNSsec itself still falls back on registrars and certificate " -"authorities, \n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the \n" -"reply spoofed, as they are encrypted to the destination's public keys, " -"and \n" -"a destination itself is just a pair of public keys and a certificate. " -"DNS-style \n" -"systems on the other hand allow any of the name servers on the lookup " -"path \n" -"to mount simple denial of service and spoofing attacks. Adding on a " -"certificate \n" -"authenticating the responses as signed by some centralized certificate " -"authority \n" -"would address many of the hostile nameserver issues but would leave open " -"replay \n" +"done by hijacking a site can be tremendous - and insecure destinations have \n" +"no value. DNSsec itself still falls back on registrars and certificate authorities, \n" +"while with I2P, requests sent to a destination cannot be intercepted or the \n" +"reply spoofed, as they are encrypted to the destination's public keys, and \n" +"a destination itself is just a pair of public keys and a certificate. DNS-style \n" +"systems on the other hand allow any of the name servers on the lookup path \n" +"to mount simple denial of service and spoofing attacks. Adding on a certificate \n" +"authenticating the responses as signed by some centralized certificate authority \n" +"would address many of the hostile nameserver issues but would leave open replay \n" "attacks as well as hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:876 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness \n" -"of Sybil attacks in anonymous systems - the attacker can simply create an" -" \n" -"arbitrarily high number of peers and \"vote\" with each to take over a " -"given \n" -"name. Proof-of-work methods can be used to make identity non-free, but as" -" \n" -"the network grows the load required to contact everyone to conduct online" -" \n" -"voting is implausible, or if the full network is not queried, different " -"sets \n" +"Voting style naming is dangerous as well, especially given the effectiveness \n" +"of Sybil attacks in anonymous systems - the attacker can simply create an \n" +"arbitrarily high number of peers and \"vote\" with each to take over a given \n" +"name. Proof-of-work methods can be used to make identity non-free, but as \n" +"the network grows the load required to contact everyone to conduct online \n" +"voting is implausible, or if the full network is not queried, different sets \n" "of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:886 msgid "" -"As with the Internet however, I2P is keeping the design and operation of" -" \n" -"a naming system out of the (IP-like) communication layer. The bundled " -"naming \n" -"library includes a simple service provider interface which alternate " -"naming \n" -"systems can plug into, allowing end users to drive what sort of naming " -"tradeoffs \n" +"As with the Internet however, I2P is keeping the design and operation of \n" +"a naming system out of the (IP-like) communication layer. The bundled naming \n" +"library includes a simple service provider interface which alternate naming \n" +"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n" "they prefer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:895 msgid "" -"The old Syndie bundled with I2P has been replaced by the new Syndie which" -"\n" -"is distributed separately. For more information see the <a " -"href=\"http://syndie.i2p2.de/\">Syndie</a>\n" +"The old Syndie bundled with I2P has been replaced by the new Syndie which\n" +"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n" "pages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:901 msgid "" -"Syndie is a safe, anonymous blogging / content publication / content " -"aggregation \n" -"system. It lets you create information, share it with others, and read " -"posts \n" -"from those you're interested in, all while taking into consideration your" -" \n" -"needs for security and anonymity. Rather than building its own content " -"distribution \n" -"network, Syndie is designed to run on top of existing networks, " -"syndicating \n" -"content through I2P Sites, Tor hidden services, Freenet freesites, normal" -" websites, \n" -"usenet newsgroups, email lists, RSS feeds, etc. Data published with " -"Syndie \n" -"is done so as to offer pseudonymous authentication to anyone reading or " -"archiving \n" +"Syndie is a safe, anonymous blogging / content publication / content aggregation \n" +"system. It lets you create information, share it with others, and read posts \n" +"from those you're interested in, all while taking into consideration your \n" +"needs for security and anonymity. Rather than building its own content distribution \n" +"network, Syndie is designed to run on top of existing networks, syndicating \n" +"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n" +"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n" +"is done so as to offer pseudonymous authentication to anyone reading or archiving \n" "it." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:916 msgid "" -"I2PTunnel is probably I2P's most popular and versatile client " -"application, \n" -"allowing generic proxying both into and out of the I2P network. I2PTunnel" -" \n" -"can be viewed as four separate proxying applications - a \"client\" which" -" receives \n" -"inbound TCP connections and forwards them to a given I2P destination, an " -"\"httpclient\" \n" -"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the " -"requests to \n" -"the appropriate I2P destination (after querying the naming service if " -"necessary), \n" -"a \"server\" which receives inbound I2P streaming connections on a " -"destination \n" -"and forwards them to a given TCP host+port, and an \"httpserver\" which " -"extends \n" -"the \"server\" by parsing the HTTP request and responses to allow safer " -"operation. \n" -"There is an additional \"socksclient\" application, but its use is not " -"encouraged \n" +"I2PTunnel is probably I2P's most popular and versatile client application, \n" +"allowing generic proxying both into and out of the I2P network. I2PTunnel \n" +"can be viewed as four separate proxying applications - a \"client\" which receives \n" +"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n" +"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n" +"the appropriate I2P destination (after querying the naming service if necessary), \n" +"a \"server\" which receives inbound I2P streaming connections on a destination \n" +"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n" +"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n" +"There is an additional \"socksclient\" application, but its use is not encouraged \n" "for reasons previously mentioned." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:930 msgid "" -"I2P itself is not an outproxy network - the anonymity and security " -"concerns \n" -"inherent in a mix net which forwards data into and out of the mix have " -"kept \n" -"I2P's design focused on providing an anonymous network which capable of " -"meeting \n" -"the user's needs without requiring external resources. However, the " -"I2PTunnel \n" -"\"httpclient\" application offers a hook for outproxying - if the " -"hostname requested \n" -"doesn't end in \".i2p\", it picks a random destination from a user-" -"provided \n" -"set of outproxies and forwards the request to them. These destinations " -"are \n" -"simply I2PTunnel \"server\" instances run by volunteers who have " -"explicitly \n" -"chosen to run outproxies - no one is an outproxy by default, and running " -"an \n" -"outproxy doesn't automatically tell other people to proxy through you. " -"While \n" -"outproxies do have inherent weaknesses, they offer a simple proof of " -"concept \n" -"for using I2P and provide some functionality under a threat model which " -"may \n" +"I2P itself is not an outproxy network - the anonymity and security concerns \n" +"inherent in a mix net which forwards data into and out of the mix have kept \n" +"I2P's design focused on providing an anonymous network which capable of meeting \n" +"the user's needs without requiring external resources. However, the I2PTunnel \n" +"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n" +"doesn't end in \".i2p\", it picks a random destination from a user-provided \n" +"set of outproxies and forwards the request to them. These destinations are \n" +"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n" +"chosen to run outproxies - no one is an outproxy by default, and running an \n" +"outproxy doesn't automatically tell other people to proxy through you. While \n" +"outproxies do have inherent weaknesses, they offer a simple proof of concept \n" +"for using I2P and provide some functionality under a threat model which may \n" "be sufficient for some users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:946 msgid "" -"I2PTunnel enables most of the applications in use. An \"httpserver\" " -"pointing \n" -"at a webserver lets anyone run their own anonymous website (or \"I2P " -"Site\") \n" -"- a webserver is bundled with I2P for this purpose, but any webserver can" -" \n" -"be used. Anyone may run a \"client\" pointing at one of the anonymously " -"hosted \n" -"IRC servers, each of which are running a \"server\" pointing at their " -"local \n" -"IRCd and communicating between IRCds over their own \"client\" tunnels. " -"End \n" -"users also have \"client\" tunnels pointing at <a " -"href=\"#app.i2pmail\">I2Pmail's</a> \n" -"POP3 and SMTP destinations (which in turn are simply \"server\" instances" -" pointing \n" -"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at " -"I2P's CVS \n" -"server, allowing anonymous development. At times people have even run " -"\"client\" \n" +"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n" +"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n" +"- a webserver is bundled with I2P for this purpose, but any webserver can \n" +"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n" +"IRC servers, each of which are running a \"server\" pointing at their local \n" +"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n" +"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n" +"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n" +"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n" +"server, allowing anonymous development. At times people have even run \"client\" \n" "proxies to access the \"server\" instances pointing at an NNTP server." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:963 msgid "" -"i2p-bt is a port of the mainline python BitTorrent client to run both the" -" \n" -"tracker and peer communication over I2P. Tracker requests are forwarded " -"through \n" -"the eepproxy to I2P Sites specified in the torrent file while tracker " -"responses \n" -"refer to peers by their destination explicitly, allowing i2p-bt to open " -"up \n" -"a <a href=\"#app.streaming\">streaming lib</a> connection to query them " -"for \n" +"i2p-bt is a port of the mainline python BitTorrent client to run both the \n" +"tracker and peer communication over I2P. Tracker requests are forwarded through \n" +"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n" +"refer to peers by their destination explicitly, allowing i2p-bt to open up \n" +"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n" "blocks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:972 msgid "" -"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making" -" \n" -"a few modifications as necessary to strip any anonymity-compromising " -"information \n" -"from the application and to take into consideration the fact that IPs " -"cannot \n" +"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n" +"a few modifications as necessary to strip any anonymity-compromising information \n" +"from the application and to take into consideration the fact that IPs cannot \n" "be used for identifying peers." msgstr "" @@ -10962,10 +9427,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:986 msgid "" -"Bundled with the I2P install, I2PSnark offers a simple anonymous " -"BitTorrent \n" -"client with multitorrent capabilities, exposing all of the functionality " -"through \n" +"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n" +"client with multitorrent capabilities, exposing all of the functionality through \n" "a plain HTML web interface." msgstr "" @@ -10973,9 +9436,7 @@ msgstr "" #, python-format msgid "" "Robert is a Bittorrent client written in Python.\n" -"It is hosted on <a " -"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- " -"TODO: expand -->" +"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1003 @@ -10987,12 +9448,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1011 msgid "" -"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to" -" \n" -"run entirely on top of I2P. While it has disabled some of Phex's " -"functionality, \n" -"such as integration with Gnutella webcaches, the basic file sharing and " -"chatting \n" +"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n" +"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n" +"such as integration with Gnutella webcaches, the basic file sharing and chatting \n" "system is fully functional." msgstr "" @@ -11005,62 +9463,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1029 #, python-format msgid "" -"I2Pmail is more a service than an application - postman offers both " -"internal \n" -"and external email with POP3 and SMTP service through I2PTunnel instances" -" \n" -"accessing a series of components developed with mastiejaner, allowing " -"people \n" -"to use their preferred mail clients to send and receive mail " -"pseudonymously. \n" -"However, as most mail clients expose substantial identifying information," -" \n" -"I2P bundles susi23's web based susimail client which has been built " -"specifically \n" -"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers " -"transparent \n" -"virus filtering as well as denial of service prevention with hashcash " -"augmented \n" -"quotas. In addition, each user has control of their batching strategy " -"prior \n" -"to delivery through the mail.i2p outproxies, which are separate from the " -"mail.i2p \n" -"SMTP and POP3 servers - both the outproxies and inproxies communicate " -"with \n" -"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising " -"those \n" -"non-anonymous locations does not give access to the mail accounts or " -"activity \n" -"patterns of the user. At the moment the developers work on a " -"decentralized \n" -"mailsystem, called \"v2mail\". More information can be found on the I2P " -"Site \n" +"I2Pmail is more a service than an application - postman offers both internal \n" +"and external email with POP3 and SMTP service through I2PTunnel instances \n" +"accessing a series of components developed with mastiejaner, allowing people \n" +"to use their preferred mail clients to send and receive mail pseudonymously. \n" +"However, as most mail clients expose substantial identifying information, \n" +"I2P bundles susi23's web based susimail client which has been built specifically \n" +"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n" +"virus filtering as well as denial of service prevention with hashcash augmented \n" +"quotas. In addition, each user has control of their batching strategy prior \n" +"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n" +"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n" +"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n" +"non-anonymous locations does not give access to the mail accounts or activity \n" +"patterns of the user. At the moment the developers work on a decentralized \n" +"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n" "<a href=\"http://%(postman)s/\">%(postman)s</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1051 msgid "" -"I2P-Bote is a distributed e-mail application. It does not use the " -"traditional\n" -"e-mail concept of sending an e-mail to a server and retrieving it from a " -"server.\n" +"I2P-Bote is a distributed e-mail application. It does not use the traditional\n" +"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n" "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n" -"One user can push a mail into the DHT, while another can request the " -"e-mail from the DHT.\n" -"And all the mails sent within the I2P-Bote network are automatically " -"encrypted end-to-end. <br>\n" -"Furthermore, I2P-Bote offers a remailer function on top of I2P, for " -"increased high-latency anonymity." +"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n" +"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n" +"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1061 msgid "" -"I2P-Messenger is an end-to-end encrypted serverless communication " -"application.\n" -"For communication between two users, they need to give each other their " -"destination keys, to allow the other to connect.\n" -"It supports file transfer and has a search for other users, based on " -"Seedless." +"I2P-Messenger is an end-to-end encrypted serverless communication application.\n" +"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n" +"It supports file transfer and has a search for other users, based on Seedless." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:2 @@ -11210,18 +9645,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" -"to find out information you don't want them to know?\" - who you are, " -"where\n" -"you are located, who you communicate with, or even when you communicate." -" \n" -"\"Perfect\" anonymity is not a useful concept here - software will not " -"make \n" -"you indistinguishable from people that don't use computers or who are not" -" on\n" -"the Internet. Instead, we are working to provide sufficient anonymity to" -" meet the\n" -"real needs of whomever we can - from those simply browsing websites, to " -"those exchanging\n" +"to find out information you don't want them to know?\" - who you are, where\n" +"you are located, who you communicate with, or even when you communicate. \n" +"\"Perfect\" anonymity is not a useful concept here - software will not make \n" +"you indistinguishable from people that don't use computers or who are not on\n" +"the Internet. Instead, we are working to provide sufficient anonymity to meet the\n" +"real needs of whomever we can - from those simply browsing websites, to those exchanging\n" "data, to those fearful of discovery by powerful organizations or states." msgstr "" @@ -11229,17 +9658,14 @@ msgstr "" msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" -"answering that question by exploring how I2P operates under various " -"attacks\n" +"answering that question by exploring how I2P operates under various attacks\n" "so that you may decide whether it meets your needs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" -"We welcome further research and analysis on I2P's resistance to the " -"threats described below.\n" -"More review of existing literature (much of it focused on Tor) and " -"original\n" +"We welcome further research and analysis on I2P's resistance to the threats described below.\n" +"More review of existing literature (much of it focused on Tor) and original\n" "work focused on I2P is needed." msgstr "" @@ -11251,69 +9677,52 @@ msgstr "" #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" -"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in" -" mind when \n" +"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n" "reviewing related literature:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:102 msgid "" -"<b>I2P is a free route mixnet</b> - the message creator explicitly " -"defines the\n" -"path that messages will be sent out (the outbound tunnel), and the " -"message \n" -"recipient explicitly defines the path that messages will be received on " -"(the\n" +"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n" +"path that messages will be sent out (the outbound tunnel), and the message \n" +"recipient explicitly defines the path that messages will be received on (the\n" "inbound tunnel)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:108 msgid "" -"<b>I2P has no official entry and exit points</b> - all peers fully " -"participate in the \n" +"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n" "mix, and there are no network layer in- or out-proxies (however, at the \n" "application layer, a few proxies do exist)" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:113 msgid "" -"<b>I2P is fully distributed</b> - there are no central controls or " -"authorities.\n" -"One could modify some routers to operate mix cascades (building tunnels " -"and giving\n" -"out the keys necessary to control the forwarding at the tunnel endpoint) " -"or directory \n" -"based profiling and selection, all without breaking compatibility with " -"the rest of \n" -"the network, but doing so is of course not necessary (and may even harm " -"one's\n" +"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n" +"One could modify some routers to operate mix cascades (building tunnels and giving\n" +"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n" +"based profiling and selection, all without breaking compatibility with the rest of \n" +"the network, but doing so is of course not necessary (and may even harm one's\n" "anonymity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:123 #, python-format msgid "" -"We have documented plans to implement <a " -"href=\"%(todo)s#stop\">nontrivial delays</a>\n" +"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n" "and <a href=\"%(todo)s#batching\">batching strategies</a> \n" -"whose existence is only known to the particular hop or tunnel gateway " -"that \n" -"receives the message, allowing a mostly low latency mixnet to provide " -"cover \n" +"whose existence is only known to the particular hop or tunnel gateway that \n" +"receives the message, allowing a mostly low latency mixnet to provide cover \n" "traffic for higher latency communication (e.g. email).\n" -"However we are aware that significant delays are required to provide " -"meaningful\n" -"protection, and that implementation of such delays will be a significant " -"challenge.\n" -"It is not clear at this time whether we will actually implement these " -"delay features." +"However we are aware that significant delays are required to provide meaningful\n" +"protection, and that implementation of such delays will be a significant challenge.\n" +"It is not clear at this time whether we will actually implement these delay features." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:134 msgid "" "In theory, routers along the message path may inject an \n" -"arbitrary number of hops before forwarding the message to the next peer, " -"though\n" +"arbitrary number of hops before forwarding the message to the next peer, though\n" "the current implementation does not." msgstr "" @@ -11327,8 +9736,7 @@ msgid "" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n" "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n" -"Our design benefits substantially from the research published around that" -" time.\n" +"Our design benefits substantially from the research published around that time.\n" "I2P uses several onion routing techniques, so we continue to benefit\n" "from the significant academic interest in Tor." msgstr "" @@ -11336,12 +9744,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:152 msgid "" "Taking from the attacks and analysis put forth in the \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " -"literature</a> (largely \n" -"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: " -"Protocols, Attacks, Design \n" -"Issues and Open Problems</a>), the following briefly describes a wide " -"variety \n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n" +"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n" +"Issues and Open Problems</a>), the following briefly describes a wide variety \n" "of attacks as well as many of I2Ps defenses. We update\n" "this list to include new attacks as they are identified." msgstr "" @@ -11369,66 +9774,46 @@ msgstr "" msgid "" "The\n" "<a href=\"%(comparisons)s\">network comparisons</a> and\n" -"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also " -"be helpful\n" +"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n" "to review." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:210 msgid "" -"A brute force attack can be mounted by a global passive or active " -"adversary, \n" -"watching all the messages pass between all of the nodes and attempting to" -" correlate\n" -"which message follows which path. Mounting this attack against I2P " -"should be \n" -"nontrivial, as all peers in the network are frequently sending messages " -"(both\n" -"end to end and network maintenance messages), plus an end to end message " -"changes\n" -"size and data along its path. In addition, the external adversary does " -"not have\n" -"access to the messages either, as inter-router communication is both " -"encrypted\n" -"and streamed (making two 1024 byte messages indistinguishable from one " -"2048 byte\n" +"A brute force attack can be mounted by a global passive or active adversary, \n" +"watching all the messages pass between all of the nodes and attempting to correlate\n" +"which message follows which path. Mounting this attack against I2P should be \n" +"nontrivial, as all peers in the network are frequently sending messages (both\n" +"end to end and network maintenance messages), plus an end to end message changes\n" +"size and data along its path. In addition, the external adversary does not have\n" +"access to the messages either, as inter-router communication is both encrypted\n" +"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n" "message)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:222 msgid "" -"However, a powerful attacker can use brute force to detect trends - if " -"they \n" -"can send 5GB to an I2P destination and monitor everyone's network " -"connection,\n" -"they can eliminate all peers who did not receive 5GB of data. Techniques" -" to \n" +"However, a powerful attacker can use brute force to detect trends - if they \n" +"can send 5GB to an I2P destination and monitor everyone's network connection,\n" +"they can eliminate all peers who did not receive 5GB of data. Techniques to \n" "defeat this attack exist, but may be prohibitively expensive (see: \n" -"<a " -"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s " -"mimics\n" -"or constant rate traffic). Most users are not concerned with this " -"attack, as \n" -"the cost of mounting it are extreme (and often require illegal activity)." -" \n" +"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n" +"or constant rate traffic). Most users are not concerned with this attack, as \n" +"the cost of mounting it are extreme (and often require illegal activity). \n" "However, the attack is still possible, for example by an observer at\n" "a large ISP or an Internet exchange point.\n" "Those who want to defend against it \n" "would want to take appropriate countermeasures, such as\n" -"setting low bandwidth limits, and using unpublished or encrypted " -"leasesets for I2P Sites.\n" -"Other countermeasures, such as nontrivial delays and restricted routes, " -"are\n" +"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n" +"Other countermeasures, such as nontrivial delays and restricted routes, are\n" "not currently implemented." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:239 #, python-format msgid "" -"As a partial defense against a single router or group of routers trying " -"to route all the network's traffic,\n" -"routers contain limits as to how many tunnels can be routed through a " -"single peer.\n" +"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n" +"routers contain limits as to how many tunnels can be routed through a single peer.\n" "As the network grows, these limits are subject to further adjustment.\n" "Other mechanisms for peer rating, selection and avoidance\n" "are discussed on the\n" @@ -11437,51 +9822,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:254 msgid "" -"I2P's messages are unidirectional and do not necessarily imply that a " -"reply\n" +"I2P's messages are unidirectional and do not necessarily imply that a reply\n" "will be sent. However, applications on top of I2P will most likely have\n" -"recognizable patterns within the frequency of their messages - for " -"instance, an \n" -"HTTP request will be a small message with a large sequence of reply " -"messages \n" -"containing the HTTP response. Using this data as well as a broad view of" -" the \n" -"network topology, an attacker may be able to disqualify some links as " -"being too \n" +"recognizable patterns within the frequency of their messages - for instance, an \n" +"HTTP request will be a small message with a large sequence of reply messages \n" +"containing the HTTP response. Using this data as well as a broad view of the \n" +"network topology, an attacker may be able to disqualify some links as being too \n" "slow to have passed the message along." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:264 msgid "" -"This sort of attack is powerful, but its applicability to I2P is non " -"obvious,\n" -"as the variation on message delays due to queuing, message processing, " -"and \n" -"throttling will often meet or exceed the time of passing a message along " -"a \n" -"single link - even when the attacker knows that a reply will be sent as " -"soon as\n" -"the message is received. There are some scenarios which will expose " -"fairly \n" -"automatic replies though - the streaming library does (with the SYN+ACK) " -"as does the \n" -"message mode of guaranteed delivery (with the " -"DataMessage+DeliveryStatusMessage)." +"This sort of attack is powerful, but its applicability to I2P is non obvious,\n" +"as the variation on message delays due to queuing, message processing, and \n" +"throttling will often meet or exceed the time of passing a message along a \n" +"single link - even when the attacker knows that a reply will be sent as soon as\n" +"the message is received. There are some scenarios which will expose fairly \n" +"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n" +"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:274 #, python-format msgid "" -"Without protocol scrubbing or higher latency, global active adversaries " -"can \n" -"gain substantial information. As such, people concerned with these " -"attacks could\n" -"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> or \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol " -"scrubbing, or\n" -"other advanced tunnel routing <a " -"href=\"%(todo)s#batching\">techniques</a>,\n" +"Without protocol scrubbing or higher latency, global active adversaries can \n" +"gain substantial information. As such, people concerned with these attacks could\n" +"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n" +"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n" "but these are unimplemented in I2P." msgstr "" @@ -11494,25 +9862,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:291 msgid "" -"Intersection attacks against low latency systems are extremely powerful -" -"\n" -"periodically make contact with the target and keep track of what peers " -"are on\n" +"Intersection attacks against low latency systems are extremely powerful -\n" +"periodically make contact with the target and keep track of what peers are on\n" "the network. Over time, as node churn occurs the attacker will gain \n" -"significant information about the target by simply intersecting the sets " -"of\n" -"peers that are online when a message successfully goes through. The cost" -" of \n" -"this attack is significant as the network grows, but may be feasible in " -"some\n" +"significant information about the target by simply intersecting the sets of\n" +"peers that are online when a message successfully goes through. The cost of \n" +"this attack is significant as the network grows, but may be feasible in some\n" "scenarios." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:301 #, python-format msgid "" -"In summary, if an attacker is at both ends of your tunnel at the same " -"time,\n" +"In summary, if an attacker is at both ends of your tunnel at the same time,\n" "he may be successful.\n" "I2P does not have a full defense to this for low latency communication.\n" "This is an inherent weakness of low-latency onion routing.\n" @@ -11531,8 +9893,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:316 #, python-format msgid "" -"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " -"small group that changes slowly" +"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small " +"group that changes slowly" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:319 @@ -11555,8 +9917,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:332 msgid "" "Even in total, these defenses are not a complete solution.\n" -"Also, we have made some design choices that may significantly increase " -"our vulnerability:" +"Also, we have made some design choices that may significantly increase our vulnerability:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:337 @@ -11565,8 +9926,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" -"We use tunnel pools comprised of several tunnels, and traffic can shift " -"from tunnel to tunnel." +"We use tunnel pools comprised of several tunnels, and traffic can shift from" +" tunnel to tunnel." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:343 @@ -11576,8 +9937,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:346 msgid "" "Tunnel lengths are configurable.\n" -"While 3-hop tunnels are recommended for full protection, several " -"applications and\n" +"While 3-hop tunnels are recommended for full protection, several applications and\n" "services use 2-hop tunnels by default." msgstr "" @@ -11585,14 +9945,10 @@ msgstr "" #, python-format msgid "" "In the future, it could\n" -"for peers who can afford significant delays (per <a " -"href=\"%(todo)s#stop\">nontrivial\n" -"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). " -"In addition,\n" -"this is only relevant for destinations that other people know about - a " -"private\n" -"group whose destination is only known to trusted peers does not have to " -"worry,\n" +"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n" +"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). In addition,\n" +"this is only relevant for destinations that other people know about - a private\n" +"group whose destination is only known to trusted peers does not have to worry,\n" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" @@ -11603,8 +9959,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" -"There are a whole slew of denial of service attacks available against " -"I2P,\n" +"There are a whole slew of denial of service attacks available against I2P,\n" "each with different costs and consequences:" msgstr "" @@ -11627,10 +9982,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:387 msgid "" "Provide easy configuration options so that users may increase their\n" -"contribution (share percentage) to the network. Display easy-to-" -"understand\n" -"metrics such as \"share ratio\" so that users may see what they are " -"contributing." +"contribution (share percentage) to the network. Display easy-to-understand\n" +"metrics such as \"share ratio\" so that users may see what they are contributing." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:392 @@ -11642,29 +9995,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:399 #, python-format msgid "" -"<b>Starvation attack:</b> A hostile user may attempt to harm the network " -"by\n" -"creating a significant number of peers in the network who are not " -"identified as\n" -"being under control of the same entity (as with Sybil). These nodes then" -" \n" -"decide not to provide any resources to the network, causing existing " -"peers \n" -"to search through a larger network database or request more tunnels than" -" \n" +"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n" +"creating a significant number of peers in the network who are not identified as\n" +"being under control of the same entity (as with Sybil). These nodes then \n" +"decide not to provide any resources to the network, causing existing peers \n" +"to search through a larger network database or request more tunnels than \n" "should be necessary. \n" -"Alternatively, the nodes may provide intermittent service by periodically" -"\n" +"Alternatively, the nodes may provide intermittent service by periodically\n" "dropping selected traffic, or refusing connections to certain peers.\n" -"This behavior may be indistinguishable from that of a heavily-loaded or " -"failing node.\n" -"I2P addresses these issues by maintaining <a " -"href=\"%(peerselection)s\">profiles</a> on the \n" +"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n" +"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n" "peers, attempting to identify underperforming ones and simply ignoring \n" "them, or using them rarely.\n" "We have significantly enhanced the\n" -"ability to recognize and avoid troublesome peers; however there are still" -"\n" +"ability to recognize and avoid troublesome peers; however there are still\n" "significant efforts required in this area." msgstr "" @@ -11672,30 +10016,18 @@ msgstr "" #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" -"a peer, a destination, or a tunnel. Network and peer flooding is " -"possible,\n" -"and I2P does nothing to prevent standard IP layer flooding. The flooding" -" of\n" -"a destination with messages by sending a large number to the target's " -"various\n" -"inbound tunnel gateways is possible, but the destination will know this " -"both\n" -"by the contents of the message and because the tunnel's tests will fail." -" The\n" -"same goes for flooding just a single tunnel. I2P has no defenses for a " -"network\n" -"flooding attack. For a destination and tunnel flooding attack, the " -"target\n" -"identifies which tunnels are unresponsive and builds new ones. New code " -"could\n" -"also be written to add even more tunnels if the client wishes to handle " -"the\n" -"larger load. If, on the other hand, the load is more than the client can" -"\n" -"deal with, they can instruct the tunnels to throttle the number of " -"messages or\n" -"bytes they should pass on (once the <a " -"href=\"%(todo)s#batching\">advanced tunnel\n" +"a peer, a destination, or a tunnel. Network and peer flooding is possible,\n" +"and I2P does nothing to prevent standard IP layer flooding. The flooding of\n" +"a destination with messages by sending a large number to the target's various\n" +"inbound tunnel gateways is possible, but the destination will know this both\n" +"by the contents of the message and because the tunnel's tests will fail. The\n" +"same goes for flooding just a single tunnel. I2P has no defenses for a network\n" +"flooding attack. For a destination and tunnel flooding attack, the target\n" +"identifies which tunnels are unresponsive and builds new ones. New code could\n" +"also be written to add even more tunnels if the client wishes to handle the\n" +"larger load. If, on the other hand, the load is more than the client can\n" +"deal with, they can instruct the tunnels to throttle the number of messages or\n" +"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n" "operation</a> is implemented)." msgstr "" @@ -11703,13 +10035,10 @@ msgstr "" msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" -"operation, and a hostile attacker could use these to flood that peer with" -"\n" -"a large number of them in an attempt to overload the CPU. Both using " -"good \n" +"operation, and a hostile attacker could use these to flood that peer with\n" +"a large number of them in an attempt to overload the CPU. Both using good \n" "engineering practices and potentially requiring nontrivial certificates \n" -"(e.g. HashCash) to be attached to these expensive requests should " -"mitigate\n" +"(e.g. HashCash) to be attached to these expensive requests should mitigate\n" "the issue, though there may be room for an attacker to exploit various\n" "bugs in the implementation." msgstr "" @@ -11717,8 +10046,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:451 #, python-format msgid "" -"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " -"network by\n" +"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n" "becoming a floodfill router. The current defenses against unreliable,\n" "intermittent, or malicious floodfill routers are poor.\n" "A floodfill router may provide bad or no response to lookups, and\n" @@ -11733,134 +10061,86 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:470 #, python-format msgid "" -"Tagging attacks - modifying a message so that it can later be identified" -" \n" -"further along the path - are by themselves impossible in I2P, as messages" -" \n" -"passed through tunnels are signed. However, if an attacker is the " -"inbound \n" -"tunnel gateway as well as a participant further along in that tunnel, " -"with\n" -"collusion they can identify the fact that they are in the same tunnel " -"(and \n" -"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and " -"other updates,\n" -"colluding peers within the same tunnel can recognize that fact without " -"any \n" -"effort). An attacker in an outbound tunnel and any part of an inbound " -"tunnel cannot \n" -"collude however, as the tunnel encryption pads and modifies the data " -"separately\n" -"for the inbound and outbound tunnels. External attackers cannot do " -"anything,\n" +"Tagging attacks - modifying a message so that it can later be identified \n" +"further along the path - are by themselves impossible in I2P, as messages \n" +"passed through tunnels are signed. However, if an attacker is the inbound \n" +"tunnel gateway as well as a participant further along in that tunnel, with\n" +"collusion they can identify the fact that they are in the same tunnel (and \n" +"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n" +"colluding peers within the same tunnel can recognize that fact without any \n" +"effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n" +"collude however, as the tunnel encryption pads and modifies the data separately\n" +"for the inbound and outbound tunnels. External attackers cannot do anything,\n" "as the links are encrypted and messages signed." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:488 msgid "" -"Partitioning attacks - finding ways to segregate (technically or " -"analytically)\n" -"the peers in a network - are important to keep in mind when dealing with " -"a \n" -"powerful adversary, since the size of the network plays a key role in " -"determining\n" -"your anonymity. Technical partitioning by cutting links between peers to" -" create\n" -"fragmented networks is addressed by I2P's built in network database, " -"which \n" -"maintains statistics about various peers so as to allow any existing " -"connections\n" -"to other fragmented sections to be exploited so as to heal the network. " -"However,\n" -"if the attacker does disconnect all links to uncontrolled peers, " -"essentially\n" -"isolating the target, no amount of network database healing will fix it." -" At\n" -"that point, the only thing the router can hope to do is notice that a " -"significant\n" -"number of previously reliable peers have become unavailable and alert the" -" client\n" -"that it is temporarily disconnected (this detection code is not " -"implemented at\n" +"Partitioning attacks - finding ways to segregate (technically or analytically)\n" +"the peers in a network - are important to keep in mind when dealing with a \n" +"powerful adversary, since the size of the network plays a key role in determining\n" +"your anonymity. Technical partitioning by cutting links between peers to create\n" +"fragmented networks is addressed by I2P's built in network database, which \n" +"maintains statistics about various peers so as to allow any existing connections\n" +"to other fragmented sections to be exploited so as to heal the network. However,\n" +"if the attacker does disconnect all links to uncontrolled peers, essentially\n" +"isolating the target, no amount of network database healing will fix it. At\n" +"that point, the only thing the router can hope to do is notice that a significant\n" +"number of previously reliable peers have become unavailable and alert the client\n" +"that it is temporarily disconnected (this detection code is not implemented at\n" "the moment)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:504 #, python-format msgid "" -"Partitioning the network analytically by looking for differences in how " -"routers \n" -"and destinations behave and grouping them accordingly is also a very " -"powerful\n" -"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a>" -" the network\n" -"database will know when a particular destination has 5 inbound tunnels in" -" their\n" -"LeaseSet while others have only 2 or 3, allowing the adversary to " -"potentially \n" -"partition clients by the number of tunnels selected. Another partition " -"is \n" -"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> and \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel " -"gateways and the\n" -"particular hops with non-zero delays will likely stand out. However, " -"this data\n" -"is only exposed to those specific hops, so to partition effectively on " -"that \n" -"matter, the attacker would need to control a significant portion of the " -"network\n" -"(and still that would only be a probabilistic partition, as they wouldn't" -" know\n" +"Partitioning the network analytically by looking for differences in how routers \n" +"and destinations behave and grouping them accordingly is also a very powerful\n" +"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n" +"database will know when a particular destination has 5 inbound tunnels in their\n" +"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n" +"partition clients by the number of tunnels selected. Another partition is \n" +"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n" +"particular hops with non-zero delays will likely stand out. However, this data\n" +"is only exposed to those specific hops, so to partition effectively on that \n" +"matter, the attacker would need to control a significant portion of the network\n" +"(and still that would only be a probabilistic partition, as they wouldn't know\n" "which other tunnels or messages have those delays)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:520 #, python-format msgid "" -"Also discussed on the <a href=\"%(netdb)s#threat\">network database " -"page</a> (bootstrap attack)." +"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>" +" (bootstrap attack)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:528 msgid "" -"The predecessor attack is passively gathering statistics in an attempt to" -" see\n" -"what peers are 'close' to the destination by participating in their " -"tunnels and\n" -"keeping track of the previous or next hop (for outbound or inbound " -"tunnels, \n" -"respectively). Over time, using a perfectly random sample of peers and " -"random\n" -"ordering, an attacker would be able to see which peer shows up as " -"'closer' \n" -"statistically more than the rest, and that peer would in turn be where " -"the\n" +"The predecessor attack is passively gathering statistics in an attempt to see\n" +"what peers are 'close' to the destination by participating in their tunnels and\n" +"keeping track of the previous or next hop (for outbound or inbound tunnels, \n" +"respectively). Over time, using a perfectly random sample of peers and random\n" +"ordering, an attacker would be able to see which peer shows up as 'closer' \n" +"statistically more than the rest, and that peer would in turn be where the\n" "target is located." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:538 #, python-format msgid "" -"I2P avoids this in four ways: first, the peers selected to participate in" -"\n" -"tunnels are not randomly sampled throughout the network - they are " -"derived from\n" -"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which " -"breaks them\n" -"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict " -"ordering</a> of peers\n" -"in a tunnel, the fact that a peer shows up more frequently does not mean " -"they're\n" -"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted " -"tunnel length</a>\n" +"I2P avoids this in four ways: first, the peers selected to participate in\n" +"tunnels are not randomly sampled throughout the network - they are derived from\n" +"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n" +"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n" +"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n" +"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n" "(not enabled by default)\n" "even 0 hop tunnels can provide plausible deniability as the occasional \n" "variation of the gateway will look like normal tunnels. Fourth, with \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> " -"(unimplemented), only the peer with\n" -"a restricted connection to the target will ever contact the target, while" -" \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n" +"a restricted connection to the target will ever contact the target, while \n" "attackers will merely run into that gateway." msgstr "" @@ -11898,8 +10178,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" -"Network growth will make it more difficult to obtain a given proportion " -"of the network" +"Network growth will make it more difficult to obtain a given proportion of " +"the network" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:590 @@ -11908,10 +10188,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:593 msgid "" -"\"Hidden mode\", which prevents a router from publishing its information " -"to the netDb,\n" -"(but also prevents it from relaying data) is not widely used now but " -"could be." +"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n" +"(but also prevents it from relaying data) is not widely used now but could be." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:599 @@ -11919,19 +10197,15 @@ msgstr "" msgid "" "In future implementations,\n" "<a href=\"%(todo)s#nat\">basic</a> and \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted " -"routes,\n" -"this attack loses much of its power, as the \"hidden\" peers do not " -"publish their\n" -"contact addresses in the network database - only the tunnels through " -"which \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n" +"this attack loses much of its power, as the \"hidden\" peers do not publish their\n" +"contact addresses in the network database - only the tunnels through which \n" "they can be reached (as well as their public keys, etc)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:608 msgid "" -"In the future, routers could use GeoIP to identify if they are in a " -"particular\n" +"In the future, routers could use GeoIP to identify if they are in a particular\n" "country where identification as an I2P node would be risky.\n" "In that case, the router could automatically enable hidden mode, or\n" "enact other restricted route methods." @@ -11942,10 +10216,8 @@ msgstr "" msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" "or state-level firewall could identify that a computer is running I2P.\n" -"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically " -"designed\n" -"to hide that a computer is running I2P. However, several design decisions" -" made\n" +"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n" +"to hide that a computer is running I2P. However, several design decisions made\n" "in the design of the\n" "<a href=\"%(transport)s\">transport layer and protocols</a>\n" "make it somewhat difficult to identify I2P traffic:" @@ -11961,8 +10233,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:636 msgid "" -"DH key exchange with no protocol bytes or other unencrypted constant " -"fields" +"DH key exchange with no protocol bytes or other unencrypted constant fields" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:639 @@ -11971,14 +10242,13 @@ msgid "" "Simultaneous use of both\n" "<a href=\"%(ntcp)s\">TCP</a> and\n" "<a href=\"%(ssu)s\">UDP</a> transports.\n" -"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to" -" track." +"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:647 msgid "" -"In the near future, we plan to directly address traffic analysis issues " -"by further obfuscation of I2P transport protocols, possibly including:" +"In the near future, we plan to directly address traffic analysis issues by " +"further obfuscation of I2P transport protocols, possibly including:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:651 @@ -11995,20 +10265,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" -"Development of additional transport methods that mimic SSL or other " -"common protocols" +"Development of additional transport methods that mimic SSL or other common " +"protocols" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "" -"Review of padding strategies at higher layers to see how they affect " -"packet sizes at the transport layer" +"Review of padding strategies at higher layers to see how they affect packet " +"sizes at the transport layer" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:663 msgid "" -"Review of methods implemented by various state-level firewalls to block " -"Tor" +"Review of methods implemented by various state-level firewalls to block Tor" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:666 @@ -12024,36 +10293,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:680 msgid "" -"Sybil describes a category of attacks where the adversary creates " -"arbitrarily\n" +"Sybil describes a category of attacks where the adversary creates arbitrarily\n" "large numbers of colluding nodes and uses the increased numbers to help \n" -"mounting other attacks. For instance, if an attacker is in a network " -"where peers\n" -"are selected randomly and they want an 80% chance to be one of those " -"peers, they\n" -"simply create five times the number of nodes that are in the network and " -"roll \n" -"the dice. When identity is free, Sybil can be a very potent technique " -"for a \n" -"powerful adversary. The primary technique to address this is simply to " -"make \n" -"identity 'non free' - <a " -"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" +"mounting other attacks. For instance, if an attacker is in a network where peers\n" +"are selected randomly and they want an 80% chance to be one of those peers, they\n" +"simply create five times the number of nodes that are in the network and roll \n" +"the dice. When identity is free, Sybil can be a very potent technique for a \n" +"powerful adversary. The primary technique to address this is simply to make \n" +"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" "(among others) uses the fact that IP addresses are limited, while \n" "IIP used \n" -"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for " -"creating a new\n" -"identity. We currently have not implemented any particular technique to " -"address\n" +"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n" +"identity. We currently have not implemented any particular technique to address\n" "Sybil, but do include placeholder certificates in the router's and \n" -"destination's data structures which can contain a HashCash certificate of" -" \n" -"appropriate value when necessary (or some other certificate proving " -"scarcity)." +"destination's data structures which can contain a HashCash certificate of \n" +"appropriate value when necessary (or some other certificate proving scarcity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:698 -msgid "Requiring HashCash Certificates in various places has two major problems:" +msgid "" +"Requiring HashCash Certificates in various places has two major problems:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:702 @@ -12063,17 +10322,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:705 msgid "" "The classic HashCash problem -\n" -"selecting HashCash values that are meaningful proofs of work on high-end " -"machines,\n" +"selecting HashCash values that are meaningful proofs of work on high-end machines,\n" "while still being feasible on low-end machines such as mobile devices." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:712 msgid "" -"Various limitations on the number of routers in a given IP range restrict" -"\n" -"the vulnerability to attackers that don't have the ability to put " -"machines\n" +"Various limitations on the number of routers in a given IP range restrict\n" +"the vulnerability to attackers that don't have the ability to put machines\n" "in several IP blocks.\n" "However, this is not a meaningful defense against a powerful adversary." msgstr "" @@ -12095,22 +10351,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:733 #, python-format msgid "" -"By refusing to accept or forward tunnel build requests, except to a " -"colluding peer, a router could ensure\n" +"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n" "that a tunnel is formed wholly from its set of colluding routers.\n" -"The chances of success are enhanced if there is a large number of " -"colluding routers,\n" +"The chances of success are enhanced if there is a large number of colluding routers,\n" "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n" "This is somewhat mitigated by our\n" -"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor " -"the performance\n" +"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n" "of peers.\n" "However, this is a powerful attack as the number of routers approaches\n" "<i>f</i> = 0.2, or 20% malicious nodes, as specifed in the paper.\n" -"The malicous routers could also maintain connections to the target router" -" and provide\n" -"excellent forwarding bandwidth for traffic over those connections, in an " -"attempt\n" +"The malicous routers could also maintain connections to the target router and provide\n" +"excellent forwarding bandwidth for traffic over those connections, in an attempt\n" "to manipulate the profiles managed by the target and appear attractive.\n" "Further research and defenses may be necessary." msgstr "" @@ -12119,38 +10370,29 @@ msgstr "" #, python-format msgid "" "We use strong cryptography with long keys, and\n" -"we assume the security of the industry-standard cryptographic primitives " -"used in I2P, as documented\n" +"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n" "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n" "Security features include the immediate detection of \n" -"altered messages along the path, the inability to decrypt messages not " -"addressed to you,\n" +"altered messages along the path, the inability to decrypt messages not addressed to you,\n" "and defense against man-in-the-middle attacks.\n" -"The key sizes chosen in 2003 were quite conservative at the time, and are" -" still longer than\n" -"those used in <a href=\"https://torproject.org/\">other anonymity " -"networks</a>.\n" +"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n" +"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n" "We don't think the current key lengths are our biggest weakness,\n" "especially for traditional, non-state-level adversaries;\n" "bugs and the small size of the network are much more worrisome.\n" -"Of course, all cryptographic algorithms eventually become obsolete due to" -"\n" -"the advent of faster processors, cryptographic research, and advancements" -" in\n" +"Of course, all cryptographic algorithms eventually become obsolete due to\n" +"the advent of faster processors, cryptographic research, and advancements in\n" "methods such as rainbow tables, clusters of video game hardware, etc.\n" -"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys" -" or change\n" +"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n" "shared secret values while maintaining backward compatibility." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:773 #, python-format msgid "" -"Upgrading the various data structures and protocols to support longer " -"keys\n" +"Upgrading the various data structures and protocols to support longer keys\n" "will have to be tackled eventually, and this will be a\n" -"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be " -"for \n" +"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n" "<a href=\"https://torproject.org/\">others</a>.\n" "Hopefully, through careful planning, we can minimize the disruption, and\n" "implement mechanisms to make it easier for future transitions." @@ -12159,12 +10401,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:782 msgid "" "In the future, several I2P protocols and data structures\n" -"support securely padding messages to arbitrary sizes, so messages could " -"be made constant\n" -"size or garlic messages could be modified randomly so that some cloves " -"appear to contain\n" -"more subcloves than they actually do. At the moment, however, garlic, " -"tunnel, and \n" +"support securely padding messages to arbitrary sizes, so messages could be made constant\n" +"size or garlic messages could be modified randomly so that some cloves appear to contain\n" +"more subcloves than they actually do. At the moment, however, garlic, tunnel, and \n" "end to end messages include simple random padding." msgstr "" @@ -12178,18 +10417,14 @@ msgid "" "In addition to the floodfill DOS attacks described\n" "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n" "to learn about network participants, due to their role\n" -"in the netDb, and the high frequency of communication with those " -"participants.\n" -"This is somewhat mitigated because floodfill routers only manage a " -"portion\n" +"in the netDb, and the high frequency of communication with those participants.\n" +"This is somewhat mitigated because floodfill routers only manage a portion\n" "of the total keyspace, and the keyspace rotates daily, as explained \n" "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n" -"The specific mechanisms by which routers communicate with floodfills have" -" been\n" +"The specific mechanisms by which routers communicate with floodfills have been\n" "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n" "However, these threats should be studied further.\n" -"The specific potential threats and corresponding defenses are a topic for" -" future research." +"The specific potential threats and corresponding defenses are a topic for future research." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:812 @@ -12208,33 +10443,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:826 msgid "" -"There are a few centralized or limited resources (some inside I2P, some " -"not)\n" +"There are a few centralized or limited resources (some inside I2P, some not)\n" "that could be attacked or used as a vector for attacks.\n" -"The absence of jrandom starting November 2007, followed by the loss of " -"the i2p.net hosting service in January 2008,\n" -"highlighted numerous centralized resources in the development and " -"operation of the I2P network,\n" +"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n" +"highlighted numerous centralized resources in the development and operation of the I2P network,\n" "most of which are now distributed.\n" -"Attacks on externally-reachable resources mainly affect the ability of " -"new users to find us,\n" +"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n" "not the operation of the network itself." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:836 #, python-format msgid "" -"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" -" for external public access." +"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin " +"for external public access." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:839 #, python-format msgid "" -"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " -"locations</a>,\n" -"however more reseed hosts may be needed, and the handling of unreliable " -"or malicious\n" +"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n" +"however more reseed hosts may be needed, and the handling of unreliable or malicious\n" "reseed hosts may need improvement." msgstr "" @@ -12250,10 +10479,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:851 msgid "" -"Routers now better handle <a href=\"#ffdos\">multiple unreliable " -"floodfill peers</a>.\n" -"Malicious floodfills <a href=\"#ffdos\">needs</a> <a " -"href=\"#floodfill\">more</a> study." +"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n" +"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:855 @@ -12265,47 +10492,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:858 msgid "" -"Routers rely on a single news host, but there is a hardcoded backup URL " -"pointing to a different host.\n" +"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:862 #, python-format msgid "" -"<a href=\"%(naming)s\">Naming system services</a>, including address book" -" subscription providers, add-host services,\n" -"and jump services, could be malicious. Substantial protections for " -"subscriptions were implemented\n" -"in release 0.6.1.31, with additional enhancements in subsequent releases." -"\n" +"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n" +"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n" +"in release 0.6.1.31, with additional enhancements in subsequent releases.\n" "However, all naming services require some measure of trust, see\n" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:869 msgid "" -"We remain reliant on the DNS service for i2p2.de, losing this would cause" -" substantial\n" +"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n" "disruption in our ability to attract new users,\n" -"and would shrink the network (in the short-to-medium term), just as the " -"loss of i2p.net did." +"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:881 msgid "" -"These attacks aren't directly on the network, but instead go after its " -"development team \n" -"by either introducing legal hurdles on anyone contributing to the " -"development\n" -"of the software, or by using whatever means are available to get the " -"developers to \n" -"subvert the software. Traditional technical measures cannot defeat these" -" attacks, and\n" -"if someone threatened the life or livelihood of a developer (or even just" -" issuing a \n" -"court order along with a gag order, under threat of prison), we would " -"have a big problem." +"These attacks aren't directly on the network, but instead go after its development team \n" +"by either introducing legal hurdles on anyone contributing to the development\n" +"of the software, or by using whatever means are available to get the developers to \n" +"subvert the software. Traditional technical measures cannot defeat these attacks, and\n" +"if someone threatened the life or livelihood of a developer (or even just issuing a \n" +"court order along with a gag order, under threat of prison), we would have a big problem." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:890 @@ -12315,26 +10530,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:894 #, python-format msgid "" -"All components of the network must be open source to enable inspection, " -"verification, \n" -"modification, and improvement. If a developer is compromised, once it is" -" noticed \n" -"the community should demand explanation and cease to accept that " -"developer's work.\n" -"All checkins to our <a href=\"%(monotone)s\">distributed source control " -"system</a>\n" -"are cryptographically signed, and the release packagers use a trust-list " -"system\n" +"All components of the network must be open source to enable inspection, verification, \n" +"modification, and improvement. If a developer is compromised, once it is noticed \n" +"the community should demand explanation and cease to accept that developer's work.\n" +"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n" +"are cryptographically signed, and the release packagers use a trust-list system\n" "to restrict modifications to those previously approved." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:902 #, python-format msgid "" -"Development over the network itself, allowing developers to stay " -"anonymous but still \n" -"secure the development process. All I2P development can occur through " -"I2P - using\n" +"Development over the network itself, allowing developers to stay anonymous but still \n" +"secure the development process. All I2P development can occur through I2P - using\n" "a <a href=\"%(monotone)s\">distributed source control system</a>,\n" "a distributed source control system, IRC chat,\n" "public web servers,\n" @@ -12344,8 +10552,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:913 msgid "" -"We also maintain relationships with various organizations that offer " -"legal advice,\n" +"We also maintain relationships with various organizations that offer legal advice,\n" "should any defense be necessary." msgstr "" @@ -12355,52 +10562,38 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:922 msgid "" -"Try as we might, most nontrivial applications include errors in the " -"design or \n" -"implementation, and I2P is no exception. There may be bugs that could be" -" exploited to \n" -"attack the anonymity or security of the communication running over I2P in" -" unexpected \n" -"ways. To help withstand attacks against the design or protocols in use, " -"we publish \n" +"Try as we might, most nontrivial applications include errors in the design or \n" +"implementation, and I2P is no exception. There may be bugs that could be exploited to \n" +"attack the anonymity or security of the communication running over I2P in unexpected \n" +"ways. To help withstand attacks against the design or protocols in use, we publish \n" "all designs and documentation and solicit review and criticism with \n" "the hope that many eyes will improve the system.\n" "We do not believe in\n" -"<a href=\"http://www.haystacknetwork.com/\">security through " -"obscurity</a>." +"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:933 msgid "" "In addition, the code is being \n" -"treated the same way, with little aversion towards reworking or throwing " -"out \n" -"something that isn't meeting the needs of the software system (including " -"ease of \n" -"modification). Documentation for the design and implementation of the " -"network and \n" -"the software components are an essential part of security, as without " -"them it is \n" -"unlikely that developers would be willing to spend the time to learn the " -"software \n" +"treated the same way, with little aversion towards reworking or throwing out \n" +"something that isn't meeting the needs of the software system (including ease of \n" +"modification). Documentation for the design and implementation of the network and \n" +"the software components are an essential part of security, as without them it is \n" +"unlikely that developers would be willing to spend the time to learn the software \n" "enough to identify shortcomings and bugs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:943 msgid "" -"Our software is likely, in particular, to contain bugs related to denial " -"of service\n" -"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues " -"in the router console,\n" -"and other vulnerabilities to non-standard inputs via the various " -"protocols." +"Our software is likely, in particular, to contain bugs related to denial of service\n" +"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,\n" +"and other vulnerabilities to non-standard inputs via the various protocols." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:949 #, python-format msgid "" -"I2P is still a small network with a small development community and " -"almost no\n" +"I2P is still a small network with a small development community and almost no\n" "interest from academic or research groups.\n" "Therefore we lack the analysis that\n" "<a href=\"https://torproject.org/\">other anonymity networks</a>\n" @@ -12414,18 +10607,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" -"To some extent, I2P could be enhanced to avoid peers operating at IP " -"addresses\n" -"listed in a blocklist. Several blocklists are commonly available in " -"standard formats,\n" -"listing anti-P2P organizations, potential state-level adversaries, and " -"others." +"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n" +"listed in a blocklist. Several blocklists are commonly available in standard formats,\n" +"listing anti-P2P organizations, potential state-level adversaries, and others." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:969 msgid "" -"To the extent that active peers actually do show up in the actual " -"blocklist,\n" +"To the extent that active peers actually do show up in the actual blocklist,\n" "blocking by only a subset of peers would tend to segment the network,\n" "exacerbate reachability problems, and decrease overall reliability.\n" "Therefore we would want to agree on a particular blocklist and\n" @@ -12434,8 +10623,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:977 msgid "" -"Blocklists are only a part (perhaps a small part) of an array of defenses" -"\n" +"Blocklists are only a part (perhaps a small part) of an array of defenses\n" "against maliciousness.\n" "In large part the profiling system does a good job of measuring\n" "router behavior so that we don't need to trust anything in netDb.\n" @@ -12448,8 +10636,7 @@ msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" "<a href=\"#central\">central resource attack</a>.\n" -"Automatic subscription to a list gives the list provider the power to " -"shut\n" +"Automatic subscription to a list gives the list provider the power to shut\n" "the i2p network down. Completely." msgstr "" @@ -12458,8 +10645,7 @@ msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" "There is no automatic update mechanism.\n" -"Should a particular IP range implement serious attacks on the I2P " -"network,\n" +"Should a particular IP range implement serious attacks on the I2P network,\n" "we would have to ask people to update their blocklist manually through\n" "out-of-band mechanisms such as forums, blogs, etc." msgstr "" @@ -12474,30 +10660,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:7 msgid "" -"This page contains an overview of I2P tunnel terminology and operation, " -"with\n" +"This page contains an overview of I2P tunnel terminology and operation, with\n" "links to more technical pages, details, and specifications." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:12 #, python-format msgid "" -"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P " -"builds virtual \"tunnels\" -\n" -"temporary and unidirectional paths through a sequence of routers. These" -" \n" +"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n" +"temporary and unidirectional paths through a sequence of routers. These \n" "tunnels are classified as either inbound tunnels (where everything \n" "given to it goes towards the creator of the tunnel) or outbound tunnels\n" "(where the tunnel creator shoves messages away from them). When Alice\n" "wants to send a message to Bob, she will (typically) send it out one of\n" -"her existing outbound tunnels with instructions for that tunnel's " -"endpoint\n" +"her existing outbound tunnels with instructions for that tunnel's endpoint\n" "to forward it to the gateway router for one of Bob's current inbound \n" "tunnels, which in turn passes it to Bob." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:25 -msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel" +msgid "" +"Alice connecting through her outbound tunnel to Bob via his inbound tunnel" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:27 @@ -12533,8 +10716,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:38 #, python-format msgid "" -"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound " -"tunnels,\n" +"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound tunnels,\n" "this is the one mentioned in the LeaseSet published in the\n" "<a href=\"%(netdb)s\">network database</a>. For outbound tunnels, the\n" "gateway is the originating router. (e.g. both A and D above)" @@ -12542,21 +10724,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:44 msgid "" -"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F" -" above)" +"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F " +"above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:45 msgid "" -"<b>Tunnel participant</b> - all routers in a tunnel except for the " -"gateway or\n" +"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n" "endpoint (e.g. both B and E above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:49 msgid "" -"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router " -"jumps, e.g.:" +"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps," +" e.g.:" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:51 @@ -12571,8 +10752,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:53 msgid "" -"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one " -"intermediate\n" +"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n" "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n" "outbound from Alice, one inbound to Bob)" msgstr "" @@ -12580,10 +10760,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:60 #, python-format msgid "" -"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 " -"byte integer</a>\n" -"different for each hop in a tunnel, and unique among all tunnels on a " -"router.\n" +"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n" +"different for each hop in a tunnel, and unique among all tunnels on a router.\n" "Chosen randomly by the tunnel creator." msgstr "" @@ -12594,8 +10772,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:68 #, python-format msgid "" -"Routers performing the three roles (gateway, participant, endpoint) are " -"given\n" +"Routers performing the three roles (gateway, participant, endpoint) are given\n" "different pieces of data in the initial\n" "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n" "to accomplish their tasks:" @@ -12609,9 +10786,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:97 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the next hop" msgstr "" @@ -12619,9 +10794,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:101 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the next hop" msgstr "" @@ -12629,9 +10802,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:105 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request" msgstr "" @@ -12648,8 +10819,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:91 msgid "" -"<b>next hop</b> - what router is the next one in the path (unless this is" -" a 0-hop tunnel, and the gateway is also the endpoint)" +"<b>next hop</b> - what router is the next one in the path (unless this is a " +"0-hop tunnel, and the gateway is also the endpoint)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:92 @@ -12676,27 +10847,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:117 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:121 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:125 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request (outbound endpoints only)" msgstr "" @@ -12712,8 +10877,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:131 msgid "" -"<b>reply router</b> - the inbound gateway of the tunnel to send the reply" -" through (outbound endpoints only)" +"<b>reply router</b> - the inbound gateway of the tunnel to send the reply " +"through (outbound endpoints only)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:132 @@ -12736,8 +10901,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:143 #, python-format msgid "" -"Several tunnels for a particular purpose may be grouped into a \"tunnel " -"pool\",\n" +"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n" "as described in the\n" "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n" "This provides redundancy and additional bandwidth.\n" @@ -12752,20 +10916,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:155 #, python-format msgid "" -"As mentioned above, each client requests that their router provide " -"tunnels to\n" +"As mentioned above, each client requests that their router provide tunnels to\n" "include at least a certain number of hops.\n" "The decision as to how many routers\n" -"to have in one's outbound and inbound tunnels has an important effect " -"upon the\n" -"latency, throughput, reliability, and anonymity provided by I2P - the " -"more peers\n" -"that messages have to go through, the longer it takes to get there and " -"the more\n" -"likely that one of those routers will fail prematurely. The less routers" -" in a\n" -"tunnel, the easier it is for an adversary to mount traffic analysis " -"attacks and\n" +"to have in one's outbound and inbound tunnels has an important effect upon the\n" +"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n" +"that messages have to go through, the longer it takes to get there and the more\n" +"likely that one of those routers will fail prematurely. The less routers in a\n" +"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n" "pierce someone's anonymity.\n" "Tunnel lengths are specified by clients via\n" "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n" @@ -12779,18 +10937,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:172 msgid "" "With no remote routers in a tunnel, the user has very basic plausible\n" -"deniability (since no one knows for sure that the peer that sent them the" -"\n" -"message wasn't simply just forwarding it on as part of the tunnel). " -"However, it\n" -"would be fairly easy to mount a statistical analysis attack and notice " -"that\n" -"messages targeting a specific destination are always sent through a " -"single\n" -"gateway. Statistical analysis against outbound 0-hop tunnels are more " -"complex,\n" -"but could show similar information (though would be slightly harder to " -"mount)." +"deniability (since no one knows for sure that the peer that sent them the\n" +"message wasn't simply just forwarding it on as part of the tunnel). However, it\n" +"would be fairly easy to mount a statistical analysis attack and notice that\n" +"messages targeting a specific destination are always sent through a single\n" +"gateway. Statistical analysis against outbound 0-hop tunnels are more complex,\n" +"but could show similar information (though would be slightly harder to mount)." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:182 @@ -12801,14 +10953,10 @@ msgstr "" #, python-format msgid "" "With only one remote router in a tunnel, the user has both plausible\n" -"deniability and basic anonymity, as long as they are not up against an " -"internal\n" -"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)." -" However,\n" -"if the adversary ran a sufficient number of routers such that the single " -"remote\n" -"router in the tunnel is often one of those compromised ones, they would " -"be able\n" +"deniability and basic anonymity, as long as they are not up against an internal\n" +"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n" +"if the adversary ran a sufficient number of routers such that the single remote\n" +"router in the tunnel is often one of those compromised ones, they would be able\n" "to mount the above statistical traffic analysis attack." msgstr "" @@ -12818,10 +10966,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:193 msgid "" -"With two or more remote routers in a tunnel, the costs of mounting the " -"traffic\n" -"analysis attack increases, since many remote routers would have to be " -"compromised\n" +"With two or more remote routers in a tunnel, the costs of mounting the traffic\n" +"analysis attack increases, since many remote routers would have to be compromised\n" "to mount it." msgstr "" @@ -12835,8 +10981,7 @@ msgid "" "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n" "3 or more hops are recommended for the highest level of protection.\n" "<a href=\"%(url)s\">Recent studies</a>\n" -"also conclude that more than 3 hops does not provide additional " -"protection." +"also conclude that more than 3 hops does not provide additional protection." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:208 @@ -12860,15 +11005,12 @@ msgstr "" #, python-format msgid "" "All tunnels are periodically tested by their creator by sending a\n" -"DeliveryStatusMessage out an outbound tunnel and bound for another " -"inbound tunnel\n" -"(testing both tunnels at once). If either fails a number of consecutive " -"tests, it is marked as no longer\n" +"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n" +"(testing both tunnels at once). If either fails a number of consecutive tests, it is marked as no longer\n" "functional. If it was used for a client's inbound tunnel, a new leaseSet\n" "is created.\n" "Tunnel test failures are also reflected in the\n" -"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer " -"profile</a>." +"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:230 @@ -12878,14 +11020,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:231 #, python-format msgid "" -"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic " -"routing</a>\n" -"a Tunnel Build Message to a router, requesting that they participate in " -"the\n" -"tunnel (providing them with all of the appropriate information, as above," -" along\n" -"with a certificate, which right now is a 'null' cert, but will support " -"hashcash\n" +"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n" +"a Tunnel Build Message to a router, requesting that they participate in the\n" +"tunnel (providing them with all of the appropriate information, as above, along\n" +"with a certificate, which right now is a 'null' cert, but will support hashcash\n" "or other non-free certificates when necessary).\n" "That router forwards the message to the next hop in the tunnel.\n" "Details are in the\n" @@ -12895,8 +11033,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:245 #, python-format msgid "" -"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic" -" encryption</a>\n" +"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n" "of tunnel messages.\n" "Details are in the\n" "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n" @@ -12917,8 +11054,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:267 msgid "" "In a distant future release,\n" -"options specifying the pooling, mixing, and chaff generation settings may" -" be implemented." +"options specifying the pooling, mixing, and chaff generation settings may be implemented." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:272 @@ -12961,20 +11097,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:6 msgid "" -"The I2P Client Protocol (I2CP) exposes a strong separation of concerns " -"between\n" -"the router and any client that wishes to communicate over the network. " -"It enables\n" -"secure and asynchronous messaging by sending and receiving messages over " -"a \n" +"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n" +"the router and any client that wishes to communicate over the network. It enables\n" +"secure and asynchronous messaging by sending and receiving messages over a \n" "single TCP socket.\n" "With I2CP, a client application tells the\n" -"router who they are (their \"destination\"), what anonymity, reliability," -" and \n" -"latency tradeoffs to make, and where to send messages. In turn the " -"router uses\n" -"I2CP to tell the client when any messages have arrived, and to request " -"authorization\n" +"router who they are (their \"destination\"), what anonymity, reliability, and \n" +"latency tradeoffs to make, and where to send messages. In turn the router uses\n" +"I2CP to tell the client when any messages have arrived, and to request authorization\n" "for some tunnels to be used." msgstr "" @@ -12983,10 +11113,8 @@ msgstr "" msgid "" "The protocol itself is implemented in Java, to provide the\n" "<a href=\"%(url)s\">Client SDK</a>.\n" -"This SDK is exposed in the i2p.jar package, which implements the client-" -"side of I2CP.\n" -"Clients should never need to access the router.jar package, which " -"contains the\n" +"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n" +"Clients should never need to access the router.jar package, which contains the\n" "router itself and the router-side of I2CP.\n" "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n" "A non-Java client would also have to implement the\n" @@ -12997,45 +11125,35 @@ msgstr "" #, python-format msgid "" "Applications can take advantage of the base I2CP plus the \n" -"<a href=\"%(streaming)s\">streaming</a> and <a " -"href=\"%(datagrams)s\">datagram</a> libraries\n" -"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a " -"href=\"%(bob)s\">BOB</a> protocols,\n" +"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n" +"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n" "which do not require clients to deal with any sort of cryptography.\n" "Also, clients may access the network by one of several proxies -\n" "HTTP, CONNECT, and SOCKS 4/4a/5.\n" -"Alternatively, Java clients may access those libraries in " -"ministreaming.jar and streaming.jar.\n" +"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n" "So there are several options for both Java and non-Java applications." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:43 #, python-format msgid "" -"Client-side end-to-end encryption (encrypting the data over the I2CP " -"connection)\n" +"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n" "was disabled in I2P release 0.6,\n" -"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end " -"encryption</a>\n" +"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n" "which is implemented in the router.\n" "The only cryptography that client libraries must still implement is\n" "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n" "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n" -"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and" -" management of those keys." +"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:56 msgid "" -"In a standard I2P installation, port 7654 is used by external java " -"clients to communicate\n" +"In a standard I2P installation, port 7654 is used by external java clients to communicate\n" "with the local router via I2CP.\n" -"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, " -"set the\n" -"router advanced configuration option " -"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" -"Clients in the same JVM as the router pass messages directly to the " -"router\n" +"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n" +"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" +"Clients in the same JVM as the router pass messages directly to the router\n" "through an internal JVM interface." msgstr "" @@ -13043,13 +11161,10 @@ msgstr "" #, python-format msgid "" "The router also supports external connections over SSL.\n" -"While SSL is not the default, it is strongly recommended for any traffic " -"that may\n" -"be exposed to the open Internet. The authorization user/password (if " -"any), the\n" +"While SSL is not the default, it is strongly recommended for any traffic that may\n" +"be exposed to the open Internet. The authorization user/password (if any), the\n" "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n" -"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private " -"Key</a> for the\n" +"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "are all transmitted in-the-clear unless SSL is enabled." msgstr "" @@ -13070,19 +11185,12 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:82 #, python-format msgid "" -"When a client connects to the router, it first sends a single protocol " -"version byte (0x2A).\n" -"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and " -"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> " -"response.\n" -"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession " -"Message</a> containing the session configuration.\n" -"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet" -" Message</a> from the router, indicating that inbound tunnels\n" -"have been built, and responds with a CreateLeaseSetMessage containing the" -" signed LeaseSet.\n" -"The client may now initiate or receive connections from other I2P " -"destinations." +"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n" +"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n" +"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n" +"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n" +"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n" +"The client may now initiate or receive connections from other I2P destinations." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:91 @@ -13098,10 +11206,7 @@ msgstr "" #, python-format msgid "" "The following options are traditionally passed to the router via\n" -"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained " -"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or " -"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession " -"Message</a>." +"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:104 @@ -13134,14 +11239,13 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:167 msgid "" "Number of ElGamal/AES Session Tags to send at a time.\n" -"For clients with relatively low bandwidth per-client-pair (IRC, some UDP " -"apps), this may be set lower." +"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:179 msgid "" -"Comma-separated list of Base 64 Hashes of peers to build tunnels through;" -" for debugging only" +"Comma-separated list of Base 64 Hashes of peers to build tunnels through; " +"for debugging only" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:188 @@ -13158,17 +11262,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:322 msgid "" "Guaranteed is disabled;\n" -"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1," -" the client side default is None as of 0.9.4" +"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:334 msgid "" "For authorization, if required by the router.\n" -"If the client is running in the same JVM as a router, this option is not " -"required.\n" -"Warning - username and password are sent in the clear to the router, " -"unless using SSL (i2cp.SSL=true).\n" +"If the client is running in the same JVM as a router, this option is not required.\n" +"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n" "Authorization is only recommended when using SSL." msgstr "" @@ -13242,8 +11343,7 @@ msgid "" "Random amount to add or subtract to the length of tunnels in.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" @@ -13252,16 +11352,14 @@ msgid "" "Random amount to add or subtract to the length of tunnels out.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:464 msgid "" "Name of tunnel - generally used in routerconsole, which will\n" -"use the first few characters of the Base64 hash of the destination by " -"default." +"use the first few characters of the Base64 hash of the destination by default." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:476 @@ -13277,8 +11375,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:497 msgid "" "Number of tunnels in.\n" -"Limit was increased from 6 to 16 in release 0.9; however, numbers higher " -"than 6 are\n" +"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n" "incompatible with older releases." msgstr "" @@ -13293,32 +11390,27 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:538 msgid "" "Any other options prefixed with \"inbound.\" are stored\n" -"in the \"unknown options\" properties of the inbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the inbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:550 msgid "" "Any other options prefixed with \"outbound.\" are stored\n" -"in the \"unknown options\" properties of the outbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the outbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:562 msgid "" "Set to false to disable ever bundling a reply LeaseSet.\n" "For clients that do not publish their LeaseSet, this option must be true\n" -"for any reply to be possible. \"true\" is also recommended for multihomed" -" servers\n" +"for any reply to be possible. \"true\" is also recommended for multihomed servers\n" "with long connection times." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:569 msgid "" -"Setting to \"false\" may save significant outbound bandwidth, especially " -"if\n" -"the client is configured with a large number of inbound tunnels (Leases)." -"\n" +"Setting to \"false\" may save significant outbound bandwidth, especially if\n" +"the client is configured with a large number of inbound tunnels (Leases).\n" "If replies are still required, this may shift the bandwidth burden to\n" "the far-end client and the floodfill.\n" "There are several cases where \"false\" may be appropriate:" @@ -13334,14 +11426,10 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:579 msgid "" -"LeaseSet is published, client is a \"server\", all connections are " -"inbound\n" -"so the connecting far-end destination obviously has the leaseset already." -"\n" -"Connections are either short, or it is acceptable for latency on a long-" -"lived\n" -"connection to temporarily increase while the other end re-fetches the " -"LeaseSet\n" +"LeaseSet is published, client is a \"server\", all connections are inbound\n" +"so the connecting far-end destination obviously has the leaseset already.\n" +"Connections are either short, or it is acceptable for latency on a long-lived\n" +"connection to temporarily increase while the other end re-fetches the LeaseSet\n" "after expiration.\n" "HTTP servers may fit these requirements." msgstr "" @@ -13355,15 +11443,11 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:596 #, python-format msgid "" -"Note: As of release 0.7.7, option names and values must use UTF-8 " -"encoding.\n" +"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n" "This is primarily useful for nicknames.\n" -"Prior to that release, options with multi-byte characters were corrupted." -"\n" -"Since options are encoded in a <a " -"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" -"all option names and values are limited to 255 bytes (not characters) " -"maximum." +"Prior to that release, options with multi-byte characters were corrupted.\n" +"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" +"all option names and values are limited to 255 bytes (not characters) maximum." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:610 @@ -13374,8 +11458,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:611 msgid "" "The following options are interpreted on the client side,\n" -"and will be interpreted if passed to the I2PSession via the " -"I2PClient.createSession() call.\n" +"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n" "The streaming lib should also pass these options through to I2CP.\n" "Other implementations may have different defaults." msgstr "" @@ -13451,28 +11534,24 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:871 msgid "" "Connect to the router using SSL.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:883 msgid "" "Router hostname.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:895 msgid "" "Router I2CP port.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:902 msgid "" -"Note: All arguments, including numbers, are strings. True/false values " -"are case-insensitive strings.\n" +"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n" "Anything other than case-insensitive \"true\" is interpreted as false.\n" "All option names are case-sensitive." msgstr "" @@ -13484,28 +11563,22 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:909 #, python-format msgid "" -"The end-to-end messages handled by I2CP (i.e. the data sent by the client" -" in a\n" +"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n" "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n" "and received by the client in a\n" "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n" "are gzipped with a standard 10-byte gzip\n" "header beginning with 0x1F 0x8B 0x08 as\n" -"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC " -"1952</a>.\n" -"As of release 0.7.1, I2P uses ignored portions of the gzip header to " -"include\n" -"protocol, from-port, and to-port information, thus supporting streaming " -"and\n" -"datagrams on the same destination, and allowing query/response using " -"datagrams\n" +"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n" +"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n" +"protocol, from-port, and to-port information, thus supporting streaming and\n" +"datagrams on the same destination, and allowing query/response using datagrams\n" "to work reliably in the presence of multiple channels." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:923 msgid "" -"The gzip function cannot be completely turned off, however setting " -"i2cp.gzip=false\n" +"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n" "turns the gzip effort setting to 0, which may save a little CPU." msgstr "" @@ -13539,7 +11612,8 @@ msgid "Gzip xflags" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:960 -msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" +msgid "" +"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:969 @@ -13564,8 +11638,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:987 #, python-format msgid "" -"Some improvements may be able to use messages previously defined but not " -"implemented.\n" +"Some improvements may be able to use messages previously defined but not implemented.\n" "For reference, here is the\n" "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n" "(PDF) dated August 28, 2003.\n" @@ -13584,12 +11657,9 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:6 msgid "" "The I2P Network Protocol (I2NP),\n" -"which is sandwiched between I2CP and the various I2P transport protocols," -" manages the\n" -"routing and mixing of messages between routers, as well as the selection " -"of what\n" -"transports to use when communicating with a peer for which there are " -"multiple\n" +"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n" +"routing and mixing of messages between routers, as well as the selection of what\n" +"transports to use when communicating with a peer for which there are multiple\n" "common transports supported." msgstr "" @@ -13599,20 +11669,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:15 msgid "" -"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-" -"router, point-to-point messages.\n" -"By encrypting and wrapping messages in other messages, they can be sent " -"in a secure way\n" +"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n" +"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n" "through multiple hops to the ultimate destination.\n" -"Priority is only used locally at the origin, i.e. when queuing for " -"outbound delivery." +"Priority is only used locally at the origin, i.e. when queuing for outbound delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:22 #, python-format msgid "" -"The priorities listed below may not be current and are subject to change." -"\n" +"The priorities listed below may not be current and are subject to change.\n" "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n" "for the current priority settings.\n" "Priority queueing implementation may vary." @@ -13624,8 +11690,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:31 msgid "" -"The following table specifies the traditional 16-byte header used in " -"NTCP.\n" +"The following table specifies the traditional 16-byte header used in NTCP.\n" "The SSU and NTCP2 transports use modified headers." msgstr "" @@ -13662,23 +11727,18 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:46 #, python-format msgid "" -"While the maximum payload size is nominally 64KB, the size is further " -"constrained by the\n" -"method of fragmenting I2NP messages into multiple 1KB tunnel messages as " -"described on\n" +"While the maximum payload size is nominally 64KB, the size is further constrained by the\n" +"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n" "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n" -"The maximum number of fragments is 64, and the message may not be " -"perfectly aligned,\n" +"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n" "So the message must nominally fit in 63 fragments." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:54 msgid "" -"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL " -"delivery mode);\n" +"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n" "the maximum size of a follow-on fragment is 996 bytes.\n" -"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 " -"bytes, or 61.2 KB." +"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:60 @@ -13686,16 +11746,13 @@ msgid "" "In addition, the transports may have additional restrictions.\n" "The NTCP limit is 16KB - 6 = 16378 bytes.\n" "The SSU limit is approximately 32 KB.\n" -"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher" -" than what a tunnel can support." +"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:67 msgid "" -"Note that these are not the limits for datagrams that the client sees, as" -" the\n" -"router may bundle a reply leaseset and/or session tags together with the " -"client message\n" +"Note that these are not the limits for datagrams that the client sees, as the\n" +"router may bundle a reply leaseset and/or session tags together with the client message\n" "in a garlic message. The leaseset and tags together may add about 5.5KB.\n" "Therefore the current datagram limit is about 10KB. This limit will be\n" "increased in a future release." @@ -13752,8 +11809,7 @@ msgid "" "Priority may vary.\n" "Size is 898 bytes for a typical 2-lease leaseSet.\n" "RouterInfo structures are compressed, and size varies; however\n" -"there is a continuing effort to reduce the amount of data published in a " -"RouterInfo\n" +"there is a continuing effort to reduce the amount of data published in a RouterInfo\n" "as we approach release 1.0." msgstr "" @@ -13763,8 +11819,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:150 msgid "" -"Used for message replies, and for testing tunnels - generally wrapped in " -"a GarlicMessage" +"Used for message replies, and for testing tunnels - generally wrapped in a " +"GarlicMessage" msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:158 @@ -13775,8 +11831,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:185 msgid "" -"The most common message. Priority for tunnel participants, outbound " -"endpoints, and inbound gateways was\n" +"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n" "reduced to 200 as of release 0.6.1.33.\n" "Outbound gateway messages (i.e. those originated locally) remains at 400." msgstr "" @@ -13807,16 +11862,13 @@ msgstr "" msgid "" "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n" "See also the\n" -"<a href=\"%(commonstructures)s\">Common Data Structure Specification " -"page</a>." +"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:234 msgid "" -"It isn't clear whether the current priority scheme is generally " -"effective,\n" -"and whether the priorities for various messages should be adjusted " -"further.\n" +"It isn't clear whether the current priority scheme is generally effective,\n" +"and whether the priorities for various messages should be adjusted further.\n" "This is a topic for further research, analysis and testing." msgstr "" @@ -13838,8 +11890,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:12 msgid "" "Each of the layers in the stack provides extra capabilities.\n" -"The capabilities are listed below, starting at the bottom of the protocol" -" stack." +"The capabilities are listed below, starting at the bottom of the protocol stack." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:18 @@ -13848,8 +11899,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:20 msgid "" -"IP: Internet Protocol, allow addressing hosts on the regular internet and" -" routing packets across the internet using best-effort delivery." +"IP: Internet Protocol, allow addressing hosts on the regular internet and " +"routing packets across the internet using best-effort delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:23 @@ -13870,11 +11921,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:30 msgid "" -"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P " -"routers. These are not anonymous yet, this is strictly a hop-to-hop " -"connection.\n" -"Two protocols are implemented to provide these capabilities. NTCP builds " -"on top of TCP, while SSU uses UDP." +"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n" +"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:35 @@ -13892,20 +11940,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:42 #, python-format msgid "" -"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are " -"large messages containing encrypted I2NP (see below) messages and " -"encrypted instructions for their delivery.\n" -"The encryption is layered. The first hop will decrypt the tunnel message " -"and read a part. Another part can still be encrypted (with another key)," -"\n" +"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n" +"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n" "so it will be forwarded." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:48 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" used to pass messages through multiple routers. These I2NP messages are " +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"used to pass messages through multiple routers. These I2NP messages are " "combined in tunnel messages." msgstr "" @@ -13918,54 +11962,51 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:55 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" wrapped in each other and used to ensure encryption between two tunnels " -"and are passed along from source to destination, keeping both anonymous." +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"wrapped in each other and used to ensure encryption between two tunnels and " +"are passed along from source to destination, keeping both anonymous." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:61 msgid "" -"The following layers are strictly speaking no longer part of the I2P " -"Protocol stack, they are not part of the core 'I2P router' functionality." -"\n" -"However, each of these layers adds additional functionality, to allow " -"applications simple and convenient I2P usage." +"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n" +"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:67 msgid "" -"<b>I2P Client Layer:</b> allow any client to use I2P functionality, " -"without requiring the direct use of the router API." +"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without " +"requiring the direct use of the router API." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:69 #, python-format msgid "" "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and " -"asynchronous messaging over I2P by communicating messages over the I2CP " -"TCP socket." +"asynchronous messaging over I2P by communicating messages over the I2CP TCP " +"socket." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:74 msgid "" -"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like " -"functionality on top of I2P." +"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality " +"on top of I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:76 #, python-format msgid "" -"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of " -"TCP-like streams over I2P. This allows easier porting of existing " -"applications to I2P." +"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-" +"like streams over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:80 #, python-format msgid "" "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-" -"like messages over I2P. This allows easier porting of existing " -"applications to I2P." +"like messages over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:85 @@ -13985,8 +12026,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:99 msgid "" -"Finally, what could be considered the <b>'I2P application layer'</b>, is " -"a large number of applications on top of I2P.\n" +"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n" "We can order this based on the I2P stack layer they use." msgstr "" @@ -14038,12 +12078,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:8 msgid "" -"A \"transport\" in I2P is a method for direct, point-to-point " -"communication\n" +"A \"transport\" in I2P is a method for direct, point-to-point communication\n" "between two routers.\n" "Transports must provide confidentiality and integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" +"against external adversaries while authenticating that the router contacted \n" "is the one who should receive a given message." msgstr "" @@ -14097,8 +12135,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:44 msgid "" "Maintain a set of router addresses, one or more for each transport,\n" -"that the router publishes as its global contact information (the " -"RouterInfo).\n" +"that the router publishes as its global contact information (the RouterInfo).\n" "Each transport may connect using one of these addresses, which may be\n" "IPv4 or (as of version 0.9.8) IPv6." msgstr "" @@ -14127,10 +12164,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:55 msgid "" -"Maintenance of connection limits for each transport, implementation of " -"various thresholds for these limits,\n" -"and communication of threshold status to the router so it may make " -"operational changes based on the status" +"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n" +"and communication of threshold status to the router so it may make operational changes based on the status" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:59 @@ -14149,27 +12184,26 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:62 msgid "" -"Coordination of firewall status and local IP, and changes to either, " -"among the transports" +"Coordination of firewall status and local IP, and changes to either, among " +"the transports" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:63 #: i2p2www/pages/site/docs/transport/ssu.html:35 msgid "" -"Communication of firewall status and local IP, and changes to either, to " -"the router and the user interface" +"Communication of firewall status and local IP, and changes to either, to the" +" router and the user interface" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:64 msgid "" -"Determination of a consensus clock, which is used to periodically update " -"the router's clock, as a backup for NTP" +"Determination of a consensus clock, which is used to periodically update the" +" router's clock, as a backup for NTP" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:65 msgid "" -"Maintenance of status for each peer, including whether it is connected, " -"whether it was recently connected,\n" +"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n" "and whether it was reachable in the last attempt" msgstr "" @@ -14179,8 +12213,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:70 msgid "" -"Honoring the automated and manual lists of banned peers maintained by the" -" router,\n" +"Honoring the automated and manual lists of banned peers maintained by the router,\n" "and refusing outbound and inbound connections to those peers" msgstr "" @@ -14190,10 +12223,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:79 msgid "" -"The transport subsystem maintains a set of router addresses, each of " -"which lists a transport method, IP, and port.\n" -"These addresses constitute the advertised contact points, and are " -"published by the router to the network database.\n" +"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n" +"These addresses constitute the advertised contact points, and are published by the router to the network database.\n" "Addresses may also contain an arbitrary set of additional options." msgstr "" @@ -14214,16 +12245,13 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:92 #, python-format msgid "" -"A router is firewalled, and therefore publishes an SSU address which " -"contains a list of cooperating\n" -"peers or \"introducers\" who will assist in NAT traversal (see <a " -"href=\"%(ssu)s\">the SSU spec</a> for details)" +"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n" +"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:96 msgid "" -"A router is not firewalled or its NAT ports are open; it publishes both " -"NTCP and SSU addresses containing\n" +"A router is not firewalled or its NAT ports are open; it publishes both NTCP and SSU addresses containing\n" "directly-accessible IP and ports." msgstr "" @@ -14234,10 +12262,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:104 #, python-format msgid "" -"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> " -"only. The transport selected for any message is\n" -"independent of the upper-layer protocols and contents (router or client " -"messages, whether an external application was using\n" +"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n" +"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n" "TCP or UDP to connect to I2P, whether the upper layer was using\n" "<a href=\"%(streaming)s\">the streaming library</a>\n" "streaming\n" @@ -14249,15 +12275,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:118 msgid "" -"For each outgoing message, the transport system solicits \"bids\" from " -"each transport.\n" -"The transport bidding the lowest (best) value wins the bid and receives " -"the message for delivery.\n" +"For each outgoing message, the transport system solicits \"bids\" from each transport.\n" +"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n" "A transport may refuse to bid." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:124 -msgid "Whether a transport bids, and with what value, depend on numerous factors:" +msgid "" +"Whether a transport bids, and with what value, depend on numerous factors:" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:128 @@ -14280,8 +12305,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:132 msgid "" -"The size of the message, as different transports have different size " -"limits" +"The size of the message, as different transports have different size limits" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:133 @@ -14291,7 +12315,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:134 -msgid "Whether the connection would be indirect (requiring introducers) or direct" +msgid "" +"Whether the connection would be indirect (requiring introducers) or direct" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:135 @@ -14300,8 +12325,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:138 msgid "" -"In general, the bid values are selected so that two routers are only " -"connected by a single transport\n" +"In general, the bid values are selected so that two routers are only connected by a single transport\n" "at any one time. However, this is not a requirement." msgstr "" @@ -14319,8 +12343,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:153 msgid "" -"An \"indirect\" transport for routers that are not reachable by all other" -" routers (one form of \"restricted routes\")" +"An \"indirect\" transport for routers that are not reachable by all other " +"routers (one form of \"restricted routes\")" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:154 @@ -14329,31 +12353,24 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:157 msgid "" -"Work continues on adjusting default connection limits for each transport." -"\n" -"I2P is designed as a \"mesh network\", where it is assumed that any " -"router can connect to any other router.\n" -"This assumption may be broken by routers that have exceeded their " -"connection limits, and by\n" +"Work continues on adjusting default connection limits for each transport.\n" +"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n" +"This assumption may be broken by routers that have exceeded their connection limits, and by\n" "routers that are behind restrictive state firewalls (restricted routes)." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:164 msgid "" -"The current connection limits are higher for SSU than for NTCP, based on " -"the assumption that\n" -"the memory requirements for an NTCP connection are higher than that for " -"SSU.\n" -"However, as NTCP buffers are partially in the kernel and SSU buffers are " -"on the Java heap,\n" +"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n" +"the memory requirements for an NTCP connection are higher than that for SSU.\n" +"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n" "that assumption is difficult to verify." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:171 #, python-format msgid "" -"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol " -"Obfuscation</a>\n" +"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n" "and see how transport-layer padding may improve things." msgstr "" @@ -14364,11 +12381,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:6 #, python-format msgid "" -"The others are <a href=\"%(ssu)s\">SSU</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>.\n" +"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n" "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n" -"Java NIO (new I/O) does not suffer from the 1 thread per connection " -"issues of the old TCP transport.\n" +"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n" "NTCP-over-IPv6 is supported as of version 0.9.8." msgstr "" @@ -14383,8 +12398,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:21 msgid "" -"The NTCP code within I2P is relatively lightweight (1/4 the size of the " -"SSU code)\n" +"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n" "because it uses the underlying Java TCP transport for reliable delivery." msgstr "" @@ -14409,21 +12423,17 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:47 msgid "" "After establishment,\n" -"the NTCP transport sends individual I2NP messages, with a simple " -"checksum.\n" +"the NTCP transport sends individual I2NP messages, with a simple checksum.\n" "The unencrypted message is encoded as follows:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:65 msgid "" -"The data is then AES/256/CBC encrypted. The session key for the " -"encryption\n" +"The data is then AES/256/CBC encrypted. The session key for the encryption\n" "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n" -"The establishment between two routers is implemented in the " -"EstablishState class\n" +"The establishment between two routers is implemented in the EstablishState class\n" "and detailed below.\n" -"The IV for AES/256/CBC encryption is the last 16 bytes of the previous " -"encrypted message." +"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:73 @@ -14447,8 +12457,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:93 msgid "" -"Total length: 16 bytes. The time sync message is sent at approximately 15" -" minute intervals.\n" +"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n" "The message is encrypted just as standard messages are." msgstr "" @@ -14471,14 +12480,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:107 #: i2p2www/pages/site/docs/transport/ssu.html:188 msgid "" -"Idle timeout and connection close is at the discretion of each endpoint " -"and may vary.\n" -"The current implementation lowers the timeout as the number of " -"connections approaches the\n" -"configured maximum, and raises the timeout when the connection count is " -"low.\n" -"The recommended minimum timeout is two minutes or more, and the " -"recommended\n" +"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n" +"The current implementation lowers the timeout as the number of connections approaches the\n" +"configured maximum, and raises the timeout when the connection count is low.\n" +"The recommended minimum timeout is two minutes or more, and the recommended\n" "maximum timeout is ten minutes or more." msgstr "" @@ -14489,12 +12494,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:117 msgid "" "After establishment, and every 30-60 minutes thereafter,\n" -"the two routers should generally exchange RouterInfos using a " -"DatabaseStoreMessage.\n" -"However, Alice should check if the first queued message is a " -"DatabaseStoreMessage\n" -"so as not to send a duplicate message; this is often the case when " -"connecting to a floodfill router." +"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n" +"However, Alice should check if the first queued message is a DatabaseStoreMessage\n" +"so as not to send a duplicate message; this is often the case when connecting to a floodfill router." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:125 @@ -14503,11 +12505,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:126 msgid "" -"In the establish state, there is a 4-phase message sequence to exchange " -"DH keys and signatures.\n" +"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n" "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n" -"Then, signatures of the critical data are exchanged to confirm the " -"connection." +"Then, signatures of the critical data are exchanged to confirm the connection." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:142 @@ -14545,15 +12545,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:159 msgid "" "The DH key exchange consists of a number of steps, displayed below.\n" -"The mapping between these steps and the messages sent between I2P " -"routers,\n" +"The mapping between these steps and the messages sent between I2P routers,\n" "is marked in bold." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:165 msgid "" -"Alice generates a secret integer x. She then calculates <code>X = g^x mod" -" p</code>." +"Alice generates a secret integer x. She then calculates <code>X = g^x mod " +"p</code>." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:166 @@ -14587,8 +12586,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:173 #, python-format msgid "" -"The sessionKey is then used to exchange identities in <b>Message 3</b> " -"and <b>Message 4</b>.\n" +"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n" "The exponent (x and y) length for the DH exchange is documented on the\n" "<a href=\"%(crypto)s#exponent\">cryptography page</a>." msgstr "" @@ -14601,8 +12599,7 @@ msgstr "" #, python-format msgid "" "This is the DH request. Alice already has Bob's\n" -"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router " -"Identity</a>,\n" +"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n" "IP address, and port, as contained in his\n" "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n" "which was published to the\n" @@ -14682,8 +12679,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:312 #, python-format msgid "" -"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" +"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" " the last 16 bytes of Y as the IV" msgstr "" @@ -14699,8 +12695,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:326 msgid "" -"This contains Alice's router identity, and a signature of the critical " -"data. Alice sends Bob:" +"This contains Alice's router identity, and a signature of the critical data." +" Alice sends Bob:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:360 @@ -14720,17 +12716,14 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Bob's `RouterIdentity`, tsA, tsB.\n" -" Alice signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in her `RouterIdentity`" +" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:389 #, python-format msgid "" -"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH" -" session key and\n" -" the last 16 bytes of HXxorHI (i.e., the last 16 bytes " -"of message #1) as the IV" +"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:400 @@ -14745,8 +12738,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:406 msgid "" -"Alice will use the last 16 bytes of the encrypted contents of this " -"message as the IV for the next message." +"Alice will use the last 16 bytes of the encrypted contents of this message " +"as the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:430 @@ -14761,19 +12754,15 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Alice's `RouterIdentity`, tsA, tsB.\n" -" Bob signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in his `RouterIdentity`" +" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:479 #, python-format msgid "" -"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" -" the last 16 bytes of the encrypted contents of message " -"#2 as the IV\n" -" 48 bytes for a DSA signature, may vary for other " -"signature types" +"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of the encrypted contents of message #2 as the IV\n" +" 48 bytes for a DSA signature, may vary for other signature types" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:488 @@ -14782,8 +12771,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:491 msgid "" -"Bob will use the last 16 bytes of the encrypted contents of this message " -"as the IV for the next message." +"Bob will use the last 16 bytes of the encrypted contents of this message as " +"the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:506 @@ -14792,14 +12781,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:507 msgid "" -"The connection is established, and standard or time sync messages may be " -"exchanged.\n" -"All subsequent messages are AES encrypted using the negotiated DH session" -" key.\n" -"Alice will use the last 16 bytes of the encrypted contents of message #3 " -"as the next IV.\n" -"Bob will use the last 16 bytes of the encrypted contents of message #4 as" -" the next IV." +"The connection is established, and standard or time sync messages may be exchanged.\n" +"All subsequent messages are AES encrypted using the negotiated DH session key.\n" +"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n" +"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:516 @@ -14826,8 +12811,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:528 msgid "" -"that many bytes making up the local router's IP address (as reached by " -"the remote side)" +"that many bytes making up the local router's IP address (as reached by the " +"remote side)" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:529 @@ -14846,8 +12831,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:532 msgid "" -"xor of the local router's identity hash and the SHA256 of bytes 32 " -"through bytes 223" +"xor of the local router's identity hash and the SHA256 of bytes 32 through " +"bytes 223" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:535 @@ -14870,11 +12855,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:550 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then.\n" -"However, there is currently no provision for padding beyond the next " -"16-byte boundary,\n" +"However, there is currently no provision for padding beyond the next 16-byte boundary,\n" "to create a limited number of message sizes." msgstr "" @@ -14897,28 +12880,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:7 #, python-format msgid "" -"SSU (also called \"UDP\" in much of the I2P documentation and user " -"interfaces)\n" -"is one of three <a href=\"%(transports)s\">transports</a> currently " -"implemented in I2P.\n" -"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>." +"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n" +"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n" +"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:13 msgid "" "SSU was introduced in I2P release 0.6.\n" -"In a standard I2P installation, the router uses both NTCP and SSU for " -"outbound connections.\n" +"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n" "SSU-over-IPv6 is supported as of version 0.9.8." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:19 msgid "" -"SSU is called \"semireliable\" because it will repeatedly retransmit " -"unacknowledged messages,\n" -"but only up to a maximum number of times. After that, the message is " -"dropped." +"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n" +"but only up to a maximum number of times. After that, the message is dropped." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:24 @@ -14927,10 +12904,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:26 msgid "" -"Like the NTCP transport, SSU provides reliable, encrypted, connection-" -"oriented, point-to-point data transport.\n" -"Unique to SSU, it also provides IP detection and NAT traversal services, " -"including:" +"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n" +"Unique to SSU, it also provides IP detection and NAT traversal services, including:" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:32 @@ -14947,8 +12922,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:34 msgid "" -"Communication of firewall status and local IP, and changes to either to " -"NTCP" +"Communication of firewall status and local IP, and changes to either to NTCP" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:46 @@ -14983,26 +12957,20 @@ msgid "" "Packets are scheduled according to the router's policy, taking care\n" "not to exceed the router's outbound capacity or to exceed the measured \n" "capacity of the remote peer. The measured capacity operates along the\n" -"lines of TCP's slow start and congestion avoidance, with additive " -"increases\n" -"to the sending capacity and multiplicative decreases in face of " -"congestion.\n" +"lines of TCP's slow start and congestion avoidance, with additive increases\n" +"to the sending capacity and multiplicative decreases in face of congestion.\n" "Unlike for TCP, routers may give up on some messages after\n" -"a given period or number of retransmissions while continuing to transmit" -" \n" +"a given period or number of retransmissions while continuing to transmit \n" "other messages." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:106 msgid "" "The congestion detection techniques vary from TCP as well, since each \n" -"message has its own unique and nonsequential identifier, and each message" -"\n" -"has a limited size - at most, 32KB. To efficiently transmit this " -"feedback\n" +"message has its own unique and nonsequential identifier, and each message\n" +"has a limited size - at most, 32KB. To efficiently transmit this feedback\n" "to the sender, the receiver periodically includes a list of fully ACKed \n" -"message identifiers and may also include bitfields for partially received" -"\n" +"message identifiers and may also include bitfields for partially received\n" "messages, where each bit represents the reception of a fragment. If \n" "duplicate fragments arrive, the message should be ACKed again, or if the\n" "message has still not been fully received, the bitfield should be \n" @@ -15012,8 +12980,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:118 msgid "" "The current implementation does not pad the packets to\n" -"any particular size, but instead just places a single message fragment " -"into\n" +"any particular size, but instead just places a single message fragment into\n" "a packet and sends it off (careful not to exceed the MTU)." msgstr "" @@ -15021,8 +12988,7 @@ msgstr "" msgid "" "As of router version 0.8.12,\n" "two MTU values are used for IPv4: 620 and 1484.\n" -"The MTU value is adjusted based on the percentage of packets that are " -"retransmitted." +"The MTU value is adjusted based on the percentage of packets that are retransmitted." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:131 @@ -15041,10 +13007,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:143 msgid "" -"Based on measurements, 1492 fits nearly all reasonably small I2NP " -"messages\n" -"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going " -"to fit\n" +"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n" +"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n" "into a live network MTU anyway)." msgstr "" @@ -15064,8 +13028,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:161 msgid "" -"As of release 0.9.2, if a router's network interface MTU is less than " -"1484,\n" +"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n" "it will publish that in the network database, and other routers should\n" "honor that when a connection is established." msgstr "" @@ -15085,13 +13048,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:175 msgid "" "While the maximum message size is nominally 32KB, the practical\n" -"limit differs. The protocol limits the number of fragments to 7 bits, or " -"128.\n" -"The current implementation, however, limits each message to a maximum of " -"64 fragments,\n" +"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n" +"The current implementation, however, limits each message to a maximum of 64 fragments,\n" "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n" -"Due to overhead for bundled LeaseSets and session keys, the practical " -"limit\n" +"Due to overhead for bundled LeaseSets and session keys, the practical limit\n" "at the application level is about 6KB lower, or about 26KB.\n" "Further work is necessary to raise the UDP transport limit above 32KB.\n" "For connections using the larger MTU, larger messages are possible." @@ -15105,8 +13065,7 @@ msgstr "" msgid "" "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n" "When Alice originates a session with Bob,\n" -"the MAC and session keys are negotiated as part of the DH exchange, and " -"are then used\n" +"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n" "for the HMAC and encryption, respectively. During the DH exchange, \n" "Bob's publicly knowable introKey is used for the MAC and encryption." msgstr "" @@ -15123,8 +13082,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:216 msgid "" -"Upon receiving a message, the receiver checks the \"from\" IP address and" -" port\n" +"Upon receiving a message, the receiver checks the \"from\" IP address and port\n" "with all established sessions - if there are matches,\n" "that session's MAC keys are tested in the HMAC. If none\n" "of those verify or if there are no matching IP addresses, the \n" @@ -15214,8 +13172,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:296 msgid "" -"Direct session establishment is used when no third party is required for " -"NAT traversal.\n" +"Direct session establishment is used when no third party is required for NAT traversal.\n" "The message sequence is as follows:" msgstr "" @@ -15235,10 +13192,8 @@ msgid "" "After the SessionConfirmed message is received, Bob sends a small\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n" "as a confirmation.\n" -"In this message, the 4-byte message ID is set to a random number, and the" -"\n" -"8-byte \"arrival time\" is set to the current network-wide ID, which is 2" -"\n" +"In this message, the 4-byte message ID is set to a random number, and the\n" +"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n" "(i.e. 0x0000000000000002)." msgstr "" @@ -15254,8 +13209,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:335 msgid "" -"It does not appear that the type of the status message or its contents " -"matters.\n" +"It does not appear that the type of the status message or its contents matters.\n" "It was originally added becasue the DatabaseStore message was delayed\n" "several seconds; since the store is now sent immediately, perhaps\n" "the status message can be eliminated." @@ -15265,8 +13219,7 @@ msgstr "" msgid "" "Introduction keys are delivered through an external channel \n" "(the network database),\n" -"where they have traditionally been identical to the router Hash through " -"release 0.9.47,\n" +"where they have traditionally been identical to the router Hash through release 0.9.47,\n" "but may be random as of release 0.9.48.\n" "They must be used when establishing a session key. For the indirect\n" "address, the peer must first contact the relayhost and ask them for\n" @@ -15285,24 +13238,16 @@ msgid "" "is necessary for efficient NAT traversal. Charlie, a router behind a\n" "NAT or firewall which does not allow unsolicited inbound UDP packets,\n" "first contacts a few peers, choosing some to serve as introducers. Each\n" -"of these peers (Bob, Bill, Betty, etc) provide Charlie with an " -"introduction\n" -"tag - a 4 byte random number - which he then makes available to the " -"public\n" -"as methods of contacting him. Alice, a router who has Charlie's " -"published\n" -"contact methods, first sends a RelayRequest packet to one or more of the" -" \n" +"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n" +"tag - a 4 byte random number - which he then makes available to the public\n" +"as methods of contacting him. Alice, a router who has Charlie's published\n" +"contact methods, first sends a RelayRequest packet to one or more of the \n" "introducers, asking each to introduce her to Charlie (offering the \n" "introduction tag to identify Charlie). Bob then forwards a RelayIntro\n" -"packet to Charlie including Alice's public IP and port number, then sends" -"\n" -"Alice back a RelayResponse packet containing Charlie's public IP and port" -"\n" -"number. When Charlie receives the RelayIntro packet, he sends off a " -"small\n" -"random packet to Alice's IP and port (poking a hole in his NAT/firewall)," -"\n" +"packet to Charlie including Alice's public IP and port number, then sends\n" +"Alice back a RelayResponse packet containing Charlie's public IP and port\n" +"number. When Charlie receives the RelayIntro packet, he sends off a small\n" +"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n" "and when Alice receives Bob's RelayResponse packet, she begins a new \n" "full direction session establishment with the specified IP and port." msgstr "" @@ -15312,20 +13257,21 @@ msgid "Connection establishment (indirect using an introducer)" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:389 -msgid "Alice first connects to introducer Bob, who relays the request to Charlie." +msgid "" +"Alice first connects to introducer Bob, who relays the request to Charlie." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:407 msgid "" -"After the hole punch, the session is established between Alice and " -"Charlie as in a direct establishment." +"After the hole punch, the session is established between Alice and Charlie " +"as in a direct establishment." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:422 +#: i2p2www/pages/site/docs/transport/ssu.html:427 msgid "Peer testing" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:424 +#: i2p2www/pages/site/docs/transport/ssu.html:429 msgid "" "The automation of collaborative reachability testing for peers is\n" "enabled by a sequence of PeerTest messages. With its proper \n" @@ -15334,7 +13280,7 @@ msgid "" "quite simple:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:443 +#: i2p2www/pages/site/docs/transport/ssu.html:448 msgid "" "Each of the PeerTest messages carry a nonce identifying the\n" "test series itself, as initialized by Alice. If Alice doesn't \n" @@ -15344,7 +13290,7 @@ msgid "" "that may be reached are as follows:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:453 +#: i2p2www/pages/site/docs/transport/ssu.html:458 msgid "" "If she doesn't receive a response from Bob, she will retransmit\n" "up to a certain number of times, but if no response ever arrives,\n" @@ -15354,7 +13300,7 @@ msgid "" "Charlie to reply." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:462 +#: i2p2www/pages/site/docs/transport/ssu.html:467 msgid "" "If Alice doesn't receive a PeerTest message with the \n" "expected nonce from a third party (Charlie), she will retransmit\n" @@ -15366,7 +13312,7 @@ msgid "" "IP and port that Bob offered up should be forwarded)." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:473 +#: i2p2www/pages/site/docs/transport/ssu.html:478 msgid "" "If Alice receives Bob's PeerTest message and both of Charlie's\n" "PeerTest messages but the enclosed IP and port numbers in Bob's \n" @@ -15377,7 +13323,7 @@ msgid "" "remote connectivity, ignoring further port discovery." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:483 +#: i2p2www/pages/site/docs/transport/ssu.html:488 msgid "" "If Alice receives Charlie's first message but not his second,\n" "she will retransmit her PeerTest message to Charlie up to a \n" @@ -15385,7 +13331,7 @@ msgid "" "that Charlie is either confused or no longer online." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:491 +#: i2p2www/pages/site/docs/transport/ssu.html:496 msgid "" "Alice should choose Bob arbitrarily from known peers who seem\n" "to be capable of participating in peer tests. Bob in turn should\n" @@ -15396,7 +13342,7 @@ msgid "" "to designate a new peer as Bob and try again with a different nonce." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:501 +#: i2p2www/pages/site/docs/transport/ssu.html:506 msgid "" "Alice's introduction key is included in all of the PeerTest \n" "messages so that she doesn't need to already have an established\n" @@ -15405,11 +13351,11 @@ msgid "" "with either Bob or Charlie, but it is not required." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:529 +#: i2p2www/pages/site/docs/transport/ssu.html:534 msgid "Transmission window, ACKs and Retransmissions" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:530 +#: i2p2www/pages/site/docs/transport/ssu.html:535 #, python-format msgid "" "The DATA message may contain ACKs of full messages and\n" @@ -15419,26 +13365,24 @@ msgid "" "for details." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:538 +#: i2p2www/pages/site/docs/transport/ssu.html:543 #, python-format msgid "" -"The details of windowing, ACK, and retransmission strategies are not " -"specified\n" +"The details of windowing, ACK, and retransmission strategies are not specified\n" "here. See the Java code for the current implementation.\n" "During the establishment phase, and for peer testing, routers\n" "should implement exponential backoff for retransmission.\n" "For an established connection, routers should implement\n" -"an adjustable transmission window, RTT estimate and timeout, similar to " -"TCP\n" +"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n" "or <a href=\"%(streaming)s\">streaming</a>.\n" "See the code for initial, min and max parameters." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:550 +#: i2p2www/pages/site/docs/transport/ssu.html:555 msgid "Security" msgstr "TÉ™hlükÉ™sizlik" -#: i2p2www/pages/site/docs/transport/ssu.html:551 +#: i2p2www/pages/site/docs/transport/ssu.html:556 msgid "" "UDP source addresses may, of course, be spoofed.\n" "Additionally, the IPs and ports contained inside specific\n" @@ -15447,108 +13391,98 @@ msgid "" "Also, certain actions and responses may need to be rate-limited." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:559 +#: i2p2www/pages/site/docs/transport/ssu.html:564 msgid "" "The details of validation are not specified\n" "here. Implementers should add defenses where appropriate." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:565 +#: i2p2www/pages/site/docs/transport/ssu.html:570 msgid "Peer capabilities" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:575 +#: i2p2www/pages/site/docs/transport/ssu.html:580 msgid "" "If the peer address contains the 'B' capability, that means \n" "they are willing and able to participate in peer tests as\n" "a 'Bob' or 'Charlie'." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:612 +#: i2p2www/pages/site/docs/transport/ssu.html:617 msgid "" -"Analysis of current SSU performance, including assessment of window size " -"adjustment\n" -"and other parameters, and adjustment of the protocol implementation to " -"improve\n" +"Analysis of current SSU performance, including assessment of window size adjustment\n" +"and other parameters, and adjustment of the protocol implementation to improve\n" "performance, is a topic for future work." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:618 +#: i2p2www/pages/site/docs/transport/ssu.html:623 msgid "" -"The current implementation repeatedly sends acknowledgments for the same " -"packets,\n" +"The current implementation repeatedly sends acknowledgments for the same packets,\n" "which unnecessarily increases overhead." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:623 +#: i2p2www/pages/site/docs/transport/ssu.html:628 msgid "" -"The default small MTU value of 620 should be analyzed and possibly " -"increased.\n" +"The default small MTU value of 620 should be analyzed and possibly increased.\n" "The current MTU adjustment strategy should be evaluated.\n" -"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? " -"Probably not." +"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:629 +#: i2p2www/pages/site/docs/transport/ssu.html:634 msgid "The protocol should be extended to exchange MTUs during the setup." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:633 +#: i2p2www/pages/site/docs/transport/ssu.html:638 msgid "Rekeying is currently unimplemented and may never be." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:637 +#: i2p2www/pages/site/docs/transport/ssu.html:642 msgid "" -"The potential use of the 'challenge' fields in RelayIntro and " -"RelayResponse,\n" -"and use of the padding field in SessionRequest and SessionCreated, is " -"undocumented." +"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n" +"and use of the padding field in SessionRequest and SessionCreated, is undocumented." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:642 +#: i2p2www/pages/site/docs/transport/ssu.html:647 msgid "" "Instead of a single fragment per packet, a more efficient\n" -"strategy may be to bundle multiple message fragments into the same " -"packet,\n" +"strategy may be to bundle multiple message fragments into the same packet,\n" "so long as it doesn't exceed the MTU." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:648 +#: i2p2www/pages/site/docs/transport/ssu.html:653 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:654 +#: i2p2www/pages/site/docs/transport/ssu.html:659 msgid "" -"Why are introduction keys the same as the router hash, should it be " -"changed, would there be any benefit?" +"Why are introduction keys the same as the router hash, should it be changed," +" would there be any benefit?" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:658 +#: i2p2www/pages/site/docs/transport/ssu.html:663 msgid "Capacities appear to be unused." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:662 +#: i2p2www/pages/site/docs/transport/ssu.html:667 msgid "" -"Signed-on times in SessionCreated and SessionConfirmed appear to be " -"unused or unverified." +"Signed-on times in SessionCreated and SessionConfirmed appear to be unused " +"or unverified." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:667 +#: i2p2www/pages/site/docs/transport/ssu.html:672 msgid "Implementation Diagram" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:668 +#: i2p2www/pages/site/docs/transport/ssu.html:673 msgid "" "This diagram\n" -"should accurately reflect the current implementation, however there may " -"be small differences." +"should accurately reflect the current implementation, however there may be small differences." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:676 +#: i2p2www/pages/site/docs/transport/ssu.html:681 msgid "Now on the SSU specification page" msgstr "" @@ -15569,12 +13503,9 @@ msgid "" "Within I2P, messages are passed in one direction through a virtual\n" "tunnel of peers, using whatever means are available to pass the \n" "message on to the next hop. Messages arrive at the tunnel's \n" -"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel " -"messages, \n" -"and are forwarded on to the next hop in the tunnel, which processes and " -"verifies\n" -"the validity of the message and sends it on to the next hop, and so on, " -"until\n" +"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n" +"and are forwarded on to the next hop in the tunnel, which processes and verifies\n" +"the validity of the message and sends it on to the next hop, and so on, until\n" "it reaches the tunnel endpoint. That <i>endpoint</i> takes the messages\n" "bundled up by the gateway and forwards them as instructed - either\n" "to another router, to another tunnel on another router, or locally." @@ -15596,12 +13527,9 @@ msgid "" "in the tunnel, and provides each with the necessary configuration\n" "data. They may have any number of hops.\n" "It is the intent to make\n" -"it hard for either participants or third parties to determine the length " -"of \n" -"a tunnel, or even for colluding participants to determine whether they " -"are a\n" -"part of the same tunnel at all (barring the situation where colluding " -"peers are\n" +"it hard for either participants or third parties to determine the length of \n" +"a tunnel, or even for colluding participants to determine whether they are a\n" +"part of the same tunnel at all (barring the situation where colluding peers are\n" "next to each other in the tunnel)." msgstr "" @@ -15639,8 +13567,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:69 #, python-format msgid "" -"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are " -"processed and passed through it.\n" +"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n" "Tunnel operation has four distinct processes, taken on by various \n" "peers in the tunnel." msgstr "" @@ -15667,8 +13594,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:89 msgid "" -"Eventually, the tunnel messages arrive at the endpoint where the I2NP " -"messages\n" +"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n" "originally bundled by the gateway are reassembled and forwarded on as \n" "requested." msgstr "" @@ -15728,11 +13654,13 @@ msgid "Decrypt (using an encryption operation)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:133 -msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message" +msgid "" +"Decrypt (using an encryption operation) to reveal plaintext tunnel message" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:134 -msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" +msgid "" +"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:142 @@ -15793,10 +13721,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:181 msgid "" "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n" -"tunnel ID to listen for messages with and what tunnel ID they should be " -"forwarded\n" -"on as to the next hop, and each hop chooses the tunnel ID which they " -"receive messages\n" +"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n" +"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n" "on. Tunnels themselves are short-lived (10 minutes).\n" "Even if subsequent tunnels are built using the same sequence of \n" "peers, each hop's tunnel ID will change." @@ -15804,16 +13730,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:190 msgid "" -"To prevent adversaries from tagging the messages along the path by " -"adjusting\n" -"the message size, all tunnel messages are a fixed 1024 bytes in size. To" -" accommodate \n" -"larger I2NP messages as well as to support smaller ones more efficiently," -" the\n" -"gateway splits up the larger I2NP messages into fragments contained " -"within each\n" -"tunnel message. The endpoint will attempt to rebuild the I2NP message " -"from the\n" +"To prevent adversaries from tagging the messages along the path by adjusting\n" +"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n" +"larger I2NP messages as well as to support smaller ones more efficiently, the\n" +"gateway splits up the larger I2NP messages into fragments contained within each\n" +"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n" "fragments for a short period of time, but will discard them as necessary." msgstr "" @@ -15830,30 +13751,20 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:207 msgid "" -"After the preprocessing of messages into a padded payload, the gateway " -"builds\n" -"a random 16 byte IV value, iteratively encrypting it and the tunnel " -"message as\n" -"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel " -"message} to the next hop." +"After the preprocessing of messages into a padded payload, the gateway builds\n" +"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n" +"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:213 msgid "" -"How encryption at the gateway is done depends on whether the tunnel is an" -"\n" -"inbound or an outbound tunnel. For inbound tunnels, they simply select a" -" random\n" -"IV, postprocessing and updating it to generate the IV for the gateway and" -" using \n" -"that IV along side their own layer key to encrypt the preprocessed data." -" For outbound \n" -"tunnels they must iteratively decrypt the (unencrypted) IV and " -"preprocessed \n" -"data with the IV and layer keys for all hops in the tunnel. The result " -"of the outbound\n" -"tunnel encryption is that when each peer encrypts it, the endpoint will " -"recover \n" +"How encryption at the gateway is done depends on whether the tunnel is an\n" +"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n" +"IV, postprocessing and updating it to generate the IV for the gateway and using \n" +"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n" +"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n" +"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n" +"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n" "the initial preprocessed data." msgstr "" @@ -15863,46 +13774,29 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:227 msgid "" -"When a peer receives a tunnel message, it checks that the message came " -"from\n" -"the same previous hop as before (initialized when the first message comes" -" through\n" -"the tunnel). If the previous peer is a different router, or if the " -"message has\n" -"already been seen, the message is dropped. The participant then encrypts" -" the \n" -"received IV with AES256/ECB using their IV key to determine the current " -"IV, uses \n" -"that IV with the participant's layer key to encrypt the data, encrypts " -"the \n" -"current IV with AES256/ECB using their IV key again, then forwards the " -"tuple \n" -"{nextTunnelId, nextIV, encryptedData} to the next hop. This double " -"encryption\n" +"When a peer receives a tunnel message, it checks that the message came from\n" +"the same previous hop as before (initialized when the first message comes through\n" +"the tunnel). If the previous peer is a different router, or if the message has\n" +"already been seen, the message is dropped. The participant then encrypts the \n" +"received IV with AES256/ECB using their IV key to determine the current IV, uses \n" +"that IV with the participant's layer key to encrypt the data, encrypts the \n" +"current IV with AES256/ECB using their IV key again, then forwards the tuple \n" +"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n" "of the IV (both before and after use) help address a certain class of\n" "confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:243 msgid "" -"Duplicate message detection is handled by a decaying Bloom filter on " -"message\n" -"IVs. Each router maintains a single Bloom filter to contain the XOR of " -"the IV and\n" -"the first block of the message received for all of the tunnels it is " -"participating\n" -"in, modified to drop seen entries after 10-20 minutes (when the tunnels " -"will have\n" -"expired). The size of the bloom filter and the parameters used are " -"sufficient to\n" -"more than saturate the router's network connection with a negligible " -"chance of \n" -"false positive. The unique value fed into the Bloom filter is the XOR of" -" the IV \n" -"and the first block so as to prevent nonsequential colluding peers in the" -" tunnel \n" -"from tagging a message by resending it with the IV and first block " -"switched." +"Duplicate message detection is handled by a decaying Bloom filter on message\n" +"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n" +"the first block of the message received for all of the tunnels it is participating\n" +"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n" +"expired). The size of the bloom filter and the parameters used are sufficient to\n" +"more than saturate the router's network connection with a negligible chance of \n" +"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n" +"and the first block so as to prevent nonsequential colluding peers in the tunnel \n" +"from tagging a message by resending it with the IV and first block switched." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:256 @@ -15911,27 +13805,19 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:258 msgid "" -"After receiving and validating a tunnel message at the last hop in the " -"tunnel,\n" -"how the endpoint recovers the data encoded by the gateway depends upon " -"whether \n" -"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, " -"the \n" -"endpoint encrypts the message with its layer key just like any other " -"participant, \n" -"exposing the preprocessed data. For inbound tunnels, the endpoint is " -"also the \n" -"tunnel creator so they can merely iteratively decrypt the IV and message," -" using the \n" +"After receiving and validating a tunnel message at the last hop in the tunnel,\n" +"how the endpoint recovers the data encoded by the gateway depends upon whether \n" +"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n" +"endpoint encrypts the message with its layer key just like any other participant, \n" +"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n" +"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n" "layer and IV keys of each step in reverse order." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:268 msgid "" -"At this point, the tunnel endpoint has the preprocessed data sent by the " -"gateway,\n" -"which it may then parse out into the included I2NP messages and forwards " -"them as\n" +"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n" +"which it may then parse out into the included I2NP messages and forwards them as\n" "requested in their delivery instructions." msgstr "" @@ -15941,30 +13827,21 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:277 msgid "" -"When building a tunnel, the creator must send a request with the " -"necessary\n" -"configuration data to each of the hops and wait for all of them to agree " -"before\n" -"enabling the tunnel. The requests are encrypted so that only the peers " -"who need\n" -"to know a piece of information (such as the tunnel layer or IV key) has " -"that\n" -"data. In addition, only the tunnel creator will have access to the " -"peer's\n" -"reply. There are three important dimensions to keep in mind when " -"producing\n" -"the tunnels: what peers are used (and where), how the requests are sent " -"(and \n" +"When building a tunnel, the creator must send a request with the necessary\n" +"configuration data to each of the hops and wait for all of them to agree before\n" +"enabling the tunnel. The requests are encrypted so that only the peers who need\n" +"to know a piece of information (such as the tunnel layer or IV key) has that\n" +"data. In addition, only the tunnel creator will have access to the peer's\n" +"reply. There are three important dimensions to keep in mind when producing\n" +"the tunnels: what peers are used (and where), how the requests are sent (and \n" "replies received), and how they are maintained." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:291 msgid "" -"Beyond the two types of tunnels - inbound and outbound - there are two " -"styles\n" +"Beyond the two types of tunnels - inbound and outbound - there are two styles\n" "of peer selection used for different tunnels - exploratory and client.\n" -"Exploratory tunnels are used for both network database maintenance and " -"tunnel\n" +"Exploratory tunnels are used for both network database maintenance and tunnel\n" "maintenance, while client tunnels are used for end to end client messages." msgstr "" @@ -15974,18 +13851,12 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:301 msgid "" -"Exploratory tunnels are built out of a random selection of peers from a " -"subset\n" -"of the network. The particular subset varies on the local router and on " -"what their\n" -"tunnel routing needs are. In general, the exploratory tunnels are built " -"out of\n" -"randomly selected peers who are in the peer's \"not failing but active\" " -"profile\n" -"category. The secondary purpose of the tunnels, beyond merely tunnel " -"routing,\n" -"is to find underutilized high capacity peers so that they can be promoted" -" for\n" +"Exploratory tunnels are built out of a random selection of peers from a subset\n" +"of the network. The particular subset varies on the local router and on what their\n" +"tunnel routing needs are. In general, the exploratory tunnels are built out of\n" +"randomly selected peers who are in the peer's \"not failing but active\" profile\n" +"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n" +"is to find underutilized high capacity peers so that they can be promoted for\n" "use in client tunnels." msgstr "" @@ -16002,14 +13873,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:319 msgid "" -"Client tunnels are built with a more stringent set of requirements - the " -"local\n" -"router will select peers out of its \"fast and high capacity\" profile " -"category so\n" -"that performance and reliability will meet the needs of the client " -"application.\n" -"However, there are several important details beyond that basic selection " -"that \n" +"Client tunnels are built with a more stringent set of requirements - the local\n" +"router will select peers out of its \"fast and high capacity\" profile category so\n" +"that performance and reliability will meet the needs of the client application.\n" +"However, there are several important details beyond that basic selection that \n" "should be adhered to, depending upon the client's anonymity needs." msgstr "" @@ -16035,10 +13902,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:341 msgid "" "To frustrate the predecessor \n" -"attack, the tunnel selection keeps the peers selected in a strict order -" -"\n" -"if A, B, and C are in a tunnel for a particular tunnel pool, the hop " -"after A is always B, and the hop after\n" +"attack, the tunnel selection keeps the peers selected in a strict order -\n" +"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n" "B is always C." msgstr "" @@ -16047,18 +13912,15 @@ msgid "" "Ordering is implemented by generating a random 32-byte key for each\n" "tunnel pool at startup.\n" "Peers should not be able to guess the ordering, or an attacker could\n" -"craft two router hashes far apart to maximize the chance of being at both" -"\n" +"craft two router hashes far apart to maximize the chance of being at both\n" "ends of a tunnel.\n" "Peers are sorted by XOR distance of the\n" -"SHA256 Hash of (the peer's hash concatenated with the random key) from " -"the random key" +"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:363 msgid "" -"Because each tunnel pool uses a different random key, ordering is " -"consistent\n" +"Because each tunnel pool uses a different random key, ordering is consistent\n" "within a single pool but not between different pools.\n" "New keys are generated at each router restart." msgstr "" @@ -16070,8 +13932,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:372 #, python-format msgid "" -"A multi-hop tunnel is built using a single build message which is " -"repeatedly\n" +"A multi-hop tunnel is built using a single build message which is repeatedly\n" "decrypted and forwarded. In the terminology of\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n" "this is \"non-interactive\" telescopic tunnel building." @@ -16082,38 +13943,28 @@ msgstr "" msgid "" "This tunnel request preparation, delivery, and response method is\n" "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n" -"predecessors exposed, cuts the number of messages transmitted, verifies " -"proper\n" -"connectivity, and avoids the message counting attack of traditional " -"telescopic\n" +"predecessors exposed, cuts the number of messages transmitted, verifies proper\n" +"connectivity, and avoids the message counting attack of traditional telescopic\n" "tunnel creation.\n" -"(This method, which sends messages to extend a tunnel through the " -"already-established\n" -"part of the tunnel, is termed \"interactive\" telescopic tunnel building " -"in\n" +"(This method, which sends messages to extend a tunnel through the already-established\n" +"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n" "the \"Hashing it out\" paper.)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:390 #, python-format msgid "" -"The details of tunnel request and response messages, and their " -"encryption,\n" +"The details of tunnel request and response messages, and their encryption,\n" "<a href=\"%(tunnelcreation)s\">are specified here</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:395 msgid "" -"Peers may reject tunnel creation requests for a variety of reasons, " -"though\n" -"a series of four increasingly severe rejections are known: probabilistic " -"rejection\n" -"(due to approaching the router's capacity, or in response to a flood of " -"requests), \n" -"transient overload, bandwidth overload, and critical failure. When " -"received, \n" -"those four are interpreted by the tunnel creator to help adjust their " -"profile of\n" +"Peers may reject tunnel creation requests for a variety of reasons, though\n" +"a series of four increasingly severe rejections are known: probabilistic rejection\n" +"(due to approaching the router's capacity, or in response to a flood of requests), \n" +"transient overload, bandwidth overload, and critical failure. When received, \n" +"those four are interpreted by the tunnel creator to help adjust their profile of\n" "the router in question." msgstr "" @@ -16131,37 +13982,26 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:412 #, python-format msgid "" -"To allow efficient operation, the router maintains a series of tunnel " -"pools,\n" -"each managing a group of tunnels used for a specific purpose with their " -"own\n" -"configuration. When a tunnel is needed for that purpose, the router " -"selects one\n" -"out of the appropriate pool at random. Overall, there are two " -"exploratory tunnel\n" -"pools - one inbound and one outbound - each using the router's default " -"configuration.\n" +"To allow efficient operation, the router maintains a series of tunnel pools,\n" +"each managing a group of tunnels used for a specific purpose with their own\n" +"configuration. When a tunnel is needed for that purpose, the router selects one\n" +"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n" +"pools - one inbound and one outbound - each using the router's default configuration.\n" "In addition, there is a pair of pools for each local destination -\n" -"one inbound and one outbound tunnel pool. Those pools use the " -"configuration specified\n" -"when the local destination connects to the router via <a " -"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" +"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n" +"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" "not specified." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:424 #, python-format msgid "" -"Each pool has within its configuration a few key settings, defining how " -"many\n" -"tunnels to keep active, how many backup tunnels to maintain in case of " -"failure,\n" +"Each pool has within its configuration a few key settings, defining how many\n" +"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n" "how long the tunnels should be, whether those\n" "lengths should be randomized, as \n" -"well as any of the other settings allowed when configuring individual " -"tunnels.\n" -"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP " -"page</a>." +"well as any of the other settings allowed when configuring individual tunnels.\n" +"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:434 @@ -16178,20 +14018,14 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:440 msgid "" -"Tunnel building is expensive, and tunnels expire a fixed time after they " -"are built.\n" -"However, when a pool that runs out of tunnels, the Destination is " -"essentially dead.\n" -"In addition, tunnel build success rate may vary greatly with both local " -"and global\n" +"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n" +"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n" +"In addition, tunnel build success rate may vary greatly with both local and global\n" "network conditions.\n" -"Therefore, it is important to maintain an anticipatory, adaptive build " -"strategy\n" -"to ensure that new tunnels are successfully built before they are needed," -"\n" +"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n" +"to ensure that new tunnels are successfully built before they are needed,\n" "without building an excess of tunnels, building them too soon,\n" -"or consuming too much CPU or bandwidth creating and sending the encrypted" -" build messages." +"or consuming too much CPU or bandwidth creating and sending the encrypted build messages." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:451 @@ -16199,8 +14033,7 @@ msgid "" "For each tuple {exploratory/client, in/out, length, length variance}\n" "the router maintains statistics on the time required for a successful\n" "tunnel build.\n" -"Using these statistics, it calculates how long before a tunnel's " -"expiration\n" +"Using these statistics, it calculates how long before a tunnel's expiration\n" "it should start attempting to build a replacement.\n" "As the expiration time approaches without a successful replacement,\n" "it starts multiple build attempts in parallel, and then\n" @@ -16222,30 +14055,18 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:473 msgid "" -"Even though the tunnels within I2P bear a resemblance to a circuit " -"switched\n" -"network, everything within I2P is strictly message based - tunnels are " -"merely\n" -"accounting tricks to help organize the delivery of messages. No " -"assumptions are\n" -"made regarding reliability or ordering of messages, and retransmissions " -"are left\n" -"to higher levels (e.g. I2P's client layer streaming library). This " -"allows I2P\n" -"to take advantage of throttling techniques available to both packet " -"switched and\n" -"circuit switched networks. For instance, each router may keep track of " -"the \n" -"moving average of how much data each tunnel is using, combine that with " -"all of \n" -"the averages used by other tunnels the router is participating in, and be" -" able\n" -"to accept or reject additional tunnel participation requests based on its" -" \n" -"capacity and utilization. On the other hand, each router can simply drop" -" \n" -"messages that are beyond its capacity, exploiting the research used on " -"the \n" +"Even though the tunnels within I2P bear a resemblance to a circuit switched\n" +"network, everything within I2P is strictly message based - tunnels are merely\n" +"accounting tricks to help organize the delivery of messages. No assumptions are\n" +"made regarding reliability or ordering of messages, and retransmissions are left\n" +"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n" +"to take advantage of throttling techniques available to both packet switched and\n" +"circuit switched networks. For instance, each router may keep track of the \n" +"moving average of how much data each tunnel is using, combine that with all of \n" +"the averages used by other tunnels the router is participating in, and be able\n" +"to accept or reject additional tunnel participation requests based on its \n" +"capacity and utilization. On the other hand, each router can simply drop \n" +"messages that are beyond its capacity, exploiting the research used on the \n" "normal Internet." msgstr "" @@ -16253,23 +14074,16 @@ msgstr "" msgid "" "In the current implementation, routers implement a\n" "weighted random early discard (WRED) strategy.\n" -"For all participating routers (internal participant, inbound gateway, and" -" outbound endpoint),\n" +"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n" "the router will start randomly dropping a portion of messages as the\n" "bandwidth limits are approached.\n" -"As traffic gets closer to, or exceeds, the limits, more messages are " -"dropped.\n" -"For an internal participant, all messages are fragmented and padded and " -"therefore are the same size.\n" -"At the inbound gateway and outbound endpoint, however, the dropping " -"decision is made\n" -"on the full (coalesced) message, and the message size is taken into " -"account.\n" +"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n" +"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n" +"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n" +"on the full (coalesced) message, and the message size is taken into account.\n" "Larger messages are more likely to be dropped.\n" -"Also, messages are more likely to be dropped at the outbound endpoint " -"than the inbound gateway,\n" -"as those messages are not as \"far along\" in their journey and thus the " -"network cost of\n" +"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n" +"as those messages are not as \"far along\" in their journey and thus the network cost of\n" "dropping those messages is lower." msgstr "" @@ -16279,16 +14093,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:509 msgid "" -"What strategies could be used at the gateway and at each hop for " -"delaying,\n" -"reordering, rerouting, or padding messages? To what extent should this " -"be done\n" -"automatically, how much should be configured as a per tunnel or per hop " -"setting,\n" -"and how should the tunnel's creator (and in turn, user) control this " -"operation?\n" -"All of this is left as unknown, to be worked out for a distant future " -"release." +"What strategies could be used at the gateway and at each hop for delaying,\n" +"reordering, rerouting, or padding messages? To what extent should this be done\n" +"automatically, how much should be configured as a per tunnel or per hop setting,\n" +"and how should the tunnel's creator (and in turn, user) control this operation?\n" +"All of this is left as unknown, to be worked out for a distant future release." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:518 @@ -16297,13 +14106,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:519 msgid "" -"The padding strategies can be used on a variety of levels, addressing the" -"\n" +"The padding strategies can be used on a variety of levels, addressing the\n" "exposure of message size information to different adversaries.\n" -"The current fixed tunnel message size is 1024 bytes. Within this " -"however, the fragmented\n" -"messages themselves are not padded by the tunnel at all, though for end " -"to end \n" +"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n" +"messages themselves are not padded by the tunnel at all, though for end to end \n" "messages, they may be padded as part of the garlic wrapping." msgstr "" @@ -16331,8 +14137,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7 msgid "" -"This page describes the origins and design of I2P's unidirectional " -"tunnels.\n" +"This page describes the origins and design of I2P's unidirectional tunnels.\n" "For further information see:" msgstr "" @@ -16366,8 +14171,7 @@ msgid "" "Several apps and protocols, notably HTTP,\n" "do transfer data in such manner. Having the traffic follow the same \n" "route to its destination and back could make it easier for an \n" -"attacker who has only timing and traffic volume data to infer the path a" -" \n" +"attacker who has only timing and traffic volume data to infer the path a \n" "tunnel is taking.\n" "Having the response come back along a different path arguably \n" "makes it harder." @@ -16376,42 +14180,27 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45 msgid "" "When dealing with \n" -"an internal adversary or most external adversaries, I2P's undirectional " -"tunnels\n" -"expose half as much traffic data than would be exposed with bidirectional" -" circuits\n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels." +"an internal adversary or most external adversaries, I2P's undirectional tunnels\n" +"expose half as much traffic data than would be exposed with bidirectional circuits\n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55 msgid "" "The strategy of using two separate tunnels for inbound and outbound\n" -"communication is not the only technique available, and it does have " -"anonymity\n" -"implications. On the positive side, by using separate tunnels it lessens" -" the\n" -"traffic data exposed for analysis to participants in a tunnel - for " -"instance,\n" -"peers in an outbound tunnel from a web browser would only see the traffic" -" of\n" +"communication is not the only technique available, and it does have anonymity\n" +"implications. On the positive side, by using separate tunnels it lessens the\n" +"traffic data exposed for analysis to participants in a tunnel - for instance,\n" +"peers in an outbound tunnel from a web browser would only see the traffic of\n" "an HTTP GET, while the peers in an inbound tunnel would see the payload \n" -"delivered along the tunnel. With bidirectional tunnels, all participants" -" would\n" -"have access to the fact that e.g. 1KB was sent in one direction, then " -"100KB\n" -"in the other. On the negative side, using unidirectional tunnels means " -"that\n" -"there are two sets of peers which need to be profiled and accounted for, " -"and\n" -"additional care must be taken to address the increased speed of " -"predecessor\n" +"delivered along the tunnel. With bidirectional tunnels, all participants would\n" +"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n" +"in the other. On the negative side, using unidirectional tunnels means that\n" +"there are two sets of peers which need to be profiled and accounted for, and\n" +"additional care must be taken to address the increased speed of predecessor\n" "attacks. The tunnel pooling and building process\n" "(peer selection and ordering strategies)\n" "should minimize the worries of the predecessor attack." @@ -16425,28 +14214,22 @@ msgstr "" #, python-format msgid "" "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n" -"declared that I2P's unidirectional tunnels \"seems to be a bad design " -"decision\"." +"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80 msgid "" "The paper's main point is that\n" -"deanonymizations on unidirectional tunnels take a longer time, which is " -"an \n" -"advantage, but that an attacker can be more certain in the unidirectional" -" case. \n" -"Therefore, the paper claims it isn't an advantage at all, but a " -"disadvantage, at least\n" +"deanonymizations on unidirectional tunnels take a longer time, which is an \n" +"advantage, but that an attacker can be more certain in the unidirectional case. \n" +"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n" "with long-living I2P Sites." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88 msgid "" -"This conclusion is not fully supported by the paper. Unidirectional " -"tunnels clearly \n" -"mitigate other attacks and it's not clear how to trade off the risk of " -"the \n" +"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n" +"mitigate other attacks and it's not clear how to trade off the risk of the \n" "attack in the paper\n" "with attacks on a bidirectional tunnel architecture." msgstr "" @@ -16455,63 +14238,45 @@ msgstr "" msgid "" "This conclusion is based on an arbitrary certainty vs. time weighting \n" "(tradeoff) that may not be applicable in all cases. For \n" -"example, somebody could make a list of possible IPs then issue subpoenas " -"to \n" +"example, somebody could make a list of possible IPs then issue subpoenas to \n" "each. Or the attacker could DDoS each in turn and via a simple \n" -"intersection attack see if the I2P Site goes down or is slowed down. So " -"close \n" +"intersection attack see if the I2P Site goes down or is slowed down. So close \n" "may be good enough, or time may be more important." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104 msgid "" -"The conclusion is based on a specific weighting of the importance of " -"certainty \n" -"vs. time, and that weighting may be wrong, and it's definitely debatable," -" \n" -"especially in a real world with subpoenas, search warrants, and other " -"methods \n" +"The conclusion is based on a specific weighting of the importance of certainty \n" +"vs. time, and that weighting may be wrong, and it's definitely debatable, \n" +"especially in a real world with subpoenas, search warrants, and other methods \n" "available for final confirmation." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111 msgid "" "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n" -"tunnels is clearly outside the scope of the paper, and has not been done" -" \n" -"elsewhere. For example, how does this attack compare to the numerous " -"possible \n" -"timing attacks published about onion-routed networks? Clearly the authors" -" have not\n" +"tunnels is clearly outside the scope of the paper, and has not been done \n" +"elsewhere. For example, how does this attack compare to the numerous possible \n" +"timing attacks published about onion-routed networks? Clearly the authors have not\n" "done that analysis, if it's even possible to do it\n" "effectively." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120 msgid "" -"Tor uses bidirectional tunnels and has had a lot of academic review. I2P" -" \n" -"uses unidirectional tunnels and has had very little review. Does the lack" -" of a \n" -"research paper defending unidirectional tunnels mean that it is a poor " -"design \n" +"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n" +"uses unidirectional tunnels and has had very little review. Does the lack of a \n" +"research paper defending unidirectional tunnels mean that it is a poor design \n" "choice, or just that it needs more study? Timing attacks and \n" -"distributed attacks are difficult to defend against in both I2P and Tor. " -"The \n" -"design intent (see references above) was that unidirectional tunnels are " -"more \n" -"resistant to timing attacks. However, the paper presents a somewhat " -"different type of timing \n" +"distributed attacks are difficult to defend against in both I2P and Tor. The \n" +"design intent (see references above) was that unidirectional tunnels are more \n" +"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n" "attack. Is this attack, innovative as it is, sufficient to label I2P's \n" "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n" -"implication clearly inferior to Tor, or is it just a design alternative " -"that \n" -"clearly needs further investigation and analysis? There are several other" -" reasons \n" -"to consider I2P currently inferior to Tor and other projects (small " -"network \n" -"size, lack of funding, lack of review) but is unidirectional tunnels " -"really a \n" +"implication clearly inferior to Tor, or is it just a design alternative that \n" +"clearly needs further investigation and analysis? There are several other reasons \n" +"to consider I2P currently inferior to Tor and other projects (small network \n" +"size, lack of funding, lack of review) but is unidirectional tunnels really a \n" "reason?" msgstr "" @@ -16522,4 +14287,3 @@ msgid "" "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n" "conclusion is not supported by the paper." msgstr "" - diff --git a/i2p2www/translations/de/LC_MESSAGES/about.po b/i2p2www/translations/de/LC_MESSAGES/about.po index 624aa08ee16755a8107e5c5c6e28cf829b4373d0..0ac16011877931d342fada099544a89a0df1fb8e 100644 --- a/i2p2www/translations/de/LC_MESSAGES/about.po +++ b/i2p2www/translations/de/LC_MESSAGES/about.po @@ -1,7 +1,7 @@ -# German translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # a b <ahx7@posteo.net>, 2015,2017,2019 # amiga4000 <amiga4000@mail.i2p>, 2008 @@ -17,17 +17,18 @@ # zeroflag <zeroflag@i2pmail.org>, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-06-15 20:37+0000\n" -"Last-Translator: Niemand Jedermann\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Niemand Jedermann, 2021\n" "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: de\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -37,14 +38,9 @@ msgstr "Alternative I2P-Clients" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"Die Haupt-I2P Implementierung verwendet Java. Falls Sie, aus welchen " -"Gründen auch immer, Java nicht auf Ihrem Gerät betreiben können, dann " -"können Sie auf alternative Implementierungen der Entwicklergemeinde " -"zurückgreifen. " +msgstr "Die Haupt-I2P Implementierung verwendet Java. Falls Sie, aus welchen Gründen auch immer, Java nicht auf Ihrem Gerät betreiben können, dann können Sie auf alternative Implementierungen der Entwicklergemeinde zurückgreifen. " #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -52,32 +48,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> ist eine I2P Client-Implementierung in C++." -"\n" -"Seit Anfang 2016, wurde i2pd stabil genug für den Produktiveinsatz \n" -"und seit Sommer 2016 sind alle I2P APIs integriert." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> ist eine I2P Client-Implementierung in C++.\nSeit Anfang 2016, wurde i2pd stabil genug für den Produktiveinsatz \nund seit Sommer 2016 sind alle I2P APIs integriert." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> ist ein aktiv entwickelter Fork von i2pd " -"für die Kryptowährung Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> ist ein aktiv entwickelter Fork von i2pd für die Kryptowährung Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> ist ein I2P-Client in der " -"Programmiersprache\n" -"<a href=\"%(golang)s\">Go</a>, der sich in einem frühen " -"Entwicklungsstadium befindet." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> ist ein I2P-Client in der Programmiersprache\n<a href=\"%(golang)s\">Go</a>, der sich in einem frühen Entwicklungsstadium befindet." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -89,11 +74,147 @@ msgstr "Glossar" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." +msgstr "Diese Tabelle listet häufig verwendete Begriffe im Zusammenhang mit I2P und Kryptografie auf." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "I2P: Invisible Internet Project: Ein Projekt um\n eine Anonymitätsschicht bereitzustellen, damit Nutzer unter Verwendung verschiedener Anwendungen\n anonym kommunizieren können." + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." msgstr "" -"Diese Seite listet häufig verwendete Terminologie beim diskutieren von " -"I2P und Kryptographie auf." #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -101,24 +222,11 @@ msgstr "Ruhmeshalle" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." -msgstr "" -"Das I2P-Projekt wird vollständig von Freiwilligen getragen. Aber ein " -"großes Projekt wie\n" -"dieses besteht nicht nur aus der Software, sondern auch aus mehreren " -"Servern, Domain-Registrierungen und der nötigen Dosis Kaffee,\n" -"die alle finanziert sein wollen, um etwas auf die Beine zu stellen. " -"Menschen aus der ganzen Welt haben für I2P gespendet, damit es zu dem " -"werden konnte was es\n" -"heute ist. Hier haben wir diejenigen Namen zu stehen, deren Spender in " -"der I2P-Ruhmeshalle veröffentlicht werden wollten." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." +msgstr "Das I2P-Projekt wird vollständig von Freiwilligen getragen. Aber ein großes Projekt wie\ndieses besteht nicht nur aus der Software, sondern auch aus mehreren Servern, Domain-Registrierungen und der nötigen Dosis Kaffee,\ndie alle finanziert sein wollen, um etwas auf die Beine zu stellen. Menschen aus der ganzen Welt haben für I2P gespendet, damit es zu dem werden konnte was es\nheute ist. Hier haben wir diejenigen Namen zu stehen, deren Spender in der I2P-Ruhmeshalle veröffentlicht werden wollten." #: i2p2www/pages/site/about/hall-of-fame.html:12 msgid "Big thanks go to the following people who have donated to I2P!" @@ -127,22 +235,15 @@ msgstr "Ein großes Dankeschön an die folgenden Leute, die für I2P gespendet h #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Wenn Sie etwas gespendet haben, senden Sie bitte ein E-Mail an <a " -"href=\"mailto:%(echelon)s\">echelon</a> mit Ihrem Namen oder " -"Benutzernamen (und optional Homepage), damit wir Sie hier auflisten " -"können." +msgstr "Wenn Sie etwas gespendet haben, senden Sie bitte ein E-Mail an <a href=\"mailto:%(echelon)s\">echelon</a> mit Ihrem Namen oder Benutzernamen (und optional Homepage), damit wir Sie hier auflisten können." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." -msgstr "" -"Eine unsortierte Liste von Spendern für I2P in 15 Jahren der I2P " -"Historie, beginnend im März 2004 bis März 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." +msgstr "Eine unsortierte Liste von Spendern für I2P in 15 Jahren der I2P Historie, beginnend im März 2004 bis März 2019." #: i2p2www/pages/site/about/intro.html:2 #: i2p2www/pages/site/about/software.html:2 @@ -155,19 +256,9 @@ msgstr "Das Invisible Internet Projekt" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." -msgstr "" -"Das Invisible Internet Project (I2P) ist eine vollständig verschlüsselte," -" private Netzwerkschicht die mit den Schwerpunkten Datenschutz und " -"Sicherheit entworfen wurde Ihre Identität, Aktivitäten und Ihren " -"Aufenthaltsort zu schützen. Das Programm wird mit einem Router " -"ausgeliefert, der Sie mit einem Netzwerk und Anwendungen zum Teilen, " -"Kommunizieren und Erstellen verbindet." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." +msgstr "Das Invisible Internet Project (I2P) ist eine vollständig verschlüsselte, private Netzwerkschicht die mit den Schwerpunkten Datenschutz und Sicherheit entworfen wurde Ihre Identität, Aktivitäten und Ihren Aufenthaltsort zu schützen. Das Programm wird mit einem Router ausgeliefert, der Sie mit einem Netzwerk und Anwendungen zum Teilen, Kommunizieren und Erstellen verbindet." #: i2p2www/pages/site/about/intro.html:9 msgid "I2P Cares About Privacy" @@ -176,22 +267,14 @@ msgstr "I2P ist Ihre Privatsphäre wichtig" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." -msgstr "" -"I2P versteckt die Server vor den Nutzern und die Nutzer vor den Servern. " -"Der gesamte I2P-Datenverkehr läuft innerhalb des I2P-Netzwerks. Er tritt " -"nicht mit dem Internet direkt in Verbindung. Es ist eine Schicht die auf " -"dem Internet liegt. Sie verwendet verschlüsselte einseitige Tunnel " -"zwischen Ihnen und den anderen Knoten. Niemand kann sehen woher der " -"Datenverkehr kommt und wohin er geht oder welche Inhalte sich darin " -"befinden. Zusätzlich bietet I2P Abwehrfunktionen gegen Mustererkennung " -"und die Blockierung durch Zensur." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." +msgstr "I2P versteckt die Server vor den Nutzern und die Nutzer vor den Servern. Der gesamte I2P-Datenverkehr läuft innerhalb des I2P-Netzwerks. Er tritt nicht mit dem Internet direkt in Verbindung. Es ist eine Schicht die auf dem Internet liegt. Sie verwendet verschlüsselte einseitige Tunnel zwischen Ihnen und den anderen Knoten. Niemand kann sehen woher der Datenverkehr kommt und wohin er geht oder welche Inhalte sich darin befinden. Zusätzlich bietet I2P Abwehrfunktionen gegen Mustererkennung und die Blockierung durch Zensur." #: i2p2www/pages/site/about/intro.html:14 msgid "How to Connect to the I2P Network" @@ -199,27 +282,16 @@ msgstr "Verbindung mit dem I2P-Netzwerk" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." -msgstr "" -"Das Invisible Internet Project bietet Programme zum Herunterladen an, die" -" Sie mit dem Netzwerk verbinden. Zusätzlich zu den Vorteilen des Netzwerk" -" im Datenschutz bietet I2P eine Anwendungsschicht, die es Menschen " -"ermöglicht ähnliche Anwendungen für den täglichen Gebrauch zu erstellen " -"und zu nutzen. I2P stellt seinen eigenen DNS bereit, so dass Sie selbst " -"Inhalte im Netzwerk spiegeln oder anbieten können. Sie können Ihre eigene" -" Plattform erstellen und verwalten, die Sie zum I2P-Verzeichnis " -"hinzufügen können oder zu der Sie nur Ihre Freunde einladen. Das I2P-" -"Netzwerk arbeitet wie das Internet. Wenn Sie das I2P-Programm " -"herunterladen ist darin alles enthalten was Sie zum privaten Verbinden, " -"Teilen und Erstellen benötigen." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." +msgstr "Das Invisible Internet Project bietet Programme zum Herunterladen an, die Sie mit dem Netzwerk verbinden. Zusätzlich zu den Vorteilen des Netzwerk im Datenschutz bietet I2P eine Anwendungsschicht, die es Menschen ermöglicht ähnliche Anwendungen für den täglichen Gebrauch zu erstellen und zu nutzen. I2P stellt seinen eigenen DNS bereit, so dass Sie selbst Inhalte im Netzwerk spiegeln oder anbieten können. Sie können Ihre eigene Plattform erstellen und verwalten, die Sie zum I2P-Verzeichnis hinzufügen können oder zu der Sie nur Ihre Freunde einladen. Das I2P-Netzwerk arbeitet wie das Internet. Wenn Sie das I2P-Programm herunterladen ist darin alles enthalten was Sie zum privaten Verbinden, Teilen und Erstellen benötigen." #: i2p2www/pages/site/about/intro.html:18 msgid "An Overview of the Network" @@ -227,51 +299,28 @@ msgstr "Ein Ãœberblick über das Netzwerk" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." -msgstr "" -"I2P verwendet Kryptografie um eine Vielzahl an Eigenschaften für die vom " -"ihm aufgebauten Tunnel und die darüber laufende Kommunikation zu " -"erreichen. I2P-Tunnel verwenden Transporte, NTCP2 und SSU, um die Art des" -" darüber transportierten Datenverkehrs zu verbergen. Verbindungen sind " -"von Router-zu-Router und von Client-zu-Client (Ende-zu-Ende) " -"verschlüsselt. Vorwärts gerichtete Sicherheit wird für alle Verbindungen " -"sichergestellt. Da I2P kryptografisch adressiert ist, sind I2P-Adressen " -"selbst-authentifizierend und gehören nur dem Benutzer der sie erzeugt " -"hat." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." +msgstr "I2P verwendet Kryptografie um eine Vielzahl an Eigenschaften für die vom ihm aufgebauten Tunnel und die darüber laufende Kommunikation zu erreichen. I2P-Tunnel verwenden Transporte, NTCP2 und SSU, um die Art des darüber transportierten Datenverkehrs zu verbergen. Verbindungen sind von Router-zu-Router und von Client-zu-Client (Ende-zu-Ende) verschlüsselt. Vorwärts gerichtete Sicherheit wird für alle Verbindungen sichergestellt. Da I2P kryptografisch adressiert ist, sind I2P-Adressen selbst-authentifizierend und gehören nur dem Benutzer der sie erzeugt hat." #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." -msgstr "" -"I2P ist eine sichere und den Datenverkehr schützende Internet-artige " -"Schicht. Das Netzwerk besteht aus gleichrangigen Knoten (\"Routern\") und" -" einseitig gerichteten ein- und ausgehenden virtuellen Tunneln. Router " -"kommunizieren untereinander mit Protokollen, die auf bestehenden " -"Transportmechanismen aufsetzen (TCP, UDP, usw) und leiten Nachrichten " -"weiter. Client-Anwendungen haben ihre eigenen kryptografischen Kennungen " -"(\"Destinationen\"), die es ihnen ermöglichen Nachrichten zu senden und " -"zu empfangen. Diese Clients können sich mit jedem Router verbinden und " -"die temporäre Zuweisung (\"Lease\") einiger Tunnel autorisieren, die für " -"das Senden und Empfangen von Nachrichten durch das Netzwerk verwendet " -"werden. I2P hat seine eigene interne Netzwerkdatenbank (eine Abwandlung " -"der Kademlia DHT) für das sichere Verteilen von Vermittlungs- und " -"Kontaktinformationen." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." +msgstr "I2P ist eine sichere und den Datenverkehr schützende Internet-artige Schicht. Das Netzwerk besteht aus gleichrangigen Knoten (\"Routern\") und einseitig gerichteten ein- und ausgehenden virtuellen Tunneln. Router kommunizieren untereinander mit Protokollen, die auf bestehenden Transportmechanismen aufsetzen (TCP, UDP, usw) und leiten Nachrichten weiter. Client-Anwendungen haben ihre eigenen kryptografischen Kennungen (\"Destinationen\"), die es ihnen ermöglichen Nachrichten zu senden und zu empfangen. Diese Clients können sich mit jedem Router verbinden und die temporäre Zuweisung (\"Lease\") einiger Tunnel autorisieren, die für das Senden und Empfangen von Nachrichten durch das Netzwerk verwendet werden. I2P hat seine eigene interne Netzwerkdatenbank (eine Abwandlung der Kademlia DHT) für das sichere Verteilen von Vermittlungs- und Kontaktinformationen." #: i2p2www/pages/site/about/intro.html:26 msgid "About Decentralization and I2P" @@ -279,65 +328,36 @@ msgstr "Ãœber Dezentralisierung und I2P" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." -msgstr "" -"Das I2P-Netzwerk ist fast vollständig dezentralisiert. Mit der Ausnahme " -"von sogenannten \"Reseed Servern\" über die man erstmalig dem Netzwerk " -"beitritt. Dies dient dazu das DHT-Initialisierungsproblem zu umgehen " -"(Distributed Hash Table). Im Grunde gibt es keine gute und zuverlässige " -"Möglichkeit es zu vermeiden mindestens einen permanenten " -"Initialisierungsknoten zu betreiben den Nicht-Netzwerknutzer finden " -"können um loszulegen. Sobald die einmal mit dem Netzwerk verbunden sind, " -"entdecken Sie andere Knoten nur noch duch das Aufbauen von " -"\"Erkundungstunneln\", aber um Ihre initiale Verbindung herstellen zu " -"können benötigen sie einen Knoten-Anfangssatz von irgendwoher. Die " -"Reseed-Server, die Sie unter http://127.0.0.1:7657/configreseed im Java-" -"I2P-Router aufgelistet sehen, versorgen Sie mit dieser Liste. Sie können " -"dann bei diesen mittels I2P-Router Verbindungen anfragen, bis sie einen " -"finden, den Sie erreichen und über den Sie Erkundungstunnel aufbauen " -"können. Reseed-Server wissen zwar, dass Sie sie anfänglich für das " -"Starten verwendet haben, aber sonst nichts über Ihren Datenverkehr im " -"I2P-Netzwerk." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." +msgstr "Das I2P-Netzwerk ist fast vollständig dezentralisiert. Mit der Ausnahme von sogenannten \"Reseed Servern\" über die man erstmalig dem Netzwerk beitritt. Dies dient dazu das DHT-Initialisierungsproblem zu umgehen (Distributed Hash Table). Im Grunde gibt es keine gute und zuverlässige Möglichkeit es zu vermeiden mindestens einen permanenten Initialisierungsknoten zu betreiben den Nicht-Netzwerknutzer finden können um loszulegen. Sobald die einmal mit dem Netzwerk verbunden sind, entdecken Sie andere Knoten nur noch duch das Aufbauen von \"Erkundungstunneln\", aber um Ihre initiale Verbindung herstellen zu können benötigen sie einen Knoten-Anfangssatz von irgendwoher. Die Reseed-Server, die Sie unter http://127.0.0.1:7657/configreseed im Java-I2P-Router aufgelistet sehen, versorgen Sie mit dieser Liste. Sie können dann bei diesen mittels I2P-Router Verbindungen anfragen, bis sie einen finden, den Sie erreichen und über den Sie Erkundungstunnel aufbauen können. Reseed-Server wissen zwar, dass Sie sie anfänglich für das Starten verwendet haben, aber sonst nichts über Ihren Datenverkehr im I2P-Netzwerk." #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"Ich sehe die I2P Adressen aller anderen I2P Knoten in der Router Konsole." -" Bedeuted dieses, dass meine IP von anderen gesehen werden kann?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "Ich sehe die I2P Adressen aller anderen I2P Knoten in der Router Konsole. Bedeuted dieses, dass meine IP von anderen gesehen werden kann?" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." -msgstr "" -"Ja, auf diese Art funktioniert ein vollständig verteiltes Netzwerk " -"zwische gleichrangigen Knoten. Jeder Knoten beteiligt sich an der " -"Weiterleitung von Paketen anderer. Ihre IP-Adresse muss bekannt sein um " -"Verbindungen herstellen zu können. Während die Tatsache, dass auf Ihrem " -"Rechner I2P läuft, bekannt ist, kann hingegen niemand die darüber " -"laufenden Aktivitäten einsehen. Man kann nicht ermitteln, ob der Nutzer " -"hinter einer IP-Adresse Dateien teilt, ein Web-Portal bereitstellt, " -"Forschung betreibt oder einfach nur einen Knoten laufen lässt, um das " -"Projekt mit Bandbreite zu versorgen." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." +msgstr "Ja, auf diese Art funktioniert ein vollständig verteiltes Netzwerk zwische gleichrangigen Knoten. Jeder Knoten beteiligt sich an der Weiterleitung von Paketen anderer. Ihre IP-Adresse muss bekannt sein um Verbindungen herstellen zu können. Während die Tatsache, dass auf Ihrem Rechner I2P läuft, bekannt ist, kann hingegen niemand die darüber laufenden Aktivitäten einsehen. Man kann nicht ermitteln, ob der Nutzer hinter einer IP-Adresse Dateien teilt, ein Web-Portal bereitstellt, Forschung betreibt oder einfach nur einen Knoten laufen lässt, um das Projekt mit Bandbreite zu versorgen." #: i2p2www/pages/site/about/intro.html:34 msgid "What I2P Does Not Do" @@ -345,23 +365,14 @@ msgstr "Was I2P nicht macht" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." -msgstr "" -"Das I2P Netzwerk selbst leitet offiziell keinen Datenverkehr aus. Es " -"verfügt über ausleitende Proxies ins Internet die von Freiwilligen als " -"zentralisierte Dienste betrieben werden. I2P ist primär ein Netzwerk " -"versteckter Dienste und ausleitende Proxies sind keine offizielle " -"Funktion, noch wird dazu geraten. Die Datenschutzvorteile die Sie von der" -" Teilnahme am I2P-Netzwerk haben, begründen sich durch das Verbleiben " -"innerhalb des Netzwerks und den Nichtzugriff auf das Internet. I2O " -"empfiehlt die Nutzung des Tor-Browsers oder einen vertrauenswürdigen VPN-" -"Anbieter wenn Sie das Internet ohne Nachverfolgung nutzen möchten." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." +msgstr "Das I2P Netzwerk selbst leitet offiziell keinen Datenverkehr aus. Es verfügt über ausleitende Proxies ins Internet die von Freiwilligen als zentralisierte Dienste betrieben werden. I2P ist primär ein Netzwerk versteckter Dienste und ausleitende Proxies sind keine offizielle Funktion, noch wird dazu geraten. Die Datenschutzvorteile die Sie von der Teilnahme am I2P-Netzwerk haben, begründen sich durch das Verbleiben innerhalb des Netzwerks und den Nichtzugriff auf das Internet. I2O empfiehlt die Nutzung des Tor-Browsers oder einen vertrauenswürdigen VPN-Anbieter wenn Sie das Internet ohne Nachverfolgung nutzen möchten." #: i2p2www/pages/site/about/intro.html:38 msgid "Comparisons" @@ -369,38 +380,21 @@ msgstr "Vergleiche" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Es gibt sehr viele andere Anwendungen und Projekte die an anonymer " -"Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen " -"inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl " -"freehavens\n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"als auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene " -"Projekte</a>\n" -"sind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\n" -"einen weitergehenden Vergleich. Für folgende Projekte gibt eigene " -"Vergleichsseiten:" +msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:" #: i2p2www/pages/site/about/intro.html:56 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere " -"Netzwerke</a> erörtert:" +msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -409,28 +403,20 @@ msgstr "Präsentationen über I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Im Folgenden stehen Links zu Präsentationen, Videos, und Tutorials über " -"I2P. Links zu wissenschaftlichen Arbeiten über I2P sind <a " -"href=\"%(papers)s\">hier</a> verfügbar." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Im Folgenden stehen Links zu Präsentationen, Videos, und Tutorials über I2P. Links zu wissenschaftlichen Arbeiten über I2P sind <a href=\"%(papers)s\">hier</a> verfügbar." #: i2p2www/pages/site/about/media.html:8 #, python-format msgid "To request an addition to this page, please send to %(email)s." -msgstr "" -"Um eine Ergänzung zu dieser Seite zu beantragen, senden Sie uns bitte " -"eine Email an %(email)s." +msgstr "Um eine Ergänzung zu dieser Seite zu beantragen, senden Sie uns bitte eine Email an %(email)s." #: i2p2www/pages/site/about/media.html:11 msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"Neueste Links befinden am Ende von jedem Abschnitt" +msgstr "\nNeueste Links befinden am Ende von jedem Abschnitt" #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -443,11 +429,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"IIP-Presentation auf der CodeCon\n" -"<a href=\"%(mp3)s\">MP3</a>\n" -"<a href=\"%(transcript)s\">Transkription</a>\n" -"Lance James (0x90), Februar 2002." +msgstr "IIP-Presentation auf der CodeCon\n<a href=\"%(mp3)s\">MP3</a>\n<a href=\"%(transcript)s\">Transkription</a>\nLance James (0x90), Februar 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -456,11 +438,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"I2P-Präsentation bei der ToorCon\n" -"<a href=\"%(mp3)s\">MP3-Audio</a>\n" -"<a href=\"%(slides)s\">Folien</a>\n" -"Lance James (0x90), September 2002." +msgstr "I2P-Präsentation bei der ToorCon\n<a href=\"%(mp3)s\">MP3-Audio</a>\n<a href=\"%(slides)s\">Folien</a>\nLance James (0x90), September 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -470,12 +448,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To Be or I2P</a>\n" -"(Youtube-Video)\n" -"Eine Einführung in anonyme Kommunikation mit I2P.\n" -"<a href=\"%(pdf)s\">To Be or I2P (PDF-Präsentation)</a>,\n" -"Jens Kubieziel, 24C3 Berlin, 28. Dezember 2007." +msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Youtube-Video)\nEine Einführung in anonyme Kommunikation mit I2P.\n<a href=\"%(pdf)s\">To Be or I2P (PDF-Präsentation)</a>,\nJens Kubieziel, 24C3 Berlin, 28. Dezember 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -483,17 +456,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Video vom I2P-Vortrag beim Chemnitzer Linux " -"Tag</a>,\n" -"Lars Schimmer,\n" -"14.-15. Mai 2009" +msgstr "<a href=\"%(video)s\">Video vom I2P-Vortrag beim Chemnitzer Linux Tag</a>,\nLars Schimmer,\n14.-15. Mai 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -504,9 +472,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Das I2P-Darknet: Wilkommen im Cipherspace</a>\n" -"Adrian Crenshaw. Schmoocon Firetalk, Januar 2011" +msgstr "<a href=\"%(link)s\">Das I2P-Darknet: Wilkommen im Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, Januar 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -514,115 +480,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" -"(Youtube-Video)\n" -"Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27. März" -" 2011.\n" -"I2P wird in diesem Video von etwa 10:00 bis 20:00 thematisiert." +msgstr "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n(Youtube-Video)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27. März 2011.\nI2P wird in diesem Video von etwa 10:00 bis 20:00 thematisiert." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" -"(Youtube-Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11.-15. " -"Juli 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n(Youtube-Video)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11.-15. Juli 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P / Tor Workshop Notizen</a>\n" -"Adrian Crenshaw. DEFCON 19, Las Vegas, 6. August 2011." +msgstr "<a href=\"%(link)s\">I2P / Tor Workshop Notizen</a>\nAdrian Crenshaw. DEFCON 19, Las Vegas, 6. August 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" -"DEFCON Live-Version (Youtube-Video)</a>,\n" -"<a href=\"%(studio)s\">\"Studio\"-Version (Youtube-Video)</a>,\n" -"<a href=\"%(slides)s\">Folien (ppt)</a>\n" -"Adrian Crenshaw. DEFCON 19, Las Vegas, 7. August 2011." +msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\nDEFCON Live-Version (Youtube-Video)</a>,\n<a href=\"%(studio)s\">\"Studio\"-Version (Youtube-Video)</a>,\n<a href=\"%(slides)s\">Folien (ppt)</a>\nAdrian Crenshaw. DEFCON 19, Las Vegas, 7. August 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), 4. November 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4. November 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" -"(Youtube-Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25. " -"Januar 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n(Youtube-Video)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25. Januar 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15.-16. August 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15.-16. August 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2P - Lebt noch! (pdf)</a>\n" -"<a href=\"%(link2)s\">(Video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28. Dezember " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2P - Lebt noch! (pdf)</a>\n<a href=\"%(link2)s\">(Video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28. Dezember 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"Ersetzung der nicht mehr zeitgemäßen Kryoto: Upgraden des I2P Netzwerkes " -"auf solidere Grundlagen\n" -"\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"\n" -"str4d, Real World Crypto, Stanford, 8. Januar 2016" +msgstr "Ersetzung der nicht mehr zeitgemäßen Kryoto: Upgraden des I2P Netzwerkes auf solidere Grundlagen\n\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\n\nstr4d, Real World Crypto, Stanford, 8. Januar 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -630,14 +553,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Zwiebel und Knoblauch: die Protokolle von I2P\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, 17. Februar 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Zwiebel und Knoblauch: die Protokolle von I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17. Februar 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -646,21 +563,14 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"The Invisible Internet Project - Eine Ãœbersicht und Ratgeber zur " -"Technologie\n" -"<a href=\"%(link)s\">(mp4)</a>\n" -"<a href=\"%(link2)s\">(webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Brüssel, 4. February 2018" +msgstr "The Invisible Internet Project - Eine Ãœbersicht und Ratgeber zur Technologie\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brüssel, 4. February 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format msgid "" "<a href=\"%(link)s\">Intro to I2P for App Developers (mp4)</a>\n" "idk" -msgstr "" -"<a href=\"%(link)s\">Einleitung zu I2P für App-Entwickler (mp4)</a>\n" -"idk" +msgstr "<a href=\"%(link)s\">Einleitung zu I2P für App-Entwickler (mp4)</a>\nidk" #: i2p2www/pages/site/about/media.html:145 msgid "Tutorials" @@ -673,11 +583,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Windows-Tutorium</a>\n" -"(Youtube-Video)\n" -"Dieses Tutorium zeigt die Installation von I2P unter Windows XP.\n" -"Von <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Windows-Tutorium</a>\n(Youtube-Video)\nDieses Tutorium zeigt die Installation von I2P unter Windows XP.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -686,11 +592,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Debian-Tutorium</a>\n" -"(Youtube-Video)\n" -"Dieses Tutorium zeigt die Installation von I2P unter Debian GNU/Linux.\n" -"Von <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Debian-Tutorium</a>\n(Youtube-Video)\nDieses Tutorium zeigt die Installation von I2P unter Debian GNU/Linux.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -699,56 +601,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Wie man eine anonyme Webseite in I2P aufsetzt</a>\n" -"(Youtube-Video)\n" -"Wie man eine anonyme Webseite in I2P aufsetzt.\n" -"Von <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Wie man eine anonyme Webseite in I2P aufsetzt</a>\n(Youtube-Video)\nWie man eine anonyme Webseite in I2P aufsetzt.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Tutorium für Mac OS X</a>\n" -"(Youtube-Video)\n" -"Ein Tutorium zum Betrieb von I2P unte Mac OS X und wie man sich mit " -"irc.telecomix.i2p verbindet.\n" -"Von <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Tutorium für Mac OS X</a>\n(Youtube-Video)\nEin Tutorium zum Betrieb von I2P unte Mac OS X und wie man sich mit irc.telecomix.i2p verbindet.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari erklärt die grundsätzlichen Prinzipien " -"von I2P</a>\n" -"(Youtube Video)\n" -"Agent Felix Atari vom Telecomix Crypto Munitions Bureau.\n" -"Von <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari erklärt die grundsätzlichen Prinzipien von I2P</a>\n(Youtube Video)\nAgent Felix Atari vom Telecomix Crypto Munitions Bureau.\nVon <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" -"(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">Wie man I2P, das anonymous P2P Darknet zum Laufen " -"bringt (Windows Installation)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"Dieses Tutorial zeigt, wie man I2P, und Software für Zugriff darauf, " -"installiert und konfiguriert." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">Wie man I2P, das anonymous P2P Darknet zum Laufen bringt (Windows Installation)</a>\n(Youtube Video)\nDieses Tutorial zeigt, wie man I2P, und Software für Zugriff darauf, installiert und konfiguriert." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -756,10 +635,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">How to connect to i2p</a>\n" -"(Youtube-Video, englisch)\n" -"Wie man I2P auf Ubuntu installiert." +msgstr "<a href=\"%(link)s\">How to connect to i2p</a>\n(Youtube-Video, englisch)\nWie man I2P auf Ubuntu installiert." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -768,11 +644,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Installation der I2P-Darknet-Software auf Linux</a>\n" -"(Video)\n" -"Adrian Crenshaw.\n" -"Januar 2011" +msgstr "<a href=\"%(link)s\">Installation der I2P-Darknet-Software auf Linux</a>\n(Video)\nAdrian Crenshaw.\nJanuar 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -780,10 +652,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Kurze Darstellung des 'Garlic Routing'</a>\n" -"(Youtube Video)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Kurze Darstellung des 'Garlic Routing'</a>\n(Youtube Video)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -796,11 +665,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) im Interview mit DistributedCity\n" -"<a href=\"%(link1)s\">Teil 1</a>\n" -"<a href=\"%(link2)s\">Teil 2</a>\n" -"26. Juli 2002." +msgstr "Lance James (0x90) im Interview mit DistributedCity\n<a href=\"%(link1)s\">Teil 1</a>\n<a href=\"%(link2)s\">Teil 2</a>\n26. Juli 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -809,35 +674,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) im Interview mit El PaÃs\n" -"(Original in Spanisch)\n" -"<a href=\"%(link)s\">Englische Ãœbersetzung</a>\n" -"31. Oktober 2002." +msgstr "Lance James (0x90) im Interview mit El PaÃs\n(Original in Spanisch)\n<a href=\"%(link)s\">Englische Ãœbersetzung</a>\n31. Oktober 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">2003 Business Week Artikel mit Bezug auf " -"Invisiblenet</a>\n" -"14. September 2003." +msgstr "<a href=\"%(link)s\">2003 Business Week Artikel mit Bezug auf Invisiblenet</a>\n14. September 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">Netzwelt.de-Artikel über anonym sein im Internet</a>" -"\n" -"(Deutsch)\n" -"November 2007." +msgstr "<a href=\"%(link)s\">Netzwelt.de-Artikel über anonym sein im Internet</a>\n(Deutsch)\nNovember 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -845,27 +697,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz im Interview mit gulli.com</a>\n" -"März 2009\n" -"<a href=\"%(german)s\">Deutsche Ãœbersetzung</a>" +msgstr "<a href=\"%(link)s\">zzz im Interview mit gulli.com</a>\nMärz 2009\n<a href=\"%(german)s\">Deutsche Ãœbersetzung</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz interviewte auf InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" -"18. August 2011\n" -"(toter Link, geseeded innerhalb I2P in <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">Postman's" -" Tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz interviewte auf InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18. August 2011\n(toter Link, geseeded innerhalb I2P in <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">Postman's Tracker</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -873,85 +713,52 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonymität für die Massen</a>,\n" -"Jonathan Cox,\n" -"11. November 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonymität für die Massen</a>,\nJonathan Cox,\n11. November 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz und Lance James interviewd im InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>16. February 2012\n" -"(toter Link, verteilt innerhalb I2P in <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">Postman's" -" Tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz und Lance James interviewd im InfoSec Daily Podcast Ep. 596 (mp3)</a>16. February 2012\n(toter Link, verteilt innerhalb I2P in <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">Postman's Tracker</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff und Str4d Inverview auf dem Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" -"Teil 1, 28. Februar 2015" +msgstr "<a href=\"%(mp3)s\">Jeff und Str4d Inverview auf dem Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nTeil 1, 28. Februar 2015" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff und Str4d interviewd im Brakeing Down Security " -"Podcast Ep. 2015-011 (mp3)</a>\n" -"Part 2, 6. März 2015" +msgstr "<a href=\"%(mp3)s\">Jeff und Str4d interviewd im Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nPart 2, 6. März 2015" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" -msgstr "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Erfolg," -" Fehler, Verzagen und Buddhismus.</a>\n" -"<a href=\"%(archive)s\">(archive.org)</a>\n" -"<a href=\"%(mp3)s\">(mp3)</a>\n" -"Robert Lei, 31. Dezember 2018" +msgstr "<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Erfolg, Fehler, Verzagen und Buddhismus.</a>\n<a href=\"%(archive)s\">(archive.org)</a>\n<a href=\"%(mp3)s\">(mp3)</a>\nRobert Lei, 31. Dezember 2018" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" -"2019\n" -msgstr "" -"<a href=\"%(mhatta)s\">Artikel von I2P Unterstützer Masayuki Hatta auf " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" +msgstr "<a href=\"%(mhatta)s\">Artikel von I2P Unterstützer Masayuki Hatta auf Medium.com</a>\n2019\n" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" -msgstr "" -"<a href=\"%(ctrl)s\">Die Ermöglichung beides, .onion und .i2p Routing mit" -" Proxy Auto-Konfiguration</a>\n" -"Daniel Aleksandersen, 7. Februar 2019" +msgstr "<a href=\"%(ctrl)s\">Die Ermöglichung beides, .onion und .i2p Routing mit Proxy Auto-Konfiguration</a>\nDaniel Aleksandersen, 7. Februar 2019" #: i2p2www/pages/site/about/media.html:295 msgid "Other" @@ -961,21 +768,61 @@ msgstr "Weitere" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P wird erwähnt in Netflix' \"House of Cards\" Staffel 2 Folge 2,\n" -"14. Februar 2014" +msgstr "I2P wird erwähnt in Netflix' \"House of Cards\" Staffel 2 Folge 2,\n14. Februar 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" +msgstr "<a href=\"%(meeh)s\">Eine überarbeitete Liste des I2P Unterstützers meeh von I2P Implementierungen, Bibliotheken, Resourcen, Projekten and glänzenden Sachen</a>\n2019" + +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." msgstr "" -"<a href=\"%(meeh)s\">Eine überarbeitete Liste des I2P Unterstützers meeh " -"von I2P Implementierungen, Bibliotheken, Resourcen, Projekten and " -"glänzenden Sachen</a>\n" -"2019" #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" @@ -985,18 +832,15 @@ msgstr "Die I2P-Software" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -1007,84 +851,61 @@ msgstr "Was enthalten ist:" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1095,8 +916,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1104,27 +924,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1132,26 +948,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1162,10 +969,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1173,18 +978,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1195,17 +997,11 @@ msgstr "I2P-Projektmitglieder" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Wir sind eine kleine Gruppe von Leuten, verteilt über mehrere Kontinente," -" die daran arbeiten, verschiedene Aspekte des Projekts voranzubringen und" -" das Design des Netzwerks zu diskutieren. <a href=\"%(volunteer)s\">Mach " -"mit!</a>" +msgstr "Wir sind eine kleine Gruppe von Leuten, verteilt über mehrere Kontinente, die daran arbeiten, verschiedene Aspekte des Projekts voranzubringen und das Design des Netzwerks zu diskutieren. <a href=\"%(volunteer)s\">Mach mit!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1374,7 +1170,8 @@ msgid "Product Development" msgstr "Produktentwicklung" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1456,9 +1253,7 @@ msgstr "I2P-Bote-Plugin" #: i2p2www/pages/site/about/team.html:182 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead" -msgstr "" -"<a " -"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>-Leitentwickler" +msgstr "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>-Leitentwickler" #: i2p2www/pages/site/about/team.html:184 msgid "Maintains the integrated Bittorrent client" @@ -1535,9 +1330,7 @@ msgstr "Debian/Ubuntu Paketersteller und PPA Verwalter" #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Arbeiten am Routerkonsolen-Backend und der Benutzerschnittstelle, " -"Umgestaltung der Website, Erstellung von Unit-Tests" +msgstr "Arbeiten am Routerkonsolen-Backend und der Benutzerschnittstelle, Umgestaltung der Website, Erstellung von Unit-Tests" #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1618,7 +1411,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "jbigi-Entwicklung, Wiki-Migration, Doku aufräumen" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "Java-Debugging und Client-Entwicklung bei I2PTunnel und der Routerkonsole" #: i2p2www/pages/site/about/team.html:323 @@ -1668,53 +1462,27 @@ msgstr "… und viele andere" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." -msgstr "" -"I2PCon 2015 war das erste Ereignis dieser Art. Sie hatte zwei " -"kurzfristige Ziele.\n" -"Erstens, der allgemeinen Öffentlichkeit einen Event zu bieten, bei dem " -"Wissen ber Privatheit erlangt werden kann.\n" -"Zweitens, um das I2P Projekt und seine Community mit technischen Aspekten" -" über Kryptografie, Anonymität und Themen rund um I2P fortzuführen." +msgstr "I2PCon 2015 war das erste Ereignis dieser Art. Sie hatte zwei kurzfristige Ziele.\nErstens, der allgemeinen Öffentlichkeit einen Event zu bieten, bei dem Wissen ber Privatheit erlangt werden kann.\nZweitens, um das I2P Projekt und seine Community mit technischen Aspekten über Kryptografie, Anonymität und Themen rund um I2P fortzuführen." #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." -msgstr "" -"Ein größeres und längerfristiges Ziel dieser Veranstaltung war es, eine " -"Gemeinschaft von Individuen mit hohem Bewußtsein für Privatsphäre " -"aufzubauen. Indem wir Menschen zusammenbringen, die um die Wichtigkeit " -"von Privatsphäre wissen, wollten wir ein Forum liefern, in dem die " -"Community wachsen kann. " +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." +msgstr "Ein größeres und längerfristiges Ziel dieser Veranstaltung war es, eine Gemeinschaft von Individuen mit hohem Bewußtsein für Privatsphäre aufzubauen. Indem wir Menschen zusammenbringen, die um die Wichtigkeit von Privatsphäre wissen, wollten wir ein Forum liefern, in dem die Community wachsen kann. " #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." -msgstr "" -"Die Idee für dieses Event wurde erstmalig aufgegriffen von unsern guten " -"Freunden bei \n" -"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"Die Unterkunft wurde von <a href=\"https://hacklab.to/\">Hacklab.to</a> " -"gestellt.\n" -"Speerspitze für Marketing war <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> und Siew.\n" -"Ohne Sie wäre das Event nicht möglich gewesen. " +msgstr "Die Idee für dieses Event wurde erstmalig aufgegriffen von unsern guten Freunden bei \n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nDie Unterkunft wurde von <a href=\"https://hacklab.to/\">Hacklab.to</a> gestellt.\nSpeerspitze für Marketing war <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> und Siew.\nOhne Sie wäre das Event nicht möglich gewesen. " #: i2p2www/pages/site/about/i2pcon/2015.html:32 msgid "Slides and Video" @@ -1730,8 +1498,8 @@ msgstr "Hinweis: Links zu Videos werden ergänzt sobald verfügbar." #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1766,22 +1534,13 @@ msgstr "Referenten" msgid "" "Colin Mahns has a strong interest in the use of anonymity and encryption " "technology to help preserve human rights in the digital age." -msgstr "" -"Colin Mahns hat ein starkes Interesse daran, durch den Einsatz von " -"Technologie für Anonymität und Verschlüsselung Menschenrechte im " -"digitalen Zeitalter bewahren zu helfen. " +msgstr "Colin Mahns hat ein starkes Interesse daran, durch den Einsatz von Technologie für Anonymität und Verschlüsselung Menschenrechte im digitalen Zeitalter bewahren zu helfen. " #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." -msgstr "" -"David Dagon ist nach seiner Promotion ein Researcher bei Georgia Tech mit" -" Focus auf Botnets, Malware, Netzwerksicherheit and DNS.\n" -"Sein Interesse an I2P bewegt sich um den Erhalt der Privatsphäre von " -"Usern, autonome Filtersysteme und Abwehr von Misbrauch." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." +msgstr "David Dagon ist nach seiner Promotion ein Researcher bei Georgia Tech mit Focus auf Botnets, Malware, Netzwerksicherheit and DNS.\nSein Interesse an I2P bewegt sich um den Erhalt der Privatsphäre von Usern, autonome Filtersysteme und Abwehr von Misbrauch." #: i2p2www/pages/site/about/i2pcon/2015.html:89 #: i2p2www/pages/site/about/i2pcon/2015.html:105 @@ -1794,25 +1553,12 @@ msgstr "J ist der Leiter der Toronto Crypto." #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." -msgstr "" -"Lance James ist der Gründer des Invisible IRC Projektes, der Vorgänger " -"von I2P, zurück in 2002.\n" -"Er gründete seine eigene Cyber Threat Intelligence Firma in 2003.\n" -"Er war seitdem focusiert auf Netzwerksicherheit, Untersuchung von Malware" -" und Informationssicherheit.\n" -"Wärend 2011 - 2014 war er Direktor für Bedrohungsscenarien für Firma The " -"Vigliant, welche von übernommen wurde Deloitte in 2013.\n" -"Kürzlich verlies er Deloitte und machte Controlling über seine eigene " -"Firma The James Group. " +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." +msgstr "Lance James ist der Gründer des Invisible IRC Projektes, der Vorgänger von I2P, zurück in 2002.\nEr gründete seine eigene Cyber Threat Intelligence Firma in 2003.\nEr war seitdem focusiert auf Netzwerksicherheit, Untersuchung von Malware und Informationssicherheit.\nWärend 2011 - 2014 war er Direktor für Bedrohungsscenarien für Firma The Vigliant, welche von übernommen wurde Deloitte in 2013.\nKürzlich verlies er Deloitte und machte Controlling über seine eigene Firma The James Group. " #: i2p2www/pages/site/about/i2pcon/2015.html:109 msgid "Nicholas D. is a member of Hacklab Toronto." @@ -1820,22 +1566,11 @@ msgstr "Nicholas D. ist ein Mitglied des Hacklab Toronto." #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." -msgstr "" -"Nicholas Johnston ist Professor für Informationssicherheit an der Schule " -"für angewandte Datenverarbeitung des Sheridan College und Teil des " -"InfoSec-Programms zum Bachelor.\n" -"In seiner bisherigen Karriere beschäftigte er sich mit digitaler Forensik" -" und Ermittlung.\n" -"Als Auftragnehmer hat er sich auf Vorfallsreaktion spezialisiert.\n" -"Seine Forschungsgebiete beinhalten sichere Softwareentwicklung und " -"Datenanalyse." +msgstr "Nicholas Johnston ist Professor für Informationssicherheit an der Schule für angewandte Datenverarbeitung des Sheridan College und Teil des InfoSec-Programms zum Bachelor.\nIn seiner bisherigen Karriere beschäftigte er sich mit digitaler Forensik und Ermittlung.\nAls Auftragnehmer hat er sich auf Vorfallsreaktion spezialisiert.\nSeine Forschungsgebiete beinhalten sichere Softwareentwicklung und Datenanalyse." #: i2p2www/pages/site/about/i2pcon/2015.html:124 msgid "Psi is an I2P developer." @@ -1887,14 +1622,9 @@ msgstr "Tag 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." -msgstr "" -"Die erste I2P gewidmete Konferenz fand 15.-16. August 2015 in Toronto " -"statt.\n" -"Siehe Link unten für mehr Informationen sowie für Links zu Vortragsfolien" -" und Videos." +msgstr "Die erste I2P gewidmete Konferenz fand 15.-16. August 2015 in Toronto statt.\nSiehe Link unten für mehr Informationen sowie für Links zu Vortragsfolien und Videos." #: i2p2www/pages/site/about/i2pcon/index.html:9 msgid "Past years" @@ -1910,27 +1640,13 @@ msgstr "August 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Man kann mehrere Ansätze verfolgen, mit denen die gefühlte Performanz\n" -"von I2P verbessert werden kann - manche der folgenden beziehen sich auf " -"die Nutzung\n" -"der CPU, andere auf die der Bandbreite, und wiederum andere auf das " -"Protokoll. Jedoch\n" -"wirken sich alle diese Faktoren auf Latenz, Durchsatz und gefühlte " -"Netzwerkperformanz\n" -"aus, da sie die Konkurrenz um knappe Ressourcen verringern. Diese Liste " -"ist natürlich \n" -"nicht umfassend, aber sie deckt die wichtigsten ab, die auftreten." +msgstr "Man kann mehrere Ansätze verfolgen, mit denen die gefühlte Performanz\nvon I2P verbessert werden kann - manche der folgenden beziehen sich auf die Nutzung\nder CPU, andere auf die der Bandbreite, und wiederum andere auf das Protokoll. Jedoch\nwirken sich alle diese Faktoren auf Latenz, Durchsatz und gefühlte Netzwerkperformanz\naus, da sie die Konkurrenz um knappe Ressourcen verringern. Diese Liste ist natürlich \nnicht umfassend, aber sie deckt die wichtigsten ab, die auftreten." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1938,10 +1654,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Für bisherige Leistungsverbesserungen, schauen Sie in der <a " -"href=\"%(history)s\">\n" -"Performance Historie</a> nach." +msgstr "Für bisherige Leistungsverbesserungen, schauen Sie in der <a href=\"%(history)s\">\nPerformance Historie</a> nach." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1950,26 +1663,13 @@ msgstr "Besseres Profiling und Auswahl der Knoten " #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Vielleicht das Wichtigste, dass getan werden kann, um eine schnellere " -"Performance zu erzielen,\n" -"ist zu verbessern, wie Router die Peers auswählen, durch die sie ihre " -"Tunnel bauen.\n" -"- sicherzustellen, dass sie keine Peers mit langsamer Verbindung benutzen" -" oder solche mit schneller Verbindung, die\n" -"aber überlastet sind, etc. Zusätzlich müssen wir sicherstellen, dass wir " -"uns keiner <a href=\"%(sybilpdf)s\">Sybil</a> Attacke\n" -"eines mächtigen Gegners mit vielen schnellen Maschinen aussetzen." +msgstr "Vielleicht das Wichtigste, dass getan werden kann, um eine schnellere Performance zu erzielen,\nist zu verbessern, wie Router die Peers auswählen, durch die sie ihre Tunnel bauen.\n- sicherzustellen, dass sie keine Peers mit langsamer Verbindung benutzen oder solche mit schneller Verbindung, die\naber überlastet sind, etc. Zusätzlich müssen wir sicherstellen, dass wir uns keiner <a href=\"%(sybilpdf)s\">Sybil</a> Attacke\neines mächtigen Gegners mit vielen schnellen Maschinen aussetzen." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1977,34 +1677,15 @@ msgstr "Netzwerkdatenbankabstimmung" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Wir sind auf dem Weg, bei der Selbstheilung der Datenbank und bei " -"Wartungsalgorhytmen effizienter werden zu wollen, anstatt permanent die " -"Ãœbersicht der Schlüssel nach neuen Peers zu überwachen - was zu einer " -"erheblichen Zahl an Netzwerknachrichten und Belastung des Routers führt." -" \n" -"Wir können diese reduzieren oder die Suche komplett stoppen, bis wir " -"erkennen, dass es etwas Neues von Relevanz gibt (z.B. die Erkundungsrate " -"in Abhängigkeit davon zu verringern, wann uns jemand zuletzt eine uns " -"zuvor nicht bekannte Referenz übermittelte).\n" -"Wir können auch einstellen, was wir tatsächlich senden - wie viele Peers " -"wir zurückspielen oder sogar ob wir überhaupt eine Antwort übermitteln, " -"so wie die Anzahl, wie viele parallele Erkundungen durchführt werden. " +msgstr "Wir sind auf dem Weg, bei der Selbstheilung der Datenbank und bei Wartungsalgorhytmen effizienter werden zu wollen, anstatt permanent die Ãœbersicht der Schlüssel nach neuen Peers zu überwachen - was zu einer erheblichen Zahl an Netzwerknachrichten und Belastung des Routers führt. \nWir können diese reduzieren oder die Suche komplett stoppen, bis wir erkennen, dass es etwas Neues von Relevanz gibt (z.B. die Erkundungsrate in Abhängigkeit davon zu verringern, wann uns jemand zuletzt eine uns zuvor nicht bekannte Referenz übermittelte).\nWir können auch einstellen, was wir tatsächlich senden - wie viele Peers wir zurückspielen oder sogar ob wir überhaupt eine Antwort übermitteln, so wie die Anzahl, wie viele parallele Erkundungen durchführt werden. " #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -2013,52 +1694,24 @@ msgstr "Session-Tag Optimierungen Verbesserungen " #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"Die Art wie der <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"Algorithmus arbeitet, ist durch Management eines Satzes von zufälligen " -"Einmal-32-Byte-Arrays und deren Verfall, wenn sie nicht schnell genug " -"abgerufen werden. \n" -"\n" -"Wenn wir diese zu schnell verwerfen, dann sind wir gezwungen, auf eine " -"vollständige (teure) ElGamal Verschlüsselung zurückzugreifen, aber wenn " -"wir sie nicht schnell genug auslaufen lassen, dann müssen wir deren Menge" -" reduzieren, damit uns der Speicher nicht ausgeht (und wenn der Empfänger" -" fehlerhafte Pakete erhält, damit einige verliert, könnten sogar noch " -"mehr Verschlüsselungsfehler entstehen, bevor dies erkannt wird). \n" -"\n" -"Mit einem etwas aktiverem Algorithmus mit Ausrichtung auf Erkennung und " -"Feedback, können wir sicherer und effektiver die Laufzeit der Tags " -"bestimmen und dabei die ElGamal-Verschlüsselung mit einer trivialeren AES" -" Operationi ersetzen. " +msgstr "Die Art wie der <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> Algorithmus arbeitet, ist durch Management eines Satzes von zufälligen Einmal-32-Byte-Arrays und deren Verfall, wenn sie nicht schnell genug abgerufen werden. \n\nWenn wir diese zu schnell verwerfen, dann sind wir gezwungen, auf eine vollständige (teure) ElGamal Verschlüsselung zurückzugreifen, aber wenn wir sie nicht schnell genug auslaufen lassen, dann müssen wir deren Menge reduzieren, damit uns der Speicher nicht ausgeht (und wenn der Empfänger fehlerhafte Pakete erhält, damit einige verliert, könnten sogar noch mehr Verschlüsselungsfehler entstehen, bevor dies erkannt wird). \n\nMit einem etwas aktiverem Algorithmus mit Ausrichtung auf Erkennung und Feedback, können wir sicherer und effektiver die Laufzeit der Tags bestimmen und dabei die ElGamal-Verschlüsselung mit einer trivialeren AES Operationi ersetzen. " #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Zusätzliche Ideen zur Verbesserung des Session Tags, Bereitstellung und " -"Beschreibung auf der <a " -"href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag Seite</a>." +msgstr "Zusätzliche Ideen zur Verbesserung des Session Tags, Bereitstellung und Beschreibung auf der <a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag Seite</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -2069,33 +1722,24 @@ msgstr "sessionTag nach synchoronized PRNG migrieren" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -2108,55 +1752,26 @@ msgstr "Tunnel von längerer Dauer" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"Die derzeitige Voreinstellung von 10 Minuten für die Dauer von " -"Tunnelverbindungen ist ziemlich willkürlich gewählt, aber\n" -"\"dem Gefühl nach\" in Ordnung. Sobald wir Tunnel wiederherstellen und " -"effektiver Probleme erkennen\n" -"können, werden wir es leichter haben, diese Dauer zu variieren, was zur " -"Entlastung\n" -"der Netzwerkverbindung und der CPU (aufgrund des sonst aufwändigen " -"Tunnelneuaufbaus) führt." +msgstr "Die derzeitige Voreinstellung von 10 Minuten für die Dauer von Tunnelverbindungen ist ziemlich willkürlich gewählt, aber\n\"dem Gefühl nach\" in Ordnung. Sobald wir Tunnel wiederherstellen und effektiver Probleme erkennen\nkönnen, werden wir es leichter haben, diese Dauer zu variieren, was zur Entlastung\nder Netzwerkverbindung und der CPU (aufgrund des sonst aufwändigen Tunnelneuaufbaus) führt." #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Dies scheint eine einfache Lösung für hohe Belastung auf Routern mit " -"großer Bandbreite zu sein, aber wir sollten nicht darauf bauen, bevor wir" -" nicht den Algorithmus der Tunnelerzeugung weiter ausgefeilt haben.\n" -"Zu beachten ist, dass eine Tunnel-Lebenszeit von 10 Minuten an vielen " -"Stellen fest programmiert ist und die Änderung der Laufzeit ist mit nicht" -" unerheblichem Aufwand verbunden. Darüber hinaus wäre es bei einer " -"solchen Änderung schwierig, die Rückwärtskompatibilität zu warhen. " +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Dies scheint eine einfache Lösung für hohe Belastung auf Routern mit großer Bandbreite zu sein, aber wir sollten nicht darauf bauen, bevor wir nicht den Algorithmus der Tunnelerzeugung weiter ausgefeilt haben.\nZu beachten ist, dass eine Tunnel-Lebenszeit von 10 Minuten an vielen Stellen fest programmiert ist und die Änderung der Laufzeit ist mit nicht unerheblichem Aufwand verbunden. Darüber hinaus wäre es bei einer solchen Änderung schwierig, die Rückwärtskompatibilität zu warhen. " #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" -"there are no current plans to extend tunnel lifetime.\n" -"\n" -"Da die Erfolgsrate des durchschnittlichen Tunnelaufbaus relativ hoch ist," -" gibt es momentan keine Pläne, die Laufzeit von Tunneln zu verlängern. " +msgstr "Currently, since the network average tunnel build success rate is fairly high,\nthere are no current plans to extend tunnel lifetime.\n\nDa die Erfolgsrate des durchschnittlichen Tunnelaufbaus relativ hoch ist, gibt es momentan keine Pläne, die Laufzeit von Tunneln zu verlängern. " #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -2164,34 +1779,22 @@ msgstr "Die Zeitüberschreitungen anpassen" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Jeder von diesen Unwägbarkeiten kann mit adaptiverem Programmcode " -"begegnet werden, sowie\n" -"mit Abstimmung von Parametern, um einen angemessenen Kompromiss zwischen\n" -"Bandbreite, Latenz und CPU-Auslastung zu finden." +msgstr "Jeder von diesen Unwägbarkeiten kann mit adaptiverem Programmcode begegnet werden, sowie\nmit Abstimmung von Parametern, um einen angemessenen Kompromiss zwischen\nBandbreite, Latenz und CPU-Auslastung zu finden." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2201,50 +1804,33 @@ msgstr "Vollständige Streaming Protokoll Verbesserungen " msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Vielleicht die Wiederermöglichung des Interactive-Stream-Profils (die \n" -"momentane Implementierung nutzt nur das Block-Stream-Profil)." +msgstr "Vielleicht die Wiederermöglichung des Interactive-Stream-Profils (die \nmomentane Implementierung nutzt nur das Block-Stream-Profil)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Limitierung der Bandbreite auf Cient-Ebene (in entweder eine oder beide " -"Richtungen eines Steams, oder möglicherweise verteilt über multiple " -"Streams). Dies wäre natürlich zusätzlich zu der gesamten Limitierung der " -"Routerbandbreite " +msgstr "Limitierung der Bandbreite auf Cient-Ebene (in entweder eine oder beide Richtungen eines Steams, oder möglicherweise verteilt über multiple Streams). Dies wäre natürlich zusätzlich zu der gesamten Limitierung der Routerbandbreite " #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Zugriffs-Kontroll-Listen (nur Streams zu oder von bestimmten Zieladressen" -" Zugriff gewähren)" +msgstr "Zugriffs-Kontroll-Listen (nur Streams zu oder von bestimmten Zieladressen Zugriff gewähren)" #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Web Kontrolle und Monitoring der Gesundheit der vielfachen Streams, so " -"wie die Möglichkeit diese explizit zu schliessen bzw. zu drosseln." +msgstr "Web Kontrolle und Monitoring der Gesundheit der vielfachen Streams, so wie die Möglichkeit diese explizit zu schliessen bzw. zu drosseln." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Zusätzliche Ideen zur Verbesserung der Streaming Bibliothek sind " -"beschrieben auf der\n" -"<a href=\"%(streaming)s#future\">Streaming Bibliothek Seite</a>." +msgstr "Zusätzliche Ideen zur Verbesserung der Streaming Bibliothek sind beschrieben auf der\n<a href=\"%(streaming)s#future\">Streaming Bibliothek Seite</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2253,16 +1839,10 @@ msgstr "Leistungschronik" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Merkliche Verbesserung der Leistung wurden durch die untenstehenden " -"Verbesserungen erreicht. Es gibt mehr zu tun, siehe die <a " -"href=\"%(performance)s\">Performance</a> Seite\n" -"für aktuelle Problematik und Gedanken.." +msgstr "Merkliche Verbesserung der Leistung wurden durch die untenstehenden Verbesserungen erreicht. Es gibt mehr zu tun, siehe die <a href=\"%(performance)s\">Performance</a> Seite\nfür aktuelle Problematik und Gedanken.." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2279,30 +1859,23 @@ msgstr "implementiert" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2316,68 +1889,42 @@ msgstr "Implentiert, benötigt weitere Optimierungen" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Diese Algorithmusänderung wird nur für Anwendungen, die eine Antwort vom " -"Klienten benötigen, relevant sein (dieses betrifft dann doch alles, " -"welches I2PTunnel oder mihis MiniStreamin Bibliothek nutzt):" +msgstr "Diese Algorithmusänderung wird nur für Anwendungen, die eine Antwort vom Klienten benötigen, relevant sein (dieses betrifft dann doch alles, welches I2PTunnel oder mihis MiniStreamin Bibliothek nutzt):" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." -msgstr "" -"Für unveröffentlichte LeaseSets wie \"geteilte Dienste\", ist dies der " -"einzige Weg, das LeaseSet an Bob zu übertragen. Diese Bündelung addiert " -"leider fast 100% Overhead zu einer Breitbandverbindung und weit mehr " -"zu einer Verbindung mit kleineren Nachrichten. " +msgstr "Für unveröffentlichte LeaseSets wie \"geteilte Dienste\", ist dies der einzige Weg, das LeaseSet an Bob zu übertragen. Diese Bündelung addiert leider fast 100% Overhead zu einer Breitbandverbindung und weit mehr zu einer Verbindung mit kleineren Nachrichten. " #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Änderungen sind vorgesehen für Version 0.6.2; Sie bündeln das LeaseSet am" -" Anfang der Verbindung nur, wenn erforderlich oder wenn es sich " -"verändert. Dies wird die zusätzliche Last an I2P-Nachrichten erheblich " -"reduzieren." +msgstr "Änderungen sind vorgesehen für Version 0.6.2; Sie bündeln das LeaseSet am Anfang der Verbindung nur, wenn erforderlich oder wenn es sich verändert. Dies wird die zusätzliche Last an I2P-Nachrichten erheblich reduzieren." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2386,20 +1933,13 @@ msgstr "Effizientere TCP Ablehnungen" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2410,16 +1950,11 @@ msgstr "Anpassen des Tunneltests" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -2429,28 +1964,17 @@ msgstr "Beständige Tunnel / Auswahl Lease" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"Auswahl der nach aussen gebundene Tunnel implementiert in 0.6.1.30, " -"Auswahl der nach innen gebundndenen Leases implementiert in Release " -"0.6.2." +msgstr "Auswahl der nach aussen gebundene Tunnel implementiert in 0.6.1.30, Auswahl der nach innen gebundndenen Leases implementiert in Release 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Wenn Tunnel und Leases für jede Nachricht zufällig gewählt werden, dann " -"führt dies zu einer hohen Tendenz für fehlerhafte Ãœbertragung, was die " -"Streaming Bibliothek daran hindert, seine Fenstergröße zu maximieren. " -"Wenn gleiche Einstellungen für gegebene Verbindungen bestehen bleiben, " -"ist die Transferrate viel höher. " +msgstr "Wenn Tunnel und Leases für jede Nachricht zufällig gewählt werden, dann führt dies zu einer hohen Tendenz für fehlerhafte Ãœbertragung, was die Streaming Bibliothek daran hindert, seine Fenstergröße zu maximieren. Wenn gleiche Einstellungen für gegebene Verbindungen bestehen bleiben, ist die Transferrate viel höher. " #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2458,20 +1982,13 @@ msgstr "Unterdrückung einiger Datenstrukturen" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2485,26 +2002,16 @@ msgstr "ersetzt durch vollständiges Streaming Protocol" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2513,18 +2020,12 @@ msgstr "Implementierung eines kompletten Streaming Protokolls" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2532,16 +2033,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2553,84 +2049,44 @@ msgstr "Leistung" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"Wie funktioniert I2P, warum ist es langsam und warum nutzt es nicht meine" -" gesamte Bandbreite?" +msgstr "Wie funktioniert I2P, warum ist es langsam und warum nutzt es nicht meine gesamte Bandbreite?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Wahrscheinlich eine der meist gestellten Fragen ist \"wie schnell ist " -"I2P?\" und niemand scheint die Antwort zu mögen - \"es hängt davon ab\". " -"Nachdem sie I2P ausbrobiert haben, ist das nächste, was sie fragen, " -"\"wird es schneller?\" und die Antwort darauf ist ein höchst empathisches" -" <b>Ja</b>." +msgstr "Wahrscheinlich eine der meist gestellten Fragen ist \"wie schnell ist I2P?\" und niemand scheint die Antwort zu mögen - \"es hängt davon ab\". Nachdem sie I2P ausbrobiert haben, ist das nächste, was sie fragen, \"wird es schneller?\" und die Antwort darauf ist ein höchst empathisches <b>Ja</b>." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"Obiges beschreibt, warum jeder I2P Node zu voneinander abweichenden Nodes" -" referenziert, um Tunnel aufzubauen. \n" -"Weil jeder I2P Node eine andere Latenz und Bandbreite hat, haben Tunnel " -"(die von diesen Nodes erzeugt wurden) unterschiedliche Latenz und " -"Bandbreitenwerte. \n" -"Und weil jeder I2P Node unterschiedliche Tunnel erzeugt, haben keine zwei" -" I2P Nodes die gleichen Tunneleinstellungen. " +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "Obiges beschreibt, warum jeder I2P Node zu voneinander abweichenden Nodes referenziert, um Tunnel aufzubauen. \nWeil jeder I2P Node eine andere Latenz und Bandbreite hat, haben Tunnel (die von diesen Nodes erzeugt wurden) unterschiedliche Latenz und Bandbreitenwerte. \nUnd weil jeder I2P Node unterschiedliche Tunnel erzeugt, haben keine zwei I2P Nodes die gleichen Tunneleinstellungen. " #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Ein Server / Client ist bekannt als \"Zieladresse\" und jede Zieladresse " -"hat mindestens einen eingehenden und einen ausgehenden Tunnel. Der " -"Standard ist 3 Hops per Tunnel. Dies addiert sich auf zu 12 Hops (12 " -"unterschiedliche I2P Nodes) für einen vollen Rundtrip Client-Server-" -"Client. " +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Ein Server / Client ist bekannt als \"Zieladresse\" und jede Zieladresse hat mindestens einen eingehenden und einen ausgehenden Tunnel. Der Standard ist 3 Hops per Tunnel. Dies addiert sich auf zu 12 Hops (12 unterschiedliche I2P Nodes) für einen vollen Rundtrip Client-Server-Client. " #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Jedes Datenpaket wird durch 6 andere I2P Knoten gesendet bevor es den " -"Server erreicht:" +msgstr "Jedes Datenpaket wird durch 6 andere I2P Knoten gesendet bevor es den Server erreicht:" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2638,134 +2094,62 @@ msgstr "und auf dem Weg zurück durch 6 andere I2P Knoten:" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." -msgstr "" -"Um die Anonymität zu wahren, sollte kein einzelner Router zur Erstellung " -"von Tunneln für das gesamte Netz eingesetzt werden. \n" -"Wenn ein einzelner Router als Tunnelrouter für ALLE I2P-Nodes operiert, " -"wird dieser zu einem ernsthaften Ansatzpunkt für Fehler so wie zur " -"Preisgabe von IP's und Daten der Clients. Das ist nicht gut. I2P versucht" -" aus diesem Grund, die Last über eine Vielzahl von I2P Nodes zu streuen." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." +msgstr "Um die Anonymität zu wahren, sollte kein einzelner Router zur Erstellung von Tunneln für das gesamte Netz eingesetzt werden. \nWenn ein einzelner Router als Tunnelrouter für ALLE I2P-Nodes operiert, wird dieser zu einem ernsthaften Ansatzpunkt für Fehler so wie zur Preisgabe von IP's und Daten der Clients. Das ist nicht gut. I2P versucht aus diesem Grund, die Last über eine Vielzahl von I2P Nodes zu streuen." #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." -msgstr "" -"Ein anderer Punkt ist das vollständige Mesh-Netzwerk. Jede Verbindung von" -" Hop zu Hop erstellt eine TCP oder UDP Verbindung zwischen den I2P Nodes." -" Bei 1000 Verbindungen sieht man 1000 TCP Verbindungen. Dies ist eine " -"ganze Menge und einige Büro- und Heimrouter (DSL, Kabel, ...) erlauben " -"nur eine kleine Anzahl an Verbindungen (oder frieren bei Anforderung von " -"X Tunneln einfach ein). I2P versucht, diese Verbindungen auf unter 1500 " -"je UDP und TCP einzuschränken. Dies limitiert den Umfang an Datenverkehr," -" der über deinen I2P Node geroutet wird, ebenfalls." +msgstr "Ein anderer Punkt ist das vollständige Mesh-Netzwerk. Jede Verbindung von Hop zu Hop erstellt eine TCP oder UDP Verbindung zwischen den I2P Nodes. Bei 1000 Verbindungen sieht man 1000 TCP Verbindungen. Dies ist eine ganze Menge und einige Büro- und Heimrouter (DSL, Kabel, ...) erlauben nur eine kleine Anzahl an Verbindungen (oder frieren bei Anforderung von X Tunneln einfach ein). I2P versucht, diese Verbindungen auf unter 1500 je UDP und TCP einzuschränken. Dies limitiert den Umfang an Datenverkehr, der über deinen I2P Node geroutet wird, ebenfalls." #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." -msgstr "" -"Zusammenfassend gesagt, ist I2P sehr komplex und es gibt keinen einfachen" -" Weg festzustellen, warum ihr Knotenpunkt nicht verwendet wird.\n" -"Wenn Ihr Knotenpunkt erreichbar ist und eine Bandbreite von >128 " -"kbyte/sec verfügbar ist und 24/7 errichbar ist, sollte er nach einer Zeit" -" am Traffic beteiligt werden.\n" -"Falls er zwischendurch offline geht, wird ein Test ihres I2P Knotens " -"durch andere Knoten denen sagen: sie sind nicht erreichbar. Dies " -"blockiert Ihren Knoten für mindestens 24 Std für andere Knoten. Daher " -"werden die anderen Knoten, die Ihren als down gestestet haben, ihren " -"Knoten für 24 Std nicht mehr zum bauen von Tunneln verwenden. Deshalb " -"wird Ihr Traffic nach dem Neustart/Herunterfahren\n" -"für mindestens 24 Std niedriger sein als normal." +msgstr "Zusammenfassend gesagt, ist I2P sehr komplex und es gibt keinen einfachen Weg festzustellen, warum ihr Knotenpunkt nicht verwendet wird.\nWenn Ihr Knotenpunkt erreichbar ist und eine Bandbreite von >128 kbyte/sec verfügbar ist und 24/7 errichbar ist, sollte er nach einer Zeit am Traffic beteiligt werden.\nFalls er zwischendurch offline geht, wird ein Test ihres I2P Knotens durch andere Knoten denen sagen: sie sind nicht erreichbar. Dies blockiert Ihren Knoten für mindestens 24 Std für andere Knoten. Daher werden die anderen Knoten, die Ihren als down gestestet haben, ihren Knoten für 24 Std nicht mehr zum bauen von Tunneln verwenden. Deshalb wird Ihr Traffic nach dem Neustart/Herunterfahren\nfür mindestens 24 Std niedriger sein als normal." #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"Auch: andere I2P Knoten müssen deinen I2P Router für Erreichbarkeit und " -"Kapazität testen. Es braucht Zeit, bis diese Nodes deinen Node kennen.\n" -"Es wird schneller geschehen, wenn du I2P für einige Zeit so einsetzt, " -"dass mehr Tunnel gebildet werden, konkret, durch den Einsatz von Torrents" -" oder Aufrufe des WWW. " +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "Auch: andere I2P Knoten müssen deinen I2P Router für Erreichbarkeit und Kapazität testen. Es braucht Zeit, bis diese Nodes deinen Node kennen.\nEs wird schneller geschehen, wenn du I2P für einige Zeit so einsetzt, dass mehr Tunnel gebildet werden, konkret, durch den Einsatz von Torrents oder Aufrufe des WWW. " #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2776,8 +2160,4 @@ msgstr "Leistungsverbesserungen" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Für mögliche zukünftige Verbesserungen in der Performance, schauen sie " -"unter <a href=\"%(future)s\">Zukünftige Performance Verbesserungen</a> " -"nach." - +msgstr "Für mögliche zukünftige Verbesserungen in der Performance, schauen sie unter <a href=\"%(future)s\">Zukünftige Performance Verbesserungen</a> nach." diff --git a/i2p2www/translations/de/LC_MESSAGES/comparison.po b/i2p2www/translations/de/LC_MESSAGES/comparison.po index 6b5b2a3976e6c98781e161d8a3f07a3a0514bf18..36edfa2b863abeff342b3e7956510c616b21baa1 100644 --- a/i2p2www/translations/de/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/de/LC_MESSAGES/comparison.po @@ -1,7 +1,7 @@ -# German translations for I2P. -# Copyright (C) 2020 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # a b <ahx7@posteo.net>, 2017 # Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021 @@ -10,17 +10,18 @@ # tk2015, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2020-11-16 17:04+0000\n" -"PO-Revision-Date: 2021-02-07 12:13+0000\n" -"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Ettore Atalan <atalanttore@googlemail.com>, 2014-2017,2021\n" "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: de\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -28,74 +29,37 @@ msgstr "I2P im Vergleich zu Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für" -" Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher " -"zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' " -"gerecht zu werden. Während Freenet als verteilter Datenspeicher " -"konzipiert wurde, hat die Comunity darüber hinaus Anwendungen " -"programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung " -"stellt wie statische Webseiten und Nachrichtenboards. " +msgstr "Freenet ist ein vollständig verteiltes anonymes Peer-to-Peer Netzwerk für Veröffentlichungen, welches sichere Methoden bereitstellt, Daten sicher zu speichern, so wie einige Ansätze den Lasten eines 'Flash Flood' gerecht zu werden. Während Freenet als verteilter Datenspeicher konzipiert wurde, hat die Comunity darüber hinaus Anwendungen programmiert, die mehr ursprüngliche anonyme Kommunikation zur Verfügung stellt wie statische Webseiten und Nachrichtenboards. " #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\n" -"Freenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, " -"auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, " -"dass beliebte und viel verwendete Daten sehr effektiv verteilt werden " -"können. I2P selbst bietet keine derartige Funktionalität und wird diese " -"auch in Zukunft nicht tun.\n" -"Auf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym " -"kommunizieren wollen durch Websites, Message Boards, File Sharing " -"Programme etc. Es wurden Versuche unternommen einen verteilten " -"Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung" -" von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts " -"davon in breiterer Verwendung." +msgstr "Verglichen mit I2P hat Freenet einige wesentliche Vorteile zu bieten.\nFreenet ist ein verteilter Datenspeicher, der es den Nutzern erlaubt, auch wenn die Quelle offline ist dessen Daten zu empfangen.Hinzu kommt, dass beliebte und viel verwendete Daten sehr effektiv verteilt werden können. I2P selbst bietet keine derartige Funktionalität und wird diese auch in Zukunft nicht tun.\nAuf der anderen Seite gibt es jedoch auch Nutzer, die einfach nur anonym kommunizieren wollen durch Websites, Message Boards, File Sharing Programme etc. Es wurden Versuche unternommen einen verteilten Datenspeicher zu entwickeln, der über I2P läuft, (zuletzt eine Portierung von <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) jedoch ist derzeit nichts davon in breiterer Verwendung." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -105,40 +69,28 @@ msgstr "I2P im Vergleich zu anderen Projekten" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" +msgstr "Es gibt sehr viele andere Anwendungen und Projekte die an anonymer Kommunikation arbeiten und I2P wurde von vielen dieser Anstrengungen inspiriert. Dies ist keine umfassende Liste anonymer Ressourcen. Sowohl freehavens\n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nals auch auf GNUnet <a href=\"https://www.gnunet.org/links/\">bezogene Projekte</a>\nsind hierfür sehr gut geeignet. Einige wenige Systeme eigenen sich für\neinen weitergehenden Vergleich. Für folgende Projekte gibt eigene Vergleichsseiten:" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere " -"Netzwerke</a> erörtert:" +msgstr "Die folgenden werden auf der Seite <a href=\"%(othernetworks)s\">Andere Netzwerke</a> erörtert:" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Der Inhalt dieser Seite wird fortwährend aktualisiert und diskutiert, und" -" wir begrüßen Kommentare und Ergänzungen.\n" -"Ein eigener Vergleich kann beigesteuert werden, indem man ein <a " -"href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -155,58 +107,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Die meisten der nachfolgenden Abschnitte sind eher alt und vielleicht " -"nicht mehr zutreffend.\n" -"Für eine Ãœbersicht bestehender Vergleiche siehe die\n" -"<a href=\"%(comparison)s\">Hauptseite für Netzwerkvergleiche</a>.\n" -"Ein eigener Vergleich kann beigesteuert werden, indem man ein\n" -"<a href=\"%(trac)s\">neues Ticket auf Trac</a> anlegt." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -214,19 +146,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -238,32 +166,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -272,36 +188,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -309,10 +212,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -326,7 +227,7 @@ msgstr "Bezahlte VPN-Dienste" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -388,9 +289,7 @@ msgstr "Vergleich der Tor- und I2P-Terminologie" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre " -"Terminologie weitgehend anders." +msgstr "Obwohl Tor und I2P in vielerlei Hinsicht ähnlich sind, ist ihre Terminologie weitgehend anders." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -463,7 +362,7 @@ msgstr "Versteckter Dienst" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" +msgid "I2P Site or Destination" msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 @@ -534,15 +433,10 @@ msgstr "Vorteile von Tor gegenüber I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-" -"Communities viel häufiger vor; profitiert von\n" -"wissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\n" -"hat einen nicht-anonymen, bekannten Projektleiter an einer Universität" +msgstr "Viel größere Nutzerbasis; kommt im akademischen Bereich und bei Hacker-Communities viel häufiger vor; profitiert von\nwissenschaftlichen Studien über Anonymität, Resistenz und Performanz;\nhat einen nicht-anonymen, bekannten Projektleiter an einer Universität" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" @@ -558,34 +452,24 @@ msgstr "Hat mehr Entwickler, davon mehrere mit finanzieller Unterstützung" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht " -"und Bridges\n" -"(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese " -"sind noch nicht umgesetzt)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Resistenter gegenüber staatlichem Sperren wegen der TLS Transportschicht und Bridges\n(bei I2P gibt es Vorschläge für \"full restricted routes\", aber diese sind noch nicht umgesetzt)" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "Groß genug, dass es sich auf Blocking und DOS-Attacken einstellen musste" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von " -"Exit-Knoten" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Ausgerichtet und optimiert auf Exit-Traffic mit einer großen Anzahl von Exit-Knoten" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Bessere Dokumentation, hat wissenschaftliche Arbeiten und " -"Spezifikationen,\n" -"bessere Website, viel mehr Ãœbersetzungen" +msgstr "Bessere Dokumentation, hat wissenschaftliche Arbeiten und Spezifikationen,\nbessere Website, viel mehr Ãœbersetzungen" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -605,9 +489,7 @@ msgstr "" msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"Ein Kern von Knoten mit hoher Kapazität\n" -"sorgt für höheren Durchsatz und niedrigere Latenz" +msgstr "Ein Kern von Knoten mit hoher Kapazität\nsorgt für höheren Durchsatz und niedrigere Latenz" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -619,8 +501,8 @@ msgstr "Vorteile von I2P gegenüber Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -631,11 +513,7 @@ msgstr "Vollkommen verteilt und selbst-organisierend" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung" -"\n" -"ausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu " -"vertrauen" +msgstr "Peers werden mittels fortlaufender Profilbildung und Performanzeinstufung\nausgewählt, anstatt der von ihnen selbst angegebenen Kapazität zu vertrauen" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" @@ -645,9 +523,7 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" -msgstr "" -"Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-" -"Attacken gab" +msgstr "Klein genug, dass es bisher kaum oder gar keine Blockierungen bzw. DOS-Attacken gab" #: i2p2www/pages/site/comparison/tor.html:135 msgid "Peer-to-peer friendly" @@ -682,10 +558,7 @@ msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"Unidirektionale Tunnel statt bidirektionaler\n" -"Schaltungen, was die Zahl der zu kompromittierenden Stellen\n" -"verdoppelt um an dieselbe Information zu gelangen." +msgstr "Unidirektionale Tunnel statt bidirektionaler\nSchaltungen, was die Zahl der zu kompromittierenden Stellen\nverdoppelt um an dieselbe Information zu gelangen." #: i2p2www/pages/site/comparison/tor.html:166 #, python-format @@ -744,9 +617,7 @@ msgstr "Weitere potentielle Vorteile von I2P, aber noch nicht implementiert" #: i2p2www/pages/site/comparison/tor.html:207 msgid "...and may never be implemented, so don't count on them!" -msgstr "" -"...und die vielleicht niemals implementiert werden, also nicht darauf " -"verlassen!" +msgstr "...und die vielleicht niemals implementiert werden, also nicht darauf verlassen!" #: i2p2www/pages/site/comparison/tor.html:210 msgid "" @@ -768,4 +639,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/de/LC_MESSAGES/docs.po b/i2p2www/translations/de/LC_MESSAGES/docs.po index 3d161c61b604e2337d45a3cc0859af77757ea83a..5232c3b902b181eafef91a17b4f12381138eec5b 100644 --- a/i2p2www/translations/de/LC_MESSAGES/docs.po +++ b/i2p2www/translations/de/LC_MESSAGES/docs.po @@ -4561,7 +4561,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:72 msgid "for" -msgstr "" +msgstr "nach" #: i2p2www/pages/site/docs/applications/git.html:74 msgid "in order to obscure your local time zone." diff --git a/i2p2www/translations/de/LC_MESSAGES/misc.po b/i2p2www/translations/de/LC_MESSAGES/misc.po index 956eda9209ef0def120ef041e51e16633c60b9ba..3c6232835555f547ea38c76e6ad70b75059adc37 100644 --- a/i2p2www/translations/de/LC_MESSAGES/misc.po +++ b/i2p2www/translations/de/LC_MESSAGES/misc.po @@ -1,7 +1,7 @@ -# German translations for I2P. -# Copyright (C) 2019 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # a b <ahx7@posteo.net>, 2017 # Ettore Atalan <atalanttore@googlemail.com>, 2014,2016 @@ -10,17 +10,18 @@ # tk2015, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2019-08-20 18:44+0000\n" -"Last-Translator: Forecast <taisto@web.de>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Forecast <taisto@web.de>, 2018-2019\n" "Language-Team: German (http://www.transifex.com/otf/I2P/language/de/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: de\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -29,80 +30,39 @@ msgstr "I2P auf der CLT und PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Mitglieder des I2P-Teams werden bei der CLT und der PetCon 2009 Vorträge " -"halten.\n" -"Zwei Mitglieder des I2P-Teams werden beim Linux Tag und einer " -"Sicherheitskonferenz anwesend sein." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Mitglieder des I2P-Teams werden bei der CLT und der PetCon 2009 Vorträge halten.\nZwei Mitglieder des I2P-Teams werden beim Linux Tag und einer Sicherheitskonferenz anwesend sein." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"Am 14. März 2009 wird es einen kurzen Vortrag von Echelon mit einer " -"allgemeinen Einführung zu I2P beim <a href=\"%(chemnitzer)s\">Chemnitzer " -"Linux Tag 2009</a> geben.\n" -"Echelon und weitere Mitglieder der I2P-Familie werden das Linuxtreffen an" -" beiden Tagen (Sa. und So.) besuchen und auch als Mitglieder der I2P-" -"Familie erkennbar sein. Trefft sie, fragt sie und unterstützt sie!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "Am 14. März 2009 wird es einen kurzen Vortrag von Echelon mit einer allgemeinen Einführung zu I2P beim <a href=\"%(chemnitzer)s\">Chemnitzer Linux Tag 2009</a> geben.\nEchelon und weitere Mitglieder der I2P-Familie werden das Linuxtreffen an beiden Tagen (Sa. und So.) besuchen und auch als Mitglieder der I2P-Familie erkennbar sein. Trefft sie, fragt sie und unterstützt sie!" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"Nur 10 Tage später findet die <a href=\"%(petcon)s\">Privacy and Data " -"Security convention</a> in Dresden statt.\n" -"echelon wird an dieser Veranstaltung wieder teilnehmen und eine " -"allgemeine Einführung in I2P geben, so wie einen weiteren Talk über die " -"Einstellung der I2P Clients." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "Nur 10 Tage später findet die <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden statt.\nechelon wird an dieser Veranstaltung wieder teilnehmen und eine allgemeine Einführung in I2P geben, so wie einen weiteren Talk über die Einstellung der I2P Clients." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"Der I2P-Quelltext wurde in einem CVS-Repositorium bereitgestellt. " -"Mittlerweile dient dazu ein <a href=\"%(monotone)s\">Monotone</a> " -"-Repositorium.\n" -"Für die, die sich mit CVS noch nicht so gut auskennen, gibt es hier ein\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">tolles Buch</a> zum " -"Thema (Entwickler müssen sich eigentlich nut mir dem ersten Kapitel " -"befassen - \"An Overview of\n" -"CVS\", da die weiteren Kapitel doch sehr weit in Details gehen, dei hier " -"im Grunde nicht gebraucht werden)." +msgstr "Der I2P-Quelltext wurde in einem CVS-Repositorium bereitgestellt. Mittlerweile dient dazu ein <a href=\"%(monotone)s\">Monotone</a> -Repositorium.\nFür die, die sich mit CVS noch nicht so gut auskennen, gibt es hier ein\n<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">tolles Buch</a> zum Thema (Entwickler müssen sich eigentlich nut mir dem ersten Kapitel befassen - \"An Overview of\nCVS\", da die weiteren Kapitel doch sehr weit in Details gehen, dei hier im Grunde nicht gebraucht werden)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" -"commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Ein nettes Zitat von WinCVS: \"Did you know... Never experiment with new" -" CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" +msgstr "Ein nettes Zitat von WinCVS: \"Did you know... Never experiment with new CVS\ncommands on your working repository. Create a sample module instead.\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -113,20 +73,13 @@ msgstr "I2PTunnel-Migration" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" -"Nach dem Upgrade auf die neue Architektur, ist ein wenig Nachbessern " -"angesagt, um die alten I2PTunnel-getriebenen Server zum Laufen zu " -"bekommen.\n" -"Schauen wir uns dazu ein kleines Beispiel an. Für eine alte clientApp-" -"Konfiguration hatttest du:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16 msgid "To provide that same functionality on the new web architecture:" -msgstr "" -"Um die gleiche Funktionalität auf der neuen Netzarchitektur " -"bereitzustellen:" +msgstr "Um die gleiche Funktionalität auf der neuen Netzarchitektur bereitzustellen:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:18 #, python-format @@ -138,12 +91,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "Klicke auf Add new: [Server tunnel] \"Go\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Für den Namen: <code>\"eepsite\"</code>" +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Für die Beschreibung: <code>\"Meine eepsite, ist sie nicht toll?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -157,11 +110,7 @@ msgstr "Für den Ziel-Port:" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Für meine private Schlüsseldatei: <code>Pfad nach " -"\"myWebPriv.dat\"</code><br /> \n" -"(es wird empfohlen diese .dat ins neue Installationsverzeichnis zu " -"kopieren)" +msgstr "Für meine private Schlüsseldatei: <code>Pfad nach \"myWebPriv.dat\"</code><br /> \n(es wird empfohlen diese .dat ins neue Installationsverzeichnis zu kopieren)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -177,22 +126,12 @@ msgstr "Dann wird die Meldung kommen:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" -msgstr "" -"Das war's! Einen neuen I2PTunnel-Server zu erstellen funktioniert genau " -"so, abgesehen davon, dass man sich das Kopieren von alten Dateien sparen " -"kann. Im Hintergrung wird alles durch die <code>i2ptunnel.config</code> " -"gesteuert, die separat modifiziert werden kann (wenn ja, wähle auf der " -"I2PTunnel-Webseite \"Konfiguration neu laden\" woraufhin alle deine " -"existierenden Tunnel beendet und neu erstellt werden)" +msgstr "Das war's! Einen neuen I2PTunnel-Server zu erstellen funktioniert genau so, abgesehen davon, dass man sich das Kopieren von alten Dateien sparen kann. Im Hintergrung wird alles durch die <code>i2ptunnel.config</code> gesteuert, die separat modifiziert werden kann (wenn ja, wähle auf der I2PTunnel-Webseite \"Konfiguration neu laden\" woraufhin alle deine existierenden Tunnel beendet und neu erstellt werden)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47 msgid "" @@ -208,7 +147,7 @@ msgid "I2PTunnel services" msgstr "I2PTunnel-Dienste" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 @@ -224,51 +163,44 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." -msgstr "" -"Empfehlenswert ist der Tiny Httpd Webserver alias thttpd (Windows-Version" -" verfügbar), es kann aber auch jeder gewünschte andere eingesetzt werden." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." +msgstr "Empfehlenswert ist der Tiny Httpd Webserver alias thttpd (Windows-Version verfügbar), es kann aber auch jeder gewünschte andere eingesetzt werden." #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 msgid "" "Make sure your firewall is set up so that you cannot receive incoming " "connections on this port (which would breach your anonymity)." -msgstr "" -"Stelle sicher, dass deine firewall eingerichtet ist, so dass du keine " -"eingehenden Verbindungen auf diesem Port empfangen kannst (was deine " -"Anonymität brechen würde)." +msgstr "Stelle sicher, dass deine firewall eingerichtet ist, so dass du keine eingehenden Verbindungen auf diesem Port empfangen kannst (was deine Anonymität brechen würde)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:25 msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 msgid "" "Once your webserver is working, and you can access it locally with your " "browser, continue to the next step." -msgstr "" -"Sobald dein webserver arbeitet und du lokal mit deinem browser auf ihn " -"zugreifen kannst, fahre mit dem nächsten Schritt fort." +msgstr "Sobald dein webserver arbeitet und du lokal mit deinem browser auf ihn zugreifen kannst, fahre mit dem nächsten Schritt fort." #: i2p2www/pages/site/misc/i2ptunnel-services.html:33 msgid "2 - Generate an I2P Destination Keypair" @@ -276,102 +208,85 @@ msgstr "2 - Erzeuge ein I2P Ziel Schlüsselpaar" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." -msgstr "" -"I2P verwendet keine IP-Adressen. Um die Anonymität zu schützen, verwendet" -" es eigene eindeutige Adressen, sog. \"destination keys\" " -"(Zielschlüssel)." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." +msgstr "I2P verwendet keine IP-Adressen. Um die Anonymität zu schützen, verwendet es eigene eindeutige Adressen, sog. \"destination keys\" (Zielschlüssel)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 msgid "Each service you run on I2P requires a different keypair." -msgstr "" -"Jeder Dienst, den Sie auf I2P betreiben, benötigt ein anderes " -"Schlüsselpaar." +msgstr "Jeder Dienst, den Sie auf I2P betreiben, benötigt ein anderes Schlüsselpaar." #: i2p2www/pages/site/misc/i2ptunnel-services.html:47 msgid "" "To generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code> (all on one line)" -msgstr "" -"Um ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code> (alles in einer Zeile)" +msgstr "Um ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (alles in einer Zeile)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:50 msgid "" "In windows, to generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code>" -msgstr "" -"Um in Windows ein Schlüsselpaar zu generieren, lautet das Kommando: " -"<code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code>" +msgstr "Um in Windows ein Schlüsselpaar zu generieren, lautet das Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 msgid "" "We now need to export your public key into base64 format, which you will " "share with others." -msgstr "" -"Wir müssen jetzt deinen öffentlichen Schlüssel in base64 Format " -"exportieren, das du dann mit anderen teilen wirst." +msgstr "Wir müssen jetzt deinen öffentlichen Schlüssel in base64 Format exportieren, das du dann mit anderen teilen wirst." #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." -msgstr "" -"Allerdings, im Gegensatz zu einer IP Adresse, gibt es keinen Weg, den " -"physischen Standort deines Rechners nachzuverfolgen - obwohl dein Server " -"durch I2P angesprochen werden kann, kann deine IP Adresse nicht mit " -"diesem Zielschlüssel in Verbindung gebracht oder verfolgt werden." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." +msgstr "Allerdings, im Gegensatz zu einer IP Adresse, gibt es keinen Weg, den physischen Standort deines Rechners nachzuverfolgen - obwohl dein Server durch I2P angesprochen werden kann, kann deine IP Adresse nicht mit diesem Zielschlüssel in Verbindung gebracht oder verfolgt werden." #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 msgid "3 - Open a 'Tunnel' from I2P To Your Server" @@ -379,9 +294,9 @@ msgstr "3 - Öffne einen \"Tunnel\" von I2P zu deinem Server" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 @@ -389,39 +304,27 @@ msgid "" "To activate such a tunnel, type the command <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code> (all one line)." -msgstr "" -"Um so einen Tunnel zu aktivieren, tippen sie <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " -"myWebPrivKey.dat\"</code> (alles eine Zeile)" +msgstr "Um so einen Tunnel zu aktivieren, tippen sie <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (alles eine Zeile)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:78 msgid "" "If you used different filenames or port number earlier on, change these " "accordingly" -msgstr "" -"Wenn du vorher verschiedene Dateinamen oder Portnummern verwendet hast, " -"ändere diese entsprechend" +msgstr "Wenn du vorher verschiedene Dateinamen oder Portnummern verwendet hast, ändere diese entsprechend" #: i2p2www/pages/site/misc/i2ptunnel-services.html:81 msgid "" "Windows users, remember to replace apostrophes with double quotes. Thus: " "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code>" -msgstr "" -"Windowsnutzer müssen Apostrophe mit doppelten Anführungszeichen ersetzen." -" Also: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost " -"10880 myWebPrivKey.dat\"</code>" +msgstr "Windowsnutzer müssen Apostrophe mit doppelten Anführungszeichen ersetzen. Also: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." -msgstr "" -"Innerhalb weniger Sekunden sollte der \"Tunnel\" nun aktiv sein und " -"entfernte Clients sollten sich anonym zum Server verbinden können. Nicht " -"vergessen, den Router \"warmlaufen\" zu lassen, bevor man Clients daruf " -"aufmacht." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." +msgstr "Innerhalb weniger Sekunden sollte der \"Tunnel\" nun aktiv sein und entfernte Clients sollten sich anonym zum Server verbinden können. Nicht vergessen, den Router \"warmlaufen\" zu lassen, bevor man Clients daruf aufmacht." #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 msgid "4 - Update Your hosts.txt File " @@ -438,9 +341,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 @@ -474,50 +377,43 @@ msgstr "Wir müssen jetzt weiter als nur an Webserver denken." #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"Das schöne an I2P ist, dass man die normalen Clients und Server der " -"meisten Protokolle durch das anonyme Netzwerk transparent tunneln kann." +msgstr "Das schöne an I2P ist, dass man die normalen Clients und Server der meisten Protokolle durch das anonyme Netzwerk transparent tunneln kann." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." -msgstr "" -"Einen Client-Tunnel für den eigenen Server startet man mit dem Kommando: " -"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e " -"\"client 10888 textofbase64key\"</code> (alles in einer Zeile)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." +msgstr "Einen Client-Tunnel für den eigenen Server startet man mit dem Kommando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (alles in einer Zeile)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." -msgstr "" -"Der Port 10888 ist willkürlich gewählt - es muss nur ein anderer sein als" -" der physische Port auf dem der eigene Server lauscht." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." +msgstr "Der Port 10888 ist willkürlich gewählt - es muss nur ein anderer sein als der physische Port auf dem der eigene Server lauscht." #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 msgid "" @@ -531,10 +427,7 @@ msgstr "" msgid "" "Within a minute or two of launching this command, the client tunnel from " "your local machine into I2P will be open and ready for use." -msgstr "" -"Etwa ein bis zwei Minuten nach dem Ausführen des Befehls sollte der " -"Client-Tunnel vom lokalen Rechner ins I2P-Netz offen sein und kann dann " -"genutzt werden." +msgstr "Etwa ein bis zwei Minuten nach dem Ausführen des Befehls sollte der Client-Tunnel vom lokalen Rechner ins I2P-Netz offen sein und kann dann genutzt werden." #: i2p2www/pages/site/misc/i2ptunnel-services.html:141 msgid "" @@ -547,17 +440,14 @@ msgstr "" msgid "" "Verify that the main page of your server eventually comes up in your " "browser." -msgstr "" -"Man sollte dann prüfen, dass die Eingangsseite des eigenen Servers im " -"Browser erscheint." +msgstr "Man sollte dann prüfen, dass die Eingangsseite des eigenen Servers im Browser erscheint." #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 @@ -568,25 +458,25 @@ msgstr "7 - Teile deine Serverdetails mit anderen" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 @@ -595,11 +485,9 @@ msgstr "8. Skripte schreiben, um sich lästige Tipparbeit zu sparen" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." -msgstr "" -"Es wäre ziemlich lästig, zum Aufsetzen eines I2P-Servers oder -Clients " -"jedesmal alle Befehle erneut einzugeben." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." +msgstr "Es wäre ziemlich lästig, zum Aufsetzen eines I2P-Servers oder -Clients jedesmal alle Befehle erneut einzugeben." #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 msgid "" @@ -607,8 +495,8 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 @@ -619,19 +507,17 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." -msgstr "" -"Ãœbung für Windows-Nutzer - setupServer.py in eine MS-DOS .BAT-Datei " -"portieren." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgstr "Ãœbung für Windows-Nutzer - setupServer.py in eine MS-DOS .BAT-Datei portieren." #: i2p2www/pages/site/misc/invisiblenet.html:2 msgid "Old Documents" @@ -639,13 +525,11 @@ msgstr "Alte Dokumente" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." +"However, the I2CP and I2NP documents in particular have some good information." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:3 @@ -658,8 +542,7 @@ msgstr "Ãœbersicht" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." msgstr "" @@ -673,18 +556,15 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" @@ -698,12 +578,9 @@ msgstr "JBigI kompilieren und testen" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." -msgstr "" -"Nachfolgend eine Anleitung zum Kompilieren einer neuen jbigi-Bibliothek " -"für die eigene Plattorm und zum Testen der Performance." +msgstr "Nachfolgend eine Anleitung zum Kompilieren einer neuen jbigi-Bibliothek für die eigene Plattorm und zum Testen der Performance." #: i2p2www/pages/site/misc/jbigi.html:42 msgid "Requirements" @@ -712,33 +589,25 @@ msgstr "Voraussetzungen" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " -msgstr "" -"Der benötigte Sourcecode ist als Monotone-Datenbank und als aktueller " -"Tarball verfügbar." +"The required code is available in monotone database and the latest source " +"tarball. " +msgstr "Der benötigte Sourcecode ist als Monotone-Datenbank und als aktueller Tarball verfügbar." #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." msgstr "" @@ -749,8 +618,7 @@ msgstr "Schritt-für-Schritt-Anweisungen" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" msgstr "" @@ -778,35 +646,26 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" msgstr "" #: i2p2www/pages/site/misc/jbigi.html:92 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>" -msgstr "" -"Innerhalb des Sourcebaums in folgendes Verzeichnis wechseln: " -"<code>core/c/jbigi</code>" +msgstr "Innerhalb des Sourcebaums in folgendes Verzeichnis wechseln: <code>core/c/jbigi</code>" #: i2p2www/pages/site/misc/jbigi.html:93 msgid "" @@ -814,18 +673,14 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." msgstr "" @@ -833,17 +688,13 @@ msgstr "" msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." msgstr "" @@ -871,11 +722,8 @@ msgstr "Starten Sie Ihre I2P-Programme neu." #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." msgstr "" @@ -885,21 +733,16 @@ msgstr "Jrandom´s Ankündigung" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"Die folgende Nachricht wurde Mitte November 2007 empfangen. Wir haben " -"keine weitere Information\n" -"über Jrandom´s Status." +msgstr "Die folgende Nachricht wurde Mitte November 2007 empfangen. Wir haben keine weitere Information\nüber Jrandom´s Status." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" @@ -911,10 +754,7 @@ msgstr "" msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"Etwa zwei Monate später wurde\n" -"forum.i2p.net aus ganz anderen Gründen nach <a " -"href=\"http://%(forum)s/\">%(forum)s</a> verschoben." +msgstr "Etwa zwei Monate später wurde\nforum.i2p.net aus ganz anderen Gründen nach <a href=\"http://%(forum)s/\">%(forum)s</a> verschoben." #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -924,33 +764,24 @@ msgstr "Java-Wrapper manuell installieren" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." msgstr "" @@ -959,7 +790,8 @@ msgid "Using existing binaries" msgstr "Vorhandene Binärdateien verwenden" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -970,18 +802,14 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:37 #: i2p2www/pages/site/misc/manual-wrapper.html:65 msgid "<code>tail -f /tmp/wrapper.log</code> and look for any problems." -msgstr "" -"Mit <code>tail -f /tmp/wrapper.log</code> schauen, ob es dabei Probleme " -"gibt." +msgstr "Mit <code>tail -f /tmp/wrapper.log</code> schauen, ob es dabei Probleme gibt." #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." -msgstr "" -"Wenn das nicht funktioniert braucht man <code>runplain.sh</code> zum " -"Starten von I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." +msgstr "Wenn das nicht funktioniert braucht man <code>runplain.sh</code> zum Starten von I2P." #: i2p2www/pages/site/misc/manual-wrapper.html:43 msgid "Compiling from source" @@ -989,16 +817,15 @@ msgstr "Aus dem Quellcode kompilieren" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:49 @@ -1007,19 +834,15 @@ msgstr "Tar-Archiv extrahieren" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" -msgstr "" -"Man setze die ENV-Variablen <code>ANT_HOME</code> und " -"<code>JAVA_HOME</code>. In Debian geht das z.B. so:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" +msgstr "Man setze die ENV-Variablen <code>ANT_HOME</code> und <code>JAVA_HOME</code>. In Debian geht das z.B. so:" #: i2p2www/pages/site/misc/manual-wrapper.html:54 msgid "" "Since there isn't a Makefile for Mipsel, we'll make a copy of an already " "existing makefile:" -msgstr "" -"Da es für Mipsel kein Makefile gibt, kann man eines anderes Makefile " -"kopieren." +msgstr "Da es für Mipsel kein Makefile gibt, kann man eines anderes Makefile kopieren." #: i2p2www/pages/site/misc/manual-wrapper.html:56 msgid "Now we can attempt to compile the wrapper:" @@ -1027,9 +850,7 @@ msgstr "Jetzt kann man versuchen, den Wrapper zu kompilieren:" #: i2p2www/pages/site/misc/manual-wrapper.html:57 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM" -msgstr "" -"Das Skript <code>./build64.sh</code> verwenden wenn man eine 64bit-CPU " -"and -JVM benutzt" +msgstr "Das Skript <code>./build64.sh</code> verwenden wenn man eine 64bit-CPU and -JVM benutzt" #: i2p2www/pages/site/misc/manual-wrapper.html:58 msgid "Copy the wrapper into its proper place:" @@ -1053,164 +874,110 @@ msgstr "" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" msgstr "" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." msgstr "" #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." msgstr "" #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" msgstr "" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" msgstr "" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." msgstr "" @@ -1225,11 +992,9 @@ msgstr "" #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" -msgstr "" -"Die Liste wurde erstellt mit dem folgenden Kommando aus dem obersten " -"Verzeichnis des Branches i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" +msgstr "Die Liste wurde erstellt mit dem folgenden Kommando aus dem obersten Verzeichnis des Branches i2p.i2p:" #: i2p2www/pages/site/misc/ratestats.html:10 msgid "All options aren't needed, but it works." @@ -1243,36 +1008,17 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"Der Quellcode von I2P wird in mehreren verteilten Monotone-Repositories " -"vorgehalten.\n" -"Siehe\n" -"<a href=\"http://www.monotone.ca/\">Monotone-Webseite</a> für " -"Informationen\n" -"zu Monotone.\n" -"Siehe\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">diesen Foreneintrag zu " -"I2P auf Monotone</a>\n" -"für weitere Informationen wie man einsteigen und den Quellcode anonym " -"auschecken kann.\n" -"Es gibt außerdem eine Schnellstart-Anleitung auf der\n" -"<a href=\"%(newdevs)s\">neuen Entwickler-Seite</a>." +msgstr "Der Quellcode von I2P wird in mehreren verteilten Monotone-Repositories vorgehalten.\nSiehe\n<a href=\"http://www.monotone.ca/\">Monotone-Webseite</a> für Informationen\nzu Monotone.\nSiehe\n<a href=\"http://%(forum)s/viewtopic.php?t=2524\">diesen Foreneintrag zu I2P auf Monotone</a>\nfür weitere Informationen wie man einsteigen und den Quellcode anonym auschecken kann.\nEs gibt außerdem eine Schnellstart-Anleitung auf der\n<a href=\"%(newdevs)s\">neuen Entwickler-Seite</a>." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." -msgstr "" -"Um den Quellcode nicht-anonym zu laden, kann man vom öffentlichen Server " -"mtn.welterde.de einen Pull-Request machen.\n" -"Der Branch vom I2P-Quellcode ist \"i2p.i2p\"." +msgstr "Um den Quellcode nicht-anonym zu laden, kann man vom öffentlichen Server mtn.welterde.de einen Pull-Request machen.\nDer Branch vom I2P-Quellcode ist \"i2p.i2p\"." #: i2p2www/pages/site/misc/transition-guide.html:21 msgid "Guide" @@ -1299,24 +1045,20 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." @@ -1329,11 +1071,9 @@ msgstr "Nachrichten-URL ändern zu: %(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " -msgstr "" -"Wähle EINE der folgenden neuen Aktualisierungs-URLs zufällig aus und gebe" -" sie in das Feld für die Aktualisierungs-URL ein:" +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " +msgstr "Wähle EINE der folgenden neuen Aktualisierungs-URLs zufällig aus und gebe sie in das Feld für die Aktualisierungs-URL ein:" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 msgid "Check the box \"Update through the eepProxy?\"" @@ -1354,8 +1094,7 @@ msgstr "Klicken Sie auf \"Ãœbernehmen\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." msgstr "" @@ -1364,7 +1103,5 @@ msgstr "" msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." +"Thank you for your support during this transition. For help please contact us on #i2p." msgstr "" - diff --git a/i2p2www/translations/el/LC_MESSAGES/about.po b/i2p2www/translations/el/LC_MESSAGES/about.po index 81602fdefd9a5418e3d1c53cec775822c151a37f..dfc8e601b737137a9ebb6102a0b046d32de03b2a 100644 --- a/i2p2www/translations/el/LC_MESSAGES/about.po +++ b/i2p2www/translations/el/LC_MESSAGES/about.po @@ -1,23 +1,24 @@ -# Greek translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # LaScapigliata <ditri2000@hotmail.com>, 2015 # anvo <fragos.george@hotmail.com>, 2020 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: Elektra M. <safiragon@yahoo.gr>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: anvo <fragos.george@hotmail.com>, 2020\n" "Language-Team: Greek (http://www.transifex.com/otf/I2P/language/el/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: el\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -27,15 +28,9 @@ msgstr "Εναλλακτικοί πελάτες/Ï€ÏογÏάμματα Ι2Ρ" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"Η κÏÏια υλοποίηση του πελάτη/Ï€ÏογÏάμματος Ι2Ρ χÏησιμοποιεί Java. Αν για " -"κάποιον\n" -"λόγο δεν μποÏείτε να χÏησιμοποιήσετε την Java στην συσκευή σας υπάÏχουν " -"εναλλακτικÎÏ‚ υλοποιήσεις\n" -"που αναπτÏσσονται από μÎλη της κοινότητας." +msgstr "Η κÏÏια υλοποίηση του πελάτη/Ï€ÏογÏάμματος Ι2Ρ χÏησιμοποιεί Java. Αν για κάποιον\nλόγο δεν μποÏείτε να χÏησιμοποιήσετε την Java στην συσκευή σας υπάÏχουν εναλλακτικÎÏ‚ υλοποιήσεις\nπου αναπτÏσσονται από μÎλη της κοινότητας." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -43,34 +38,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"Το <a href=\"%(i2pd)s\">i2pd</a> είναι μια υλοποίηση Ï€ÏογÏάμματος/πελάτη " -"του Ι2Ρ σε C++.\n" -"Από τις αÏχÎÏ‚ του 2016 το i2pd Îγινε αÏκετά σταθεÏÏŒ ώστε να " -"χÏησιμοποιείται στην\n" -"παÏαγωγή και από το καλοκαίÏι του 2016 εφαÏμόζει πλήÏως όλα τα ΑΡΙ του " -"Ι2Ρ." +msgstr "Το <a href=\"%(i2pd)s\">i2pd</a> είναι μια υλοποίηση Ï€ÏογÏάμματος/πελάτη του Ι2Ρ σε C++.\nΑπό τις αÏχÎÏ‚ του 2016 το i2pd Îγινε αÏκετά σταθεÏÏŒ ώστε να χÏησιμοποιείται στην\nπαÏαγωγή και από το καλοκαίÏι του 2016 εφαÏμόζει πλήÏως όλα τα ΑΡΙ του Ι2Ρ." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"Το <a href=\"%(kovri)s\">Kovri</a> είναι Îνας ενεÏγός κλάδος ανάπτυξης " -"του i2pd για το κÏυπτονόμισμα Monero." +msgstr "Το <a href=\"%(kovri)s\">Kovri</a> είναι Îνας ενεÏγός κλάδος ανάπτυξης του i2pd για το κÏυπτονόμισμα Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"Το <a href=\"%(go_i2p)s\">Go-I2P</a> είναι Îνα Ï€ÏόγÏαμμα/πελάτης Ι2Ρ που " -"αναπτÏσσεται με την χÏήση της\n" -"γλώσσας Ï€ÏογÏÎ±Î¼Î¼Î±Ï„Î¹ÏƒÎ¼Î¿Ï <a href=\"%(golang)s\">Go</a>. Το ÎÏγο αυτό είναι" -" σε αÏχικό στάδιο ανάπτυξης. " +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "Το <a href=\"%(go_i2p)s\">Go-I2P</a> είναι Îνα Ï€ÏόγÏαμμα/πελάτης Ι2Ρ που αναπτÏσσεται με την χÏήση της\nγλώσσας Ï€ÏογÏÎ±Î¼Î¼Î±Ï„Î¹ÏƒÎ¼Î¿Ï <a href=\"%(golang)s\">Go</a>. Το ÎÏγο αυτό είναι σε αÏχικό στάδιο ανάπτυξης. " #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -82,24 +64,158 @@ msgstr "ΓλωσσάÏι" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -109,15 +225,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -131,12 +246,8 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -146,13 +257,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -161,15 +272,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -178,28 +289,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -208,36 +318,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -246,13 +355,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -261,15 +370,11 @@ msgstr "ΣυγκÏίσεις" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -288,9 +393,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -347,8 +451,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -367,8 +470,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -377,8 +479,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -391,8 +492,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -401,8 +501,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -410,8 +510,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -426,15 +525,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -446,8 +543,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -502,16 +598,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -520,11 +614,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -577,16 +669,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -602,12 +692,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -621,35 +708,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -658,16 +739,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -684,11 +763,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -697,18 +822,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -719,84 +841,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -807,8 +906,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -816,27 +914,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -844,26 +938,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -874,10 +959,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -885,18 +968,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -907,10 +987,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1082,7 +1160,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1322,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1372,32 +1452,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1415,8 +1488,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1455,10 +1528,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1472,15 +1543,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1489,11 +1556,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1548,8 +1612,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1567,15 +1630,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1594,14 +1653,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1612,20 +1667,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1636,24 +1684,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1673,33 +1712,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1712,32 +1742,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1747,27 +1769,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1784,17 +1798,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1807,8 +1818,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1819,10 +1829,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1841,30 +1849,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1878,55 +1879,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1937,20 +1923,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1961,16 +1940,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1980,17 +1954,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2001,20 +1972,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2028,26 +1992,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2056,18 +2010,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2075,16 +2023,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2100,52 +2043,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2160,102 +2084,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2268,4 +2151,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/el/LC_MESSAGES/get-involved.po b/i2p2www/translations/el/LC_MESSAGES/get-involved.po index 6410e2c334d011a348d9f7a6727f8c715ace6119..3a900cb6c962b70222a8606b58b8db5781ac28a4 100644 --- a/i2p2www/translations/el/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/el/LC_MESSAGES/get-involved.po @@ -1,22 +1,23 @@ -# Greek translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # LaScapigliata <ditri2000@hotmail.com>, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: george k <norhorn@gmail.com>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: LaScapigliata <ditri2000@hotmail.com>, 2015\n" "Language-Team: Greek (http://www.transifex.com/otf/I2P/language/el/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: el\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +32,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +49,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +114,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +145,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +161,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +195,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +209,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +222,8 @@ msgstr "ΜετάφÏαση" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +234,12 @@ msgstr "ΤεκμηÏίωση" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +250,11 @@ msgstr "Δοκιμάζει" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +267,10 @@ msgstr "ΥπηÏεσίες" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +280,9 @@ msgstr "ΑνατÏοφοδότηση" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +326,7 @@ msgstr "Ανάλυση" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +334,7 @@ msgstr "" msgid "Roadmap" msgstr "" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +395,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +458,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +471,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +495,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +565,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +620,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +634,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +675,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +735,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +757,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +781,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +790,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +804,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +848,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +872,7 @@ msgstr "ΑφαιÏÎθηκε" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +886,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +905,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +917,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +934,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +956,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +983,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1027,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1054,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1074,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1103,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1388,8 +1184,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1402,24 +1197,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1429,22 +1215,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1480,21 +1258,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1518,10 +1291,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1532,8 +1303,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1546,10 +1316,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1559,7 +1327,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1580,7 +1349,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1602,7 +1373,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1611,8 +1383,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1644,35 +1415,28 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1680,29 +1444,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1729,12 +1487,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1744,10 +1500,8 @@ msgstr "Κοινότητα" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1769,8 +1523,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1793,8 +1548,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1808,34 +1562,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1845,61 +1593,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1926,20 +1662,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1965,12 +1700,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1990,8 +1726,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2018,12 +1753,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2042,22 +1774,22 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2074,8 +1806,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2092,14 +1824,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2178,34 +1910,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2215,20 +1939,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2245,22 +1965,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2272,10 +1989,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2285,38 +2000,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2334,23 +2041,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2364,11 +2065,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2379,34 +2077,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2419,18 +2110,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2444,16 +2131,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2473,67 +2158,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2557,8 +2232,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2574,44 +2249,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2619,8 +2284,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2629,64 +2293,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "ΜεταφÏάσεις" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "ΕÏγαλεία" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2694,42 +2353,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2742,143 +2393,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2887,93 +2426,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2993,11 +2481,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3012,10 +2498,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3035,12 +2519,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3051,27 +2532,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3087,10 +2564,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3108,8 +2583,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3122,19 +2596,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3142,15 +2612,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3159,8 +2627,8 @@ msgstr "ΣυχνÎÏ‚ εÏωτήσεις" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3176,67 +2644,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3261,10 +2727,8 @@ msgstr "Επισκόπηση" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3273,21 +2737,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3310,8 +2770,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3321,18 +2780,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3342,10 +2796,8 @@ msgstr "Πολιτική Î Ïοστασίας Î Ïοσωπικών ΔεδομΠ#: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3354,17 +2806,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3373,10 +2823,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3387,18 +2835,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/es/LC_MESSAGES/about.po b/i2p2www/translations/es/LC_MESSAGES/about.po index 55a8b0003c3ef161f36217364ffd6faac1576cfa..c9a10894bb06aa0ee8ee1c6a55ef79ff35dd6a4b 100644 --- a/i2p2www/translations/es/LC_MESSAGES/about.po +++ b/i2p2www/translations/es/LC_MESSAGES/about.po @@ -1,31 +1,34 @@ -# Spanish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Adolfo Jayme-Barrientos, 2013 -# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 -# <454cc45058db9632179dc8079c0c1af3_5311>, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # m1xxy <m1xxy@mail.i2p>, 2011 # Oliver Trash <oliver.trasshh@gmail.com>, 2013 +# Oliver Trash <oliver.trasshh@gmail.com>, 2013 # strel, 2013 # strel, 2013-2018 +# strel, 2013 # trolly, 2013 # trolly <translatortr@i2pmail.org>, 2013 # fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: str4d <str4d@i2pmail.org>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: strel, 2013-2018\n" "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -35,13 +38,9 @@ msgstr "Clientes I2P alternativos" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"La principal implementación de cliente I2P usa Java. Si por alguna\n" -"razón no puede usar Java en su dispositivo, hay implementaciones\n" -"alternativas desarrolladas por los miembros de la comunidad." +msgstr "La principal implementación de cliente I2P usa Java. Si por alguna\nrazón no puede usar Java en su dispositivo, hay implementaciones\nalternativas desarrolladas por los miembros de la comunidad." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -49,34 +48,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> es una implementación de cliente I2P en " -"C++.\n" -"Desde principios de 2016, i2pd se ha vuelto lo suficientemente estable " -"para ser usado en \n" -"producción, y desde el verano de 2016 implementa todas las APIs de I2P " -"por completo." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> es una implementación de cliente I2P en C++.\nDesde principios de 2016, i2pd se ha vuelto lo suficientemente estable para ser usado en \nproducción, y desde el verano de 2016 implementa todas las APIs de I2P por completo." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> es un derivado activo de i2pd para la " -"criptomoneda Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> es un derivado activo de i2pd para la criptomoneda Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> es un cliente I2P desarrollado usando " -"el lenguage de\n" -"programación <a href=\"%(golang)s\">Go</a>. El proyecto está en fase " -"inicial de desarrollo." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> es un cliente I2P desarrollado usando el lenguage de\nprogramación <a href=\"%(golang)s\">Go</a>. El proyecto está en fase inicial de desarrollo." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -88,11 +74,147 @@ msgstr "Glosario" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Esta página muestra la terminologÃa usada cuando se habla de I2P y " -"cifrados." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -100,14 +222,10 @@ msgstr "Pódium" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -117,18 +235,14 @@ msgstr "¡Muchas gracias a las siguientes personas que han donado a I2P!" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Si ha hecho una donación , por favor envÃe un email a <a " -"href=\"mailto:%(echelon)s\">echelon</a> con su nombre o nick (y " -"opcionalmente su página web) para que podamos listarle aquÃ." +msgstr "Si ha hecho una donación , por favor envÃe un email a <a href=\"mailto:%(echelon)s\">echelon</a> con su nombre o nick (y opcionalmente su página web) para que podamos listarle aquÃ." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -142,12 +256,8 @@ msgstr "El proyecto de Internet Invisible" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -157,13 +267,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -172,15 +282,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -189,28 +299,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -219,36 +328,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -257,13 +365,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -272,37 +380,21 @@ msgstr "Comparaciones" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Hay muchas otras buenas aplicaciones y proyectos trabajando en " -"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus " -"esfuerzos. Esto no es una lista completa de recursos para el anonimato - " -"ambos \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a> y los <a " -"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con " -"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos " -"proyectos destacan como para comparaciones adicionales. Los siguientes " -"proyectos tienen webs con comparaciones individuales:" +msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:" #: i2p2www/pages/site/about/intro.html:56 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Los siguientes proyectos son discutidos en la <a " -"href=\"%(othernetworks)s\">página sobre otras redes:</a>" +msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -311,13 +403,9 @@ msgstr "Presentaciones sobre I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Los siguientes enlaces son presentaciones, vÃdeos y tutoriales sobre I2P." -" Los enlaces para investigación sobre I2P están disponibles <a " -"href=\"%(papers)s\">aquÃ</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Los siguientes enlaces son presentaciones, vÃdeos y tutoriales sobre I2P. Los enlaces para investigación sobre I2P están disponibles <a href=\"%(papers)s\">aquÃ</a>." #: i2p2www/pages/site/about/media.html:8 #, python-format @@ -328,9 +416,7 @@ msgstr "Para solicitar añadidos a esta web por favor envÃelos a %(email)s." msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"Los enlaces más nuevos al final de cada sección." +msgstr "\nLos enlaces más nuevos al final de cada sección." #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -343,10 +429,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"IIP Presentación en CodeCon <a href=\"%(mp3)s\">MP3 audio</a> <a " -"href=\"%(transcript)s\">transcripción</a> Lance James (0x90), Febrero " -"2002." +msgstr "IIP Presentación en CodeCon <a href=\"%(mp3)s\">MP3 audio</a> <a href=\"%(transcript)s\">transcripción</a> Lance James (0x90), Febrero 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -355,9 +438,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"IIP Presentación en ToorCon <a href=\"%(mp3)s\">MP3 audio</a> <a " -"href=\"%(slides)s\">diapositivas</a> Lance James (0x90), Septiembre 2002." +msgstr "IIP Presentación en ToorCon <a href=\"%(mp3)s\">MP3 audio</a> <a href=\"%(slides)s\">diapositivas</a> Lance James (0x90), Septiembre 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -367,10 +448,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To Be or I2P</a> (Youtube Video) Una introducción a" -" las comunicaciones anónimas con I2P. <a href=\"%(pdf)s\">To Be or I2P " -"(PDF presentation)</a>, Jens Kubieziel, 24C3 Berlin, Diciembre 28, 2007." +msgstr "<a href=\"%(video)s\">To Be or I2P</a> (Youtube Video) Una introducción a las comunicaciones anónimas con I2P. <a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>, Jens Kubieziel, 24C3 Berlin, Diciembre 28, 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -378,15 +456,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">VÃdeo de charla I2P en Chemnitz Linux Tag</a>, Lars" -" Schimmer, Marzo 14-15, 2009" +msgstr "<a href=\"%(video)s\">VÃdeo de charla I2P en Chemnitz Linux Tag</a>, Lars Schimmer, Marzo 14-15, 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -397,9 +472,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a> " -"Adrian Crenshaw. Schmoocon Firetalk, Enero 2011" +msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a> Adrian Crenshaw. Schmoocon Firetalk, Enero 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -407,111 +480,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Usando la tecnologÃa para mejorar la libertad</a> " -"(Youtube VÃdeo) Eric Johnson. <a href=\"http://agora.io/etienne\">Agora " -"I/O Unconference</a>, Marzo 27, 2011. I2P desde 10:00 a 20:00 en el " -"vÃdeo." +msgstr "<a href=\"%(link)s\">Usando la tecnologÃa para mejorar la libertad</a> (Youtube VÃdeo) Eric Johnson. <a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, Marzo 27, 2011. I2P desde 10:00 a 20:00 en el vÃdeo." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Common Darknet Weaknesses</a> (VÃdeo en Youtube) " -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, Julio " -"11-15, 2011" +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a> (VÃdeo en Youtube) Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, Julio 11-15, 2011" #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P / Tor Workshop Notes</a> Adrian Crenshaw. DEF " -"CON 19, Las Vegas, Agosto 6, 2011." +msgstr "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a> Adrian Crenshaw. DEF CON 19, Las Vegas, Agosto 6, 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies - DEF CON Vesión en vivo (VÃdeo de Youtube)</a>, <a " -"href=\"%(studio)s\">versión de \"estudio\" (Youtube Video)</a>, <a " -"href=\"%(slides)s\">Slides (ppt)</a> Adrian Crenshaw. DEF CON 19, Las " -"Vegas, Agosto 7, 2011." +msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies - DEF CON Vesión en vivo (VÃdeo de Youtube)</a>, <a href=\"%(studio)s\">versión de \"estudio\" (Youtube Video)</a>, <a href=\"%(slides)s\">Slides (ppt)</a> Adrian Crenshaw. DEF CON 19, Las Vegas, Agosto 7, 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a> " -"(Ecosistemas de espacio cifrado modernos), 0x375 0x06 (Thessaloniki Tech " -"Talk Sessions (Charlas técnicas de Tesalónica)), 4 de noviembre de 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a> (Ecosistemas de espacio cifrado modernos), 0x375 0x06 (Thessaloniki Tech Talk Sessions (Charlas técnicas de Tesalónica)), 4 de noviembre de 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2P - The Anonymous Network</a> (I2P - La red " -"anónima)\n" -"(VÃdeo de Youtube)\n" -"Blair Dick, Universidad de Abertay, Sociedad de hacking ético de Dundee, " -"25 de enero de 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a> (I2P - La red anónima)\n(VÃdeo de Youtube)\nBlair Dick, Universidad de Abertay, Sociedad de hacking ético de Dundee, 25 de enero de 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 de agosto de 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 de agosto de 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2P - ¡Aún vive! (pdf)</a>\n" -"<a href=\"%(link2)s\">(vÃdeo)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburgo, 28 de " -"diciembre de 2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2P - ¡Aún vive! (pdf)</a>\n<a href=\"%(link2)s\">(vÃdeo)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburgo, 28 de diciembre de 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"Reemplazar criptografÃa débil: Actualizar la red I2P con primitivas más " -"robustas.\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d (desarrollador), Real World Crypto, Stanford, 8 de enero de 2016" +msgstr "Reemplazar criptografÃa débil: Actualizar la red I2P con primitivas más robustas.\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d (desarrollador), Real World Crypto, Stanford, 8 de enero de 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -519,14 +553,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Onion y Garlic: Los protocolos de I2P\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d (desarrollador), COMPSCI 460: Computer Networking, University of " -"Wisconsin Whitewater, 17 de febrero de 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Onion y Garlic: Los protocolos de I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d (desarrollador), COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 de febrero de 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -535,11 +563,7 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"The Invisible Internet Project - Una panorámica y guÃa por la tecnologÃa\n" -"<a href=\"%(link)s\">(mp4)</a>\n" -"<a href=\"%(link2)s\">(webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Bruselas, 4 de febrero de 2018" +msgstr "The Invisible Internet Project - Una panorámica y guÃa por la tecnologÃa\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruselas, 4 de febrero de 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format @@ -559,10 +583,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Windows Tutorial</a> (Youtube Video) Esta guÃa " -"le mostrará cono instalar I2P en Windows. Por <a " -"href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Windows Tutorial</a> (Youtube Video) Esta guÃa le mostrará cono instalar I2P en Windows. Por <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -571,10 +592,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Debian Tutorial</a> (VÃdeo en Youtube) Esta guÃa" -" le mostrará como instalar I2P en sistemas basados en Debian. Por <a " -"href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Debian Tutorial</a> (VÃdeo en Youtube) Esta guÃa le mostrará como instalar I2P en sistemas basados en Debian. Por <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -583,49 +601,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">How to set up anonymous site in I2P</a> (VÃdeo en " -"Youtube) Como configurar una web anónima en I2P. Por <a " -"href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">How to set up anonymous site in I2P</a> (VÃdeo en Youtube) Como configurar una web anónima en I2P. Por <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a> (VÃdeo en Youtube) Un " -"tutorial de como ejecutar I2P en os X y como conectar a " -"irc.telecomix.i2p. Por <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a> (VÃdeo en Youtube) Un tutorial de como ejecutar I2P en os X y como conectar a irc.telecomix.i2p. Por <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -" (VÃdeo en Youtube) Agent Felix Atari of the Telecomix Crypto Munitions " -"Bureau. Por <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a> (VÃdeo en Youtube) Agent Felix Atari of the Telecomix Crypto Munitions Bureau. Por <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a> (VÃdeo en Youtube) Esta guÃa muestra como instalar " -"y configurar las aplicaciones necesarias para acceder a I2P." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a> (VÃdeo en Youtube) Esta guÃa muestra como instalar y configurar las aplicaciones necesarias para acceder a I2P." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -633,9 +635,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">How to connect to I2P</a> (VÃdeo en Youtube) Como " -"instalar I2P en Ubuntu." +msgstr "<a href=\"%(link)s\">How to connect to I2P</a> (VÃdeo en Youtube) Como instalar I2P en Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -644,9 +644,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Installing the I2P darknet software in Linux</a> " -"(VÃdeo) Adrian Crenshaw. Enero 2011" +msgstr "<a href=\"%(link)s\">Installing the I2P darknet software in Linux</a> (VÃdeo) Adrian Crenshaw. Enero 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -654,9 +652,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Short garlic routing animation</a> (VÃdeo en " -"Youtube) Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Short garlic routing animation</a> (VÃdeo en Youtube) Adrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -669,11 +665,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) entrevistado por DistributedCity\n" -"<a href=\"%(link1)s\">Parte 1</a>\n" -"<a href=\"%(link2)s\">Parte 2</a>\n" -"26 de julio de 2002." +msgstr "Lance James (0x90) entrevistado por DistributedCity\n<a href=\"%(link1)s\">Parte 1</a>\n<a href=\"%(link2)s\">Parte 2</a>\n26 de julio de 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -682,32 +674,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) entrevistado por El PaÃs\n" -"(original en español)\n" -"<a href=\"%(link)s\">Traducción al inglés</a>\n" -"31 de octubre de 2002." +msgstr "Lance James (0x90) entrevistado por El PaÃs\n(original en español)\n<a href=\"%(link)s\">Traducción al inglés</a>\n31 de octubre de 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">ArtÃculo de 2003 del Business Week refiriéndose " -"invisiblenet (red invisible)</a> 14 de septiembre de 2003." +msgstr "<a href=\"%(link)s\">ArtÃculo de 2003 del Business Week refiriéndose invisiblenet (red invisible)</a> 14 de septiembre de 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">ArtÃculo del Netzwelt.de sobre como permanecer " -"anónimos en Internet</a> (Alemán) Noviembre 2007." +msgstr "<a href=\"%(link)s\">ArtÃculo del Netzwelt.de sobre como permanecer anónimos en Internet</a> (Alemán) Noviembre 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -715,27 +697,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz entrevistado por gulli.com</a>\n" -"Marzo de 2009\n" -"<a href=\"%(german)s\">Traducción al alemán</a>" +msgstr "<a href=\"%(link)s\">zzz entrevistado por gulli.com</a>\nMarzo de 2009\n<a href=\"%(german)s\">Traducción al alemán</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz entrevistado en el InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" -"18 de agosto de 2011\n" -"(enlace muerto, diseminado dentro de I2P por el <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">tracker" -" de postman</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz entrevistado en el InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 de agosto de 2011\n(enlace muerto, diseminado dentro de I2P por el <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">tracker de postman</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -743,54 +713,34 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>, Jonathan Cox, " -"Noviembre 11, 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>, Jonathan Cox, Noviembre 11, 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz y Lance James entrevistados en el InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" -"16 de febrero de 2012\n" -"(enlace muerto, diseminado dentro de I2P por el <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">tracker" -" de postman</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz y Lance James entrevistados en el InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 de febrero de 2012\n(enlace muerto, diseminado dentro de I2P por el <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">tracker de postman</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el " -"Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" -"Parte 1, 28 de febrero de 2015" +msgstr "<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nParte 1, 28 de febrero de 2015" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el " -"Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" -"Parte 2, 6 de marzo de 2015" +msgstr "<a href=\"%(mp3)s\">Jeff y Str4d (desarrolladores) entrevistados en el Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nParte 2, 6 de marzo de 2015" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -799,16 +749,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -820,19 +768,62 @@ msgstr "Otro" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P es mencionado en el episodio 2 de la temporada 2 de la serie \"House " -"of Cards\" de Netflix,\n" -"14 de febrero de 2014." +msgstr "I2P es mencionado en el episodio 2 de la temporada 2 de la serie \"House of Cards\" de Netflix,\n14 de febrero de 2014." #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -841,18 +832,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -863,84 +851,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -951,8 +916,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -960,27 +924,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -988,26 +948,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1018,10 +969,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1029,18 +978,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1051,16 +997,11 @@ msgstr "Miembros del proyecto I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Somos un pequeño grupo de personas repartidas por varios continentes, " -"trabajando para mejorar diferentes aspectos del proyecto y discutir el " -"diseño de la red.<a href=\"%(volunteer)s\">¿Únete!</a>" +msgstr "Somos un pequeño grupo de personas repartidas por varios continentes, trabajando para mejorar diferentes aspectos del proyecto y discutir el diseño de la red.<a href=\"%(volunteer)s\">¿Únete!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1185,9 +1126,7 @@ msgstr "Administrador de CI" #: i2p2www/pages/site/about/team.html:82 msgid "Maintain the Continuous Integration infrastructure" -msgstr "" -"Mantiene la infraestructura de integración continua (Continuous " -"Integration)" +msgstr "Mantiene la infraestructura de integración continua (Continuous Integration)" #: i2p2www/pages/site/about/team.html:85 msgid "Reseed admin" @@ -1231,7 +1170,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1390,9 +1330,7 @@ msgstr "Encargado de los paquetes para Debian/Ubuntu y del PPA" #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web," -" y trabajos en los unit tests" +msgstr "Trabajos en la consola del ruter y el interfaz gráfico, mejora de la web, y trabajos en los unit tests" #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1473,10 +1411,9 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "desarrollo de jbigi, migración de la wiki, limpieza de la documentación" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" -msgstr "" -"depuración de java y desarrollo del cliente en I2PTunnel y en la consola " -"del ruter" +msgid "" +"java debugging and client development on I2PTunnel and the router console" +msgstr "depuración de java y desarrollo del cliente en I2PTunnel y en la consola del ruter" #: i2p2www/pages/site/about/team.html:323 msgid "SAM perl module" @@ -1525,55 +1462,27 @@ msgstr "… y muchas otros" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." -msgstr "" -"I2PCon 2015 fue el primer evento de su clase. Tuvo dos metas a corto " -"plazo.\n" -"Primero, ofrecer al público general un evento donde se pudiera obtener " -"conocimiento sobre privacidad.\n" -"Segundo, para llevar más allá al proyecto I2P y su comunidad con debates " -"técnicos\n" -"sobre criptografÃa, anonimato y temas I2P-céntricos." +msgstr "I2PCon 2015 fue el primer evento de su clase. Tuvo dos metas a corto plazo.\nPrimero, ofrecer al público general un evento donde se pudiera obtener conocimiento sobre privacidad.\nSegundo, para llevar más allá al proyecto I2P y su comunidad con debates técnicos\nsobre criptografÃa, anonimato y temas I2P-céntricos." #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." -msgstr "" -"Una meta mayor y a más largo plazo de este evento fue construir una " -"comunidad de\n" -"individuos con consciencia sobre privacidad. Al conectar personas que " -"reconocen la\n" -"importancia de la privacidad, quisimos ofrecer un foro donde esta " -"comunidad pueda crecer." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." +msgstr "Una meta mayor y a más largo plazo de este evento fue construir una comunidad de\nindividuos con consciencia sobre privacidad. Al conectar personas que reconocen la\nimportancia de la privacidad, quisimos ofrecer un foro donde esta comunidad pueda crecer." #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." -msgstr "" -"La idea para este evento fue inicialmente concebida por nuestros\n" -"maravillosos amigos de <a href=\"https://torontocrypto.org/\">Toronto " -"Crypto</a>.\n" -"El punto de reunión fue proporcionado por <a " -"href=\"https://hacklab.to/\">Hacklab.to</a>.\n" -"El marketing fue encabezado por <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> y Siew.\n" -"Sin ellos este evento no habrÃa sido posible." +msgstr "La idea para este evento fue inicialmente concebida por nuestros\nmaravillosos amigos de <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nEl punto de reunión fue proporcionado por <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nEl marketing fue encabezado por <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> y Siew.\nSin ellos este evento no habrÃa sido posible." #: i2p2www/pages/site/about/i2pcon/2015.html:32 msgid "Slides and Video" @@ -1581,20 +1490,16 @@ msgstr "Diapositivas y vÃdeo" #: i2p2www/pages/site/about/i2pcon/2015.html:34 msgid "Slides are also available as an in-I2P torrent." -msgstr "" -"Las secuencias de diapositivas también están disponibles como un torrent " -"en-I2P." +msgstr "Las secuencias de diapositivas también están disponibles como un torrent en-I2P." #: i2p2www/pages/site/about/i2pcon/2015.html:41 msgid "Note: Video links will be posted as they become available." -msgstr "" -"Nota: Los enlaces de vÃdeo se publicarán tan pronto como estén " -"disponibles." +msgstr "Nota: Los enlaces de vÃdeo se publicarán tan pronto como estén disponibles." #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1619,9 +1524,7 @@ msgstr "Diapositivas realizadas por str4d y zzz:" #: i2p2www/pages/site/about/i2pcon/2015.html:71 msgid "Slides by others: Contact the author for license information." -msgstr "" -"Diapositivas realizadas por otros: Contacte con el autor para la " -"información de licencia." +msgstr "Diapositivas realizadas por otros: Contacte con el autor para la información de licencia." #: i2p2www/pages/site/about/i2pcon/2015.html:77 msgid "Speakers" @@ -1631,22 +1534,13 @@ msgstr "Altavoces" msgid "" "Colin Mahns has a strong interest in the use of anonymity and encryption " "technology to help preserve human rights in the digital age." -msgstr "" -"Colin Mahns tiene un fuerte interés en el uso de tecnologÃa de " -"información y cifrado para ayudar a preservar los derechos humanos en la " -"era digital." +msgstr "Colin Mahns tiene un fuerte interés en el uso de tecnologÃa de información y cifrado para ayudar a preservar los derechos humanos en la era digital." #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." -msgstr "" -"David Dagon es un investigador de postdoctorado en Georgia Tech enfocado " -"en botnets, malware, seguridad de red, y DNS.\n" -"Su interés en I2P se centra en preservar la privacidad del usuario, el " -"filtrado autónomo, y el anti-abuso." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." +msgstr "David Dagon es un investigador de postdoctorado en Georgia Tech enfocado en botnets, malware, seguridad de red, y DNS.\nSu interés en I2P se centra en preservar la privacidad del usuario, el filtrado autónomo, y el anti-abuso." #: i2p2www/pages/site/about/i2pcon/2015.html:89 #: i2p2www/pages/site/about/i2pcon/2015.html:105 @@ -1659,25 +1553,12 @@ msgstr "J está al frente de Toronto Crypto." #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." -msgstr "" -"Lance James es el fundador del Invisible IRC Project, el predecesor de " -"I2P, allá por 2002.\n" -"Fundó su propia compañÃa de inteligencia de cyber amenazas en 2003.\n" -"Desde entonces está enfocado en la seguridad de red, investigación de " -"malware, y seguridad de la información.\n" -"Durante 2011-2013, fue Director de Inteligencia en Amenazas para The " -"Vigilant, que fue adquirida por Deloitte en 2013.\n" -"Recientemente abandonó Deloitte para hacer consultorÃa a través de su " -"compañÃa The James Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." +msgstr "Lance James es el fundador del Invisible IRC Project, el predecesor de I2P, allá por 2002.\nFundó su propia compañÃa de inteligencia de cyber amenazas en 2003.\nDesde entonces está enfocado en la seguridad de red, investigación de malware, y seguridad de la información.\nDurante 2011-2013, fue Director de Inteligencia en Amenazas para The Vigilant, que fue adquirida por Deloitte en 2013.\nRecientemente abandonó Deloitte para hacer consultorÃa a través de su compañÃa The James Group." #: i2p2www/pages/site/about/i2pcon/2015.html:109 msgid "Nicholas D. is a member of Hacklab Toronto." @@ -1685,22 +1566,11 @@ msgstr "Nicholas D. es un miembro de Hacklab Toronto." #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." -msgstr "" -"Nicholas Johnston es un Profesor de Seguridad de la Información en la " -"Escuela de Computación Aplicada del Sheridan College en el programa de " -"Bachelor's degree de InfoSec.\n" -"Su carrera profesional previa fue en actividades forenses digitales e " -"investigaciones.\n" -"También es un contratista especializado en respuesta a incidentes.\n" -"Sus áreas de investigación incluyen el desarrollo de software de " -"seguridad y el análisis de datos." +msgstr "Nicholas Johnston es un Profesor de Seguridad de la Información en la Escuela de Computación Aplicada del Sheridan College en el programa de Bachelor's degree de InfoSec.\nSu carrera profesional previa fue en actividades forenses digitales e investigaciones.\nTambién es un contratista especializado en respuesta a incidentes.\nSus áreas de investigación incluyen el desarrollo de software de seguridad y el análisis de datos." #: i2p2www/pages/site/about/i2pcon/2015.html:124 msgid "Psi is an I2P developer." @@ -1752,8 +1622,7 @@ msgstr "DÃa 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1771,23 +1640,13 @@ msgstr "Agosto del 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Hay varias técnicas para mejorar el rendimiento de I2P - algunas tienen " -"que ver con la CPU, otras con el ancho de banda y otras relacionadas con " -"los protocolos. Sin embargo, todas estas mejoras afectan la latencia, la " -"cantidad de datos enviados y el rendimiento de la red, mientras que " -"reducen la competencia por los recursos escasos. Esta lista no está " -"completa, pero abarca las más importantes que se conocen." +msgstr "Hay varias técnicas para mejorar el rendimiento de I2P - algunas tienen que ver con la CPU, otras con el ancho de banda y otras relacionadas con los protocolos. Sin embargo, todas estas mejoras afectan la latencia, la cantidad de datos enviados y el rendimiento de la red, mientras que reducen la competencia por los recursos escasos. Esta lista no está completa, pero abarca las más importantes que se conocen." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1795,9 +1654,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Para ver las mejoras de rendimiento pasadas vea <a href=\"%(history)s\"> " -"historial de rendimiento</a>." +msgstr "Para ver las mejoras de rendimiento pasadas vea <a href=\"%(history)s\"> historial de rendimiento</a>." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1806,24 +1663,13 @@ msgstr "Mejor selección de pares y sus perfiles." #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Probablemente, una de las partes más importantes para conseguir una " -"mejora en el rendimiento será mejorar como los ruters elijen los pares a " -"través de los que construyen los túneles - asegurándose que no utiliza " -"pares con enlaces lentos o con enlaces rápidos pero sobrecargados. etc. " -"Además, tenemos que asegurarnos que no nos exponemos a un ataque <a " -"href=\"%(sybilpdf)s\">Sybil</a> de un adversario con muchos recursos y " -"con máquinas muy rápidas." +msgstr "Probablemente, una de las partes más importantes para conseguir una mejora en el rendimiento será mejorar como los ruters elijen los pares a través de los que construyen los túneles - asegurándose que no utiliza pares con enlaces lentos o con enlaces rápidos pero sobrecargados. etc. Además, tenemos que asegurarnos que no nos exponemos a un ataque <a href=\"%(sybilpdf)s\">Sybil</a> de un adversario con muchos recursos y con máquinas muy rápidas." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1831,32 +1677,15 @@ msgstr "Base de datos de la Red I2P" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Queremos ser más eficientes en la reparación de la base de datos de la " -"red y los algoritmos de mantenimiento - en vez de explorar la red " -"constantemente buscando nuevos pares - causando un gran número de " -"mensajes y carga en el ruter - podemos frenar o incluso parar la " -"búsqueda mientras no se detecte que hay algo nuevo por explorar (por " -"ejemplo, ralentizar la tasa de exploración dependiendo de la última vez " -"que algún par nos dio una referencia de algún otro par desconocido). " -"También podemos mejorar lo que enviamos - cuantos pares recuperamos (o " -"incluso si recuperamos una respuesta), también podemos mejorar cuantas " -"búsquedas concurrentes hacemos." +msgstr "Queremos ser más eficientes en la reparación de la base de datos de la red y los algoritmos de mantenimiento - en vez de explorar la red constantemente buscando nuevos pares - causando un gran número de mensajes y carga en el ruter - podemos frenar o incluso parar la búsqueda mientras no se detecte que hay algo nuevo por explorar (por ejemplo, ralentizar la tasa de exploración dependiendo de la última vez que algún par nos dio una referencia de algún otro par desconocido). También podemos mejorar lo que enviamos - cuantos pares recuperamos (o incluso si recuperamos una respuesta), también podemos mejorar cuantas búsquedas concurrentes hacemos." #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -1865,48 +1694,24 @@ msgstr "Mejoras en las Etiquetas de Sesión" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"La forma en que funciona el algoritmo <a " -"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> es administrando un " -"conjunto de arrays de 32 bytes aleatorios de un solo uso, y desechándolos" -" cuando no se usan los suficientemente rápido. Si los desechamos " -"demasiado pronto, tenemos que crear otra vez un cifrado (muy caro) " -"ElGamal, pero si no los desechamos a tiempo, tenemos que reducir su " -"número o nos quedaremos sin memoria RAM (y si al destinatario de alguna " -"forma se le corrompen y pierde algunas etiquetas, pueden ocurrir incluso " -"más fallos en los cifrados). Con algoritmos con detección activa y de " -"control, podemos ajustar de una forma más segura y eficientemente el " -"tiempo de vida de una etiqueta, reemplazando el cifrado ElGamal con un " -"algoritmo más trivial como AES." +msgstr "La forma en que funciona el algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> es administrando un conjunto de arrays de 32 bytes aleatorios de un solo uso, y desechándolos cuando no se usan los suficientemente rápido. Si los desechamos demasiado pronto, tenemos que crear otra vez un cifrado (muy caro) ElGamal, pero si no los desechamos a tiempo, tenemos que reducir su número o nos quedaremos sin memoria RAM (y si al destinatario de alguna forma se le corrompen y pierde algunas etiquetas, pueden ocurrir incluso más fallos en los cifrados). Con algoritmos con detección activa y de control, podemos ajustar de una forma más segura y eficientemente el tiempo de vida de una etiqueta, reemplazando el cifrado ElGamal con un algoritmo más trivial como AES." #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Algunas ideas adicionales para mejorar el envÃo de las Etiquetas de " -"Sesión se describen en la <a href=\"%(elgamalaes)s#future\">página de " -"ElGamal/AES+SessionTag</a>." +msgstr "Algunas ideas adicionales para mejorar el envÃo de las Etiquetas de Sesión se describen en la <a href=\"%(elgamalaes)s#future\">página de ElGamal/AES+SessionTag</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -1917,61 +1722,29 @@ msgstr "Migrar las Etiquetas de sesión a PRNG sincronizado." msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." -msgstr "" -"Ahora mismo, nuestro algoritmo <a " -"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funciona etiquetando " -"cada mensaje cifrado con un 'nonce' único de 32 bytes (una \"etiqueta de " -"sesión\"), identificando el mensaje como un mensaje cifrado con la clave " -"de sesión AES asociada. Esto previene que los pares distingan los " -"mensajes que son parte de la misma sesión, ya que cada mensaje tiene una " -"etiqueta nueva completamente aleatoria. Para llevar esto acabo, cada unos" -" pocos mensajes se envuelven un nuevo conjunto de etiquetas de sesión " -"dentro del mensaje cifrado, creando una forma transparente de identificar" -" los mensajes futuros. Por lo tanto tenemos que llevar un control de " -"cuales mensajes han llegado con éxito a su destino para saber que " -"etiquetas debemos usar." +msgstr "Ahora mismo, nuestro algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funciona etiquetando cada mensaje cifrado con un 'nonce' único de 32 bytes (una \"etiqueta de sesión\"), identificando el mensaje como un mensaje cifrado con la clave de sesión AES asociada. Esto previene que los pares distingan los mensajes que son parte de la misma sesión, ya que cada mensaje tiene una etiqueta nueva completamente aleatoria. Para llevar esto acabo, cada unos pocos mensajes se envuelven un nuevo conjunto de etiquetas de sesión dentro del mensaje cifrado, creando una forma transparente de identificar los mensajes futuros. Por lo tanto tenemos que llevar un control de cuales mensajes han llegado con éxito a su destino para saber que etiquetas debemos usar." #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" "to handle out of order delivery)." -msgstr "" -"Este sistema funciona bien y es muy robusto, aunque no es eficiente en el" -" uso del ancho de banda, y necesita el envÃo de estas etiquetas antes de " -"tiempo (y no todas las etiquetas serán necesarias, o se desperdician, " -"debido al tiempo de expiración). De media, enviar con antelación las " -"etiquetas de sesión cuesta 32 bytes por mensaje (el tamaño de una " -"etiqueta). aunque como ha sugerido Taral, ese tamaño puede evitarse " -"reemplazando el envÃo de etiquetas con un PRNG sincronizado - cuando una " -"nueva sesión se establece (a través de un bloque cifrado ElGamal), ambos " -"lados siembran un PRNG para generar las etiquetas de sesión cuando se " -"necesite (con el destinatarios pre calculando los siguientes valores para" -" poder manejar los envÃos)" +msgstr "Este sistema funciona bien y es muy robusto, aunque no es eficiente en el uso del ancho de banda, y necesita el envÃo de estas etiquetas antes de tiempo (y no todas las etiquetas serán necesarias, o se desperdician, debido al tiempo de expiración). De media, enviar con antelación las etiquetas de sesión cuesta 32 bytes por mensaje (el tamaño de una etiqueta). aunque como ha sugerido Taral, ese tamaño puede evitarse reemplazando el envÃo de etiquetas con un PRNG sincronizado - cuando una nueva sesión se establece (a través de un bloque cifrado ElGamal), ambos lados siembran un PRNG para generar las etiquetas de sesión cuando se necesite (con el destinatarios pre calculando los siguientes valores para poder manejar los envÃos)" #: i2p2www/pages/site/about/performance/future.html:87 msgid "Longer lasting tunnels" @@ -1979,50 +1752,26 @@ msgstr "Tiempo de duración máximo de los túneles." #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"El tiempo de duración actual de 10 minutes es bastante arbitrario, aunque" -" parece que funciona bien. Una vez que tengamos el código de reparación " -"de túnel y un sistema de detección de fallos más eficiente, podremos " -"cambiar estas duraciones de forma más segura, reduciendo la carga en la " -"CPU y en la red (debido al excesivo costo al crear los mensajes de los " -"túneles). " +msgstr "El tiempo de duración actual de 10 minutes es bastante arbitrario, aunque parece que funciona bien. Una vez que tengamos el código de reparación de túnel y un sistema de detección de fallos más eficiente, podremos cambiar estas duraciones de forma más segura, reduciendo la carga en la CPU y en la red (debido al excesivo costo al crear los mensajes de los túneles). " #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Esto parece un fácil arreglo para la carga de la CPU y el gasto de ancho " -"de banda en los ruters, pero no podemos usarlos hasta que hayamos afinado" -" mucho mejor los algoritmos de creación de túneles.\n" -"Aún asÃ, el tiempo de vida de 10 minutos está incluido en varios sitios, " -"con lo que hará falta bastante esfuerzo para cambiar esta duración. " -"Además, será dificil mantener la compatibilidad con versiones anteriores " -"tras este cambio." +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Esto parece un fácil arreglo para la carga de la CPU y el gasto de ancho de banda en los ruters, pero no podemos usarlos hasta que hayamos afinado mucho mejor los algoritmos de creación de túneles.\nAún asÃ, el tiempo de vida de 10 minutos está incluido en varios sitios, con lo que hará falta bastante esfuerzo para cambiar esta duración. Además, será dificil mantener la compatibilidad con versiones anteriores tras este cambio." #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"Actualmente, ya que el éxito en la creación de túneles de la red es " -"bastante alto, no existen planes para aumentar el tiempo de vida de los " -"túneles." +msgstr "Actualmente, ya que el éxito en la creación de túneles de la red es bastante alto, no existen planes para aumentar el tiempo de vida de los túneles." #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -2030,43 +1779,22 @@ msgstr "Ajustar tiempo máximo de espera" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" -msgstr "" -"Otros truquitos arbitrarios que parece que \"funcionan bien\" usados son " -"los tiempos de vida actuales de varias actividades. ¿Por qué tenemos 60 " -"segundos para el tiempo de vida de \"par inaccesible\"?¿Por qué " -"intentamos usar un diferente túnel que el LeaseSet nos avisa después de " -"10 segundos?¿Por qué las consultas a la base de datos está limitada por " -"60 o 20 segundos?¿Por qué están las destinaciones configuradas para " -"preguntar por un nuevo grupo de túneles cada 10 minutos?¿Por qué " -"permitimos a un par tardar 60 segundos en responder a la petición de " -"unirse a un túnel?¿Por qué consideramos un túnel como \"muerto\" si no " -"pasa nuestras pruebas en 60 segundos?" +msgstr "Otros truquitos arbitrarios que parece que \"funcionan bien\" usados son los tiempos de vida actuales de varias actividades. ¿Por qué tenemos 60 segundos para el tiempo de vida de \"par inaccesible\"?¿Por qué intentamos usar un diferente túnel que el LeaseSet nos avisa después de 10 segundos?¿Por qué las consultas a la base de datos está limitada por 60 o 20 segundos?¿Por qué están las destinaciones configuradas para preguntar por un nuevo grupo de túneles cada 10 minutos?¿Por qué permitimos a un par tardar 60 segundos en responder a la petición de unirse a un túnel?¿Por qué consideramos un túnel como \"muerto\" si no pasa nuestras pruebas en 60 segundos?" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Todos estos imponderables pueden solucionarse con un código más " -"adaptativo, al igual que con parámetros afinables que compensen el gasto " -"entre el ancho de banda, latencia y el uso de CPU." +msgstr "Todos estos imponderables pueden solucionarse con un código más adaptativo, al igual que con parámetros afinables que compensen el gasto entre el ancho de banda, latencia y el uso de CPU." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2076,48 +1804,33 @@ msgstr "Mejoras en el protocolo de transmisión" msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Quizás usando de nuevo el perfil de transmisión interactivo (la " -"implementación actual sólo usa el perfil de transmisión normal)." +msgstr "Quizás usando de nuevo el perfil de transmisión interactivo (la implementación actual sólo usa el perfil de transmisión normal)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Limitación del ancho de banda en el cliente (en una o las dos direcciones" -" de una conexión, o posiblemente compartido entre varias conexiones). " -"Esto será además del lÃmite general de ancho de banda, por supuesto." +msgstr "Limitación del ancho de banda en el cliente (en una o las dos direcciones de una conexión, o posiblemente compartido entre varias conexiones). Esto será además del lÃmite general de ancho de banda, por supuesto." #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Listas de control de acceso (sólo permitiendo conexiones desde o hacia " -"otras destinaciones conocidas)." +msgstr "Listas de control de acceso (sólo permitiendo conexiones desde o hacia otras destinaciones conocidas)." #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Control por web y monitorización del estado de varias conexiones, además " -"de la posibilidad explÃcita de cerrarlas o regularlas." +msgstr "Control por web y monitorización del estado de varias conexiones, además de la posibilidad explÃcita de cerrarlas o regularlas." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Varias ideas para mejorar la librerÃa de straming se describen en la <a " -"href=\"%(streaming)s#future\">web de la librerÃa de streaming</a>." +msgstr "Varias ideas para mejorar la librerÃa de straming se describen en la <a href=\"%(streaming)s#future\">web de la librerÃa de streaming</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2126,15 +1839,10 @@ msgstr "Historia de rendimiento." #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Usando las técnicas de abajo se ha conseguido muchas mejoras en el " -"rendimiento. Hay más por hacer, vea la web del <a " -"href=\"%(performance)s\">Rendimiento</a> para probelmas e ideas." +msgstr "Usando las técnicas de abajo se ha conseguido muchas mejoras en el rendimiento. Hay más por hacer, vea la web del <a href=\"%(performance)s\">Rendimiento</a> para probelmas e ideas." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2151,47 +1859,25 @@ msgstr "implementado" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" -msgstr "" -"Cuando examiné el código de I2P, la mayorÃa del tiempo se gastaba dentro " -"de una función: java.math. En el <a href=\"%(modpow)s\">modPow</a> de " -"BigInteger. En vez de intentar mejorar este método, usamos <a " -"href=\"%(gmp)s\">GNU MP</a> - una librerÃa matemática realmente rápida " -"(con el ensamblador mejorado para varias arquitecturas). (<i>Editor: vea" -" <a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" +msgstr "Cuando examiné el código de I2P, la mayorÃa del tiempo se gastaba dentro de una función: java.math. En el <a href=\"%(modpow)s\">modPow</a> de BigInteger. En vez de intentar mejorar este método, usamos <a href=\"%(gmp)s\">GNU MP</a> - una librerÃa matemática realmente rápida (con el ensamblador mejorado para varias arquitecturas). (<i>Editor: vea <a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." -msgstr "" -"\n" -"ugha y duck están trabajando en el código de C/JNI, y el código java " -"actual está desplegado con los 'ganchos' para cuando esté listo. Los " -"resultados preliminares se ven fantásticos - ejecutar el ruter con GMP " -"modPow nativo proporciona un aumento de velocidad del 800% , y la " -"carga se ha reducido ala mitad. Y esto sólo ha sido en la maquina de un " -"solo usuario, y las cosas están casi listas para ser empaquetado y " -"distribuidas." +msgstr "\nugha y duck están trabajando en el código de C/JNI, y el código java actual está desplegado con los 'ganchos' para cuando esté listo. Los resultados preliminares se ven fantásticos - ejecutar el ruter con GMP modPow nativo proporciona un aumento de velocidad del 800% , y la carga se ha reducido ala mitad. Y esto sólo ha sido en la maquina de un solo usuario, y las cosas están casi listas para ser empaquetado y distribuidas." #: i2p2www/pages/site/about/performance/history.html:32 msgid "Garlic wrapping a \"reply\" LeaseSet" @@ -2203,82 +1889,42 @@ msgstr "implementado pero necesita mejoras" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Esta mejora en el algoritmo sólo afectará a las aplicaciones que quieran " -"que los pares les responda (esto incluye todo lo que use I2PTunnel o la " -"mini-librerÃa de streaming de mihi):" +msgstr "Esta mejora en el algoritmo sólo afectará a las aplicaciones que quieran que los pares les responda (esto incluye todo lo que use I2PTunnel o la mini-librerÃa de streaming de mihi):" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." -msgstr "" -"Anteriormente, cuando Alice enviaba un mensaje a Bob, cuando Bob " -"respondÃa tenÃa que hacer una búsqueda en la base de datos de la red - " -"enviando varias peticiones para obtener el LeaseSet de Alice. Si ya tiene" -" el LeaseSet de Alice, puede simplemente enviar su respuesta " -"inmediatamente - esto es (en parte) por qué normalmente toma más tiempo " -"conectar con alguien por primera vez, pero posteriormente es más rápido. " -"Actualmente - para todos los clientes - empaquetamos el LeaseSet del " -"remitente en el mensaje Garlic que es enviado al destinatario, para que " -"cuando vaya a responder, <i>siempre</i> tendrán el LeaseSet almacenado " -"localmente - eliminando completamente la necesidad de hacer búsquedas en " -"la base de datos de la red al responder. Esto ahorra un gran ancho de " -"banda al remitente. Si no hiciésemos las búsquedas a menudo, el uso de " -"ancho de banda disponible global de la red descenderÃa, ya que el " -"destinatario no necesita hacer la búsqueda en la base de datos de la red." +msgstr "Anteriormente, cuando Alice enviaba un mensaje a Bob, cuando Bob respondÃa tenÃa que hacer una búsqueda en la base de datos de la red - enviando varias peticiones para obtener el LeaseSet de Alice. Si ya tiene el LeaseSet de Alice, puede simplemente enviar su respuesta inmediatamente - esto es (en parte) por qué normalmente toma más tiempo conectar con alguien por primera vez, pero posteriormente es más rápido. Actualmente - para todos los clientes - empaquetamos el LeaseSet del remitente en el mensaje Garlic que es enviado al destinatario, para que cuando vaya a responder, <i>siempre</i> tendrán el LeaseSet almacenado localmente - eliminando completamente la necesidad de hacer búsquedas en la base de datos de la red al responder. Esto ahorra un gran ancho de banda al remitente. Si no hiciésemos las búsquedas a menudo, el uso de ancho de banda disponible global de la red descenderÃa, ya que el destinatario no necesita hacer la búsqueda en la base de datos de la red." #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." -msgstr "" -"Para los LeaseSets no publicados como los \"clientes compartidos\", esta " -"es la única forma de enviar el LeaseSet a Bob. Desafortunadamente al " -"construirlo cada vez se añade al menos un 100% de sobre gastos en una" -" red con mucho ancho de banda, y mucho más en una red con mensajes más " -"pequeños." +msgstr "Para los LeaseSets no publicados como los \"clientes compartidos\", esta es la única forma de enviar el LeaseSet a Bob. Desafortunadamente al construirlo cada vez se añade al menos un 100% de sobre gastos en una red con mucho ancho de banda, y mucho más en una red con mensajes más pequeños." #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Los cambios programados para la versión 0.6.2 empaquetará el LeaseSet " -"sólo cuando sea necesario, al iniciar la conexión o cuando el LeaseSet " -"cambie. Esto reducirá sustancialmente el gasto delos mensajes I2P." +msgstr "Los cambios programados para la versión 0.6.2 empaquetará el LeaseSet sólo cuando sea necesario, al iniciar la conexión o cuando el LeaseSet cambie. Esto reducirá sustancialmente el gasto delos mensajes I2P." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2287,40 +1933,16 @@ msgstr "Más eficiencia en las caÃdas y errores del protocolo TCP" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." -msgstr "" -"En este momento, todas las conexiones TCP hacen todas sus validaciones \n" -"de pares ('peer') depués de ir a través de la negociación ('handshaking')" -"\n" -"Diffie-Hellman completa (cara) para negociar una clave de sesión privada." -"\n" -"Esto significa que si el reloj de alguien está bastante desajustado, o " -"sus \n" -"NAT/firewall/etc no están apropiadamente configurados (o sólo están\n" -"ejecutando una versión incompatible del router), van a causar " -"consistentemente\n" -"(aunque no constantemente, gracias a la lista de excluidos) una operación" -"\n" -"criptográfica cara y futil sobre todos los pares que conozcan. Aunque\n" -"querremos mantener parte de las verificaciones/validaciones dentro del\n" -"ámbito del cifrado, querremos actualizar el protocolo para que haga\n" -"algunas de ellas primero, de forma que podamos rechazarlos \n" -"limpiamente sin desperdiciar mucha CPU u otros recursos." +msgstr "En este momento, todas las conexiones TCP hacen todas sus validaciones \nde pares ('peer') depués de ir a través de la negociación ('handshaking')\nDiffie-Hellman completa (cara) para negociar una clave de sesión privada.\nEsto significa que si el reloj de alguien está bastante desajustado, o sus \nNAT/firewall/etc no están apropiadamente configurados (o sólo están\nejecutando una versión incompatible del router), van a causar consistentemente\n(aunque no constantemente, gracias a la lista de excluidos) una operación\ncriptográfica cara y futil sobre todos los pares que conozcan. Aunque\nquerremos mantener parte de las verificaciones/validaciones dentro del\námbito del cifrado, querremos actualizar el protocolo para que haga\nalgunas de ellas primero, de forma que podamos rechazarlos \nlimpiamente sin desperdiciar mucha CPU u otros recursos." #: i2p2www/pages/site/about/performance/history.html:81 msgid "Adjust the tunnel testing" @@ -2328,26 +1950,13 @@ msgstr "Ajustar las pruebas de túneles" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." -msgstr "" -"En vez de usar el esquema bastante aleatorio que tenemos ahora, " -"deberÃamos usar un algoritmo más consciente del contexto para probar los " -"túneles. Por ejemplo, si ya conocemos sus datos de validación " -"correctamente, no hay necesidad de probarlo, mientras que si no hemos " -"visto ningún dato recientemente, quizás valga la pena enviarle algunos " -"datos. Esto reducirá el parón en los túneles debido a un número de " -"mensajes excesivo, a la vez que mejorará la velocidad en la detección de " -"los túneles fallidos." +msgstr "En vez de usar el esquema bastante aleatorio que tenemos ahora, deberÃamos usar un algoritmo más consciente del contexto para probar los túneles. Por ejemplo, si ya conocemos sus datos de validación correctamente, no hay necesidad de probarlo, mientras que si no hemos visto ningún dato recientemente, quizás valga la pena enviarle algunos datos. Esto reducirá el parón en los túneles debido a un número de mensajes excesivo, a la vez que mejorará la velocidad en la detección de los túneles fallidos." #: i2p2www/pages/site/about/performance/history.html:92 msgid "Persistent Tunnel / Lease Selection" @@ -2355,27 +1964,17 @@ msgstr "Túneles persistentes / Selección del LeaseSet" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"La selección del túnel de salida se implementó en la versión 0.6.1.30, la" -" selección del túnel de entrada se implementó en la versión 0.6.2." +msgstr "La selección del túnel de salida se implementó en la versión 0.6.1.30, la selección del túnel de entrada se implementó en la versión 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Seleccionar los túneles y leases aleatoriamente para cada mensaje crea un" -" gran problema con el envÃo de mensajes desordenados, lo cual evita que " -"la librerÃa de streaming pueda aumentar el tamaño de su 'ventana' tanto " -"como podrÃa. Al persistir con las mismas selecciones para una conexión " -"determinada, la velocidad de transferencia es mucho mayor." +msgstr "Seleccionar los túneles y leases aleatoriamente para cada mensaje crea un gran problema con el envÃo de mensajes desordenados, lo cual evita que la librerÃa de streaming pueda aumentar el tamaño de su 'ventana' tanto como podrÃa. Al persistir con las mismas selecciones para una conexión determinada, la velocidad de transferencia es mucho mayor." #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2383,32 +1982,15 @@ msgstr "Comprimiendo algunas estructuras de datos" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." -msgstr "" -"Los mensajes I2NP y los datos que contiene están ya definidos en una " -"estructura bastante compacta, aunque un atributo de la estructura del " -"RouterInfo no lo está - \"options\" está en texto ASCII plano en el " -"formato nombre = valor. Ahora mismo, se está rellenado con estadÃsticas " -"publicadas - alrededor de 3300 bytes por par. Implementar la compresión " -"GZip, lo cual es trivial, ahorrarÃa 1/3 de su tamaño, y cuando se " -"considera las veces que se pasan las estructuras RouterInfo a través de " -"la red, es un gran ahorro - cada vez que un ruter pregunta a otro por una" -" entrada en la netDb que el par no posee, envÃa de vuelta de 3-10 " -"estructuras RouterInfo." +msgstr "Los mensajes I2NP y los datos que contiene están ya definidos en una estructura bastante compacta, aunque un atributo de la estructura del RouterInfo no lo está - \"options\" está en texto ASCII plano en el formato nombre = valor. Ahora mismo, se está rellenado con estadÃsticas publicadas - alrededor de 3300 bytes por par. Implementar la compresión GZip, lo cual es trivial, ahorrarÃa 1/3 de su tamaño, y cuando se considera las veces que se pasan las estructuras RouterInfo a través de la red, es un gran ahorro - cada vez que un ruter pregunta a otro por una entrada en la netDb que el par no posee, envÃa de vuelta de 3-10 estructuras RouterInfo." #: i2p2www/pages/site/about/performance/history.html:117 msgid "Update the ministreaming protocol" @@ -2420,39 +2002,17 @@ msgstr "reemplazar por un protocolo full streaming" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." -msgstr "" -"Actualmente la librerÃa ministream de mihi tiene un protocolo de " -"negociación bastante simple - Alice envÃa a Bob un mensaje SYN, Bob " -"responde con un ACK, entonces Alice y Bob comparten información, hasta " -"que uno le envÃe a otro un mensaje CLOSE. Para conexiones de larga " -"duración (por ejemplo a un servidor IRC), esta sobrecarga es " -"despreciable, pero para situaciones de una sola repuesta (Una petición " -"HTTP por ejemplo), es más del doble de los mensajes necesarios. Si, de " -"otra forma, Alice hubiese adjuntado su primer payload con el mensaje SYN," -" y Bob hubiese adjuntado su primera respuesta en el ACK - e incluso " -"incluyendo la etiqueta CLOSE - los envÃos transitorios como las respuetas" -" HTTP podrÃan reducirse a un par de mensajes, en vez del " -"SYN+ACK+petición+respuesta+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." +msgstr "Actualmente la librerÃa ministream de mihi tiene un protocolo de negociación bastante simple - Alice envÃa a Bob un mensaje SYN, Bob responde con un ACK, entonces Alice y Bob comparten información, hasta que uno le envÃe a otro un mensaje CLOSE. Para conexiones de larga duración (por ejemplo a un servidor IRC), esta sobrecarga es despreciable, pero para situaciones de una sola repuesta (Una petición HTTP por ejemplo), es más del doble de los mensajes necesarios. Si, de otra forma, Alice hubiese adjuntado su primer payload con el mensaje SYN, y Bob hubiese adjuntado su primera respuesta en el ACK - e incluso incluyendo la etiqueta CLOSE - los envÃos transitorios como las respuetas HTTP podrÃan reducirse a un par de mensajes, en vez del SYN+ACK+petición+respuesta+CLOSE." #: i2p2www/pages/site/about/performance/history.html:132 msgid "Implement full streaming protocol" @@ -2460,60 +2020,26 @@ msgstr "Implementar el protocolo full streaming" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." -msgstr "" -"El protocolo ministreaming se aprovecha de una decisión en favor de un " -"pobre diseño\n" -"en el protocolo de cliente de I2P (I2CP) - la vulnerabilidad del " -"\"mode=GUARANTEED\"\n" -"(garantizado), que permite que lo que de otra forma serÃa sólo un " -"protocolo basado en\n" -"mensajes, no fiable, y que lo hace lo mejor que puede, sea utilizado para" -" operaciones\n" -"de bloqueo fiables (bajo las apariencias, todo será aún no fiable y " -"basado en mensajes,\n" -"con el router I2P proporcionando garantÃas de entrega al adjuntar un " -"mensaje \"ACK\" `[acuse\n" -"de recibo] dentro junto con la carga, de forma que una vez los datos " -"llegan al objetivo,\n" -"el mensaje ACK es reenviado de vuelta a nosotros [a través de túneles, " -"por supuesto])." +msgstr "El protocolo ministreaming se aprovecha de una decisión en favor de un pobre diseño\nen el protocolo de cliente de I2P (I2CP) - la vulnerabilidad del \"mode=GUARANTEED\"\n(garantizado), que permite que lo que de otra forma serÃa sólo un protocolo basado en\nmensajes, no fiable, y que lo hace lo mejor que puede, sea utilizado para operaciones\nde bloqueo fiables (bajo las apariencias, todo será aún no fiable y basado en mensajes,\ncon el router I2P proporcionando garantÃas de entrega al adjuntar un mensaje \"ACK\" `[acuse\nde recibo] dentro junto con la carga, de forma que una vez los datos llegan al objetivo,\nel mensaje ACK es reenviado de vuelta a nosotros [a través de túneles, por supuesto])." #: i2p2www/pages/site/about/performance/history.html:143 #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." -msgstr "" -"Como ya he <a href=\"%(link)s\">dicho</a>, permitir que el I2PTunnel (y " -"la librerÃa ministream) usen esta ruta es lo mejor que se pudo hacer, " -"pero hay mecanismos más eficientes. Cuando eliminamos la funcionalidad " -"\"mode=GUARANTEED\", estamos esencialmente dejando un I2CP que parece una" -" capa IP anónima, y por eso, podremos ser capaces de implementar la " -"librerÃa de streaming para obtener ventajas de las experiencias de diseño" -" de la capa TCP - ACKs selectivos, detección de congestión, etc." +msgstr "Como ya he <a href=\"%(link)s\">dicho</a>, permitir que el I2PTunnel (y la librerÃa ministream) usen esta ruta es lo mejor que se pudo hacer, pero hay mecanismos más eficientes. Cuando eliminamos la funcionalidad \"mode=GUARANTEED\", estamos esencialmente dejando un I2CP que parece una capa IP anónima, y por eso, podremos ser capaces de implementar la librerÃa de streaming para obtener ventajas de las experiencias de diseño de la capa TCP - ACKs selectivos, detección de congestión, etc." #: i2p2www/pages/site/about/performance/index.html:2 msgid "Performance" @@ -2523,95 +2049,44 @@ msgstr "Rendimiento" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"¿Cómo funciona I2P, por qué es lento, y por qué no utiliza todo el ancho " -"de banda?" +msgstr "¿Cómo funciona I2P, por qué es lento, y por qué no utiliza todo el ancho de banda?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Probablemente una de las preguntas más frecuentes es ¿cómo de rápido es " -"I2P?, y parece que a nadie le gusta la respuesta - \"depende\". Después " -"de probar I2P, la siguiente cosa que preguntan es ¿será más rápido?, y la" -" respuesta a eso es un enfático <b>sÃ</b>." +msgstr "Probablemente una de las preguntas más frecuentes es ¿cómo de rápido es I2P?, y parece que a nadie le gusta la respuesta - \"depende\". Después de probar I2P, la siguiente cosa que preguntan es ¿será más rápido?, y la respuesta a eso es un enfático <b>sÃ</b>." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." -msgstr "" -"I2P es un red totalmente dinámica. Cada cliente es conocido por otros " -"nodos y prueba los nodos conocidos localmente para comprobar su " -"accesibilidad y su capacidad. Sólo los nodos accesibles y capaces son " -"guardados en la NetDB local (Esto normalmente es sólo una parte de la " -"red, sobre 500-1000). Cuando I2P construye túneles selecciona los mejores" -" recursos de esta fuente. Por ejemplo, sólo unos 20-50 nodos están " -"disponibles para construir túneles. Ya que las pruebas se hacen cada " -"minuto la fuente de los nodos usados cambia cada minuto. Cada nodo I2P " -"conoce una parte de la red total, haciendo que cada ruter tenga una lista" -" diferente de nodos I2P para ser usados como túneles. Incluso si dos " -"ruters tienen la misma subred de nodos conocidos las pruebas de " -"accesibilidad y capacidad mostrarán diferentes resultados, ya que cuando " -"un ruter hace las pruebas otros ruters pueden estar bajo carga, pero " -"estar libre cuando es un segundo ruter el que hace las pruebas." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." +msgstr "I2P es un red totalmente dinámica. Cada cliente es conocido por otros nodos y prueba los nodos conocidos localmente para comprobar su accesibilidad y su capacidad. Sólo los nodos accesibles y capaces son guardados en la NetDB local (Esto normalmente es sólo una parte de la red, sobre 500-1000). Cuando I2P construye túneles selecciona los mejores recursos de esta fuente. Por ejemplo, sólo unos 20-50 nodos están disponibles para construir túneles. Ya que las pruebas se hacen cada minuto la fuente de los nodos usados cambia cada minuto. Cada nodo I2P conoce una parte de la red total, haciendo que cada ruter tenga una lista diferente de nodos I2P para ser usados como túneles. Incluso si dos ruters tienen la misma subred de nodos conocidos las pruebas de accesibilidad y capacidad mostrarán diferentes resultados, ya que cuando un ruter hace las pruebas otros ruters pueden estar bajo carga, pero estar libre cuando es un segundo ruter el que hace las pruebas." #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"El texto anterior explica porque cada nodo I2P usa diferentes nodos para " -"construir sus túneles. Porque cada nodo I2P tienen una latencia y ancho " -"de banda diferente, los túneles ( que se construyen con estos nodos) " -"tienen valores diferentes de latencia y ancho de banda. Y ya que cada " -"nodo I2P tiene diferentes nodos construidos, no hay dos nodos I2P con la " -"misma configuración de túneles." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "El texto anterior explica porque cada nodo I2P usa diferentes nodos para construir sus túneles. Porque cada nodo I2P tienen una latencia y ancho de banda diferente, los túneles ( que se construyen con estos nodos) tienen valores diferentes de latencia y ancho de banda. Y ya que cada nodo I2P tiene diferentes nodos construidos, no hay dos nodos I2P con la misma configuración de túneles." #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Un servidor/cliente se conoce como \"destinación\" y cada destinación " -"tiene al menos un túnel de entrada y otro de salida. Por defecto son 3 " -"saltos por túnel. Esto suman 12 saltos (osea 12 diferentes nodos I2P) " -"para una ida y vuelta completa cliente-servidor-cliente." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Un servidor/cliente se conoce como \"destinación\" y cada destinación tiene al menos un túnel de entrada y otro de salida. Por defecto son 3 saltos por túnel. Esto suman 12 saltos (osea 12 diferentes nodos I2P) para una ida y vuelta completa cliente-servidor-cliente." #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Cada paquete de datos es enviado a través de otros 6 nodos I2P hasta que " -"alcanza el servidor:" +msgstr "Cada paquete de datos es enviado a través de otros 6 nodos I2P hasta que alcanza el servidor:" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2619,165 +2094,62 @@ msgstr "y de vuelta por 6 nodos I2P diferentes:" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." -msgstr "" -"Como la mayorÃa del tráfico I2P (www, torrent, ...) necesita paquetes ack" -" hasta que la nueva información es enviada, necesita esperar hasta que un" -" paquete ack regrese del servidor. Al final: envÃa información, espera " -"por ack, envÃa mas información, espera por ack... Y ya que el RTT " -"(RoundTripTime) añade latencia por cada nodo individual I2P y por cada " -"conexión de esta ida y vuelta, normalmente tarda de 1-3 segundos hasta " -"que un paquete ack regresa al cliente. Además el funcionamiento interno " -"del transporte de TCP y de I2P hacen que un paquete de información tenga " -"un tamaño limitado y no pueda ser tan grande como desearÃamos que fuese. " -"Estas condiciones unidas crean un lÃmite de ancho de banda por túnel de " -"20-50 kbyte/sec. Pero, si SÓLO un salto del túnel tiene solamente 5 " -"kb/sec de ancho de banda para usar, el túnel completo estará limitado a 5" -" kb/sec, independientemente de las latencia y otras limitaciones." +msgstr "Como la mayorÃa del tráfico I2P (www, torrent, ...) necesita paquetes ack hasta que la nueva información es enviada, necesita esperar hasta que un paquete ack regrese del servidor. Al final: envÃa información, espera por ack, envÃa mas información, espera por ack... Y ya que el RTT (RoundTripTime) añade latencia por cada nodo individual I2P y por cada conexión de esta ida y vuelta, normalmente tarda de 1-3 segundos hasta que un paquete ack regresa al cliente. Además el funcionamiento interno del transporte de TCP y de I2P hacen que un paquete de información tenga un tamaño limitado y no pueda ser tan grande como desearÃamos que fuese. Estas condiciones unidas crean un lÃmite de ancho de banda por túnel de 20-50 kbyte/sec. Pero, si SÓLO un salto del túnel tiene solamente 5 kb/sec de ancho de banda para usar, el túnel completo estará limitado a 5 kb/sec, independientemente de las latencia y otras limitaciones." #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." -msgstr "" -"Debido al cifrado usado y otras configuraciones de I2P (como se " -"construyen los túneles, latencia, ...) se utiliza bastante tiempo de la " -"CPU para crear un túnel. Esto es por lo que una destinación solo tiene " -"permitido un máximo de 6 túneles de de entrada y 6 de salida para enviar" -" información. Con un máximo de 50 kb/sec por túnel una destinación podrÃa" -" usar aproximadamente 300 kb/sec (en realidad podrÃa ser más si se " -"utilizan túneles más cortos con poco o ningún anonimato). Los túneles " -"usados son eliminados cada 10 minutos y se crean unos nuevos. Estos " -"cambios en los túneles (y a veces los clientes que apagan de golpe usando" -" \"apagar inmediatamente\" o por caÃdas de corriente) a veces rompen los " -"túneles y las conexiones, como se puede ver en las pérdidas de conexiones" -" en el IRC2P (ping timeout) o cuando se está usando eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." +msgstr "Debido al cifrado usado y otras configuraciones de I2P (como se construyen los túneles, latencia, ...) se utiliza bastante tiempo de la CPU para crear un túnel. Esto es por lo que una destinación solo tiene permitido un máximo de 6 túneles de de entrada y 6 de salida para enviar información. Con un máximo de 50 kb/sec por túnel una destinación podrÃa usar aproximadamente 300 kb/sec (en realidad podrÃa ser más si se utilizan túneles más cortos con poco o ningún anonimato). Los túneles usados son eliminados cada 10 minutos y se crean unos nuevos. Estos cambios en los túneles (y a veces los clientes que apagan de golpe usando \"apagar inmediatamente\" o por caÃdas de corriente) a veces rompen los túneles y las conexiones, como se puede ver en las pérdidas de conexiones en el IRC2P (ping timeout) o cuando se está usando eepget." #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." -msgstr "" -"Con un número limitado de destinaciones y un número limitado de túneles " -"por destinación, un nodo I2P sólo utiliza un número limitado de túneles a" -" través de otros nodos de I2P. Por ejemplo, si en el ejemplo de arriba un" -" nodo I2P es \"hop1\", sólo tendrÃamos 1 túnel participante originado en " -"el cliente. Si sumamos toda la red I2P, sólo un número limitado de " -"túneles participantes pueden ser construidos con una cantidad limitada de" -" ancho de banda. Si uno distribuye todo ese número limitado entre el " -"número de nodos I2P, sólo hay disponible una fracción del ancho de " -"banca/capacidad disponible para el uso." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." +msgstr "Con un número limitado de destinaciones y un número limitado de túneles por destinación, un nodo I2P sólo utiliza un número limitado de túneles a través de otros nodos de I2P. Por ejemplo, si en el ejemplo de arriba un nodo I2P es \"hop1\", sólo tendrÃamos 1 túnel participante originado en el cliente. Si sumamos toda la red I2P, sólo un número limitado de túneles participantes pueden ser construidos con una cantidad limitada de ancho de banda. Si uno distribuye todo ese número limitado entre el número de nodos I2P, sólo hay disponible una fracción del ancho de banca/capacidad disponible para el uso." #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." -msgstr "" -"Para permanecer anónimos un ruter no deberÃa usarse por toda la red para " -"construir túneles, si un solo ruter funciona como túnel para TODOS los " -"nodos de I2P se convierte en el centro de un problema, asà como el punto " -"central para obtener IPs e información de los clientes. Esto no es bueno." -" I2P intenta repartir la carga a través de muchos nodos I2P justo por " -"esta razón." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." +msgstr "Para permanecer anónimos un ruter no deberÃa usarse por toda la red para construir túneles, si un solo ruter funciona como túnel para TODOS los nodos de I2P se convierte en el centro de un problema, asà como el punto central para obtener IPs e información de los clientes. Esto no es bueno. I2P intenta repartir la carga a través de muchos nodos I2P justo por esta razón." #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." -msgstr "" -"Otro punto a tener en cuenta es la red mesh completa. Cada conexión " -"salto-a-salto utiliza una conexión TCP o UDP en los nodos de I2P. Con " -"1000 conexiones uno ve 1000 conexiones TCP. Eso es bastante y algunos " -"ruters domésticos o de oficina (DSL, cable...) sólo permiten un cierto " -"número de conexiones ( o simplemente se vuelven locos si se usa un número" -" mayor de X conexiones). I2P intenta limitar esas conexiones por debajo " -"de 1500 para UDP y TCP. Esto limita también la cantidad de tráfico " -"enrutado a través de su nodo I2P." +msgstr "Otro punto a tener en cuenta es la red mesh completa. Cada conexión salto-a-salto utiliza una conexión TCP o UDP en los nodos de I2P. Con 1000 conexiones uno ve 1000 conexiones TCP. Eso es bastante y algunos ruters domésticos o de oficina (DSL, cable...) sólo permiten un cierto número de conexiones ( o simplemente se vuelven locos si se usa un número mayor de X conexiones). I2P intenta limitar esas conexiones por debajo de 1500 para UDP y TCP. Esto limita también la cantidad de tráfico enrutado a través de su nodo I2P." #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." -msgstr "" -"En resumen, I2P es muy complejo y no hay una forma fácil de determinar " -"con precisión por qué su nodo no se utiliza. Si su ruter es accesible y " -"tiene mas de 128 kbyte/sec de ancho de banda compartido y está accesible " -"24/7, deberÃa ser usado después de algún tiempo de tener tráfico " -"participante. Si no esta activo siempre, las pruebas de otros nodos sobre" -" su nodo I2P le dirá: no está accesible. Esto bloquea su nodo por al " -"menos 24h para los otros nodos. Por lo cual los otros nodos que han " -"testado su nodo cuando estaba caÃdo no utilizarán su nodo para construir " -"túneles durante 24h. Esto es por lo que su tráfico será menor después de " -"un reinicio/apagado por lo menos durante 24h." +msgstr "En resumen, I2P es muy complejo y no hay una forma fácil de determinar con precisión por qué su nodo no se utiliza. Si su ruter es accesible y tiene mas de 128 kbyte/sec de ancho de banda compartido y está accesible 24/7, deberÃa ser usado después de algún tiempo de tener tráfico participante. Si no esta activo siempre, las pruebas de otros nodos sobre su nodo I2P le dirá: no está accesible. Esto bloquea su nodo por al menos 24h para los otros nodos. Por lo cual los otros nodos que han testado su nodo cuando estaba caÃdo no utilizarán su nodo para construir túneles durante 24h. Esto es por lo que su tráfico será menor después de un reinicio/apagado por lo menos durante 24h." #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"Además: otros nodos I2P necesitan conocer su ruter I2P para probar la " -"accesibilidad y capacidad. Toma tiempo que otros nodos lleguen a conocer " -"su nodo. Será más rápido si utiliza I2P y crea más túneles, por ejemplo " -"usando torrents o webs i2p durante algún tiempo." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "Además: otros nodos I2P necesitan conocer su ruter I2P para probar la accesibilidad y capacidad. Toma tiempo que otros nodos lleguen a conocer su nodo. Será más rápido si utiliza I2P y crea más túneles, por ejemplo usando torrents o webs i2p durante algún tiempo." #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2788,7 +2160,4 @@ msgstr "Mejoras en el rendimiento" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Para futuras mejoras en el rendimiento vea <a href=\"%(future)s\">mejoras" -" futuras en el rendimiento</a>." - +msgstr "Para futuras mejoras en el rendimiento vea <a href=\"%(future)s\">mejoras futuras en el rendimiento</a>." diff --git a/i2p2www/translations/es/LC_MESSAGES/comparison.po b/i2p2www/translations/es/LC_MESSAGES/comparison.po index 60bfe0e9cfb41365fa5d409557f334ad18959bed..23563f614883d69ba81c5f1bc44a7ba58fbb82ab 100644 --- a/i2p2www/translations/es/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/es/LC_MESSAGES/comparison.po @@ -1,29 +1,31 @@ -# Spanish translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# Adolfo Jayme Barrientos, 2013 -# Daniel Mustieles <inactive+leo@transifex.com>, 2013 +# Adolfo Jayme-Barrientos, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # m1xxy <m1xxy@mail.i2p>, 2011 # Oliver Trash <oliver.trasshh@gmail.com>, 2013 # strel, 2016 # strel, 2013 # trolly, 2013 -# Trolly, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-10-04 00:26+0000\n" -"Last-Translator: erinm\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: strel, 2016\n" "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -31,85 +33,39 @@ msgstr "Comparación de I2P con Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet es una red completamente distribuida, red anónima de publicación " -"par a par, que ofrece una forma segura de almacenar datos, y también " -"enfocada en solucionar los problemas de carga y desbordamientos. Mientras" -" que Freenet está diseñada como un almacén distribuido de datos, la gente" -" ha construido aplicaciones sobre el sistema para tener otras " -"comunicaciones anónimas genéricas, como webs estáticas y foros." +msgstr "Freenet es una red completamente distribuida, red anónima de publicación par a par, que ofrece una forma segura de almacenar datos, y también enfocada en solucionar los problemas de carga y desbordamientos. Mientras que Freenet está diseñada como un almacén distribuido de datos, la gente ha construido aplicaciones sobre el sistema para tener otras comunicaciones anónimas genéricas, como webs estáticas y foros." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"Comparado con I2P, Freenet ofrece substanciales beneficios - es un " -"sistema distribuido de almacenamiento de datos, mientras que I2P no lo " -"es, permitiendo a la gente obtener al contenido publicado por otros " -"incluso cuando el que lo ha publicado no esté online. Además es capaz de " -"distribuir eficientemente la información más utilizada. I2P no tiene ni " -"tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para " -"los usuarios que simplemente quieren comunicarse con otros anónimamente a" -" través de webs, foros, aplicaciones de compartición de archivos, etc. " -"Ha habido varios intentos de desarrollar un sistema de almacenamiento " -"distribuido funcionando sobre I2P, (más recientemente un port de <a " -"href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavÃa no está listo para uso " -"general." +msgstr "Comparado con I2P, Freenet ofrece substanciales beneficios - es un sistema distribuido de almacenamiento de datos, mientras que I2P no lo es, permitiendo a la gente obtener al contenido publicado por otros incluso cuando el que lo ha publicado no esté online. Además es capaz de distribuir eficientemente la información más utilizada. I2P no tiene ni tendrá esta funcionalidad. Por otro lado, hay demasiada redundancia para los usuarios que simplemente quieren comunicarse con otros anónimamente a través de webs, foros, aplicaciones de compartición de archivos, etc. Ha habido varios intentos de desarrollar un sistema de almacenamiento distribuido funcionando sobre I2P, (más recientemente un port de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>) pero todavÃa no está listo para uso general." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Sin embargo, e incluso ignorando los problemas de implementación, hay " -"algunas preocupaciones sobre la escalabilidad y el anonimato de algunos " -"algoritmos de Freenet, debido básicamente a la heurÃstica de ruteo de " -"Freenet. La unión de varias técnicas puede desalentar el hacer varios " -"tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo " -"podrÃan proveer la escalabilidad esperada. Desafortunadamente, no muchos " -"de los análisis sobre los algoritmos han dado resultados satisfactorios, " -"pero aún hay esperanzas. Al final, Freenet nos proporciona bastante " -"anonimato contra cualquier atacante que no tenga los recursos necesarios " -"para análisis completos." +msgstr "Sin embargo, e incluso ignorando los problemas de implementación, hay algunas preocupaciones sobre la escalabilidad y el anonimato de algunos algoritmos de Freenet, debido básicamente a la heurÃstica de ruteo de Freenet. La unión de varias técnicas puede desalentar el hacer varios tipos de ataques, y quizás algunos aspectos del algoritmo de ruteo podrÃan proveer la escalabilidad esperada. Desafortunadamente, no muchos de los análisis sobre los algoritmos han dado resultados satisfactorios, pero aún hay esperanzas. Al final, Freenet nos proporciona bastante anonimato contra cualquier atacante que no tenga los recursos necesarios para análisis completos." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -117,49 +73,28 @@ msgstr "Comparando I2P con otros proyectos" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Hay muchas otras buenas aplicaciones y proyectos trabajando en " -"comunicaciones anónimas, e I2P se ha inspirado en muchos de sus " -"esfuerzos. Esto no es una lista completa de recursos para el anonimato - " -"ambos \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a> y los <a " -"href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con " -"GNUnet sirven también para ese mismo propósito. Dicho eso, pocos " -"proyectos destacan como para comparaciones adicionales. Los siguientes " -"proyectos tienen webs con comparaciones individuales:" +msgstr "Hay muchas otras buenas aplicaciones y proyectos trabajando en comunicaciones anónimas, e I2P se ha inspirado en muchos de sus esfuerzos. Esto no es una lista completa de recursos para el anonimato - ambos \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> y los <a href=\"https://www.gnunet.org/links/\">proyectos relacionados</a> con GNUnet sirven también para ese mismo propósito. Dicho eso, pocos proyectos destacan como para comparaciones adicionales. Los siguientes proyectos tienen webs con comparaciones individuales:" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Los siguientes proyectos son discutidos en la <a " -"href=\"%(othernetworks)s\">página sobre otras redes:</a>" +msgstr "Los siguientes proyectos son discutidos en la <a href=\"%(othernetworks)s\">página sobre otras redes:</a>" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Los contenidos de esta página pueden ser cambiados o discutidos, y " -"apreciamos los comentarios y añadidos. Puede contribuir al análisis " -"creando un <a href=\"%(trac)s\">nuevo ticket en el Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -176,232 +111,116 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"La mayorÃa de las secciones siguientes son bastante viejas, y puede que " -"no sean precisas. Para una vista rápida de las comparaciones disponibles," -" vea la <a href=\"%(comparison)s\">página principal de comparaciones</a>." -" Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo " -"ticket en el Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." -msgstr "" -"Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par " -"anónimas con proxies para el anonimato, permitiendo a la gente enviar " -"datos fuera a través de redes de mezcla de baja latencia. Morphmix " -"incluye unos algoritmos de detección de colisiones bastante interesante y" -" defensas contra Sybil, mientras que Tarzan hace uso de la escasez de " -"direcciones IP para obtener lo mismo. Las dos principales diferencias " -"entre estos dos sistemas e I2P tienen que ver con el <a " -"href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de " -"outproxies (al contrario que el anonimato proporcionado para ambos, el " -"que envÃa y el que recibe). El código está disponible para ambos " -"sistemas, pero no sabemos de su uso fuera de ambientes académicos." +msgstr "Morphmix y Tarzan son las dos totalmente distribuidas, redes par a par anónimas con proxies para el anonimato, permitiendo a la gente enviar datos fuera a través de redes de mezcla de baja latencia. Morphmix incluye unos algoritmos de detección de colisiones bastante interesante y defensas contra Sybil, mientras que Tarzan hace uso de la escasez de direcciones IP para obtener lo mismo. Las dos principales diferencias entre estos dos sistemas e I2P tienen que ver con el <a href=\"%(threatmodel)s\">modelo de amenazas</a> de I2P y su diseño de outproxies (al contrario que el anonimato proporcionado para ambos, el que envÃa y el que recibe). El código está disponible para ambos sistemas, pero no sabemos de su uso fuera de ambientes académicos." #: i2p2www/pages/site/comparison/other-networks.html:172 #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." -msgstr "" -"\n" -"Mixminion y Mixmaster son redes que soportan correos anónimos contra " -"adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia" -" sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) " -"quizás sean adecuadas para satisfacer el modelo de amenazas de estos " -"adversarios, funcionando en paralelo con las necesidades de baja latencia" -" de los usuarios, para proporcionar un gran set de anonimato. El soporte " -"de alta latencia en el ruter de I2P puede que se añada o no en un futuro " -"distante. Es demasiado pronto para decir si I2P satisfará las necesidades" -" de los usuarios que requieran una protección extrema para los correos." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." +msgstr "\nMixminion y Mixmaster son redes que soportan correos anónimos contra adversarios muy peligrosos. Las aplicaciones de mensajes de alta latencia sobre I2P (por ejemplo <a href=\"%(syndie)s\">Syndie</a> o I2PBote) quizás sean adecuadas para satisfacer el modelo de amenazas de estos adversarios, funcionando en paralelo con las necesidades de baja latencia de los usuarios, para proporcionar un gran set de anonimato. El soporte de alta latencia en el ruter de I2P puede que se añada o no en un futuro distante. Es demasiado pronto para decir si I2P satisfará las necesidades de los usuarios que requieran una protección extrema para los correos." #: i2p2www/pages/site/comparison/other-networks.html:184 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." -msgstr "" -"Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también" -" la aproximación basada en directorios." +msgstr "Al igual que con Tor y Onion routing, Mixminion y Mixmaster toman también la aproximación basada en directorios." #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" -msgstr "" -"JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el " -"anonimato de las solicitudes web que tiene varios nodos centrales " -"(participantes en la cascada) que combinan y mezclan las solicitudes de " -"los clientes a través de una secuencia de nodos (la cascada) antes de " -"enviarlos por un proxy a la web. El alcance, modelo de amenazas y la " -"seguridad son bastantes diferentes a las de I2P, pero para aquellos que " -"requieran bastante anonimato pero no están satisfechos con un servicio de" -" tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un " -"precaución que debe tener todo aquel que se encuentre bajo la " -"jurisdicción de los juzgados alemanes, es que el German Federal Bureau " -"of Criminal Investigation (FBCI) ha montado un <a " -"href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el " -"ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad" -" es que la información fue sustraÃda con éxito. Los jueces cambian sus " -"mentes basados en las circunstancias, y esta es la evidencia de que si el" -" gobierno quisiese la información podrÃan conseguirla, aunque fuese " -"inadmisible más tarde en un juicio)" +msgstr "JAP (Proxy Anónimo en Java) es una red de mezcla en cascadas para el anonimato de las solicitudes web que tiene varios nodos centrales (participantes en la cascada) que combinan y mezclan las solicitudes de los clientes a través de una secuencia de nodos (la cascada) antes de enviarlos por un proxy a la web. El alcance, modelo de amenazas y la seguridad son bastantes diferentes a las de I2P, pero para aquellos que requieran bastante anonimato pero no están satisfechos con un servicio de tipo anonimizador, puede venirles bien echarle un ojo a JAP. Un precaución que debe tener todo aquel que se encuentre bajo la jurisdicción de los juzgados alemanes, es que el German Federal Bureau of Criminal Investigation (FBCI) ha montado un <a href=\"%(url)s\">ataque</a> con éxito sobre esta red. Incluso aunque el ataque se encontró más tarde ilegal en los juzgados alemanes, la realidad es que la información fue sustraÃda con éxito. Los jueces cambian sus mentes basados en las circunstancias, y esta es la evidencia de que si el gobierno quisiese la información podrÃan conseguirla, aunque fuese inadmisible más tarde en un juicio)" #: i2p2www/pages/site/comparison/other-networks.html:216 #, python-format msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." -msgstr "" -"Estos dos sistemas trabajan con el rutado básico <a " -"href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer " -"negación plausible contra un simple adversario sin colisión. Con el " -"rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast" -" para encontrar el par o la identidad deseada, y después usan esa " -"algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones " -"que sólo quieren saber que tienen que ofrecer la gente que está alrededor" -" - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se " -"obtiene un conjunto de nodos que pueden compartit archivos y mantener el " -"anonimato (aunque no se tiene mucho control sobre quién es ese grupo de " -"pares)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." +msgstr "Estos dos sistemas trabajan con el rutado básico <a href=\"%(antnet)s\">antnet</a>, proporcionando anonimato al proveer negación plausible contra un simple adversario sin colisión. Con el rutado antnet, primero hacen una ruta aleatoria o una búsqueda broadcast para encontrar el par o la identidad deseada, y después usan esa algoritmo para optimizar la ruta. Esto funciona bien para aplicaciones que sólo quieren saber que tienen que ofrecer la gente que está alrededor - \"Cómo os va\" contra \"Hey Alice, como estás\" - básicamente se obtiene un conjunto de nodos que pueden compartit archivos y mantener el anonimato (aunque no se tiene mucho control sobre quién es ese grupo de pares)." #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." -msgstr "" -"Sin embargo, el algoritmo no escala bien del todo - si la aplicación " -"quiere hablar con un par en particular termina haciendo una búsqueda " -"broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). " -"Esto significa que mientras esas redes trabajan bien a escalas pequeñas, " -"no son apropiadas para redes grandes donde alguien quiere ponerse en " -"contacto con un par en particular. Esto no quiere decir que este sistema " -"no tenga ningún valor, sólo que su aplicación está limitada a situaciones" -" donde sus problemas pueden evitarse." +msgstr "Sin embargo, el algoritmo no escala bien del todo - si la aplicación quiere hablar con un par en particular termina haciendo una búsqueda broadcast o un paseo aleatorio (si son afortunados de que eso ocurra). Esto significa que mientras esas redes trabajan bien a escalas pequeñas, no son apropiadas para redes grandes donde alguien quiere ponerse en contacto con un par en particular. Esto no quiere decir que este sistema no tenga ningún valor, sólo que su aplicación está limitada a situaciones donde sus problemas pueden evitarse." #: i2p2www/pages/site/comparison/other-networks.html:239 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." -msgstr "" -"Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo" -" un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una " -"herramienta de elusión</a>. No hace falta decir que el ser de código " -"cerrado y orientada a un paÃs especÃfico no son buenas ideas. I2P es, por" -" supuesto, de código libre. Aunque el código y nuestra <a " -"href=\"%(docs)s\">documentación técnica</a> necesitan muchas más " -"revisión." +msgstr "Esta era una red de código cerrado orientada a usuarios de Irán. Tor hizo un <a href=\"%(torpost)s\">buen estudio sobre qué buscar en una herramienta de elusión</a>. No hace falta decir que el ser de código cerrado y orientada a un paÃs especÃfico no son buenas ideas. I2P es, por supuesto, de código libre. Aunque el código y nuestra <a href=\"%(docs)s\">documentación técnica</a> necesitan muchas más revisión." #: i2p2www/pages/site/comparison/other-networks.html:248 msgid "Paid VPN Services" @@ -412,10 +231,8 @@ msgstr "Servicios VPN de pago" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Puede contribuir al análisis creando un <a href=\"%(trac)s\">nuevo ticket" -" en el Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:254 msgid "Others" @@ -443,17 +260,7 @@ msgid "" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n" "database</a> and <a href=\"%(peerselection)s\">peer selection</a>." -msgstr "" -"Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a" -" la gente salir a través de su red ya mezclada de baja latencia. Las dos " -"primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo " -"relacionas con las diferencias en el modelo de amenazas y el diseño de " -"los outproxies (a través de Tor soporta también servicios ocultos). " -"Además, Tor usa un enfoque basado en directorios - creando un punto " -"central para manejar la 'vista' general de las redes, y además se " -"obtienen más estadÃsticas, al contrario que la <a href=\"%(netdb)s\">base" -" de datos de la red </a> dsitribuida de I2P y la <a " -"href=\"%(peerselection)s\">selección de pares</a>." +msgstr "Tor y el rutado Onion son ambas redes de proxies anónimas, que permiten a la gente salir a través de su red ya mezclada de baja latencia. Las dos primeras diferencias entre Tor/Onion-Routing e I2P están de nuevo relacionas con las diferencias en el modelo de amenazas y el diseño de los outproxies (a través de Tor soporta también servicios ocultos). Además, Tor usa un enfoque basado en directorios - creando un punto central para manejar la 'vista' general de las redes, y además se obtienen más estadÃsticas, al contrario que la <a href=\"%(netdb)s\">base de datos de la red </a> dsitribuida de I2P y la <a href=\"%(peerselection)s\">selección de pares</a>." #: i2p2www/pages/site/comparison/tor.html:23 msgid "" @@ -466,13 +273,7 @@ msgid "" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." -msgstr "" -"El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de " -"ataques - una vez que la comunicación deja la red Tor, adversarios " -"pasivos pueden hacer más fácilmente ataques de análisis. Además los " -"outproxies tienen acceso al texto en claro transferido en las dos " -"direcciones, y los outproxies son propensos a abusos, y además tenemos " -"que tener en cuenta otros ataques posibles dentro del Internet normal." +msgstr "El outproxy de I2P/Tor tiene varias debilidades contra cierto tipo de ataques - una vez que la comunicación deja la red Tor, adversarios pasivos pueden hacer más fácilmente ataques de análisis. Además los outproxies tienen acceso al texto en claro transferido en las dos direcciones, y los outproxies son propensos a abusos, y además tenemos que tener en cuenta otros ataques posibles dentro del Internet normal." #: i2p2www/pages/site/comparison/tor.html:35 msgid "" @@ -482,12 +283,7 @@ msgid "" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." -msgstr "" -"Aún asÃ, mucha gente no tiene por que preocuparse por estas situaciones, " -"ya que no están dentro del modelo de amenazas. Y además esto está fuera " -"del alcance (formal) de I2P (si la gente desea construir un outproxy " -"sobre la capa de comunicación anónima, pueden hacerlo). De hecho, " -"actualmente algunos usuarios utilizan el outproxy de Tor." +msgstr "Aún asÃ, mucha gente no tiene por que preocuparse por estas situaciones, ya que no están dentro del modelo de amenazas. Y además esto está fuera del alcance (formal) de I2P (si la gente desea construir un outproxy sobre la capa de comunicación anónima, pueden hacerlo). De hecho, actualmente algunos usuarios utilizan el outproxy de Tor." #: i2p2www/pages/site/comparison/tor.html:49 msgid "Comparison of Tor and I2P Terminology" @@ -497,9 +293,7 @@ msgstr "Comparación de la terminologÃa de I2P y Tor" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Mientras que Tor e I2p tienen algunas similitudes, mucha de la " -"terminologÃa cambia." +msgstr "Mientras que Tor e I2p tienen algunas similitudes, mucha de la terminologÃa cambia." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -572,8 +366,8 @@ msgstr "Servicio oculto" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite o destinación" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -623,9 +417,7 @@ msgstr "Punto de reunión" #: i2p2www/pages/site/comparison/tor.html:70 msgid "somewhat like Inbound Gateway + Outbound Endpoint" -msgstr "" -"algo asà como inbound Gateway + Outbound Endpoint, puerta de salida de " -"entrada + punto final de salida" +msgstr "algo asà como inbound Gateway + Outbound Endpoint, puerta de salida de entrada + punto final de salida" #: i2p2www/pages/site/comparison/tor.html:71 msgid "Router Descriptor" @@ -645,15 +437,10 @@ msgstr "Beneficios de Tor sobre I2p" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"El número de usuarios es mucho mayor; mucho más visible en entorno " -"académicos y comunidades de hackers; tiene los beneficios de tener " -"estudios formales sobre el anonimato, resistencia y rendimiento; y tienen" -" un lÃder no anónimo universitario y visible" +msgstr "El número de usuarios es mucho mayor; mucho más visible en entorno académicos y comunidades de hackers; tiene los beneficios de tener estudios formales sobre el anonimato, resistencia y rendimiento; y tienen un lÃder no anónimo universitario y visible" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" @@ -669,32 +456,24 @@ msgstr "Tiene más desarrolladores, incluso algunos con fondos" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Tiene un bloqueo de nivel de estado más resistente debido la capa de " -"transporte TLS y a los puentes (I2P tienen propuestas de \"rutas " -"completamente restringidas\" pero estas aún no están implementadas)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Tiene un bloqueo de nivel de estado más resistente debido la capa de transporte TLS y a los puentes (I2P tienen propuestas de \"rutas completamente restringidas\" pero estas aún no están implementadas)" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "Es tan grande que incluso se ha adaptado para bloquear los intentos de DOS" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Diseñado para optimizar el tráfico de salida, con un gran número de nodos" -" de salida" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Diseñado para optimizar el tráfico de salida, con un gran número de nodos de salida" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Mejor documentación, tiene estudios formales y especificaciones, una web " -"mejor, y muchas traducciones" +msgstr "Mejor documentación, tiene estudios formales y especificaciones, una web mejor, y muchas traducciones" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -708,17 +487,13 @@ msgstr "Los nodos cliente de Tor tienen muy poco gasto de ancho de nada" msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"El control centralizado reduce la complejidad de cada nodo y puede evitar" -" ataques Sybil fácilmente" +msgstr "El control centralizado reduce la complejidad de cada nodo y puede evitar ataques Sybil fácilmente" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y " -"menor latencia" +msgstr "Un núcleo de nodos de gran capacidad proporciona una mayor rendimiento y menor latencia" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -730,11 +505,9 @@ msgstr "Beneficios de I2P sobre Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Diseñado para optimizar los servicios ocultos, que son mucho más rápidos " -"que los de Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Diseñado para optimizar los servicios ocultos, que son mucho más rápidos que los de Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -744,17 +517,13 @@ msgstr "Totalmente distribuido y auto organizado" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Los pares son seleccionados continuamente según el rendimiento y " -"categorÃa, en vez de confiar en la capacidad indicada" +msgstr "Los pares son seleccionados continuamente según el rendimiento y categorÃa, en vez de confiar en la capacidad indicada" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" -msgstr "" -"Los pares Floodfill (\"servidores de directorios\") cambian, en vez de " -"estar siempre fijos." +msgstr "Los pares Floodfill (\"servidores de directorios\") cambian, en vez de estar siempre fijos." #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" @@ -772,17 +541,13 @@ msgstr "Conmutado por paquete en vez de conmutado por circuito" msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" -msgstr "" -"Implica control de carga transparente de los mensajes a través de " -"múltiples pares, en vez de por un sólo camino." +msgstr "Implica control de carga transparente de los mensajes a través de múltiples pares, en vez de por un sólo camino." #: i2p2www/pages/site/comparison/tor.html:145 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" -msgstr "" -"Resistencia contra fallos ya que usa varios túneles en paralelo, además " -"de rotar los túneles" +msgstr "Resistencia contra fallos ya que usa varios túneles en paralelo, además de rotar los túneles" #: i2p2www/pages/site/comparison/tor.html:151 msgid "" @@ -790,20 +555,14 @@ msgid "" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" -msgstr "" -"el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por " -"ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los " -"pares con lo que habla Alice, en vez de un circuito por cada par)" +msgstr "el número de conexiones en i2p vienen dado por O(1) en vez de O(N) (por ejemplo, Alice tiene 2 túneles de entrada que son usados por todos los pares con lo que habla Alice, en vez de un circuito por cada par)" #: i2p2www/pages/site/comparison/tor.html:161 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"Túneles unidireccionales en vez de circuitos bidireccionales, usando el " -"doble de nodos un par se compromete más para obtener la misma " -"información." +msgstr "Túneles unidireccionales en vez de circuitos bidireccionales, usando el doble de nodos un par se compromete más para obtener la misma información." #: i2p2www/pages/site/comparison/tor.html:166 #, python-format @@ -817,11 +576,7 @@ msgid "" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" -msgstr "" -"Protección contra la detección de la actividad de un cliente, incluso " -"cuando un atacante participa en el túnel, ya que los túneles no son sólo " -"usados para pasar el mensaje de punto a punto (por ejemplo, netDB, " -"administración de túneles, pruebas en los túneles)" +msgstr "Protección contra la detección de la actividad de un cliente, incluso cuando un atacante participa en el túnel, ya que los túneles no son sólo usados para pasar el mensaje de punto a punto (por ejemplo, netDB, administración de túneles, pruebas en los túneles)" #: i2p2www/pages/site/comparison/tor.html:180 msgid "" @@ -829,19 +584,13 @@ msgid "" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." -msgstr "" -"Los túneles de I2P tienen una vida corta, reduciendo el número de " -"muestras que un atacante puede usar para lograr un ataque activo, al " -"contrario que con los circuitos en Tor, que son tÃpicamente de larga " -"duración." +msgstr "Los túneles de I2P tienen una vida corta, reduciendo el número de muestras que un atacante puede usar para lograr un ataque activo, al contrario que con los circuitos en Tor, que son tÃpicamente de larga duración." #: i2p2www/pages/site/comparison/tor.html:188 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." -msgstr "" -"Los APIs de I2P están especÃficamente diseñados para el anonimato y la " -"seguridad, mientras que SOCKS está diseñado para su funcionalidad." +msgstr "Los APIs de I2P están especÃficamente diseñados para el anonimato y la seguridad, mientras que SOCKS está diseñado para su funcionalidad." #: i2p2www/pages/site/comparison/tor.html:193 msgid "Essentially all peers participate in routing for others" @@ -852,10 +601,7 @@ msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." -msgstr "" -"El uso de ancho de banda de cualquier par completo es bajo, mientras que " -"en Tor, aunque un nodo cliente no necesita mucho ancho de banda, " -"realmente no participan completamente en la red." +msgstr "El uso de ancho de banda de cualquier par completo es bajo, mientras que en Tor, aunque un nodo cliente no necesita mucho ancho de banda, realmente no participan completamente en la red." #: i2p2www/pages/site/comparison/tor.html:201 msgid "Integrated automatic update mechanism" @@ -875,26 +621,20 @@ msgstr "Otros beneficios potenciales de I2P aún no implementados" #: i2p2www/pages/site/comparison/tor.html:207 msgid "...and may never be implemented, so don't count on them!" -msgstr "" -"...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente" -" con ellos!" +msgstr "...y puede ser que nunca lleguen a ser implementados, ¡osea que no cuente con ellos!" #: i2p2www/pages/site/comparison/tor.html:210 msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" -msgstr "" -"Defensa contra el análisis de conteo de mensajes envolviendo múltiples " -"mensajes dentro de la red garlic" +msgstr "Defensa contra el análisis de conteo de mensajes envolviendo múltiples mensajes dentro de la red garlic" #: i2p2www/pages/site/comparison/tor.html:216 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" -msgstr "" -"Defensa contra la intersección a largo plazo añadiendo demoras en varios " -"saltos (donde las demoras no son perceptibles por los otros saltos)" +msgstr "Defensa contra la intersección a largo plazo añadiendo demoras en varios saltos (donde las demoras no son perceptibles por los otros saltos)" #: i2p2www/pages/site/comparison/tor.html:223 msgid "" @@ -902,8 +642,4 @@ msgid "" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" -msgstr "" -"Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando " -"túneles que manejarán 500 mensajes al minuto, donde el punto final " -"inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)" - +msgstr "Varias estrategias de mezclado a nivel del túnel (por ejemplo, creando túneles que manejarán 500 mensajes al minuto, donde el punto final inyectará mensajes de relleno si no hubiese suficientes mensajes, etc)" diff --git a/i2p2www/translations/es/LC_MESSAGES/docs.po b/i2p2www/translations/es/LC_MESSAGES/docs.po index cc0b6ba6fb52ec1f01fb33effbf0ff5bc7ca53b8..08f033800721d668403834a5044aad4d51aeb7dc 100644 --- a/i2p2www/translations/es/LC_MESSAGES/docs.po +++ b/i2p2www/translations/es/LC_MESSAGES/docs.po @@ -4558,7 +4558,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:72 msgid "for" -msgstr "" +msgstr "para" #: i2p2www/pages/site/docs/applications/git.html:74 msgid "in order to obscure your local time zone." diff --git a/i2p2www/translations/es/LC_MESSAGES/misc.po b/i2p2www/translations/es/LC_MESSAGES/misc.po index 8eba06108160ad0c8a81940f25eebc8982e90428..87c47b0a951d51b604bd4ba02b653e93c0eb5dd5 100644 --- a/i2p2www/translations/es/LC_MESSAGES/misc.po +++ b/i2p2www/translations/es/LC_MESSAGES/misc.po @@ -1,29 +1,30 @@ -# Spanish translations for I2P. -# Copyright (C) 2017 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# Adolfo Jayme Barrientos, 2013 -# Daniel Mustieles <inactive+leo@transifex.com>, 2013 +# Adolfo Jayme-Barrientos, 2013 +# 0f759dd1ea6c4c76cedc299039ca4f23_7584d04 <454cc45058db9632179dc8079c0c1af3_5311>, 2013 # m1xxy <m1xxy@mail.i2p>, 2011 # Oliver Trash <oliver.trasshh@gmail.com>, 2013 # strel, 2016 # strel, 2013 # trolly, 2013 -# Trolly, 2013 +# fa1e5d1b5b1ea91a38c4e92aeae85c31_060014a, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2017-09-19 18:21+0000\n" -"Last-Translator: strel\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: strel, 2016\n" "Language-Team: Spanish (http://www.transifex.com/otf/I2P/language/es/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: es\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -32,78 +33,39 @@ msgstr "I2P en el CLT y el PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Miembros de I2P darán una charla en el CLT y PetCon 2009.1. Dos miembros " -"de equipo de I2P estarán en los 2 próximos Linux day y en concenciones de" -" seguridad." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Miembros de I2P darán una charla en el CLT y PetCon 2009.1. Dos miembros de equipo de I2P estarán en los 2 próximos Linux day y en concenciones de seguridad." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"El 14 de mayo del 2009 habrá un corta charla sobre una introducción " -"general a I2P en la <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> guiada por echelon. Echelon y algunos otros miembros de la " -"familia I2P estarán en la conferencia los dos dÃas (sábado y Domingo) y " -"serán reconocibles como parte de la familia I2P. Conócelos, pregúntales, " -"muéstreles sus propuestas." +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "El 14 de mayo del 2009 habrá un corta charla sobre una introducción general a I2P en la <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> guiada por echelon. Echelon y algunos otros miembros de la familia I2P estarán en la conferencia los dos dÃas (sábado y Domingo) y serán reconocibles como parte de la familia I2P. Conócelos, pregúntales, muéstreles sus propuestas." #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"Justo 10 dÃas después se llevará a cabo la <a href=\"%(petcon)s\">Privacy" -" and Data Security convention</a> en Dresden.. De igual forma, echelon " -"estará en el evento y dará una pequeña charla introductoria sobre I2P. " -"También se dará otra charla sobre los perfiles de los clientes I2P." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "Justo 10 dÃas después se llevará a cabo la <a href=\"%(petcon)s\">Privacy and Data Security convention</a> en Dresden.. De igual forma, echelon estará en el evento y dará una pequeña charla introductoria sobre I2P. También se dará otra charla sobre los perfiles de los clientes I2P." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"El código fuente de I2P se guardaba en un repositorio CVS. En estos " -"momentos se guarda en un repositorio <a " -"href=\"%(monotone)s\">Monotone</a>. Para aquellos que no estén " -"familiarizados con CVS, existe un <a href=\"http://cvsbook.red-" -"bean.com/cvsbook.html\">libro fantásrico</a> sobre este tema (los " -"desarrolladores sólo necesitan familiarizarse con el primer capÃtulo - " -"\"An Overview of\n" -"CVS\", ya que los siguientes capÃtulos tratan sobre algunos feos detalles" -" que pocas personas necesitarán)." +msgstr "El código fuente de I2P se guardaba en un repositorio CVS. En estos momentos se guarda en un repositorio <a href=\"%(monotone)s\">Monotone</a>. Para aquellos que no estén familiarizados con CVS, existe un <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">libro fantásrico</a> sobre este tema (los desarrolladores sólo necesitan familiarizarse con el primer capÃtulo - \"An Overview of\nCVS\", ya que los siguientes capÃtulos tratan sobre algunos feos detalles que pocas personas necesitarán)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Nota humorÃstica en WinCVS: \"¿SabÃa que nunca deberÃa experimentar los " -"nuevos comandos CVS en el repositorio de trabajo?. Es mejor crear un " -"módulo de ejemplo.\"" +msgstr "Nota humorÃstica en WinCVS: \"¿SabÃa que nunca deberÃa experimentar los nuevos comandos CVS en el repositorio de trabajo?. Es mejor crear un módulo de ejemplo.\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -114,13 +76,9 @@ msgstr "Migración de los I2PTunnel" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" -"Después de actualizar la nueva arquitectura, deberá realizar un pequeño " -"esfuerzo para hacer funcionar de nuevo sus servidores antiguos manejados " -"por los I2PTunnel. Para una eepsite con la configuración clientApp " -"antigua, debe:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16 msgid "To provide that same functionality on the new web architecture:" @@ -136,12 +94,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "Pulse en Añadir un nuevo:[Rúnel Servidor] \"GO\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Nombre: <code>\"eepsite\"</code> " +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Descripción:<code>\"Mi eepsite, ¿no es bonita?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -155,10 +113,7 @@ msgstr "Puerto de destino:" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Archivo con la clave privada: <code>path de \"myWebPriv.dat\"</code><br " -"/> (se recomienda que copie ese archivo .dat al nuevo directorio de " -"instalación)" +msgstr "Archivo con la clave privada: <code>path de \"myWebPriv.dat\"</code><br /> (se recomienda que copie ese archivo .dat al nuevo directorio de instalación)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -174,23 +129,12 @@ msgstr "Responderá diciendo:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" -msgstr "" -"¡Ya está! Para crear el nuevo servidor I2PTunnel funciona de la misma " -"forma, excepto que no necesita \"copiar el archivo antiguo\". " -"Internamente está todo controlado por el archivo " -"<code>i2ptunnel.config</code>, el cual puede editar externamente (si lo " -"hace, pulse \"Recargar configuración\" en la página web del I2PTunnel, " -"que apagará todos los túneles existentes y los construirá y levantará de " -"nuevo)." +msgstr "¡Ya está! Para crear el nuevo servidor I2PTunnel funciona de la misma forma, excepto que no necesita \"copiar el archivo antiguo\". Internamente está todo controlado por el archivo <code>i2ptunnel.config</code>, el cual puede editar externamente (si lo hace, pulse \"Recargar configuración\" en la página web del I2PTunnel, que apagará todos los túneles existentes y los construirá y levantará de nuevo)." #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47 msgid "" @@ -199,22 +143,15 @@ msgid "" "interface. It will say \"Please be patient\" if you try to \n" "beforehand, which means that it is still trying to build the \n" "necessary I2PTunnel sessions it has been configured to create." -msgstr "" -"Dese cuenta que TENDRà que esperar hasta que el ruter esté integrado en " -"la red antes de poder usar el interfaz web para /i2ptunnel/. Le dirá " -"\"Por favor sea paciente\" si ya lo ha intentado anteriormente, lo que " -"significa que aún está intentando de construir las sesiones de los " -"túneles que ha configurado para ser creados." +msgstr "Dese cuenta que TENDRà que esperar hasta que el ruter esté integrado en la red antes de poder usar el interfaz web para /i2ptunnel/. Le dirá \"Por favor sea paciente\" si ya lo ha intentado anteriormente, lo que significa que aún está intentando de construir las sesiones de los túneles que ha configurado para ser creados." #: i2p2www/pages/site/misc/i2ptunnel-services.html:2 msgid "I2PTunnel services" msgstr "Servicios I2PTunnel." #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" -"Más abajo tiene una copia de la guÃa de aum de como crear una eepsite " -"rápidamente." #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 msgid "1. - Deploy a local server" @@ -225,70 +162,48 @@ msgid "" "For simplicity's sake, we will walk through the setup of a web server; " "however, this procedure is the same regardless what protocol of servers " "and/or clients you are setting up." -msgstr "" -"Para simplificar, seguiremos los pasos de cómo crear un servidor web; aún" -" asÃ, este procedimiento es le mismo independientemente del protocolo del" -" servidor o/y los clientes que esté configurando." +msgstr "Para simplificar, seguiremos los pasos de cómo crear un servidor web; aún asÃ, este procedimiento es le mismo independientemente del protocolo del servidor o/y los clientes que esté configurando." #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." -msgstr "" -"Recomiendo el servidor web Tiny Httpd, thttpd, (hay una versión " -"disponible en su web para windows) aunque puede usar cualquier servidor " -"con el que se encuantre confortable." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." +msgstr "Recomiendo el servidor web Tiny Httpd, thttpd, (hay una versión disponible en su web para windows) aunque puede usar cualquier servidor con el que se encuantre confortable." #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." -msgstr "" -"Otra opción robusta podrÃa ser usar EasyPHP, el cual es también libre. " -"Viene con PHP, PHPmyamin, mySQL y el servidor web Apache. Para los " -"principiantes que no tengan experiencia en configurar un domino o " -"servidores de contenido, vea la web de hosting/servidores para más ayuda." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." +msgstr "Otra opción robusta podrÃa ser usar EasyPHP, el cual es también libre. Viene con PHP, PHPmyamin, mySQL y el servidor web Apache. Para los principiantes que no tengan experiencia en configurar un domino o servidores de contenido, vea la web de hosting/servidores para más ayuda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." -msgstr "" -"En el servidor web que haya elegido, configúrelo para que escuche en un " -"puerto de su elección, y sirva los documentos de un directorio de su " -"elección. Para este ejemplo supondremos que usamos el puerto 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." +msgstr "En el servidor web que haya elegido, configúrelo para que escuche en un puerto de su elección, y sirva los documentos de un directorio de su elección. Para este ejemplo supondremos que usamos el puerto 10880." #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 msgid "" "Make sure your firewall is set up so that you cannot receive incoming " "connections on this port (which would breach your anonymity)." -msgstr "" -"Asegúrese que su cortafuegos está configurado para bloquear las " -"conexiones entrantes a este puerto (si no, al poder acceder directamente " -"a este puerto, eliminarÃa su anonimato)" +msgstr "Asegúrese que su cortafuegos está configurado para bloquear las conexiones entrantes a este puerto (si no, al poder acceder directamente a este puerto, eliminarÃa su anonimato)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:25 msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." -msgstr "" -"Pruebe el servidor web abriendo en su navegador web (el navegador con " -"\"conexión directa\") la dirección <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (cambiando el puerto 10880 " -"por el número que haya elejido)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." +msgstr "Pruebe el servidor web abriendo en su navegador web (el navegador con \"conexión directa\") la dirección <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> (cambiando el puerto 10880 por el número que haya elejido)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 msgid "" "Once your webserver is working, and you can access it locally with your " "browser, continue to the next step." -msgstr "" -"Una vez que el servidor esté funcionando, y pueda acceder a él localmente" -" con su explorador, continue con el siguiente paso." +msgstr "Una vez que el servidor esté funcionando, y pueda acceder a él localmente con su explorador, continue con el siguiente paso." #: i2p2www/pages/site/misc/i2ptunnel-services.html:33 msgid "2 - Generate an I2P Destination Keypair" @@ -296,45 +211,29 @@ msgstr "2 - Genere el par de claves de destino de I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." -msgstr "" -"I2P no funciona con su dirección IP. Para proteger su anonimato funciona " -"con direcciones únicas llamadas claves de destino." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." +msgstr "I2P no funciona con su dirección IP. Para proteger su anonimato funciona con direcciones únicas llamadas claves de destino." #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" -msgstr "" -"Una clave de Destino funciona como una dirección IP normal, excepto que " -"no se puede seguir dicha dirección hasta tu localización local. Cuando " -"los usuarios hacen una petición para hablarle, sus puertas de salida, " -"gateways son las que responden por usted. Con lo que los usuarios sólo " -"pueden saber las IP de sus gateways. Además, las gateways no saben su IP," -" ya que las gateways son los últimos nodos de sus túneles, y los túneles " -"han sido creado anónimamante con el rutado Garlic. (Las gateways son como" -" mascotas que no pueden ver a sus dueños, y todo el mundo se comunica a " -"través de estas mascotas)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" +msgstr "Una clave de Destino funciona como una dirección IP normal, excepto que no se puede seguir dicha dirección hasta tu localización local. Cuando los usuarios hacen una petición para hablarle, sus puertas de salida, gateways son las que responden por usted. Con lo que los usuarios sólo pueden saber las IP de sus gateways. Además, las gateways no saben su IP, ya que las gateways son los últimos nodos de sus túneles, y los túneles han sido creado anónimamante con el rutado Garlic. (Las gateways son como mascotas que no pueden ver a sus dueños, y todo el mundo se comunica a través de estas mascotas)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" -msgstr "" -"Para crear un servicio en I2P, se crean un par de claves de destino. Se " -"utiliza la clave privada para autentificar sur servidor cuando se conecta" -" a I2P, y se hace pública la clave pública (también llamada clave de " -"destino), asà otros pueden conectarse a su servidor. (indirectamente, a " -"través de sus gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" +msgstr "Para crear un servicio en I2P, se crean un par de claves de destino. Se utiliza la clave privada para autentificar sur servidor cuando se conecta a I2P, y se hace pública la clave pública (también llamada clave de destino), asà otros pueden conectarse a su servidor. (indirectamente, a través de sus gateways)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 msgid "Each service you run on I2P requires a different keypair." @@ -345,77 +244,52 @@ msgid "" "To generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code> (all on one line)" -msgstr "" -"Para generar el par de claves, ejecute el comando: <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code> (en una sola lÃnea)" +msgstr "Para generar el par de claves, ejecute el comando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (en una sola lÃnea)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:50 msgid "" "In windows, to generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code>" -msgstr "" -"Para generar el par de claves en windows, ejecute el comando: <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code>" +msgstr "Para generar el par de claves en windows, ejecute el comando: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." -msgstr "" -"Los nombres de archivo <code>myWebPrivKey.dat</code> y " -"<code>myWebPubKey.dat</code> son arbitrarios - elija el que desee, al " -"menos mientras entienda sus elecciones." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." +msgstr "Los nombres de archivo <code>myWebPrivKey.dat</code> y <code>myWebPubKey.dat</code> son arbitrarios - elija el que desee, al menos mientras entienda sus elecciones." #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 msgid "" "We now need to export your public key into base64 format, which you will " "share with others." -msgstr "" -"Ahora necesitamos exportar su clave pública al formato base64, el cual " -"compartirá con otros." +msgstr "Ahora necesitamos exportar su clave pública al formato base64, el cual compartirá con otros." #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." -msgstr "" -"Para convertir su archivo myWebPubKey.dat al formato base64 compartible, " -"ejecute el comando <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (todo en la misma lÃnea)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." +msgstr "Para convertir su archivo myWebPubKey.dat al formato base64 compartible, ejecute el comando <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > myWebPubKey.txt</code> (todo en la misma lÃnea)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." -msgstr "" -"El archivo que acaba de generar, <code>myWebPubKey.txt</code>, contiene " -"una cadena larga base64 (con 516 caracteres), lo que llamamos una clave " -"de destino. Todo lo que necesita saber por el momento es que esta clave " -"de destino permite que los clientes remotos localicen con precisión su " -"servicio y se conecten a él, justamente de la misma forma que una IP " -"permite que las máquinas remotas puedan localizar su máquina y se " -"conecten a ella." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." +msgstr "El archivo que acaba de generar, <code>myWebPubKey.txt</code>, contiene una cadena larga base64 (con 516 caracteres), lo que llamamos una clave de destino. Todo lo que necesita saber por el momento es que esta clave de destino permite que los clientes remotos localicen con precisión su servicio y se conecten a él, justamente de la misma forma que una IP permite que las máquinas remotas puedan localizar su máquina y se conecten a ella." #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." -msgstr "" -"Aunque, y a diferencia de una dirección IP, no hay forma de rastrear la " -"localización fÃsica de su máquina - aunque el servidor pueda ser accedido" -" desde I2P, su dirección IP no puede ser rastreada o asociada a esta " -"clave de destino." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." +msgstr "Aunque, y a diferencia de una dirección IP, no hay forma de rastrear la localización fÃsica de su máquina - aunque el servidor pueda ser accedido desde I2P, su dirección IP no puede ser rastreada o asociada a esta clave de destino." #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 msgid "3 - Open a 'Tunnel' from I2P To Your Server" @@ -423,51 +297,37 @@ msgstr "3 - Abra un 'Túnel' desde I2P hacia su servicio/servidor" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." -msgstr "" -"Para que los clientes de I2P sean capaces de acceder a su servidor, tiene" -" que ejecutar un 'bridge', puente, o un 'túnel', los cuales cogen las " -"conexiones desde esos clientes y las reenvÃan hasta su servidor local." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." +msgstr "Para que los clientes de I2P sean capaces de acceder a su servidor, tiene que ejecutar un 'bridge', puente, o un 'túnel', los cuales cogen las conexiones desde esos clientes y las reenvÃan hasta su servidor local." #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 msgid "" "To activate such a tunnel, type the command <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code> (all one line)." -msgstr "" -"Para activar este tipo de túneles, ejecute el comando <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " -"myWebPrivKey.dat\"</code> (todo en la misma lÃnea)." +msgstr "Para activar este tipo de túneles, ejecute el comando <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (todo en la misma lÃnea)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:78 msgid "" "If you used different filenames or port number earlier on, change these " "accordingly" -msgstr "" -"Si anteriormente ha usado nombres diferentes en los archivos, o usado " -"números de puertos diferentes, cámbielos de acuerdo a ello." +msgstr "Si anteriormente ha usado nombres diferentes en los archivos, o usado números de puertos diferentes, cámbielos de acuerdo a ello." #: i2p2www/pages/site/misc/i2ptunnel-services.html:81 msgid "" "Windows users, remember to replace apostrophes with double quotes. Thus: " "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code>" -msgstr "" -"Para usuarios de windows; recuerden cambiar los apostrofes con comillas " -"dobles. Tal que: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server " -"localhost 10880 myWebPrivKey.dat\"</code>" +msgstr "Para usuarios de windows; recuerden cambiar los apostrofes con comillas dobles. Tal que: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." -msgstr "" -"En unos pocos segundos el 'túnel' deberÃa estar activo, y los clientes " -"remotos deberÃan poder acceder al servicio anónimamante. Recuerde dejar " -"su ruter \"calentarse\" antes de permitir que los clientes se conecten." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." +msgstr "En unos pocos segundos el 'túnel' deberÃa estar activo, y los clientes remotos deberÃan poder acceder al servicio anónimamante. Recuerde dejar su ruter \"calentarse\" antes de permitir que los clientes se conecten." #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 msgid "4 - Update Your hosts.txt File " @@ -479,32 +339,21 @@ msgid "" "hosts.txt file, so I2P can translate the simple URL you place in the " "browser's address bar into the full public key text needed to find your " "server." -msgstr "" -"Para probar su propio servicio localmente debe crear una entrada en su " -"archivo host.txt, para que I2P pueda traducir la URL sencilla que " -"introduce en la barra de direcciones de su navegador en la clave pública " -"completa que necesita para encontrar su servidor." +msgstr "Para probar su propio servicio localmente debe crear una entrada en su archivo host.txt, para que I2P pueda traducir la URL sencilla que introduce en la barra de direcciones de su navegador en la clave pública completa que necesita para encontrar su servidor." #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" -msgstr "" -"Edite su archivo host.txt y añada la lÃnea myserver.i2p=blahblahblah, " -"donde myserver.i2p es un 'dominio' I2P que desea asociar con su web, y en" -" donde el blahblahblah es el texto de la clave pública base64 que ha " -"creado anteriormente en el archivo " +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" +msgstr "Edite su archivo host.txt y añada la lÃnea myserver.i2p=blahblahblah, donde myserver.i2p es un 'dominio' I2P que desea asociar con su web, y en donde el blahblahblah es el texto de la clave pública base64 que ha creado anteriormente en el archivo " #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 msgid "" "With this in place, you and others can reach your server with the simple " "domain name myserver.i2p in the browser's address bar." -msgstr "" -"Una vez hecho esto, usted y otros pueden acceder a su servidor " -"simplemente poniendo el nombre de dominio myserver.i2p en la barra de " -"direcciones del navegador." +msgstr "Una vez hecho esto, usted y otros pueden acceder a su servidor simplemente poniendo el nombre de dominio myserver.i2p en la barra de direcciones del navegador." #: i2p2www/pages/site/misc/i2ptunnel-services.html:102 msgid "5 - Surf Your Site Within I2P" @@ -515,10 +364,7 @@ msgid "" "Using your secondary browser - the one you earlier configured to use " "localhost:4444 as a proxy - point this browser to the address <a " "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" -msgstr "" -"Usando su navegador web secundario - el que anteriormente ha configurado" -" para usar el proxy localhost:4444 - acceda en su navegador a la " -"dirección " +msgstr "Usando su navegador web secundario - el que anteriormente ha configurado para usar el proxy localhost:4444 - acceda en su navegador a la dirección " #: i2p2www/pages/site/misc/i2ptunnel-services.html:107 msgid "You should see the main page of your webserver come up." @@ -534,61 +380,43 @@ msgstr "Ahora debemos pensara más allá de los servidores web." #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." -msgstr "" -"Según use más I2P y lo conozca mejor, deseará usar todo tipo de " -"servidores y clientes." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." +msgstr "Según use más I2P y lo conozca mejor, deseará usar todo tipo de servidores y clientes." #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"La belleza de I2P radica en que permite que los clientes y servidores de " -"la mayorÃa de los protocolos sean 'tunelados' transparentemente a través " -"de la red anónima I2P." +msgstr "La belleza de I2P radica en que permite que los clientes y servidores de la mayorÃa de los protocolos sean 'tunelados' transparentemente a través de la red anónima I2P." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." -msgstr "" -"Puede ejecutar servidores/clientes de correo, de nombres, de noticias " -"(usenet) - realmente casi cualquier cosa - quizá incluso FTP en modo " -"pasivo." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." +msgstr "Puede ejecutar servidores/clientes de correo, de nombres, de noticias (usenet) - realmente casi cualquier cosa - quizá incluso FTP en modo pasivo." #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." -msgstr "" -"Ahora vamos a crear un túnel cliente. Este es como el túnel servidor que " -"hemos creado anteriormente, pero funciona al revés. Escucha en un puerto " -"en su máquina local; su cliente local se conecta a este puerto; la " -"conexión se reenvÃa a través de I2P hasta el servicio de destino." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." +msgstr "Ahora vamos a crear un túnel cliente. Este es como el túnel servidor que hemos creado anteriormente, pero funciona al revés. Escucha en un puerto en su máquina local; su cliente local se conecta a este puerto; la conexión se reenvÃa a través de I2P hasta el servicio de destino." #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." -msgstr "" -"Para abrir el túnel cliente para su servidor, ejecute el comando " -"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e " -"\"client 10888 textofbase64key\"</code> (todo en una lÃnea)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." +msgstr "Para abrir el túnel cliente para su servidor, ejecute el comando <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (todo en una lÃnea)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." -msgstr "" -"El puerto10888 es arbitrario - simplemente es necesario que sea un " -"puerto diferente al que ocupa su servidor, y que no esté usado por ningún" -" otro servicio." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." +msgstr "El puerto10888 es arbitrario - simplemente es necesario que sea un puerto diferente al que ocupa su servidor, y que no esté usado por ningún otro servicio." #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 msgid "" @@ -596,52 +424,34 @@ msgid "" "myWebPubKey.txt, reproduced fully on one line (alternately, instead of " "textofbase64key, you can specify the name from your hosts.txt - e.g. " "myserver.i2p)" -msgstr "" -"textofbase64key no es más que el contenido del archivo de la clave " -"pública myWebPubKey.txt, reproducido completamente en una lÃnea " -"(alternativamente, en vez de usar textofbase64key, puede especificar el " -"nombre en su hosts.txt - por ejemplo myserver.i2p)" +msgstr "textofbase64key no es más que el contenido del archivo de la clave pública myWebPubKey.txt, reproducido completamente en una lÃnea (alternativamente, en vez de usar textofbase64key, puede especificar el nombre en su hosts.txt - por ejemplo myserver.i2p)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:138 msgid "" "Within a minute or two of launching this command, the client tunnel from " "your local machine into I2P will be open and ready for use." -msgstr "" -"Después de un minuto o dos de haber ejecutado este comando, el túnel " -"cliente desde su máquina local hacia I2P estará abierto y listo para " -"usar." +msgstr "Después de un minuto o dos de haber ejecutado este comando, el túnel cliente desde su máquina local hacia I2P estará abierto y listo para usar." #: i2p2www/pages/site/misc/i2ptunnel-services.html:141 msgid "" "Point your regular web browser (ie, not the one you configured to use " "localhost:4444), and point it to <a href=\"http://localhost:10888\" " "target=\"_blank\">http://localhost:10888</a>" -msgstr "" -"Apunte su navegador web normal (no el que ha configurado para usar " -"localhost:4444), hacia <a href=\"http://localhost:10888\" " -"target=\"_blank\">http://localhost:10888</a>" +msgstr "Apunte su navegador web normal (no el que ha configurado para usar localhost:4444), hacia <a href=\"http://localhost:10888\" target=\"_blank\">http://localhost:10888</a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:144 msgid "" "Verify that the main page of your server eventually comes up in your " "browser." -msgstr "" -"Asegúrese que la página principal de su servidor aparece en su navegador " -"web." +msgstr "Asegúrese que la página principal de su servidor aparece en su navegador web." #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." -msgstr "" -"Usará el mismo procedimiento para que cualquier aplicación cliente local " -"pueda acceder a un servidor remoto I2P - simplemente consiga la clave " -"pública base64 (llamada clave de destino) del servidor remoto, elija un " -"puerto local para conectarse al servidor remoto, abra el túnel, y conecte" -" con su cliente al contenido deseado. " +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." +msgstr "Usará el mismo procedimiento para que cualquier aplicación cliente local pueda acceder a un servidor remoto I2P - simplemente consiga la clave pública base64 (llamada clave de destino) del servidor remoto, elija un puerto local para conectarse al servidor remoto, abra el túnel, y conecte con su cliente al contenido deseado. " #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 msgid "7 - Share your server details with others" @@ -651,43 +461,26 @@ msgstr "7 - Comparta los datos del servidor con otros" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." -msgstr "" -"Usando un medio anónimo (por ejemplo unos los servidores IRC en I2P o la " -"wiki de ugha), anuncie su nombre de dominio ( por ejemplo <a " -"href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a>) asà " -"como su clave de destino. Entonces otros podrán conectarse a su servidor " -"remotamente sin comprometer su anonimato o el de ellos." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." +msgstr "Usando un medio anónimo (por ejemplo unos los servidores IRC en I2P o la wiki de ugha), anuncie su nombre de dominio ( por ejemplo <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a>) asà como su clave de destino. Entonces otros podrán conectarse a su servidor remotamente sin comprometer su anonimato o el de ellos." #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." -msgstr "" -"Recuerde, pude ir a What's on I2P y buscar las últimas claves públicas " -"enlazadas a su URL. También deberÃa añadir su clave pública y URL allÃ. " -"Pero por supuesto, quiere hacer esto anónimamente. Drupal.i2p.net es sólo" -" accesible desde la clearnet. Por lo que para acceder a la WWW " -"anónimamante desde I2P, necesitará ejecutar el script startSquid. Hágalo " -"de la misma forma que ha ejecutado otros scripts. Vuelva a configurar su " -"navegador web para que use localhost:5555 como proxy, como se ha definido" -" en el script, y cuando el script haya generado sus claves, ya puede " -"acceder el proxy squid. Ponga cualquier URL WWW (como Google o esta web " -"de I2P) en su navegador y estará navegando la clearnet anónimamante. " -"Ahora puede añadir su clave pública seguro, y nadie puede averiguar si " -"IP." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." +msgstr "Recuerde, pude ir a What's on I2P y buscar las últimas claves públicas enlazadas a su URL. También deberÃa añadir su clave pública y URL allÃ. Pero por supuesto, quiere hacer esto anónimamente. Drupal.i2p.net es sólo accesible desde la clearnet. Por lo que para acceder a la WWW anónimamante desde I2P, necesitará ejecutar el script startSquid. Hágalo de la misma forma que ha ejecutado otros scripts. Vuelva a configurar su navegador web para que use localhost:5555 como proxy, como se ha definido en el script, y cuando el script haya generado sus claves, ya puede acceder el proxy squid. Ponga cualquier URL WWW (como Google o esta web de I2P) en su navegador y estará navegando la clearnet anónimamante. Ahora puede añadir su clave pública seguro, y nadie puede averiguar si IP." #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense" @@ -695,11 +488,9 @@ msgstr "8 - Cree algunos scripts para manejar todo este sinsentido" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." -msgstr "" -"Repetir estos pasos cada vez que se configura un cliente o servidor I2P " -"puede volver loco a mucha gente." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." +msgstr "Repetir estos pasos cada vez que se configura un cliente o servidor I2P puede volver loco a mucha gente." #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 msgid "" @@ -707,41 +498,29 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." -msgstr "" -"En la web de Aum <a href=\"http://www.freenet.org.nz/i2p/\" " -"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> hay un script " -"llamado setupServer.py que automatiza todo este sinsentido en un comando " -"de una sola lÃnea." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." +msgstr "En la web de Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> hay un script llamado setupServer.py que automatiza todo este sinsentido en un comando de una sola lÃnea." #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 msgid "" "So please feel free to use and/or customize setupServer.py to taste, or " "write your own in Python or another language." -msgstr "" -"Siéntase libre de usar o cambiar etupServer.py para probarlo, o para " -"escribir su propio script en Python o en cualquier otro lenguaje." +msgstr "Siéntase libre de usar o cambiar etupServer.py para probarlo, o para escribir su propio script en Python o en cualquier otro lenguaje." #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." -msgstr "" -"También pude querer escribir para que maneje el inicio del Ruter I2P, el " -"eepProxy y los túneles que esté usando. Yo uso un script llamado " -"startEverything.sh, que se ejecuta al iniciar al sistema. (Estos scripts " -"no son necesarios en las nuevas versiones de I2P)." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." +msgstr "También pude querer escribir para que maneje el inicio del Ruter I2P, el eepProxy y los túneles que esté usando. Yo uso un script llamado startEverything.sh, que se ejecuta al iniciar al sistema. (Estos scripts no son necesarios en las nuevas versiones de I2P)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." -msgstr "" -"Un ejercicio para los usuarios de Windows - portar setupServer.py a un " -"archivo MS-DOS .BAT." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgstr "Un ejercicio para los usuarios de Windows - portar setupServer.py a un archivo MS-DOS .BAT." #: i2p2www/pages/site/misc/invisiblenet.html:2 msgid "Old Documents" @@ -749,18 +528,12 @@ msgstr "Documentos viejos" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." -msgstr "" -"Aquà hay una lista de documentos originarios de www.invisiblenet.net/i2p/" -" y rescatado gracias a la <a href=\"http://www.archive.org/\">Wayback " -"Machine</a>. Son bastantes antiguos y pueden que ya no sean precisos. Aún" -" asÃ, los documentos sobre I2CP e I2NP tienen información bastante buena." +"However, the I2CP and I2NP documents in particular have some good information." +msgstr "Aquà hay una lista de documentos originarios de www.invisiblenet.net/i2p/ y rescatado gracias a la <a href=\"http://www.archive.org/\">Wayback Machine</a>. Son bastantes antiguos y pueden que ya no sean precisos. Aún asÃ, los documentos sobre I2CP e I2NP tienen información bastante buena." #: i2p2www/pages/site/misc/jbigi.html:3 msgid "August 2011" @@ -772,14 +545,10 @@ msgstr "Vista general" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." -msgstr "" -"Usando JNI (Interfaz nativo de Java), un poco de código C (¡gracias " -"ugha!), un poco de trabajo manual y un trozo de chicle hemos hecho que " -"varias operaciones de cifrados sean un poco más rápidas." +msgstr "Usando JNI (Interfaz nativo de Java), un poco de código C (¡gracias ugha!), un poco de trabajo manual y un trozo de chicle hemos hecho que varias operaciones de cifrados sean un poco más rápidas." #: i2p2www/pages/site/misc/jbigi.html:13 #, python-format @@ -790,37 +559,21 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." -msgstr "" -"El aumento de velocidad se debe a la súper rápida <a " -"href=\"%(gmplib)s\">librerÃa GNU MP Bignum (libgmp)</a>. Sólo usamos una " -"función de libgmp - <a href=\"%(func)s\">mpz_powm()</a> como reemplazo de" -" la <a href=\"%(bigint)s\">modPow() BigInteger en la librerÃa Java " -"Math</a>. Ya que modPow() es una importante parte de los cálculos de " -"cifrados, se consigue un beneficio sognificante." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." +msgstr "El aumento de velocidad se debe a la súper rápida <a href=\"%(gmplib)s\">librerÃa GNU MP Bignum (libgmp)</a>. Sólo usamos una función de libgmp - <a href=\"%(func)s\">mpz_powm()</a> como reemplazo de la <a href=\"%(bigint)s\">modPow() BigInteger en la librerÃa Java Math</a>. Ya que modPow() es una importante parte de los cálculos de cifrados, se consigue un beneficio sognificante." #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n" "is used." -msgstr "" -"La instalación estándar de I2P incluye como 20 versiones de la librerÃa " -"para diferentes plataformas, dentro del archivo jbigi.jar, cada una sobre" -" 50kb. El inicio de la librerÃa JBigl, la identificación de la CPU, " -"selección y extracción del módulo correcto a cargar es manejado por la <a" -" href=\"%(nativebigint)s\">clase NativeBigInteger</a>. Si no hay un " -"módulo disponible para la plataforma usada, se usará la librerÃa estándar" -" <a href=\"%(bigint)s\">modPow() BigInteger de Java Math library</a>." +msgstr "La instalación estándar de I2P incluye como 20 versiones de la librerÃa para diferentes plataformas, dentro del archivo jbigi.jar, cada una sobre 50kb. El inicio de la librerÃa JBigl, la identificación de la CPU, selección y extracción del módulo correcto a cargar es manejado por la <a href=\"%(nativebigint)s\">clase NativeBigInteger</a>. Si no hay un módulo disponible para la plataforma usada, se usará la librerÃa estándar <a href=\"%(bigint)s\">modPow() BigInteger de Java Math library</a>." #: i2p2www/pages/site/misc/jbigi.html:38 msgid "Rebuilding and Testing JBigI" @@ -828,12 +581,9 @@ msgstr "Recompilando y probando JBigl" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." -msgstr "" -"Aquà están las instrucciones para compilar una nueva librerÃa jbigi para " -"su propia plataforma y poder probar su rendimiento." +msgstr "Aquà están las instrucciones para compilar una nueva librerÃa jbigi para su propia plataforma y poder probar su rendimiento." #: i2p2www/pages/site/misc/jbigi.html:42 msgid "Requirements" @@ -842,49 +592,28 @@ msgstr "Dependencias" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." -msgstr "" -"Funciona en Linux con unos pocos cambios en build.sh, probablemente " -"también en otras plataformas. En Kaffe el aumento de velocidad es muy " -"pequeño, porque ya usa internamente el BitInteger nativo. Blackdown " -"parece producir errores extraños. Ya que va a compilar necesita JDK; el " -"JRE no funcionará." +msgstr "Funciona en Linux con unos pocos cambios en build.sh, probablemente también en otras plataformas. En Kaffe el aumento de velocidad es muy pequeño, porque ya usa internamente el BitInteger nativo. Blackdown parece producir errores extraños. Ya que va a compilar necesita JDK; el JRE no funcionará." #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " -msgstr "" -"El código necesario está disponible en monotone y en el último tarball de" -" las fuentes." +"The required code is available in monotone database and the latest source " +"tarball. " +msgstr "El código necesario está disponible en monotone y en el último tarball de las fuentes." #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." -msgstr "" -"Necesita instalar la librerÃa GNU MP Bignu (libgmp), si no está incluida " -"en su OS / distribución puede obtenerla de <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Incluso si ya tiene instalada como un binario, vale la pena compilar GMP " -"por usted mismo, ya que de esta forma será capaz de usar las " -"instrucciones especÃficas de su procesador. Probablemente se pueda usar " -"la última versión de GMP en vez de la 5.0.2, pero no ha sido probado por " -"nosotros." +msgstr "Necesita instalar la librerÃa GNU MP Bignu (libgmp), si no está incluida en su OS / distribución puede obtenerla de <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Incluso si ya tiene instalada como un binario, vale la pena compilar GMP por usted mismo, ya que de esta forma será capaz de usar las instrucciones especÃficas de su procesador. Probablemente se pueda usar la última versión de GMP en vez de la 5.0.2, pero no ha sido probado por nosotros." #: i2p2www/pages/site/misc/jbigi.html:61 msgid "Step-by-step instructions" @@ -892,19 +621,13 @@ msgstr "Instrucciones paso a paso" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" -msgstr "" -"Mire en <a href=\"http://localhost:7657/logs.jsp\">, en la web de los " -"registros, el entorno que está ejecutando . DeberÃan aparecer uno o dos " -"mensajes sobre JBigi" +msgstr "Mire en <a href=\"http://localhost:7657/logs.jsp\">, en la web de los registros, el entorno que está ejecutando . DeberÃan aparecer uno o dos mensajes sobre JBigi" #: i2p2www/pages/site/misc/jbigi.html:66 msgid "Locally optimized native BigInteger loaded from the library path" -msgstr "" -"LibrerÃa nativa local optimizada BigInteger has sido cargada " -"satisfactoriamente." +msgstr "LibrerÃa nativa local optimizada BigInteger has sido cargada satisfactoriamente." #: i2p2www/pages/site/misc/jbigi.html:68 msgid "or" @@ -922,57 +645,30 @@ msgid "" "may require you to compile your own library.\n" "If the BigInteger library was loaded, do at least the next step to see\n" "what your performance is." -msgstr "" -"Si la librerÃa nativa BigInteger NO ha sida cargada, definitivamente " -"necesita compilarla. Algunas plataformas, como OS X, OpenSolaris y los " -"sistemas de 64 bits, pueden necesitar que compile su propia librerÃa. Si " -"la librerÃa BigInteger se ha cargado, al menos haga el siguiente paso " -"para comprobar su rendimiento." +msgstr "Si la librerÃa nativa BigInteger NO ha sida cargada, definitivamente necesita compilarla. Algunas plataformas, como OS X, OpenSolaris y los sistemas de 64 bits, pueden necesitar que compile su propia librerÃa. Si la librerÃa BigInteger se ha cargado, al menos haga el siguiente paso para comprobar su rendimiento." #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." -msgstr "" -"Mire en <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -" para ver cuales son los valores medios del tiempo de vida para " -"<code>crypto.elGamal.decrypt</code> y " -"<code>crypto.elGamal.encrypt</code>. Los números son el tiempo en mili " -"segundos. Cópielos para poder compararlos más tarde. El tiempo medio de" -" cifrado es alrededor de 20ms. Si el tiempo de cifrado es menor de 50ms " -"para un procesador relativamente nuevo, o menos de 100ms para un " -"procesador viejo, y la librerÃa BigIntefer ha sido cargada, probablemente" -" esté todo bien." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." +msgstr "Mire en <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> para ver cuales son los valores medios del tiempo de vida para <code>crypto.elGamal.decrypt</code> y <code>crypto.elGamal.encrypt</code>. Los números son el tiempo en mili segundos. Cópielos para poder compararlos más tarde. El tiempo medio de cifrado es alrededor de 20ms. Si el tiempo de cifrado es menor de 50ms para un procesador relativamente nuevo, o menos de 100ms para un procesador viejo, y la librerÃa BigIntefer ha sido cargada, probablemente esté todo bien." #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" -msgstr "" -"Obtenga las últimas sources de I2P desde <a href=\"%(downloads)s\">la " -"página de descargas</a>, u obtenga el código más actualizado desde la " -"base de datos de monotone en mtn.i2p2.de" +msgstr "Obtenga las últimas sources de I2P desde <a href=\"%(downloads)s\">la página de descargas</a>, u obtenga el código más actualizado desde la base de datos de monotone en mtn.i2p2.de" #: i2p2www/pages/site/misc/jbigi.html:92 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>" -msgstr "" -"Dentro del directorio de las fuentes cambie a la carpeta: " -"<code>core/c/jbigi</code>" +msgstr "Dentro del directorio de las fuentes cambie a la carpeta: <code>core/c/jbigi</code>" #: i2p2www/pages/site/misc/jbigi.html:93 msgid "" @@ -980,58 +676,30 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." -msgstr "" -"Lea el archivo README. Si ya tiene un archivo /usr/lib/libgmp.so, no " -"necesita descargar GMP. Use la opción 'dynamic' para build.sh. De otra " -"forma, también puede descargar la versión 5.0.2 de GMP desde " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"guardándolo como gmp-5.0.2.tar.bz2. Si decide usar una versión más " -"nueva, cambie la lÃnea VER= en <code>core/c/jbigi/build.sh</code>. " +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." +msgstr "Lea el archivo README. Si ya tiene un archivo /usr/lib/libgmp.so, no necesita descargar GMP. Use la opción 'dynamic' para build.sh. De otra forma, también puede descargar la versión 5.0.2 de GMP desde href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, guardándolo como gmp-5.0.2.tar.bz2. Si decide usar una versión más nueva, cambie la lÃnea VER= en <code>core/c/jbigi/build.sh</code>. " #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." -msgstr "" -"Échele un vistazo a <code>build.sh</code>, si su variable de entorno " -"<code>JAVA_HOME</code> está puesta y usa Linux, simplemente deberÃa " -"funcionar. En caso contrario, cambie las configuraciones. Recuerde, " -"necesita tener instalado el SDK de Java." +msgstr "Échele un vistazo a <code>build.sh</code>, si su variable de entorno <code>JAVA_HOME</code> está puesta y usa Linux, simplemente deberÃa funcionar. En caso contrario, cambie las configuraciones. Recuerde, necesita tener instalado el SDK de Java." #: i2p2www/pages/site/misc/jbigi.html:106 msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." -msgstr "" -"Ejecute <code>build.sh</code> (si ha descargado GMP) o <code>build.sh " -"dynamic</code> (si ya tiene /usr/lib/libgmp.so).<br/> Quizás al compilar " -"le arroje algunos errores sobre la falta de los archivos jni.h y " -"jni_md.h. Puede copiar estos archivos desde su instalación de java al " -"directorio core/c/jbigi/jbigi/include/, o arregle su $JAVA_HOME.<br> " -"Puede ejecutar <code>build.sh</code> desde el directorio " -"<code>core/c/</code>, lo cual compilará todas las librerÃas jbigi " -"disponibles dentro de jbigi.jar.</br>. En dicho directorio deberÃa " -"crearse un archivo llamado <code>libjbigi.so</code>. Si no aparece y/o " -"obtiene errores, por favor repórtelo." +msgstr "Ejecute <code>build.sh</code> (si ha descargado GMP) o <code>build.sh dynamic</code> (si ya tiene /usr/lib/libgmp.so).<br/> Quizás al compilar le arroje algunos errores sobre la falta de los archivos jni.h y jni_md.h. Puede copiar estos archivos desde su instalación de java al directorio core/c/jbigi/jbigi/include/, o arregle su $JAVA_HOME.<br> Puede ejecutar <code>build.sh</code> desde el directorio <code>core/c/</code>, lo cual compilará todas las librerÃas jbigi disponibles dentro de jbigi.jar.</br>. En dicho directorio deberÃa crearse un archivo llamado <code>libjbigi.so</code>. Si no aparece y/o obtiene errores, por favor repórtelo." #: i2p2www/pages/site/misc/jbigi.html:118 msgid "" @@ -1039,18 +707,13 @@ msgid "" "the speed test.\n" "Read the final lines of the speed test's output for some additional\n" "info, it will be something like this:" -msgstr "" -"Siga las instrucciones de core/c/README para instalar la librerÃa y " -"ejecutar las pruebas de velocidad. Lea las últimas lÃneas del test de " -"velocidad para obtener información adicional, deberÃa ser algo como esto:" +msgstr "Siga las instrucciones de core/c/README para instalar la librerÃa y ejecutar las pruebas de velocidad. Lea las últimas lÃneas del test de velocidad para obtener información adicional, deberÃa ser algo como esto:" #: i2p2www/pages/site/misc/jbigi.html:128 msgid "" "If the native is indeed 5-7x faster (or more) then it looks all good. If " "not, please report." -msgstr "" -"Si el nativo es 5-7 veces más rápido (o más), entonces todo está bien. Si" -" no, avÃsenos." +msgstr "Si el nativo es 5-7 veces más rápido (o más), entonces todo está bien. Si no, avÃsenos." #: i2p2www/pages/site/misc/jbigi.html:129 msgid "Copy <code>libjbigi.so</code> to your i2p directory" @@ -1062,17 +725,10 @@ msgstr "Reinicie sus programas I2P" #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." -msgstr "" -"En <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -" las velocidades en <code>crypto.elGamal.decrypt</code> y " -"<code>crypto.elGamal.encrypt</code> deberÃan ser mucho más rápidas." +msgstr "En <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> las velocidades en <code>crypto.elGamal.decrypt</code> y <code>crypto.elGamal.encrypt</code> deberÃan ser mucho más rápidas." #: i2p2www/pages/site/misc/jrandom-awol.html:2 msgid "Jrandom's Announcement" @@ -1080,40 +736,28 @@ msgstr "Aviso de Jrandom" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"El siguiente mensaje fue recibido a mediados de Noviembre del 2007. No " -"tenemos más información sobre jrandom." +msgstr "El siguiente mensaje fue recibido a mediados de Noviembre del 2007. No tenemos más información sobre jrandom." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" "and related subdomains." -msgstr "" -"Más tarde, en un incidente no relacionado, la compañÃa de hosting de " -"todos los servidores *.i2p.net (excepto forum.i2p.net) sufrió una perdida" -" de corriente el 13 de Enero del 2008, y los servidores i2p.net no " -"volvieron a funcionar. Ya que sólo jrandom tiene las credenciales para " -"restaurar el servicio, y no puede ser contactado, movimos todos los " -"servicios públicos a <a href=\"%(site)s\">www.i2p2.de</a>." +msgstr "Más tarde, en un incidente no relacionado, la compañÃa de hosting de todos los servidores *.i2p.net (excepto forum.i2p.net) sufrió una perdida de corriente el 13 de Enero del 2008, y los servidores i2p.net no volvieron a funcionar. Ya que sólo jrandom tiene las credenciales para restaurar el servicio, y no puede ser contactado, movimos todos los servicios públicos a <a href=\"%(site)s\">www.i2p2.de</a>." #: i2p2www/pages/site/misc/jrandom-awol.html:19 #, python-format msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"Dos meses más tarde, aproximadamente, y por otras razones, forum.i2p.net " -"fue movido a <a href=\"http://%(forum)s/\">%(forum)s</a>. " +msgstr "Dos meses más tarde, aproximadamente, y por otras razones, forum.i2p.net fue movido a <a href=\"http://%(forum)s/\">%(forum)s</a>. " #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -1123,59 +767,35 @@ msgstr "Instalar manualmente el Wrapper de Java" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." -msgstr "" -"El paquete de instalación para el <a href=\"%(downloads)s\">ruter I2P</a>" -" viene con un wrapper de Java para las arquitecturas más comunes. Si su " -"sistema no está soportado por nuestro instalador, o si desea actualizar " -"el wrapper a una nueva versión, los siguientes pasos describen como " -"instalar el wrapper a mano." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." +msgstr "El paquete de instalación para el <a href=\"%(downloads)s\">ruter I2P</a> viene con un wrapper de Java para las arquitecturas más comunes. Si su sistema no está soportado por nuestro instalador, o si desea actualizar el wrapper a una nueva versión, los siguientes pasos describen como instalar el wrapper a mano." #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." -msgstr "" -"Compruebe la <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">página" -" de descargas</a> de Tanuki Software por su plataforma. ¿Está su " -"plataforma listada? Si es asÃ, ¡está de suerte! Descargue la versión más " -"reciente para su sistema operativo y su CPU y vaya al <a " -"href=\"#packaged\">siguiente paso</a>." +msgstr "Compruebe la <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">página de descargas</a> de Tanuki Software por su plataforma. ¿Está su plataforma listada? Si es asÃ, ¡está de suerte! Descargue la versión más reciente para su sistema operativo y su CPU y vaya al <a href=\"#packaged\">siguiente paso</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." -msgstr "" -"Si su plataforma no tiene todavÃa un wrapper disponible compilado, podrÃa" -" ser capaz de compilarlo usted mismo. Si desea hacerlo, vaya a <a " -"href=\"#compiling\">compilar</a> el wrapper para su sistema." +msgstr "Si su plataforma no tiene todavÃa un wrapper disponible compilado, podrÃa ser capaz de compilarlo usted mismo. Si desea hacerlo, vaya a <a href=\"#compiling\">compilar</a> el wrapper para su sistema." #: i2p2www/pages/site/misc/manual-wrapper.html:27 msgid "Using existing binaries" msgstr "Usando binarios ya existentes" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." -msgstr "" -"En los pasos de más abajo, $I2P significa <em>el lugar donde ha sido " -"instalado I2P</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgstr "En los pasos de más abajo, $I2P significa <em>el lugar donde ha sido instalado I2P</em>." #: i2p2www/pages/site/misc/manual-wrapper.html:36 #: i2p2www/pages/site/misc/manual-wrapper.html:64 @@ -1190,11 +810,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> y busque los problemas." #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." -msgstr "" -"Si esto no funciona necesitará ejecutar <code>runplain.sh</code> para " -"arrancar I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." +msgstr "Si esto no funciona necesitará ejecutar <code>runplain.sh</code> para arrancar I2P." #: i2p2www/pages/site/misc/manual-wrapper.html:43 msgid "Compiling from source" @@ -1202,23 +820,16 @@ msgstr "Compilando desde las fuentes" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." -msgstr "" -"Estos pasos han funcionado para compilar el wrapper en un sistema mipsel " -"ejecutando debian. Estos pasos <strong>tendrán</strong> que ser cambiados" -" dependiendo de su sistema." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." +msgstr "Estos pasos han funcionado para compilar el wrapper en un sistema mipsel ejecutando debian. Estos pasos <strong>tendrán</strong> que ser cambiados dependiendo de su sistema." #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." -msgstr "" -"Descargue el archivo con las fuentes para la versión del wrapper desde <a" -" href=\"http://wrapper.tanukisoftware.com/downloads\">la página de " -"descarga del wrapper</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." +msgstr "Descargue el archivo con las fuentes para la versión del wrapper desde <a href=\"http://wrapper.tanukisoftware.com/downloads\">la página de descarga del wrapper</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:49 msgid "Extract the tarball" @@ -1226,19 +837,15 @@ msgstr "Descompriba el archivo" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" -msgstr "" -"Ajuste las variables <code>ANT_HOME</code> y <code>JAVA_HOME</code>. For " -"ejemplo en Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" +msgstr "Ajuste las variables <code>ANT_HOME</code> y <code>JAVA_HOME</code>. For ejemplo en Debian:" #: i2p2www/pages/site/misc/manual-wrapper.html:54 msgid "" "Since there isn't a Makefile for Mipsel, we'll make a copy of an already " "existing makefile:" -msgstr "" -"Ya que no existe un Makefile para Mipsel, haremos una copia de un " -"makefile ya existente:" +msgstr "Ya que no existe un Makefile para Mipsel, haremos una copia de un makefile ya existente:" #: i2p2www/pages/site/misc/manual-wrapper.html:56 msgid "Now we can attempt to compile the wrapper:" @@ -1256,9 +863,7 @@ msgstr "Copie el wrapper al su lugar correcto:" msgid "" "Here's an outline and rationale for a minimal WWW proxy app for use over " "I2P." -msgstr "" -"Aquà hay un esquema para una aplicación proxy WWW mÃnima para usar sobre " -"I2P " +msgstr "Aquà hay un esquema para una aplicación proxy WWW mÃnima para usar sobre I2P " #: i2p2www/pages/site/misc/minwww.html:8 msgid "" @@ -1268,252 +873,116 @@ msgid "" "in the router (but later versions of the SocketLibrary will be able to\n" "use selective ACK and large window sizes, allowing more ACKs to be\n" "skipped)" -msgstr "" -"Usar HTTP sobre I2P usando un I2PTunnel. Cuando la librerÃa base " -"SocketLibrary esté lista, los únicos cambios significantes serán que el " -"'wrapRequest' y 'unwrapRequest' serán alojados funcionalmente en la " -"librerÃa socketLibrary, no en el ruter (pero las versiones más nuevas de " -"SocketLibrary serán capaces de usar ACK selectivo y windows de grandes " -"tamaños, permitiendo que sean omitidos más Acks)" +msgstr "Usar HTTP sobre I2P usando un I2PTunnel. Cuando la librerÃa base SocketLibrary esté lista, los únicos cambios significantes serán que el 'wrapRequest' y 'unwrapRequest' serán alojados funcionalmente en la librerÃa socketLibrary, no en el ruter (pero las versiones más nuevas de SocketLibrary serán capaces de usar ACK selectivo y windows de grandes tamaños, permitiendo que sean omitidos más Acks)" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" -msgstr "" -"Un clase optimizada, diseñada para manejar archivos y páginas de " -"sólo128KB [1], pude funcionar mucho más rápida:" +msgstr "Un clase optimizada, diseñada para manejar archivos y páginas de sólo128KB [1], pude funcionar mucho más rápida:" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." -msgstr "" -"La diferencia en la carga y latencia de la red es significante - esto es " -"esencialmente una versión UDP de HTTP. En las webs normales no podemos " -"hacer esto, ya que la mayorÃa de las peticiones y respuestas HTTP son " -"mayores de lo que permiten los paquetes UDP, pero en I2P, los mensajes " -"pueden ser más grandes. El ahorro para la red viene de que no necesitamos" -" enviar ningún mensaje ACK - al contrario que las peticiones wrap/unwrap " -"anteriores (que unen un DataMessage con un DeliveryStatusMessage para " -"asegurarse que que ha sido entregado), el proxy MinWWW se encarga de " -"estos reenvÃos (si es necesario - en los I2PTunnel no hay reenvÃos)." +msgstr "La diferencia en la carga y latencia de la red es significante - esto es esencialmente una versión UDP de HTTP. En las webs normales no podemos hacer esto, ya que la mayorÃa de las peticiones y respuestas HTTP son mayores de lo que permiten los paquetes UDP, pero en I2P, los mensajes pueden ser más grandes. El ahorro para la red viene de que no necesitamos enviar ningún mensaje ACK - al contrario que las peticiones wrap/unwrap anteriores (que unen un DataMessage con un DeliveryStatusMessage para asegurarse que que ha sido entregado), el proxy MinWWW se encarga de estos reenvÃos (si es necesario - en los I2PTunnel no hay reenvÃos)." #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." -msgstr "" -"Los datos que el servidor y el proxy MinWWW necesitan envolver son " -"triviales - cuando el proxy quiere enviar un \"GET /\", lo antepone con " -"la destinación I2P y envÃa la petición, seguido por un ID de petición de " -"4 bytes. El servidor MinWWW recibe entonces estas peticiones, contacta " -"con el servidor HTTP apropiado, envÃa la petición, espera por la " -"respuesta, y envÃa una respuesta al proxy MinWWW con la respuesta dentro," -" y con el ID original de la petición como prefijo. Esa respuesta se toma " -"y se envÃa de vuelta al navegador, y se cierra la conexión." +msgstr "Los datos que el servidor y el proxy MinWWW necesitan envolver son triviales - cuando el proxy quiere enviar un \"GET /\", lo antepone con la destinación I2P y envÃa la petición, seguido por un ID de petición de 4 bytes. El servidor MinWWW recibe entonces estas peticiones, contacta con el servidor HTTP apropiado, envÃa la petición, espera por la respuesta, y envÃa una respuesta al proxy MinWWW con la respuesta dentro, y con el ID original de la petición como prefijo. Esa respuesta se toma y se envÃa de vuelta al navegador, y se cierra la conexión." #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." -msgstr "" -"Además, el proxy MinWWW puede elegir el servidor MinWWW a usar de una " -"lista, a través de round robin u otro algoritmo, con lo que habrÃa " -"múltiples outproxies unidos transparentemente. El ancho de banda " -"necesario para ejecutar estos outproxies se reduce drásticamente, ya que " -"sólo maneja archivos de 128KB (tambien conocido como: nadie va a bajar " -"porno, software, etc)." +msgstr "Además, el proxy MinWWW puede elegir el servidor MinWWW a usar de una lista, a través de round robin u otro algoritmo, con lo que habrÃa múltiples outproxies unidos transparentemente. El ancho de banda necesario para ejecutar estos outproxies se reduce drásticamente, ya que sólo maneja archivos de 128KB (tambien conocido como: nadie va a bajar porno, software, etc)." #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." -msgstr "" -"Esta funcionalidad /está/ limitada, pero 128KB es mucho para una simple " -"respuesta o petición HTTP. Los diagramas de más arriba además no son " -"realistas en sus saltos - ROUTERA nunca conectará directamente con " -"ROUTERB, ROUTERA enviará sus mensajes a través de dos ruters de salida " -"adicionales, entonces se reenviará a dos túneles adicionales hacia " -"ROUTERB, con lo que el retraso es significante - mientras que lo anterior" -" sólo ahorra 11 pasos, 8 de estos pasos necesitan atravesar el camino " -"entero de túneles (4 saltos más remotos cada vez), dejando MinWWW con " -"sólo dos recorridos completos (uno para la petición, otro para la " -"respuesta), en vez de 10." +msgstr "Esta funcionalidad /está/ limitada, pero 128KB es mucho para una simple respuesta o petición HTTP. Los diagramas de más arriba además no son realistas en sus saltos - ROUTERA nunca conectará directamente con ROUTERB, ROUTERA enviará sus mensajes a través de dos ruters de salida adicionales, entonces se reenviará a dos túneles adicionales hacia ROUTERB, con lo que el retraso es significante - mientras que lo anterior sólo ahorra 11 pasos, 8 de estos pasos necesitan atravesar el camino entero de túneles (4 saltos más remotos cada vez), dejando MinWWW con sólo dos recorridos completos (uno para la petición, otro para la respuesta), en vez de 10." #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" -msgstr "" -"Implementar el proxy y el servidor MinWWW deberÃa ser bastante fácil - " -"leer una petición HTTP del cliente (quizás sólo empezar con un HTTP GET; " -"dejando HTTP POST para más tarde), envolver el mensaje, y esperar por la " -"respuesta. El servidor de turno sólo necesita analizar la petición para " -"abrir un socket o una URL, enviar la petición, esperar por la respuesta y" -" enviarlo de vuelta a través de la red. ¡Si alguien implementase esto, " -"serÃa Genial! :)" +msgstr "Implementar el proxy y el servidor MinWWW deberÃa ser bastante fácil - leer una petición HTTP del cliente (quizás sólo empezar con un HTTP GET; dejando HTTP POST para más tarde), envolver el mensaje, y esperar por la respuesta. El servidor de turno sólo necesita analizar la petición para abrir un socket o una URL, enviar la petición, esperar por la respuesta y enviarlo de vuelta a través de la red. ¡Si alguien implementase esto, serÃa Genial! :)" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" -msgstr "" -"[1] ¿Por qué archivos de 128KB? Actualmente I2P permite mensajes de " -"tamaño arbitrario, pero eso se eliminará ya que implica un gasto de " -"memoria en los ruters intermedios. Los túneles I2P están limitados a " -"128KB y no ha sido un problema, son lo que quizás podrÃa ampliarse a " -"256KB cuando las espcificaciones de I2CP se actualicen)" +msgstr "[1] ¿Por qué archivos de 128KB? Actualmente I2P permite mensajes de tamaño arbitrario, pero eso se eliminará ya que implica un gasto de memoria en los ruters intermedios. Los túneles I2P están limitados a 128KB y no ha sido un problema, son lo que quizás podrÃa ampliarse a 256KB cuando las espcificaciones de I2CP se actualicen)" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." -msgstr "" -"Ha habido discusiones durante unos meses sobre una aplicación de blogging" -" llamada ahora \"MyI2P\". Aunque la discusión original se perdió, fuimos " -"capaces de conseguirla con el <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de " -"Google. " +msgstr "Ha habido discusiones durante unos meses sobre una aplicación de blogging llamada ahora \"MyI2P\". Aunque la discusión original se perdió, fuimos capaces de conseguirla con el <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de Google. " #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." -msgstr "" -"La aplicación en si misma no está implementada, y las ideas detrás de " -"ella se han hecho menos ambiciosas con el tiempo, pero aún son válidas y " -"el <a href=\"%(roadmap)s\">plan</a> actual es tener el núcleo de MyI2P " -"disponible con la versión 1.0 de I2P. Esto incluirá una libreta de " -"direcciones distribuida para permitir un sistema de nombres seguro y " -"distribuido aunque signifique sacrificar la necesidad de unicidad global " -"- básicamente cada uno tiene su libreta de direcciones locales y puede " -"'suscribirse' a las libretas de direcciones de otros usuarios, " -"permitiendo a MyI2P obtener periódicamente nuevos nombres de destinos " -"(dejando al usuario arreglar los conflictos). Ademas de la libreta de " -"direcciones, habrá un sistema de blogs distribuidos usando una parte " -"segura de <a " -"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a>, para " -"proveer un <a href=\"http://www.livejournal.com/\">LiveJournal</a> " -"anónimo, una 'lista de amigos' y un control de acceso transparente " -"(autentificado por los <a href=\"%(datagrams)s\">datagramas</a> de I2P " -"con normas definidas basadas en la libreta de direcciones)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." +msgstr "La aplicación en si misma no está implementada, y las ideas detrás de ella se han hecho menos ambiciosas con el tiempo, pero aún son válidas y el <a href=\"%(roadmap)s\">plan</a> actual es tener el núcleo de MyI2P disponible con la versión 1.0 de I2P. Esto incluirá una libreta de direcciones distribuida para permitir un sistema de nombres seguro y distribuido aunque signifique sacrificar la necesidad de unicidad global - básicamente cada uno tiene su libreta de direcciones locales y puede 'suscribirse' a las libretas de direcciones de otros usuarios, permitiendo a MyI2P obtener periódicamente nuevos nombres de destinos (dejando al usuario arreglar los conflictos). Ademas de la libreta de direcciones, habrá un sistema de blogs distribuidos usando una parte segura de <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a>, para proveer un <a href=\"http://www.livejournal.com/\">LiveJournal</a> anónimo, una 'lista de amigos' y un control de acceso transparente (autentificado por los <a href=\"%(datagrams)s\">datagramas</a> de I2P con normas definidas basadas en la libreta de direcciones)." #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." -msgstr "" -"Las funcionalidades adicionales, como la integración del almacenamiento " -"de copias DHT o la transferencia de archivos cmoo 'adjuntos' puede " -"añadirse más tarde. El email puede estar listo o no en esta primera " -"versión, aunque su implementación es esencialmente simplemente una " -"entrada de blog con acceso privado, con lo que quizás algún diseñador de " -"aplicaciones gráficas podrÃa hacer algo. Esportando los datos a RSS o el " -"acceso a través de ATOM podrÃa ser unas opciones también." +msgstr "Las funcionalidades adicionales, como la integración del almacenamiento de copias DHT o la transferencia de archivos cmoo 'adjuntos' puede añadirse más tarde. El email puede estar listo o no en esta primera versión, aunque su implementación es esencialmente simplemente una entrada de blog con acceso privado, con lo que quizás algún diseñador de aplicaciones gráficas podrÃa hacer algo. Esportando los datos a RSS o el acceso a través de ATOM podrÃa ser unas opciones también." #: i2p2www/pages/site/misc/ratestats.html:2 #: i2p2www/pages/site/misc/ratestats.html:5 @@ -1526,11 +995,9 @@ msgstr "I2p permite un gran número de diferentes velocidades." #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" -msgstr "" -"La lista fue obtenida usando el siguiente comando en el directorio " -"principal de la rama 2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" +msgstr "La lista fue obtenida usando el siguiente comando en el directorio principal de la rama 2p.i2p:" #: i2p2www/pages/site/misc/ratestats.html:10 msgid "All options aren't needed, but it works." @@ -1544,30 +1011,17 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"El código fuente de i2p es mantenido en varios repositorios distribuidos " -"de monotone. Vea la <a href=\"http://www.monotone.ca/\">Web de " -"Monotone</a> para mas información sobre monotone. Vea <a " -"href=\"http://%(forum)s/viewtopic.php?t=2524\">este foro sobre i2p y " -"monotone</a> para obtener mas información de como comenzar y descargar el" -" código fuente anónimamente. También hay una guÃa rápida en la <a " -"href=\"%(newdevs)s\">web de nuevos desarrolladores</a>." +msgstr "El código fuente de i2p es mantenido en varios repositorios distribuidos de monotone. Vea la <a href=\"http://www.monotone.ca/\">Web de Monotone</a> para mas información sobre monotone. Vea <a href=\"http://%(forum)s/viewtopic.php?t=2524\">este foro sobre i2p y monotone</a> para obtener mas información de como comenzar y descargar el código fuente anónimamente. También hay una guÃa rápida en la <a href=\"%(newdevs)s\">web de nuevos desarrolladores</a>." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." -msgstr "" -"Si desea obtener el código fuente no anónimamente, descargue desde el " -"servidor publico mtn.welterde.de.\n" -"La rama del código fuente de i2p es \"i2p.i2p\"." +msgstr "Si desea obtener el código fuente no anónimamente, descargue desde el servidor publico mtn.welterde.de.\nLa rama del código fuente de i2p es \"i2p.i2p\"." #: i2p2www/pages/site/misc/transition-guide.html:21 msgid "Guide" @@ -1577,9 +1031,7 @@ msgstr "GuÃa" msgid "" "\n" "The following is a detailed guide by Complication." -msgstr "" -"\n" -"Lo siguiente es una guÃa detallada hecha por Complication." +msgstr "\nLo siguiente es una guÃa detallada hecha por Complication." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2 msgid "How to Upgrade from 0.6.1.30 and Earlier" @@ -1596,40 +1048,24 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." -msgstr "" -"Desde que el programador principal de i2p <a href=\"%(jrandom)s\">se " -"ausentó sin avisar, AWOL</a>, no tenemos su clave de actualización " -"firmada o acceso a www.i2p[.net] o dev.i2p[.net]. Complication y zzz han " -"generado nuevas claves de firmado, y ellos y Amiga proveen alojamiento a " -"los archivos de actualización. Estos cambios tienen que ser configurados " -"en su ruter para que tengan efecto. " +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." +msgstr "Desde que el programador principal de i2p <a href=\"%(jrandom)s\">se ausentó sin avisar, AWOL</a>, no tenemos su clave de actualización firmada o acceso a www.i2p[.net] o dev.i2p[.net]. Complication y zzz han generado nuevas claves de firmado, y ellos y Amiga proveen alojamiento a los archivos de actualización. Estos cambios tienen que ser configurados en su ruter para que tengan efecto. " #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." -msgstr "" -"Haga los siguientes cambios de configuración y su ruter instalará " -"automáticamente la última versión" +msgstr "Haga los siguientes cambios de configuración y su ruter instalará automáticamente la última versión" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." -msgstr "" -"Recomendamos el proceso automático ya que verificará la clave del archivo" -" de actualización firmado. Si no hace estos cambios, puede descargar " -"manualmente el archivo i2pupdate.zip de la <a " -"href=\"%(downloads)s\">página de descargas</a>." +msgstr "Recomendamos el proceso automático ya que verificará la clave del archivo de actualización firmado. Si no hace estos cambios, puede descargar manualmente el archivo i2pupdate.zip de la <a href=\"%(downloads)s\">página de descargas</a>." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34 #, python-format @@ -1638,11 +1074,9 @@ msgstr "Cambiar el enlace de la suscripción de noticias a: %(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " -msgstr "" -"Seleccione una de las siguientes enlaces de actualización aleatoriamente " -"e introdúzcalo dentro de la casilla Update URL:" +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " +msgstr "Seleccione una de las siguientes enlaces de actualización aleatoriamente e introdúzcalo dentro de la casilla Update URL:" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 msgid "Check the box \"Update through the eepProxy?\"" @@ -1663,25 +1097,14 @@ msgstr "Pulse \"Aplicar\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." -msgstr "" -"Ahora estas listo para recibir automáticamente el archivo de " -"actualización, ya sea configurando su polÃtica de actualizaciones a " -"\"descargar e instalar\" o pulsando en el enlace \"actualización " -"disponible\" cuando aparezca." +msgstr "Ahora estas listo para recibir automáticamente el archivo de actualización, ya sea configurando su polÃtica de actualizaciones a \"descargar e instalar\" o pulsando en el enlace \"actualización disponible\" cuando aparezca." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65 #, python-format msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." -msgstr "" -"Si deseas verificar las claves de actualización de confianza, se " -"encuentran también <a href=\"%(url)s\">subidas y firmadas aquÃ</a>. " -"Gracias por su ayuda durante la transición. Por favor, para pedir ayuda " -"contacte con nosotros en #I2P." - +"Thank you for your support during this transition. For help please contact us on #i2p." +msgstr "Si deseas verificar las claves de actualización de confianza, se encuentran también <a href=\"%(url)s\">subidas y firmadas aquÃ</a>. Gracias por su ayuda durante la transición. Por favor, para pedir ayuda contacte con nosotros en #I2P." diff --git a/i2p2www/translations/es_AR/LC_MESSAGES/docs.po b/i2p2www/translations/es_AR/LC_MESSAGES/docs.po index e229e5412845d09963f3549f6fcbfdd642e4f759..3d6cbfcf62144f49f689f4ed605dabf16ac3a032 100644 --- a/i2p2www/translations/es_AR/LC_MESSAGES/docs.po +++ b/i2p2www/translations/es_AR/LC_MESSAGES/docs.po @@ -4547,7 +4547,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:72 msgid "for" -msgstr "" +msgstr "para" #: i2p2www/pages/site/docs/applications/git.html:74 msgid "in order to obscure your local time zone." diff --git a/i2p2www/translations/fa/LC_MESSAGES/about.po b/i2p2www/translations/fa/LC_MESSAGES/about.po index 39df10553392759683aa95753400f56736eddd11..1c106f6578cfb9a1799fb8f77a029097feb998ce 100644 --- a/i2p2www/translations/fa/LC_MESSAGES/about.po +++ b/i2p2www/translations/fa/LC_MESSAGES/about.po @@ -1,23 +1,24 @@ -# Persian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Amir H. Firouzian, 2014 # Reza Ghasemi, 2019 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:26+0000\n" -"PO-Revision-Date: 2021-11-28 10:01+0000\n" -"Last-Translator: Vox <voxp@protonmail.com>\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Reza Ghasemi, 2019\n" "Language-Team: Persian (http://www.transifex.com/otf/I2P/language/fa/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: fa\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -27,8 +28,7 @@ msgstr "کلاینت های I2P دیگر" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -51,8 +51,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -72,18 +71,15 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:9 msgid "" "I2P: Invisible Internet Project: a project meant to\n" -" provide an anonymity layer, so user can communicate anonymously " -"using a\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" " range of applications." msgstr "" #: i2p2www/pages/site/about/glossary.html:12 msgid "" "Router: The core I2P software, which routes encrypted\n" -" packets on the I2P network. All routers by default participate in" -" the\n" -" network, which both helps the network and provides cover traffic " -"for any\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" " clients or servers connecting to the I2P network through the\n" " router." msgstr "" @@ -91,26 +87,22 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:17 msgid "" "RouterIdentity: A collection of information required to\n" -" communicate directly with a router, such as its IP address and " -"listening\n" +" communicate directly with a router, such as its IP address and listening\n" " port, public signing and encryption keys etc." msgstr "" #: i2p2www/pages/site/about/glossary.html:20 msgid "" "Tunnel: An anonymous communication pathway between a\n" -" client or server and the I2P network. Tunnels are unidirectional," -" so any\n" -" one client or server must have at least two Tunnels - one for " -"inbound\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" " traffic and one for outbound traffic." msgstr "" #: i2p2www/pages/site/about/glossary.html:24 msgid "" "Destination: The cryptographic identity of a tunnel.\n" -" These are the identities of clients and servers within the I2P " -"network,\n" +" These are the identities of clients and servers within the I2P network,\n" " and are analogous to the IP:port of a computer on the normal\n" " internet." msgstr "" @@ -118,39 +110,32 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:28 msgid "" "LeaseSet: A collection of information required to\n" -" communicate with a client or server at a particular Destination, " -"such as\n" +" communicate with a client or server at a particular Destination, such as\n" " the gateways of the inbound Tunnels for that\n" " Destination." msgstr "" #: i2p2www/pages/site/about/glossary.html:34 msgid "" -"This table lists definition of different networks and their components. " -"These\n" +"This table lists definition of different networks and their components. These\n" "terms and the definitions provided are taken from\n" -"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization" -" Off The\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" "Shelf: 7 Maxims by Simply Secure</a>(used with permission)." msgstr "" #: i2p2www/pages/site/about/glossary.html:40 msgid "" "Decentralization: Network architecture that avoids\n" -" reliance on a single party. Encompasses peer-to-peer, blockchain," -"\n" -" federated, and distributed technologies that involve many " -"individual\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" " users." msgstr "" #: i2p2www/pages/site/about/glossary.html:44 msgid "" "Peer-to-Peer (p2p): Peers make a portion of their \n" -" resources, such as processing power, disk storage or network " -"bandwidth,\n" -" directly available to other network participants, without the " -"need for\n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" " central coordination by servers or stable hosts. Popularized by\n" " BitTorrent, Napster, and Bitcoin." msgstr "" @@ -158,32 +143,25 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:49 msgid "" "Federated: Federation allows separate deployments of a\n" -" service to communicate with each other through a common protocol," -" for\n" -" instance a mail server run by Google federates with a mail server" -" run by\n" -" Microsoft when you send an email from @gmail.com to @hotmail.com." -"\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" " Each deployment may host multiple users." msgstr "" #: i2p2www/pages/site/about/glossary.html:54 msgid "" "Blockchain: A distributed ledger that can record\n" -" transactions between multiple parties efficiently and in a " -"verifiable\n" +" transactions between multiple parties efficiently and in a verifiable\n" " and permanent way." msgstr "" #: i2p2www/pages/site/about/glossary.html:57 msgid "" "Distributed systems: Academic topic within the\n" -" discipline of Computer Science which is concerned with the design" -" of\n" -" computer systems that consist of many individual computers " -"connected\n" -" over a network. Peer-to-peer networks and blockchains are " -"examples of\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" " distributed systems architectures." msgstr "" @@ -197,8 +175,7 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:65 msgid "" "DHT: Distributed hash table, used in some projects to\n" -" connect peers to each other by storing information in the form of" -"\n" +" connect peers to each other by storing information in the form of\n" " key-value pairs in a distributed manner." msgstr "" @@ -218,16 +195,14 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:73 msgid "" "Hash: A number, usually displayed as a string of letters\n" -" and numbers. It can serve as a ‘fingerprint’ uniquely identifying" -"\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" " data." msgstr "" #: i2p2www/pages/site/about/glossary.html:76 msgid "" "UX: User experience, the overall experience of a person\n" -" using a product or a service, especially in terms of how easy it " -"is to\n" +" using a product or a service, especially in terms of how easy it is to\n" " use." msgstr "" @@ -237,14 +212,10 @@ msgstr "تالار شهرت" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -254,15 +225,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -276,12 +246,8 @@ msgstr "پروژه اینترنت نامرئی" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -291,13 +257,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -306,15 +272,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -323,28 +289,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -353,36 +318,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -391,13 +355,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -406,15 +370,11 @@ msgstr "مقایسه ها" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -433,9 +393,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -492,8 +451,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -512,8 +470,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -522,8 +479,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -536,8 +492,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -546,8 +501,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -555,8 +510,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -571,15 +525,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -591,8 +543,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -647,16 +598,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -665,11 +614,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -722,16 +669,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -747,12 +692,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -766,35 +708,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -803,16 +739,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -829,8 +763,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" @@ -840,29 +773,20 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:4 msgid "" -"This implementation of I2P (the Java implementation distributed on this " -"site)\n" -"includes a \"Strict Countries List\" which we use to decide how routers " -"should behave \n" -"within regions where applications like I2P may be limited by law. For " -"example, while\n" -"no countries that we know of prohibit using I2P, some have broad " -"prohibitions on\n" -"participating in routing for others. Routers that appear to be in the " -"\"Strict\"\n" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" "countries will automatically be placed into \"Hidden\" mode." msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:11 msgid "" -"The Project relies on the research provided by civil and digital rights " -"organizations in order\n" -"to make decisions that offer protections for its users. In this case the " -"ongoing research\n" -"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has " -"been referenced. General\n" -"guidance is to include countries with a Civil Liberties (CL) score of 16 " -"or less or an Internet\n" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" "Freedom score of 39 or less (not free)." msgstr "" @@ -872,16 +796,11 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:19 msgid "" -"When a router is placed into hidden mode, three key things change about " -"it's behavior.\n" -"It will no longer publish a routerInfo to the NetDB, it will no longer " -"accept\n" -"participating tunnels, and it will reject direct connections to routers " -"in the same\n" -"country that it is in. These defenses make the routers more difficult to " -"enumerate\n" -"reliably, and prevent them from running afoul of restrictions on routing " -"traffic for\n" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" "others." msgstr "" @@ -903,18 +822,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -925,84 +841,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1013,8 +906,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1022,27 +914,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1050,26 +938,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1080,10 +959,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1091,18 +968,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1113,10 +987,8 @@ msgstr "اعضا پروژه I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1288,7 +1160,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1528,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1578,32 +1452,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1621,8 +1488,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1661,10 +1528,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1678,15 +1543,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1695,11 +1556,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1754,8 +1612,7 @@ msgstr "روز 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1773,15 +1630,11 @@ msgstr "آگوست 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1800,14 +1653,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1818,20 +1667,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1842,24 +1684,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1879,33 +1712,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1918,32 +1742,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1953,27 +1769,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1990,17 +1798,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -2013,8 +1818,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -2025,10 +1829,8 @@ msgstr "تاریخچه عملکرد" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -2047,30 +1849,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2084,55 +1879,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -2143,20 +1923,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2167,16 +1940,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -2186,17 +1954,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2207,20 +1972,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2234,26 +1992,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2262,18 +2010,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2281,16 +2023,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2306,52 +2043,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2366,102 +2084,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2474,4 +2151,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/fr/LC_MESSAGES/about.po b/i2p2www/translations/fr/LC_MESSAGES/about.po index b020ea763a6fbe08cdc06b3a44295e44a10a5d73..c9a540282b0bd42d329ab314f1234e00c15809a4 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/about.po +++ b/i2p2www/translations/fr/LC_MESSAGES/about.po @@ -1,12 +1,13 @@ -# French translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # AO <ao@localizationlab.org>, 2018-2021 # Boxoa590, 2013 # AO <ao@localizationlab.org>, 2017-2018 # magma <magma@mail.i2p>, 2011 +# Boxoa590, 2013 # Nicolas Belleau <nbbelleau@gmail.com>, 2019 # syl_, 2013 # syl_, 2013,2015-2016 @@ -14,17 +15,18 @@ # Towinet, 2013-2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: AO <ao@localizationlab.org>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: AO <ao@localizationlab.org>, 2018-2021\n" "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: fr\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -34,14 +36,9 @@ msgstr "Clients I2P de remplacement" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"L’implémentation du principal client I2P utilise Java. Si pour certaines " -"raisons vous ne pouvez pas utiliser Java sur votre dispositif, il y a des" -" implémentations alternatives développées par des membres de la " -"communauté." +msgstr "L’implémentation du principal client I2P utilise Java. Si pour certaines raisons vous ne pouvez pas utiliser Java sur votre dispositif, il y a des implémentations alternatives développées par des membres de la communauté." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -49,33 +46,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> est une implémentation de client I2P écrite" -" en C++.\n" -"Début 2016, i2pd est devenu suffisamment stable pour être utilisable en " -"production, et depuis l’été 2016 il implémente complètement toutes les " -"APIs d’I2P." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> est une implémentation de client I2P écrite en C++.\nDébut 2016, i2pd est devenu suffisamment stable pour être utilisable en production, et depuis l’été 2016 il implémente complètement toutes les APIs d’I2P." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> est une fourche active d’I2P développée " -"pour la cryptomonnaie Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> est une fourche active d’I2P développée pour la cryptomonnaie Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> est un client I2P client développé en " -"utilisant le langage de programmation \n" -"<a href=\"%(golang)s\">Go</a>. Le projet est au début de son " -"développement." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> est un client I2P client développé en utilisant le langage de programmation \n<a href=\"%(golang)s\">Go</a>. Le projet est au début de son développement." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -87,11 +72,147 @@ msgstr "Glossaire" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Cette page liste la terminologie souvent utilisée lors de discussions au " -"sujet d’I2P et de la cryptographie." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -99,22 +220,11 @@ msgstr "Temple de la renommée" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." -msgstr "" -"I2P est un projet entièrement réalisé par des passionnés pendant leur " -"temps libre. Mais un grand projet tel qu’I2P n’est pas seulement " -"constitué de logiciels. Plusieurs serveurs, abonnements de domaines et " -"cafés doivent être payés pour obtenir un excellent résultat. Des gens du " -"monde entier ont fait des dons afin qu’I2P atteignent l’état où il se " -"trouve actuellement. Nous gardons ici une trace de ceux qui nous ont " -"donné un nom à publier dans le temple de la renommée d’I2P." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." +msgstr "I2P est un projet entièrement réalisé par des passionnés pendant leur temps libre. Mais un grand projet tel qu’I2P n’est pas seulement constitué de logiciels. Plusieurs serveurs, abonnements de domaines et cafés doivent être payés pour obtenir un excellent résultat. Des gens du monde entier ont fait des dons afin qu’I2P atteignent l’état où il se trouve actuellement. Nous gardons ici une trace de ceux qui nous ont donné un nom à publier dans le temple de la renommée d’I2P." #: i2p2www/pages/site/about/hall-of-fame.html:12 msgid "Big thanks go to the following people who have donated to I2P!" @@ -123,21 +233,15 @@ msgstr "Un grand merci aux personnes suivantes qui ont donné à I2P !" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Si vous avez fait un don, veuillez envoyer un courriel à <a " -"href=\"mailto:%(echelon)s\">echelon</a> avec votre nom ou pseudo (et " -"facultativement votre page Web) afin que nous puissions vous lister ici." +msgstr "Si vous avez fait un don, veuillez envoyer un courriel à <a href=\"mailto:%(echelon)s\">echelon</a> avec votre nom ou pseudo (et facultativement votre page Web) afin que nous puissions vous lister ici." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." -msgstr "" -"La liste non triée de donateurs à I2P lors des quinze années d’histoire " -"d’I2P, de mars 2004 à mars 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." +msgstr "La liste non triée de donateurs à I2P lors des quinze années d’histoire d’I2P, de mars 2004 à mars 2019." #: i2p2www/pages/site/about/intro.html:2 #: i2p2www/pages/site/about/software.html:2 @@ -150,12 +254,8 @@ msgstr "The Invisible Internet Project (le projet internet invisible)" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -165,13 +265,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -180,15 +280,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -197,28 +297,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -227,39 +326,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"Dans la console du routeur, je vois les adresses IP de tous les autres " -"nÅ“uds d’I2P. Cela signifie-t-il que les autres peuvent voir mon adresse " -"IP ?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "Dans la console du routeur, je vois les adresses IP de tous les autres nÅ“uds d’I2P. Cela signifie-t-il que les autres peuvent voir mon adresse IP ?" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -268,13 +363,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -283,36 +378,21 @@ msgstr "Comparaisons" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Il existe un grand nombre d’autres applications et de projets travaillant" -" sur les communications anonymes et I2P s’en est largement inspiré. Cette" -" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a " -"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a> de Freehaven\n" -"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à " -"GNUnet servent à celà ). \n" -"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les " -"suivants disposent d’ailleurs d’une page dédiée :" +msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà ). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :" #: i2p2www/pages/site/about/intro.html:56 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Ceux qui suivent sont discuté sur la page <a " -"href=\"%(othernetworks)s\">autres réseaux</a>" +msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -321,13 +401,9 @@ msgstr "Présentations sur I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Voici des liens vers des présentations, des vidéos et des tutoriels sur " -"I2P. Des liens vers des documents de recherche sur I2P sont proposés <a " -"href=\"%(papers)s\">ici</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Voici des liens vers des présentations, des vidéos et des tutoriels sur I2P. Des liens vers des documents de recherche sur I2P sont proposés <a href=\"%(papers)s\">ici</a>." #: i2p2www/pages/site/about/media.html:8 #, python-format @@ -338,9 +414,7 @@ msgstr "Pour demander un ajout à cette page, veuillez l’envoyer à %(email)s. msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"Les liens les plus récents se trouvent au bas de chaque section." +msgstr "\nLes liens les plus récents se trouvent au bas de chaque section." #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -353,11 +427,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"Présentation IIP à Codecon\n" -"<a href=\"%(mp3)s\">audio MP3</a>\n" -"<a href=\"%(transcript)s\">transcription</a>\n" -"Lance James (0x90), février 2002." +msgstr "Présentation IIP à Codecon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(transcript)s\">transcription</a>\nLance James (0x90), février 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -366,11 +436,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"Présentation IIP à ToorCon\n" -"<a href=\"%(mp3)s\">audio MP3</a>\n" -"<a href=\"%(slides)s\">diaporama</a>\n" -" Lance James (0x90), septembre 2002." +msgstr "Présentation IIP à ToorCon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(slides)s\">diaporama</a>\n Lance James (0x90), septembre 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -380,12 +446,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To Be or I2P</a>\n" -"(vidéo Youtube)\n" -"Une introduction à la communication anonyme avec I2P.\n" -"<a href=\"%(pdf)s\">To Be or I2P (présentation PDF)</a>,\n" -"Jens Kubieziel, 24C3 Berlin, le 28 décembre 2007." +msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(vidéo Youtube)\nUne introduction à la communication anonyme avec I2P.\n<a href=\"%(pdf)s\">To Be or I2P (présentation PDF)</a>,\nJens Kubieziel, 24C3 Berlin, le 28 décembre 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -393,17 +454,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Vidéo de la conférence I2P au « Chemnitz Linux " -"Tag »</a>,\n" -"Lars Schimmer,\n" -"14 au 15 mars 2009" +msgstr "<a href=\"%(video)s\">Vidéo de la conférence I2P au « Chemnitz Linux Tag »</a>,\nLars Schimmer,\n14 au 15 mars 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -414,9 +470,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" -"Adrian Crenshaw. Schmoocon Firetalk, janvier 2011" +msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, janvier 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -424,114 +478,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Utiliser la technologie pour faire avancer la " -"liberté</a>\n" -"(vidéo Youtube)\n" -"Eric Johnson. \n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, le 27 " -"mars 2011. \n" -"I2P couvert de 10:00 à 20:00 dans la vidéo." +msgstr "<a href=\"%(link)s\">Utiliser la technologie pour faire avancer la liberté</a>\n(vidéo Youtube)\nEric Johnson. \n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, le 27 mars 2011. \nI2P couvert de 10:00 à 20:00 dans la vidéo." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Faiblesses communes du darknet (Common Darknet " -"Weaknesses)</a>\n" -"(vidéo Youtube)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 " -"juillet 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Faiblesses communes du darknet (Common Darknet Weaknesses)</a>\n(vidéo Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 juillet 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\"> I2P / Tor notes d’atelier</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 août 2011." +msgstr "<a href=\"%(link)s\"> I2P / Tor notes d’atelier</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 août 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\"> Cipherspaces / Darknets : un aperçu des stratégies " -"d’attaque –\n" -"DEF CON Live version (vidéo Youtube) </a>,\n" -"<a href=\"%(studio)s\">Version \"Studio\" (vidéo Youtube) </a>,\n" -"<a href=\"%(slides)s\">Diaporama (ppt)</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 août 2011." +msgstr "<a href=\"%(live)s\"> Cipherspaces / Darknets : un aperçu des stratégies d’attaque –\nDEF CON Live version (vidéo Youtube) </a>,\n<a href=\"%(studio)s\">Version \"Studio\" (vidéo Youtube) </a>,\n<a href=\"%(slides)s\">Diaporama (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 août 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), 4 novembre 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 novembre 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" -"(vidéo Youtube)\n" -"Blair Dick, Université d’Abertay, Dundee Ethical Hacking Society, 25 " -"janvier 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n(vidéo Youtube)\nBlair Dick, Université d’Abertay, Dundee Ethical Hacking Society, 25 janvier 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 août 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 août 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" -"<a href=\"%(link2)s\">(vidéo)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 décembre 2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n<a href=\"%(link2)s\">(vidéo)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 décembre 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"Remplacement de crypto usée (anglais: Weary) : mise à niveau du réseau " -"I2P avec des primitives plus fortes\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, Real World Crypto, Stanford, 8 janvier 2016" +msgstr "Remplacement de crypto usée (anglais: Weary) : mise à niveau du réseau I2P avec des primitives plus fortes\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 janvier 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -539,14 +551,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Onions and Garlic: the protocols of I2P\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, 17 février 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Onions and Garlic: the protocols of I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 février 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -555,22 +561,14 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"Le projet de l’Internet invisible — Une vue d’ensemble et un guide des " -"technologies\n" -"<a href=\"%(link)s\">(mp4)</a>\n" -"<a href=\"%(link2)s\">(webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Bruxelles, le 4 février 2018" +msgstr "Le projet de l’Internet invisible — Une vue d’ensemble et un guide des technologies\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruxelles, le 4 février 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format msgid "" "<a href=\"%(link)s\">Intro to I2P for App Developers (mp4)</a>\n" "idk" -msgstr "" -"<a href=\"%(link)s\">Présentation d’I2P pour les développeurs d’appli " -"(mp4)</a>\n" -"idk" +msgstr "<a href=\"%(link)s\">Présentation d’I2P pour les développeurs d’appli (mp4)</a>\nidk" #: i2p2www/pages/site/about/media.html:145 msgid "Tutorials" @@ -583,11 +581,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Tutoriel I2P sous Windows</a>\n" -"(vidéo Youtube)\n" -"Ce guide vous montrera comment installer I2P sous Windows XP.\n" -"Par <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Tutoriel I2P sous Windows</a>\n(vidéo Youtube)\nCe guide vous montrera comment installer I2P sous Windows XP.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -596,12 +590,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Tutoriel I2P sous Debian</a>\n" -"(vidéo Youtube)\n" -"Ce tutoriel vous guidera dans l’installation d’I2P sur un système Linux " -"Debian.\n" -"Par <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Tutoriel I2P sous Debian</a>\n(vidéo Youtube)\nCe tutoriel vous guidera dans l’installation d’I2P sur un système Linux Debian.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -610,57 +599,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Comment mettre en place un site anonyme dans I2P</a>" -"\n" -"(vidéo Youtube)\n" -"Comment mettre en place un site Web anonyme dans I2P.\n" -"Par <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Comment mettre en place un site anonyme dans I2P</a>\n(vidéo Youtube)\nComment mettre en place un site Web anonyme dans I2P.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Tutoriel I2P Mac OS X</a>\n" -"(vidéo Youtube)\n" -"Un tutoriel sur la façon d’exécuter I2P sur Mac OS X et comment se " -"connecter à irc.telecomix.i2p.\n" -"Par <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Tutoriel I2P Mac OS X</a>\n(vidéo Youtube)\nUn tutoriel sur la façon d’exécuter I2P sur Mac OS X et comment se connecter à irc.telecomix.i2p.\nPar <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari explique les principes de base d’I2P</a>" -"\n" -"(vidéo YouTube)\n" -"Agent Felix Atari du « Telecomix Crypto Munitions Bureau ».\n" -"Par <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari explique les principes de base d’I2P</a>\n(vidéo YouTube)\nAgent Felix Atari du « Telecomix Crypto Munitions Bureau ».\nPar <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\"> Comment aller sur I2P, le darknet P2P anonyme " -"(installeur Windows) </a>\n" -"(vidéo Youtube)\n" -"Ce tutoriel montre comment installer et configurer le logiciel nécessaire" -" pour accéder à I2P." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\"> Comment aller sur I2P, le darknet P2P anonyme (installeur Windows) </a>\n(vidéo Youtube)\nCe tutoriel montre comment installer et configurer le logiciel nécessaire pour accéder à I2P." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -668,10 +633,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">Comment se connecter à I2P</a>\n" -"(vidéo Youtube)\n" -"Comment installer I2P sur Ubuntu." +msgstr "<a href=\"%(link)s\">Comment se connecter à I2P</a>\n(vidéo Youtube)\nComment installer I2P sur Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -680,11 +642,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Installation du logiciel darknet I2P sous Linux</a>\n" -"(vidéo)\n" -"Adrian Crenshaw. \n" -"Janvier 2011" +msgstr "<a href=\"%(link)s\">Installation du logiciel darknet I2P sous Linux</a>\n(vidéo)\nAdrian Crenshaw. \nJanvier 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -692,10 +650,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Courte animation du garlic routing</a>\n" -"(vidéo Youtube)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Courte animation du garlic routing</a>\n(vidéo Youtube)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -708,11 +663,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) interviewé par DistributedCity\n" -"<a href=\"%(link1)s\">Partie 1</a>\n" -"<a href=\"%(link2)s\">Partie 2</a>\n" -"26 juillet 2002." +msgstr "Lance James (0x90) interviewé par DistributedCity\n<a href=\"%(link1)s\">Partie 1</a>\n<a href=\"%(link2)s\">Partie 2</a>\n26 juillet 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -721,35 +672,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) interviewé par El PaÃs\n" -"(original en Espagnol)\n" -"<a href=\"%(link)s\">Traduction en Anglais</a>\n" -"31 octobre 2002." +msgstr "Lance James (0x90) interviewé par El PaÃs\n(original en Espagnol)\n<a href=\"%(link)s\">Traduction en Anglais</a>\n31 octobre 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">2003 article de Business Week référençant " -"Invisiblenet</a>\n" -"14 septembre 2003." +msgstr "<a href=\"%(link)s\">2003 article de Business Week référençant Invisiblenet</a>\n14 septembre 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">Article de Netzwelt.de traitant de l’anonymat sur " -"Internet</a>\n" -"(Allemand)\n" -"Novembre 2007." +msgstr "<a href=\"%(link)s\">Article de Netzwelt.de traitant de l’anonymat sur Internet</a>\n(Allemand)\nNovembre 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -757,26 +695,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz interviewé par gulli.com</a>\n" -"Mars 2009\n" -"<a href=\"%(german)s\">Traduction allemande</a>" +msgstr "<a href=\"%(link)s\">zzz interviewé par gulli.com</a>\nMars 2009\n<a href=\"%(german)s\">Traduction allemande</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz lors de l’entrevue du balado « InfoSec Daily " -"Podcast Ep. 454 » (mp3)</a>, le 18 août 2011 (lien mort, propagé dans I2P" -" au <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">traqueur" -" de Postman</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz lors de l’entrevue du balado « InfoSec Daily Podcast Ep. 454 » (mp3)</a>, le 18 août 2011 (lien mort, propagé dans I2P au <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">traqueur de Postman</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -784,83 +711,52 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" -"Jonathan Cox,\n" -"11 novembre 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\nJonathan Cox,\n11 novembre 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz et Lance James lors de l’entrevue du balado " -"« InfoSec Daily Podcast Ep. 596 » (mp3)</a>, le 16 février 2012 (lien " -"mort, propagé dans I2P au <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">traqueur" -" de Postman</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz et Lance James lors de l’entrevue du balado « InfoSec Daily Podcast Ep. 596 » (mp3)</a>, le 16 février 2012 (lien mort, propagé dans I2P au <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">traqueur de Postman</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" -"Partie 1, 28 février 2015" +msgstr "<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\nPartie 1, 28 février 2015" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" -"Partie 2, 6 mars 2015" +msgstr "<a href=\"%(mp3)s\">Jeff et Str4d interviewés lors du Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\nPartie 2, 6 mars 2015" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" -msgstr "" -"<a href=\"%(link)s\">Fireside avec Lei — Épisode 18 : Lance James. " -"Succès, échec, deuil et boudhism.</a> <a " -"href=\"%(archive)s\">(archive.org)</a> <a href=\"%(mp3)s\">(mp3)</a> " -"Robert Lei, 31 décembre 2018" +msgstr "<a href=\"%(link)s\">Fireside avec Lei — Épisode 18 : Lance James. Succès, échec, deuil et boudhism.</a> <a href=\"%(archive)s\">(archive.org)</a> <a href=\"%(mp3)s\">(mp3)</a> Robert Lei, 31 décembre 2018" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" -msgstr "" -"<a href=\"%(mhatta)s\">Articles par le contributeur d’I2p Masayuki Hatta " -"sur medium.com</a> 2019\n" +msgstr "<a href=\"%(mhatta)s\">Articles par le contributeur d’I2p Masayuki Hatta sur medium.com</a> 2019\n" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" -msgstr "" -"<a href=\"%(ctrl)s\">Activer à la fois le routage .onion et .i2p grâce à " -"la configuration automatique du mandataire</a>\n" -"Daniel Aleksandersen, 7 février 2019" +msgstr "<a href=\"%(ctrl)s\">Activer à la fois le routage .onion et .i2p grâce à la configuration automatique du mandataire</a>\nDaniel Aleksandersen, 7 février 2019" #: i2p2www/pages/site/about/media.html:295 msgid "Other" @@ -870,21 +766,61 @@ msgstr "Autres" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P mentionné dans \"House of Cards\" de Netflix, saison 2 épisode 2,\n" -"14 février 2014" +msgstr "I2P mentionné dans \"House of Cards\" de Netflix, saison 2 épisode 2,\n14 février 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" +msgstr "<a href=\"%(meeh)s\">Une liste organisée par le contributeur d’I2p meeh des mises en Å“uvre, bibliothèques, ressources, projets et autres choses rutilantes d’I2P</a>\n2019" + +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." msgstr "" -"<a href=\"%(meeh)s\">Une liste organisée par le contributeur d’I2p meeh " -"des mises en Å“uvre, bibliothèques, ressources, projets et autres choses " -"rutilantes d’I2P</a>\n" -"2019" #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" @@ -894,18 +830,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -916,84 +849,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1004,8 +914,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1013,27 +922,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1041,26 +946,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1071,10 +967,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1082,18 +976,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1104,19 +995,11 @@ msgstr "Membres du projet I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Nous sommes un petit groupe disséminé sur tous les continents qui " -"travaille\n" -"à l’amélioration des différents aspects du projet et qui étudie et débat " -"sur la\n" -"conception du réseau.\n" -"<a href=\"%(volunteer)s\">Impliquez-vous !</a>" +msgstr "Nous sommes un petit groupe disséminé sur tous les continents qui travaille\nà l’amélioration des différents aspects du projet et qui étudie et débat sur la\nconception du réseau.\n<a href=\"%(volunteer)s\">Impliquez-vous !</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1285,7 +1168,8 @@ msgid "Product Development" msgstr "Développement de produits" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1367,9 +1251,7 @@ msgstr "Greffon I2P-Bote" #: i2p2www/pages/site/about/team.html:182 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead" -msgstr "" -"Responsable de <a " -"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" +msgstr "Responsable de <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" #: i2p2www/pages/site/about/team.html:184 msgid "Maintains the integrated Bittorrent client" @@ -1446,9 +1328,7 @@ msgstr "Intégrateur Debian/Ubuntu et mainteneur du PPA " #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Arrière-plan et travail sur l’UI de la console routeur, réorganisation du" -" site Web, travail sur les tests d’unité" +msgstr "Arrière-plan et travail sur l’UI de la console routeur, réorganisation du site Web, travail sur les tests d’unité" #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1529,10 +1409,9 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "Développement jbigi, migration du wiki, nettoyage de la doc" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" -msgstr "" -"Débogage java debugging et développement de client sur I2PTunnel et la " -"console du routeur" +msgid "" +"java debugging and client development on I2PTunnel and the router console" +msgstr "Débogage java debugging et développement de client sur I2PTunnel et la console du routeur" #: i2p2www/pages/site/about/team.html:323 msgid "SAM perl module" @@ -1581,52 +1460,27 @@ msgstr "… et de nombreux autres" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." -msgstr "" -"I2PCon 2015 était le premier événement de cet type. Il avait deux " -"objectifs à court terme.\n" -"D’abord, de fournir au grand public un événement où il pourrait obtenir " -"de la connaissance au sujet de la vie privée.\n" -"Deuxièmement, à prolonger le projet I2P et sa communauté avec des " -"discussions techniques au sujet de la cryptographie, l’anonymat et les " -"sujets centrés sur I2P." +msgstr "I2PCon 2015 était le premier événement de cet type. Il avait deux objectifs à court terme.\nD’abord, de fournir au grand public un événement où il pourrait obtenir de la connaissance au sujet de la vie privée.\nDeuxièmement, à prolonger le projet I2P et sa communauté avec des discussions techniques au sujet de la cryptographie, l’anonymat et les sujets centrés sur I2P." #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." -msgstr "" -"Un objectif plus grand et à plus à long terme de cet événement était de " -"construire une communauté d’individus conscients de la vie privée. En " -"connectant des gens qui reconnaissent l’importance de la vie privée, " -"nous avons voulu fournir un forum où cette communauté peut croître." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." +msgstr "Un objectif plus grand et à plus à long terme de cet événement était de construire une communauté d’individus conscients de la vie privée. En connectant des gens qui reconnaissent l’importance de la vie privée, nous avons voulu fournir un forum où cette communauté peut croître." #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." -msgstr "" -"L’idée de cet événement a été d’abord engendré par nos merveilleux amis " -"du\n" -"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"Le lieu a été fourni par <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" -"Le marketing a été mené par <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> et Siew.\n" -"Sans eux cet événement n’aurait pas été possible." +msgstr "L’idée de cet événement a été d’abord engendré par nos merveilleux amis du\n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nLe lieu a été fourni par <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nLe marketing a été mené par <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> et Siew.\nSans eux cet événement n’aurait pas été possible." #: i2p2www/pages/site/about/i2pcon/2015.html:32 msgid "Slides and Video" @@ -1642,8 +1496,8 @@ msgstr "Note : des liens de vidéos seront affichés dès qu’ils seront dispo #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1668,9 +1522,7 @@ msgstr "Diaporamas par str4d et zzz :" #: i2p2www/pages/site/about/i2pcon/2015.html:71 msgid "Slides by others: Contact the author for license information." -msgstr "" -"Diaporamas réalisées par d’autres : contactez l’auteur pour les " -"informations de licence." +msgstr "Diaporamas réalisées par d’autres : contactez l’auteur pour les informations de licence." #: i2p2www/pages/site/about/i2pcon/2015.html:77 msgid "Speakers" @@ -1680,23 +1532,13 @@ msgstr "Orateurs" msgid "" "Colin Mahns has a strong interest in the use of anonymity and encryption " "technology to help preserve human rights in the digital age." -msgstr "" -"Colin Mahns a un grand intérêt dans l’utilisation de l’anonymat et de la " -"technologie de chiffrement pour aider à préserver les droits humains à " -"l’âge numérique." +msgstr "Colin Mahns a un grand intérêt dans l’utilisation de l’anonymat et de la technologie de chiffrement pour aider à préserver les droits humains à l’âge numérique." #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." -msgstr "" -"David Dagon est un chercheur postdoctoral à l’université « Georgia " -"Tech ». Il concentre ses recherches sur les réseaux de zombies, les " -"programmes malveillants, la sécurité des réseaux et le DNS.\n" -"Son intérêt pour I2P est axé sur la protection de la vie privée des " -"utilisateurs, le filtrage autonome et la lutte contre les abus." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." +msgstr "David Dagon est un chercheur postdoctoral à l’université « Georgia Tech ». Il concentre ses recherches sur les réseaux de zombies, les programmes malveillants, la sécurité des réseaux et le DNS.\nSon intérêt pour I2P est axé sur la protection de la vie privée des utilisateurs, le filtrage autonome et la lutte contre les abus." #: i2p2www/pages/site/about/i2pcon/2015.html:89 #: i2p2www/pages/site/about/i2pcon/2015.html:105 @@ -1709,25 +1551,12 @@ msgstr "J est le responsable de Toronto Crypto." #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." -msgstr "" -"Lance James est le fondateur du projet IRC Invisible, le prédécesseur " -"d’I2P, lancé en 2002.\n" -"Il a fondé sa propre entreprise d’intelligence en cyber menace en 2003. \n" -"Depuis, il a été concentré sur la sécurité de réseau, la recherche " -"concernant le logiciel malveillant et la sécurité de l’information.\n" -"Durant 2011-2013, il était le directeur d’intelligence de menace pour The" -" Vigilant, qui a été acquis par Deloitte en 2013.\n" -"Il a récemment quitté Deloitte pour effectuer du conseil via son " -"entreprise James Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." +msgstr "Lance James est le fondateur du projet IRC Invisible, le prédécesseur d’I2P, lancé en 2002.\nIl a fondé sa propre entreprise d’intelligence en cyber menace en 2003. \nDepuis, il a été concentré sur la sécurité de réseau, la recherche concernant le logiciel malveillant et la sécurité de l’information.\nDurant 2011-2013, il était le directeur d’intelligence de menace pour The Vigilant, qui a été acquis par Deloitte en 2013.\nIl a récemment quitté Deloitte pour effectuer du conseil via son entreprise James Group." #: i2p2www/pages/site/about/i2pcon/2015.html:109 msgid "Nicholas D. is a member of Hacklab Toronto." @@ -1735,20 +1564,11 @@ msgstr "Nicholas D. est un membre du Hacklab Toronto." #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." -msgstr "" -"Nicholas Johnston est un professeur de sécurité de l’information au " -"\"Sheridan College’s School of Applied Computing\" dans le programme de " -"licence d’InfoSec. Sa carrière professionnelle précédente était dans la " -"science légale numérique et les enquêtes. Il est aussi un entrepreneur se" -" spécialisant dans la réponse à l’incident. Ses zones de recherche " -"incluent le développement logiciel sécurisé et l’analytique de données." +msgstr "Nicholas Johnston est un professeur de sécurité de l’information au \"Sheridan College’s School of Applied Computing\" dans le programme de licence d’InfoSec. Sa carrière professionnelle précédente était dans la science légale numérique et les enquêtes. Il est aussi un entrepreneur se spécialisant dans la réponse à l’incident. Ses zones de recherche incluent le développement logiciel sécurisé et l’analytique de données." #: i2p2www/pages/site/about/i2pcon/2015.html:124 msgid "Psi is an I2P developer." @@ -1800,14 +1620,9 @@ msgstr "Jour 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." -msgstr "" -"La première conférence dédiée à I2P à eu lieu à Toronto du 15 au 16 août " -"2015.\n" -"Voir les liens ci-dessous pour plus de précisions et les liens vers les " -"diaporamas et les vidéos." +msgstr "La première conférence dédiée à I2P à eu lieu à Toronto du 15 au 16 août 2015.\nVoir les liens ci-dessous pour plus de précisions et les liens vers les diaporamas et les vidéos." #: i2p2www/pages/site/about/i2pcon/index.html:9 msgid "Past years" @@ -1823,24 +1638,13 @@ msgstr "Août 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Il existe quelques techniques principales qui peuvent être appliquées " -"pour améliorer les performances perçues d’I2P. Certaines des suivantes " -"sont liées à l’UCT, d’autres à la bande passante et d’autres encore au " -"protocole. Cependant, toutes ces dimensions affectent la latence, le " -"débit, et les performances perçues du réseau, car elles réduisent les " -"conflits pour des ressources rares. Cette liste n’est bien sûr pas " -"complète, mais elle couvre les techniques principales observées." +msgstr "Il existe quelques techniques principales qui peuvent être appliquées pour améliorer les performances perçues d’I2P. Certaines des suivantes sont liées à l’UCT, d’autres à la bande passante et d’autres encore au protocole. Cependant, toutes ces dimensions affectent la latence, le débit, et les performances perçues du réseau, car elles réduisent les conflits pour des ressources rares. Cette liste n’est bien sûr pas complète, mais elle couvre les techniques principales observées." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1848,10 +1652,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Pour les améliorations de performance passées voir <a " -"href=\"%(history)s\">\n" -"l’historique de performance</a>." +msgstr "Pour les améliorations de performance passées voir <a href=\"%(history)s\">\nl’historique de performance</a>." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1860,27 +1661,13 @@ msgstr "Meilleure sélection et profilage du pair" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Une des parties probablement les plus importantes pour obtenir la " -"performance plus rapide sera\n" -"d’améliorer comment les routeurs choisissent les pairs( au travers " -"desquels ils construisent leurs tunnels -\n" -"en s’assurant qu’ils n’utilisent pas de pairs avec des liens lents ou " -"avec des liens rapides qui\n" -"seraient surchargés, etc. De plus, nous devons nous assurer que nous ne " -"nous exposons pas\n" -"nous-mêmes à une attaque <a href=\"%(sybilpdf)s\">Sybil</a>\n" -"lancée depuis un adversaire puissant avec beaucoup de machines rapides." +msgstr "Une des parties probablement les plus importantes pour obtenir la performance plus rapide sera\nd’améliorer comment les routeurs choisissent les pairs( au travers desquels ils construisent leurs tunnels -\nen s’assurant qu’ils n’utilisent pas de pairs avec des liens lents ou avec des liens rapides qui\nseraient surchargés, etc. De plus, nous devons nous assurer que nous ne nous exposons pas\nnous-mêmes à une attaque <a href=\"%(sybilpdf)s\">Sybil</a>\nlancée depuis un adversaire puissant avec beaucoup de machines rapides." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1888,38 +1675,15 @@ msgstr "Mise au point de la base de données de réseau" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Nous allons vouloir être plus efficaces en guérissant la base de données " -"de réseau\n" -"et les algorithmes de maintenance - plutôt que constamment explorer le " -"keyspace pour de nouveaux\n" -"pairs - cause d’un nombre important de messages de réseau et de charge de" -" routeur - nous\n" -"pouvons ralentir ou peut même arrêter d’explorer jusqu’à ce que nous " -"détections qu’il y a\n" -"quelque chose de nouveau méritant d’être trouvé (ex: dégrader le taux " -"d’exploration en se basant sur la dernière fois que quelqu’un nous a " -"donné une référence de quelqu’un dont nous n’avions jamais entendu " -"parler). Nous pouvons aussi faire certains\n" -"réglages sur ce que nous envoyons actuellement - sur combien de pairs " -"nous rebondissons (ou même si nous\n" -"rebondissons en retour une réponse), aussi bien que combien de recherches" -" simultanées nous accomplissons." +msgstr "Nous allons vouloir être plus efficaces en guérissant la base de données de réseau\net les algorithmes de maintenance - plutôt que constamment explorer le keyspace pour de nouveaux\npairs - cause d’un nombre important de messages de réseau et de charge de routeur - nous\npouvons ralentir ou peut même arrêter d’explorer jusqu’à ce que nous détections qu’il y a\nquelque chose de nouveau méritant d’être trouvé (ex: dégrader le taux d’exploration en se basant sur la dernière fois que quelqu’un nous a donné une référence de quelqu’un dont nous n’avions jamais entendu parler). Nous pouvons aussi faire certains\nréglages sur ce que nous envoyons actuellement - sur combien de pairs nous rebondissons (ou même si nous\nrebondissons en retour une réponse), aussi bien que combien de recherches simultanées nous accomplissons." #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -1928,53 +1692,24 @@ msgstr "Mise au point et améliorations des étiquettes de session" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"La façon dont l’algorithme <a " -"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a>\n" -"fonctione est en gérant un ensemble de tableaux de 32 octets à usage " -"unique, et en\n" -"les faisant expirer s’ils ne sont pas utilisés assez rapidement. Si nous " -"les faisons expirer trop tôt, nous\n" -"sommes obligés de nous replier en ayant recours à un (coûteux) plein " -"chiffrement ElGamal, mais si nous ne\n" -"les faisons pas expirer assez rapidement, nous devons réduire leur " -"quantité pour que nous ne soyons pas \n" -"à court de mémoire (et si le destinataire est d’une façon ou d’une autre " -"corrompu et perd certaines étiquettes, encore plus d’échecs de " -"chiffrement peuvent se produire avant la détection). Avec une certaine " -"détection plus active et\n" -"des algorithmes de retour d’information, nous pouvons sans risque et plus" -" efficacement ajuster la durée de vie des étiquettes, remplaçant le " -"chiffrement ElGamal avec une insignifiante opération AES." +msgstr "La façon dont l’algorithme <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a>\nfonctione est en gérant un ensemble de tableaux de 32 octets à usage unique, et en\nles faisant expirer s’ils ne sont pas utilisés assez rapidement. Si nous les faisons expirer trop tôt, nous\nsommes obligés de nous replier en ayant recours à un (coûteux) plein chiffrement ElGamal, mais si nous ne\nles faisons pas expirer assez rapidement, nous devons réduire leur quantité pour que nous ne soyons pas \nà court de mémoire (et si le destinataire est d’une façon ou d’une autre corrompu et perd certaines étiquettes, encore plus d’échecs de chiffrement peuvent se produire avant la détection). Avec une certaine détection plus active et\ndes algorithmes de retour d’information, nous pouvons sans risque et plus efficacement ajuster la durée de vie des étiquettes, remplaçant le chiffrement ElGamal avec une insignifiante opération AES." #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Des idées supplémentaires pour améliorer la livraison d’étiquettes de " -"session sont décrites sur la\n" -"<a href=\"%(elgamalaes)s#future\">page ElGamal/AES+SessionTag</a>." +msgstr "Des idées supplémentaires pour améliorer la livraison d’étiquettes de session sont décrites sur la\n<a href=\"%(elgamalaes)s#future\">page ElGamal/AES+SessionTag</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -1985,75 +1720,29 @@ msgstr "Migrer l’étiquette de session vers un PRNG synchronisé" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." -msgstr "" -"Dès maintenant, notre algorithme <a " -"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" -"fonctionne en étiquetant chaque message chiffré avec un nonce unique " -"aléatoire \n" -"de 32 octets (une \"étiquette de session\"), identifiant ce message comme" -" étant chiffré \n" -"avec la clé de la session AES associée. Ceci empêche des pairs de " -"distinguer\n" -"les messages faisant partie de la même session, sachant que chaque " -"message a une nouvelle étiquette complètement aléatoire. Pour accomplir " -"ceci, tous les quelques messages empaquette un tout\n" -"nouvel ensemble d’étiquettes de session dans le message chiffré lui-même," -" livrant d’une manière transparente\n" -"une façon d’identifier des messages futurs. Nous devons alors garder la " -"trace\n" -"de quels messages sont livrés avec succès afin que nous sachions quelles " -"étiquettes\n" -"nous pouvons utiliser." +msgstr "Dès maintenant, notre algorithme <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \nfonctionne en étiquetant chaque message chiffré avec un nonce unique aléatoire \nde 32 octets (une \"étiquette de session\"), identifiant ce message comme étant chiffré \navec la clé de la session AES associée. Ceci empêche des pairs de distinguer\nles messages faisant partie de la même session, sachant que chaque message a une nouvelle étiquette complètement aléatoire. Pour accomplir ceci, tous les quelques messages empaquette un tout\nnouvel ensemble d’étiquettes de session dans le message chiffré lui-même, livrant d’une manière transparente\nune façon d’identifier des messages futurs. Nous devons alors garder la trace\nde quels messages sont livrés avec succès afin que nous sachions quelles étiquettes\nnous pouvons utiliser." #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" "to handle out of order delivery)." -msgstr "" -"Ceci marche bien et c’est assez robuste, cependant c’est inefficace en " -"termes\n" -"d’utilisation de bande passante, comme cela exige la livraison de ces " -"étiquettes en avance de\n" -"temps (et toutes les étiquettes peuvent ne pas être nécessaires, ou " -"certaines peuvent être gaspillés, en raison de\n" -"leur expiration). En moyenne cependant, pré délivrer l’étiquette de " -"session coûte\n" -"32 octets par message (la taille d’une étiquette). Comme Taral l’a " -"suggéré, cette\n" -"taille peut être évitée en remplaçant la livraison des étiquettes par un " -"PRNG synchronisé\n" -" - quand une nouvelle session est établie (via un block ElGamal chiffré)," -"\n" -"les deux côtés essaiment un PRNG pour utilisation et produisent les " -"étiquettes de session sur\n" -"demande (avec le destinataire pré calculant à l’avance les quelques peu " -"de valeurs suivantes possibles\n" -"afin de traiter la panne de livraison)." +msgstr "Ceci marche bien et c’est assez robuste, cependant c’est inefficace en termes\nd’utilisation de bande passante, comme cela exige la livraison de ces étiquettes en avance de\ntemps (et toutes les étiquettes peuvent ne pas être nécessaires, ou certaines peuvent être gaspillés, en raison de\nleur expiration). En moyenne cependant, pré délivrer l’étiquette de session coûte\n32 octets par message (la taille d’une étiquette). Comme Taral l’a suggéré, cette\ntaille peut être évitée en remplaçant la livraison des étiquettes par un PRNG synchronisé\n - quand une nouvelle session est établie (via un block ElGamal chiffré),\nles deux côtés essaiment un PRNG pour utilisation et produisent les étiquettes de session sur\ndemande (avec le destinataire pré calculant à l’avance les quelques peu de valeurs suivantes possibles\nafin de traiter la panne de livraison)." #: i2p2www/pages/site/about/performance/future.html:87 msgid "Longer lasting tunnels" @@ -2061,53 +1750,26 @@ msgstr "Tunnels de longue durée" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"La durée actuelle de tunnel est par défaut de 10 minutes, c’est assez " -"arbitraire, quoique\n" -"cela \"va bien\". Une fois que nous aurons le code de guérison de tunnel " -"et un code de détection d’échec plus efficace, nous pourrons sans risque " -"varier ces durées, réduisant les\n" -"charges réseau et UC (dues aux coûteux messages de création de tunnel)." +msgstr "La durée actuelle de tunnel est par défaut de 10 minutes, c’est assez arbitraire, quoique\ncela \"va bien\". Une fois que nous aurons le code de guérison de tunnel et un code de détection d’échec plus efficace, nous pourrons sans risque varier ces durées, réduisant les\ncharges réseau et UC (dues aux coûteux messages de création de tunnel)." #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Ceci semble être une réparation facile pour une haute charge sur des " -"routeurs à grande bande passante, mais\n" -"nous ne devrions pas y recourir jusqu’à ce que nous ayons ajusté le " -"tunnel construisant des algorithmes plus loin. \n" -"Cependant, la durée de vie de tunnel de 10 minutes est codée en dur dans" -" un bon nombre d’endroits,\n" -"donc un effort substantiel serait exigé pour changer la durée.\n" -"Aussi, il serait difficile de maintenir la compatibilité descendante avec" -" un tel changement." +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Ceci semble être une réparation facile pour une haute charge sur des routeurs à grande bande passante, mais\nnous ne devrions pas y recourir jusqu’à ce que nous ayons ajusté le tunnel construisant des algorithmes plus loin. \nCependant, la durée de vie de tunnel de 10 minutes est codée en dur dans un bon nombre d’endroits,\ndonc un effort substantiel serait exigé pour changer la durée.\nAussi, il serait difficile de maintenir la compatibilité descendante avec un tel changement." #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"Actuellement, puisque dans le réseau le taux de réussite de construction " -"de tunnel est en moyenne assez élevé,\n" -"il n’y a actuellement aucun plan visant à étendre la durée de vie de " -"tunnel." +msgstr "Actuellement, puisque dans le réseau le taux de réussite de construction de tunnel est en moyenne assez élevé,\nil n’y a actuellement aucun plan visant à étendre la durée de vie de tunnel." #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -2115,46 +1777,22 @@ msgstr "Ajuster les temps d’échéance" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" -msgstr "" -"Les temporisations actuelles pour diverses activités sont une autre des " -"choses assez arbitraires, mais qui « semblent correcte » que nous avons. " -"Pourquoi avons-nous une temporisation « pair inaccessible » de 60 " -"secondes ? Pourquoi essayons-nous après 10 secondes d’envoyer au travers " -"d’un tunnel différent que celui annoncé par le jeu de baux ? Pourquoi les" -" requêtes à la base de données de réseau sont-elles restreintes par des " -"limites de 60 ou 20 secondes ? Pourquoi les destinations sont-elles " -"configurées pour demander un nouveau jeu de tunnels toutes les 10 " -"minutes ? Pourquoi permettons-nous 60 secondes à un pair pour répondre à " -"notre demande de se joindre à un tunnel ? Pourquoi considérons-nous comme" -" « mort » un tunnel qui ne réussi pas notre test dans les 60 secondes ?" +msgstr "Les temporisations actuelles pour diverses activités sont une autre des choses assez arbitraires, mais qui « semblent correcte » que nous avons. Pourquoi avons-nous une temporisation « pair inaccessible » de 60 secondes ? Pourquoi essayons-nous après 10 secondes d’envoyer au travers d’un tunnel différent que celui annoncé par le jeu de baux ? Pourquoi les requêtes à la base de données de réseau sont-elles restreintes par des limites de 60 ou 20 secondes ? Pourquoi les destinations sont-elles configurées pour demander un nouveau jeu de tunnels toutes les 10 minutes ? Pourquoi permettons-nous 60 secondes à un pair pour répondre à notre demande de se joindre à un tunnel ? Pourquoi considérons-nous comme « mort » un tunnel qui ne réussi pas notre test dans les 60 secondes ?" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Chacun de ces impondérables peut être abordé avec du code plus adaptatif," -" et aussi\n" -"avec des paramètres ajustables pour tenir compte de différences plus " -"appropriées entre\n" -"bande passante, latence et utilisation de CPU." +msgstr "Chacun de ces impondérables peut être abordé avec du code plus adaptatif, et aussi\navec des paramètres ajustables pour tenir compte de différences plus appropriées entre\nbande passante, latence et utilisation de CPU." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2164,52 +1802,33 @@ msgstr "Améliorations du protocole full streaming" msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Peut-être re-permettre le profil stream interactif (la\n" -"mise en Å“uvre actuelle utilise seulement le profil stream en vrac (bulk)." +msgstr "Peut-être re-permettre le profil stream interactif (la\nmise en Å“uvre actuelle utilise seulement le profil stream en vrac (bulk)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Limitation de bande passante au niveau du client (ou dans les deux " -"directions sur un flux stream,\n" -"ou probablement partagée à travers de multiples flux stream). Ceci serait" -" bien sûr en supplément à \n" -"la limitation de bande passante globale du routeur." +msgstr "Limitation de bande passante au niveau du client (ou dans les deux directions sur un flux stream,\nou probablement partagée à travers de multiples flux stream). Ceci serait bien sûr en supplément à \nla limitation de bande passante globale du routeur." #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Listes de contrôle d’accès (permettant seulement des flux vers ou depuis " -"certaines autres\n" -"destinations connues)." +msgstr "Listes de contrôle d’accès (permettant seulement des flux vers ou depuis certaines autres\ndestinations connues)." #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Contrôles Web et suivi de la santé des divers flux, ainsi que la capacité" -" de les fermer ou de les ralentir explicitement." +msgstr "Contrôles Web et suivi de la santé des divers flux, ainsi que la capacité de les fermer ou de les ralentir explicitement." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Des idées supplémentaires pour améliorer la bibliothèque de streaming " -"sont décrites sur la\n" -"<a href=\"%(streaming)s#future\">page de bibliothèque streaming</a>." +msgstr "Des idées supplémentaires pour améliorer la bibliothèque de streaming sont décrites sur la\n<a href=\"%(streaming)s#future\">page de bibliothèque streaming</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2218,17 +1837,10 @@ msgstr "Historique des performances" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Des améliorations notables de performance ont été faites en utilisant les" -" techniques ci-dessous.\n" -"Il y a plus à faire, voir la page <a " -"href=\"%(performance)s\">performance</a>\n" -"pour les problèmes actuels et les idées." +msgstr "Des améliorations notables de performance ont été faites en utilisant les techniques ci-dessous.\nIl y a plus à faire, voir la page <a href=\"%(performance)s\">performance</a>\npour les problèmes actuels et les idées." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2245,55 +1857,25 @@ msgstr "implémenté" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" -msgstr "" -"Quand j’ai dernièrement établi le profil du code d’I2P, la grande " -"majorité du temps a été passée dans\n" -"une fonction : java.math.BigInteger’s\n" -"<a href=\"%(modpow)s\">modPow</a>.\n" -"Plutôt que d’essayer d’accorder cette méthode, nous ferons appel à \n" -"<a href=\"%(gmp)s\">GNU MP</a> – une bibliothèque mathématique follement " -"rapide\n" -"(avec assembleur accordé pour beaucoup d’architectures). (<i>éditeur : " -"voir\n" -"<a href=\"%(jbigi)s\">NativeBigInteger pour cryptographie clé publique " -"plus rapide</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" +msgstr "Quand j’ai dernièrement établi le profil du code d’I2P, la grande majorité du temps a été passée dans\nune fonction : java.math.BigInteger’s\n<a href=\"%(modpow)s\">modPow</a>.\nPlutôt que d’essayer d’accorder cette méthode, nous ferons appel à \n<a href=\"%(gmp)s\">GNU MP</a> – une bibliothèque mathématique follement rapide\n(avec assembleur accordé pour beaucoup d’architectures). (<i>éditeur : voir\n<a href=\"%(jbigi)s\">NativeBigInteger pour cryptographie clé publique plus rapide</a></i>)" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." -msgstr "" -"\n" -"ugha et duck travaillent sur le code glue de C/JNI, et le code Java " -"existant\n" -"est déjà déployé avec des crochets pour cela quand ce sera prêt. Les " -"résultats préliminaires\n" -"semblent fantastiques - faire tourner le routeur avec le modPow GMP natal" -" fournit\n" -"une accélération de 800* *37; de la performance en chiffrement, et la " -"charge a été réduite à moitié. Ceci\n" -"était juste sur la machine d’un utilisateur et les choses sont très loin " -"d’être prêtes pour le paquetage\n" -"ni le déploiement, pour le moment." +msgstr "\nugha et duck travaillent sur le code glue de C/JNI, et le code Java existant\nest déjà déployé avec des crochets pour cela quand ce sera prêt. Les résultats préliminaires\nsemblent fantastiques - faire tourner le routeur avec le modPow GMP natal fournit\nune accélération de 800* *37; de la performance en chiffrement, et la charge a été réduite à moitié. Ceci\nétait juste sur la machine d’un utilisateur et les choses sont très loin d’être prêtes pour le paquetage\nni le déploiement, pour le moment." #: i2p2www/pages/site/about/performance/history.html:32 msgid "Garlic wrapping a \"reply\" LeaseSet" @@ -2305,87 +1887,42 @@ msgstr "implémenté mais aurait besoin d’ajustements" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Cet ajustement de l’algorithme ne sera seulement pertinent que pour les " -"applications qui veulent que leurs pairs leur répondent (quoique cela " -"inclue tout ce qui utilise I2PTunnel ou la bibliothèque « ministreaming »" -" de mihi) :" +msgstr "Cet ajustement de l’algorithme ne sera seulement pertinent que pour les applications qui veulent que leurs pairs leur répondent (quoique cela inclue tout ce qui utilise I2PTunnel ou la bibliothèque « ministreaming » de mihi) :" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." -msgstr "" -"Précédemment, quand Alice a envoyé un message à Bob, quand Bob a répondu " -"qu’il avait dû consulter la base de données de réseau, émettant quelques " -"requêtes pour obtenir le jeu de baux actuel d’Alice. S’il a déjà le jeu " -"de baux actuel d’Alice, il peut alors juste envoyer sa réponse " -"immédiatement - c’est (en partie) pourquoi cela prend habituellement un " -"peu plus longtemps de parler à quelqu’un la première fois que vous vous " -"connectez, mais les communications subséquentes sont plus rapides. " -"Actuellement, pour tous les clients, nous enveloppons le jeu de baux " -"actuel de l’expéditeur dans l’ail qui est livré au destinataire, afin " -"qu’ils aient <i>toujours</i> le jeu de baux stocké localement quand ils " -"s’apprêtent à répondre, supprimant complètement le besoin de consulter la" -" base de données de réseau lors des réponses. \n" -"Ceci échange une grande partie de la bande passante de l’expéditeur " -"contre cette réponse plus rapide.\n" -"Si nous ne le faisions pas très souvent, l’utilisation globale de la " -"bande passante du réseau diminuerait, puisque le destinataire n’a pas à " -"consulter de base de données de réseau." +msgstr "Précédemment, quand Alice a envoyé un message à Bob, quand Bob a répondu qu’il avait dû consulter la base de données de réseau, émettant quelques requêtes pour obtenir le jeu de baux actuel d’Alice. S’il a déjà le jeu de baux actuel d’Alice, il peut alors juste envoyer sa réponse immédiatement - c’est (en partie) pourquoi cela prend habituellement un peu plus longtemps de parler à quelqu’un la première fois que vous vous connectez, mais les communications subséquentes sont plus rapides. Actuellement, pour tous les clients, nous enveloppons le jeu de baux actuel de l’expéditeur dans l’ail qui est livré au destinataire, afin qu’ils aient <i>toujours</i> le jeu de baux stocké localement quand ils s’apprêtent à répondre, supprimant complètement le besoin de consulter la base de données de réseau lors des réponses. \nCeci échange une grande partie de la bande passante de l’expéditeur contre cette réponse plus rapide.\nSi nous ne le faisions pas très souvent, l’utilisation globale de la bande passante du réseau diminuerait, puisque le destinataire n’a pas à consulter de base de données de réseau." #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." -msgstr "" -"Pour les jeux de baux non publiés tels que les « clients partagés », " -"c’est la seule façon d’envoyer le jeu de baux à Bob. Malheureusement, ce " -"groupage, répété toutes les fois, ajoute presque 100 % de surcharge à " -" une connexion à large bande passante et beaucoup plus à une connexion " -"avec de plus petits messages." +msgstr "Pour les jeux de baux non publiés tels que les « clients partagés », c’est la seule façon d’envoyer le jeu de baux à Bob. Malheureusement, ce groupage, répété toutes les fois, ajoute presque 100 % de surcharge à une connexion à large bande passante et beaucoup plus à une connexion avec de plus petits messages." #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Les changements prévus pour la version 0.6.2 grouperont le jeu de baux " -"seulement si requis, au début d’une connexion ou quand le jeu de baux " -"change.\n" -"Cela réduira considérablement la surcharge totale de la messagerie d’I2P." +msgstr "Les changements prévus pour la version 0.6.2 grouperont le jeu de baux seulement si requis, au début d’une connexion ou quand le jeu de baux change.\nCela réduira considérablement la surcharge totale de la messagerie d’I2P." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2394,42 +1931,16 @@ msgstr "Refus TCP plus efficace" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." -msgstr "" -"À l’heure actuelle, toutes les connexions TCP font toute leur validation " -"de pair après\n" -"avoir passé la (coûteuse) poignée de mains Diffie-Hellman pour négocier " -"une\n" -"clé de session privée. Cela signifie que si l’horloge de quelqu’un est " -"vraiment fausse, ou \n" -"que leur NAT/pare-feu/etc est incorrectement configuré (ou qu’ils font " -"juste fonctionner\n" -"une version incompatible du routeur), ils vont systématiquement (quoique " -"non\n" -"constamment, grâce à la banlist) causer un chère et futile opération " -"cryptographique\n" -"sur tous les pairs qu’ils connaissent. Tandis que nous voudrons garder " -"quelques \n" -"vérifications/validations dans la frontière de chiffrement, nous voudrons" -" mettre à jour le\n" -"protocole pour faire un peu de cela d’abord, afin que nous puissions les " -"rejeter proprement\n" -"sans gaspiller beaucoup de CPU ou d’autres ressources." +msgstr "À l’heure actuelle, toutes les connexions TCP font toute leur validation de pair après\navoir passé la (coûteuse) poignée de mains Diffie-Hellman pour négocier une\nclé de session privée. Cela signifie que si l’horloge de quelqu’un est vraiment fausse, ou \nque leur NAT/pare-feu/etc est incorrectement configuré (ou qu’ils font juste fonctionner\nune version incompatible du routeur), ils vont systématiquement (quoique non\nconstamment, grâce à la banlist) causer un chère et futile opération cryptographique\nsur tous les pairs qu’ils connaissent. Tandis que nous voudrons garder quelques \nvérifications/validations dans la frontière de chiffrement, nous voudrons mettre à jour le\nprotocole pour faire un peu de cela d’abord, afin que nous puissions les rejeter proprement\nsans gaspiller beaucoup de CPU ou d’autres ressources." #: i2p2www/pages/site/about/performance/history.html:81 msgid "Adjust the tunnel testing" @@ -2437,27 +1948,13 @@ msgstr "Ajuster le test de tunnel" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." -msgstr "" -"Plutôt que d’aller avec l’approche assez aléatoire que nous avons " -"maintenant, nous devrions utiliser un algorithme plus conscient du " -"contexte pour tester les tunnels. Par exemple, si nous savons déjà qu’il " -"laisse correctement passer des données valides, il est inutile de le " -"tester. Alors que si nous n’avons pas vu passer de données récemment, il " -"pourrait être utile d’y envoyer des données. Cela réduira la contention " -"du tunnel causée par un excès de messages et améliorera aussi notre " -"vitesse de détections des tunnels en échec ainsi que notre vitesse " -"d’intervention." +msgstr "Plutôt que d’aller avec l’approche assez aléatoire que nous avons maintenant, nous devrions utiliser un algorithme plus conscient du contexte pour tester les tunnels. Par exemple, si nous savons déjà qu’il laisse correctement passer des données valides, il est inutile de le tester. Alors que si nous n’avons pas vu passer de données récemment, il pourrait être utile d’y envoyer des données. Cela réduira la contention du tunnel causée par un excès de messages et améliorera aussi notre vitesse de détections des tunnels en échec ainsi que notre vitesse d’intervention." #: i2p2www/pages/site/about/performance/history.html:92 msgid "Persistent Tunnel / Lease Selection" @@ -2465,30 +1962,17 @@ msgstr "Tunnel persistant / Sélection de bail" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"La sélection de tunnels sortants est mise en Å“uvre dans 0.6.1.30, la " -"sélection de baux entrants est mise en Å“uvre dans la version 0.6.2." +msgstr "La sélection de tunnels sortants est mise en Å“uvre dans 0.6.1.30, la sélection de baux entrants est mise en Å“uvre dans la version 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Sélectionner au hasard des tunnels et des baux pour chaque message crée " -"une grande\n" -"incidence de défaillance de livraison, laquelle empêche la lib streaming " -"d'\n" -"augmenter sa taille de fenêtre autant qu’elle le pourrait. En persistant " -"avec les\n" -"mêmes sélections pour une connexion donné, le taux de transfert est " -"beaucoup plus rapide." +msgstr "Sélectionner au hasard des tunnels et des baux pour chaque message crée une grande\nincidence de défaillance de livraison, laquelle empêche la lib streaming d'\naugmenter sa taille de fenêtre autant qu’elle le pourrait. En persistant avec les\nmêmes sélections pour une connexion donné, le taux de transfert est beaucoup plus rapide." #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2496,32 +1980,15 @@ msgstr "Compresse certaines structures de données" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." -msgstr "" -"Les messages I2NP et les données qu’ils contiennent sont déjà définis " -"dans une structure assez compacte, bien qu’un attribut de la structure " -"d’infosRouteur ne l’est pas. « options » est un mappage nom = valeur " -"ASCII en clair. Pour l’instant, nous le remplissons avec ces statistiques" -" publiées - autour de 3300 octets par pair. Facile à mettre en Å“uvre, la " -"compression GZIP le réduirait presque d’un tiers et, quand l’on tient " -"compte du nombre de fois que des structures InfosRouteur sont échangées " -"par le réseau, cela représente des économies significatives. Chaque fois " -"qu’un routeur demande à un autre routeur une entrée networkDb que le pair" -" n’a pas, il en renvoie de 3 à 10 InfosRouteur." +msgstr "Les messages I2NP et les données qu’ils contiennent sont déjà définis dans une structure assez compacte, bien qu’un attribut de la structure d’infosRouteur ne l’est pas. « options » est un mappage nom = valeur ASCII en clair. Pour l’instant, nous le remplissons avec ces statistiques publiées - autour de 3300 octets par pair. Facile à mettre en Å“uvre, la compression GZIP le réduirait presque d’un tiers et, quand l’on tient compte du nombre de fois que des structures InfosRouteur sont échangées par le réseau, cela représente des économies significatives. Chaque fois qu’un routeur demande à un autre routeur une entrée networkDb que le pair n’a pas, il en renvoie de 3 à 10 InfosRouteur." #: i2p2www/pages/site/about/performance/history.html:117 msgid "Update the ministreaming protocol" @@ -2533,40 +2000,17 @@ msgstr "remplacé par le protocole plein ministreaming" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." -msgstr "" -"Actuellement, la bibliothèque de minidiffusion de mihi a un protocole de " -"négociation de flux assez simple. Alice envoie à Bob un message SYN, Bob " -"répond par un message ACK, ensuite Alice et Bob s’envoient des données, " -"jusqu’à ce que l’un d’entre eux envoie à l’autre un message CLOSE. Pour " -"les connexions longues (p. ex. à un serveur IRC), cette surcharge est " -"négligeable, mais pour les situations simples de demande/réponse unique " -"(p. ex. une demande/réponse HTTP), c’est plus du double de messages que " -"nécessaire. Si, cependant, Alice avait ajouté ses premières données " -"utiles au message SYN et Bob avait ajouté sa première réponse avec le " -"message ACK, et peut-être aussi\n" -"inclus le drapeau CLOSE, les flux transitoires tels que les requêtes HTTP" -" pourraient être réduits à deux messages, au lieu du " -"SYN+ACK+requête+réponse+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." +msgstr "Actuellement, la bibliothèque de minidiffusion de mihi a un protocole de négociation de flux assez simple. Alice envoie à Bob un message SYN, Bob répond par un message ACK, ensuite Alice et Bob s’envoient des données, jusqu’à ce que l’un d’entre eux envoie à l’autre un message CLOSE. Pour les connexions longues (p. ex. à un serveur IRC), cette surcharge est négligeable, mais pour les situations simples de demande/réponse unique (p. ex. une demande/réponse HTTP), c’est plus du double de messages que nécessaire. Si, cependant, Alice avait ajouté ses premières données utiles au message SYN et Bob avait ajouté sa première réponse avec le message ACK, et peut-être aussi\ninclus le drapeau CLOSE, les flux transitoires tels que les requêtes HTTP pourraient être réduits à deux messages, au lieu du SYN+ACK+requête+réponse+CLOSE." #: i2p2www/pages/site/about/performance/history.html:132 msgid "Implement full streaming protocol" @@ -2574,55 +2018,26 @@ msgstr "Implémenter protocole full streaming" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." -msgstr "" -"Le protocole « ministreaming » profite d’une mauvaise décision de " -"conception dans le protocole client I2P (I2CP) ; l’exposition de " -"« mode=GUARANTEED », permettant à ce qui serait autrement un protocole " -"non fiable, au meilleur effort, basé sur des messages d’être utilisé pour" -" une opération de blocage fiable (sous le capot, tout est encore non " -"fiable et basé sur des messages, le routeur fournissant des garanties de " -"livraison par l’enveloppage ail d’un message « ACK » avec les données " -"utiles. Donc une fois que les données atteignent la cible, le message ACK" -" nous est retourné [par des tunnels, bien sûr])." +msgstr "Le protocole « ministreaming » profite d’une mauvaise décision de conception dans le protocole client I2P (I2CP) ; l’exposition de « mode=GUARANTEED », permettant à ce qui serait autrement un protocole non fiable, au meilleur effort, basé sur des messages d’être utilisé pour une opération de blocage fiable (sous le capot, tout est encore non fiable et basé sur des messages, le routeur fournissant des garanties de livraison par l’enveloppage ail d’un message « ACK » avec les données utiles. Donc une fois que les données atteignent la cible, le message ACK nous est retourné [par des tunnels, bien sûr])." #: i2p2www/pages/site/about/performance/history.html:143 #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." -msgstr "" -"Comme je l’ai <a href=\"%(link)s\">dit</a>, faire qu’I2PTunnel (et la " -"bibliothèque ministreaming) suivent cette route était la meilleure chose " -"à faire, mais des mécanismes plus efficaces existent. Quand nous ôtons la" -"\n" -"fonction « Mode=GUARANTEED », nous nous trouvons essentiellement avec un " -"I2CP qui ressemble à une couche IP anonyme, et il nous sera ainsi " -"possible de mettre en Å“uvre la bibliothèque de diffusion afin de profiter" -" des expériences de conception de la couche TCP : ACK sélectifs, " -"détection de la congestion, nagle, etc." +msgstr "Comme je l’ai <a href=\"%(link)s\">dit</a>, faire qu’I2PTunnel (et la bibliothèque ministreaming) suivent cette route était la meilleure chose à faire, mais des mécanismes plus efficaces existent. Quand nous ôtons la\nfonction « Mode=GUARANTEED », nous nous trouvons essentiellement avec un I2CP qui ressemble à une couche IP anonyme, et il nous sera ainsi possible de mettre en Å“uvre la bibliothèque de diffusion afin de profiter des expériences de conception de la couche TCP : ACK sélectifs, détection de la congestion, nagle, etc." #: i2p2www/pages/site/about/performance/index.html:2 msgid "Performance" @@ -2632,105 +2047,44 @@ msgstr "Performance" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"Comment est-ce que I2P fonctionne, pourquoi est-il lent, et pourquoi " -"n’utilise-t-il pas complètement ma bande passante ?" +msgstr "Comment est-ce que I2P fonctionne, pourquoi est-il lent, et pourquoi n’utilise-t-il pas complètement ma bande passante ?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Probablement qu’une de choses la plus fréquemment demandée par les gens " -"est \"à quelle vitesse est I2P ?\",\n" -"et aucun ne semble aimer la réponse - \"cela dépend\". Après avoir essayé" -" I2P, la\n" -"chose suivante qu’ils demandent est \"deviendra-t-il plus rapide ?\", et " -"la réponse à cela est plus\n" -"emphatique <b>oui</b>." +msgstr "Probablement qu’une de choses la plus fréquemment demandée par les gens est \"à quelle vitesse est I2P ?\",\net aucun ne semble aimer la réponse - \"cela dépend\". Après avoir essayé I2P, la\nchose suivante qu’ils demandent est \"deviendra-t-il plus rapide ?\", et la réponse à cela est plus\nemphatique <b>oui</b>." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." -msgstr "" -"I2P est un réseau complètement dynamique. Chaque client est connu par les" -" autres nÅ“uds et teste l’accessibilité et la capacité des nÅ“uds locaux " -"connus.\n" -"Seuls les nÅ“uds accessibles et aptes sont enregistrés dans une base de " -"données NetDB locale (généralement une portion du réseau seulement, " -"environ 500 à 1 000).\n" -"Quand I2P construit des tunnels, la meilleure ressource est sélectionnée " -"de cette réserve. Par exemple, un petit sous-ensemble de 20 à 50 nÅ“uds " -"n’est disponible que pour construire des tunnels.\n" -"Avec des tests toutes les minutes, la réserve de nÅ“uds utilisés change " -"toutes les minutes.\n" -"Chaque nÅ“ud d’I2P connaît une partie différente du réseau, ce qui " -"signifie que chaque routeur connaît un ensemble différent de nÅ“uds d’I2P " -"pouvant être utilisés pour les tunnels.\n" -"Même si deux routeurs possédaient le même sous-ensemble de nÅ“uds connus, " -"les tests d’accessibilité et de capacité donneraient probablement des " -"résultats différents, car les autres routeurs pourraient subir une charge" -" lors du test d’un routeur, mais être libres lors du test du deuxième " -"routeur." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." +msgstr "I2P est un réseau complètement dynamique. Chaque client est connu par les autres nÅ“uds et teste l’accessibilité et la capacité des nÅ“uds locaux connus.\nSeuls les nÅ“uds accessibles et aptes sont enregistrés dans une base de données NetDB locale (généralement une portion du réseau seulement, environ 500 à 1 000).\nQuand I2P construit des tunnels, la meilleure ressource est sélectionnée de cette réserve. Par exemple, un petit sous-ensemble de 20 à 50 nÅ“uds n’est disponible que pour construire des tunnels.\nAvec des tests toutes les minutes, la réserve de nÅ“uds utilisés change toutes les minutes.\nChaque nÅ“ud d’I2P connaît une partie différente du réseau, ce qui signifie que chaque routeur connaît un ensemble différent de nÅ“uds d’I2P pouvant être utilisés pour les tunnels.\nMême si deux routeurs possédaient le même sous-ensemble de nÅ“uds connus, les tests d’accessibilité et de capacité donneraient probablement des résultats différents, car les autres routeurs pourraient subir une charge lors du test d’un routeur, mais être libres lors du test du deuxième routeur." #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"Le texte ci-dessus décrit pourquoi chaque noeud I2P a des noeuds " -"différents pour construire des tunnels.\n" -"Parce que chaque noeud I2P a une latence différente et une largeur de " -"bande passante, des tunnels (qui sont construits via ces noeuds) ont une " -"latence différente et des valeurs différentes de bande passante.\n" -"Et parce que chaque noeud I2P a différents tunnels construits, aucun de " -"deux noeud I2P n’a les mêmes ensembles de tunnels." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "Le texte ci-dessus décrit pourquoi chaque noeud I2P a des noeuds différents pour construire des tunnels.\nParce que chaque noeud I2P a une latence différente et une largeur de bande passante, des tunnels (qui sont construits via ces noeuds) ont une latence différente et des valeurs différentes de bande passante.\nEt parce que chaque noeud I2P a différents tunnels construits, aucun de deux noeud I2P n’a les mêmes ensembles de tunnels." #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Un serveur ou client est connu comme une « destination » et chaque " -"destination a au moins un tunnel entrant et un tunnel sortant. Il y a par" -" défaut 3 sauts par tunnel.\n" -"Cela s’élève à 12 sauts (c.-à -d. 12 nÅ“uds I2P différents) pour un aller-" -"retour complet client-serveur-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Un serveur ou client est connu comme une « destination » et chaque destination a au moins un tunnel entrant et un tunnel sortant. Il y a par défaut 3 sauts par tunnel.\nCela s’élève à 12 sauts (c.-à -d. 12 nÅ“uds I2P différents) pour un aller-retour complet client-serveur-client." #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Chaque paquet de données est envoyé par 6 autres noeuds I2P jusqu’à ce " -"qu’il atteigne le serveur :" +msgstr "Chaque paquet de données est envoyé par 6 autres noeuds I2P jusqu’à ce qu’il atteigne le serveur :" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2738,180 +2092,62 @@ msgstr "et au retour 6 noeuds I2P différents :" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." -msgstr "" -"Comme la plupart du trafic sur I2P (www, torrent, etc.) a besoin de " -"paquets ack jusqu’à ce que de nouvelles données soient envoyées, il doit " -"attendre jusqu’à ce qu’un paquet ack revienne du serveur.\n" -"Donc : envoyer des données, attendre ack, envoyer plus de données, " -"attendre ack, etc.\n" -"Comme le RTT (temps aller-retour) s’ajoute à la latence de chaque " -"nÅ“ud I2P individuel et à chaque connexion pendant cet aller-retour, un " -"paquet ack revient habituellement vers le client en 1 à 3 secondes.\n" -"En raison de contrainte du transport TCP et I2P, un paquet de données a " -"une taille limitée et ne peut pas être aussi grand que nous le " -"souhaitons.\n" -"Ensemble, ces conditions définissent une limite de bande passante " -"maximale de 20 à 50 Ko/s par tunnel.\n" -"Mais si SEULEMENT UN saut dans le tunnel n’a qu’une bande passante de " -"5 Ko/s à pouvoir, le tunnel entier est limité à 5 Ko/s, indépendamment de" -" la latence et autres restrictions." +msgstr "Comme la plupart du trafic sur I2P (www, torrent, etc.) a besoin de paquets ack jusqu’à ce que de nouvelles données soient envoyées, il doit attendre jusqu’à ce qu’un paquet ack revienne du serveur.\nDonc : envoyer des données, attendre ack, envoyer plus de données, attendre ack, etc.\nComme le RTT (temps aller-retour) s’ajoute à la latence de chaque nÅ“ud I2P individuel et à chaque connexion pendant cet aller-retour, un paquet ack revient habituellement vers le client en 1 à 3 secondes.\nEn raison de contrainte du transport TCP et I2P, un paquet de données a une taille limitée et ne peut pas être aussi grand que nous le souhaitons.\nEnsemble, ces conditions définissent une limite de bande passante maximale de 20 à 50 Ko/s par tunnel.\nMais si SEULEMENT UN saut dans le tunnel n’a qu’une bande passante de 5 Ko/s à pouvoir, le tunnel entier est limité à 5 Ko/s, indépendamment de la latence et autres restrictions." #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." -msgstr "" -"En raison du chiffrement utilisé et d’autres configurations dans I2P " -"(comment construire des tunnels, la latence…) la construction d’un tunnel" -" est gourmande en temps UCT. C’est pourquoi une destination n’est " -"autorisée à avoir qu’un maximum de 6 tunnels entrants et 6 sortants pour " -"transporter les données. Avec un maximum de 50 ko/s par tunnel, une " -"destination pourrait utiliser à peu près 300 ko/s de trafic combiné (en " -"réalité peut-être plus si des tunnels plus courts sont utilisés avec un " -"anonymat disponible faible ou nul).\n" -"Les tunnels utilisés sont éliminés toutes les 10 minutes et d’autres sont" -" construits.\n" -"Ce changement de tunnels (et parfois des clients qui se ferment à froid, " -"car ils utilisent la « fermeture immédiate » ou des situations de panne " -"de courant) met parfois fin aux tunnels et aux connexions, comme observé " -"sur le réseau IRC2P en perte de connexion (dépassement du temps de ping) " -"ou lors de l’utilisation d’eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." +msgstr "En raison du chiffrement utilisé et d’autres configurations dans I2P (comment construire des tunnels, la latence…) la construction d’un tunnel est gourmande en temps UCT. C’est pourquoi une destination n’est autorisée à avoir qu’un maximum de 6 tunnels entrants et 6 sortants pour transporter les données. Avec un maximum de 50 ko/s par tunnel, une destination pourrait utiliser à peu près 300 ko/s de trafic combiné (en réalité peut-être plus si des tunnels plus courts sont utilisés avec un anonymat disponible faible ou nul).\nLes tunnels utilisés sont éliminés toutes les 10 minutes et d’autres sont construits.\nCe changement de tunnels (et parfois des clients qui se ferment à froid, car ils utilisent la « fermeture immédiate » ou des situations de panne de courant) met parfois fin aux tunnels et aux connexions, comme observé sur le réseau IRC2P en perte de connexion (dépassement du temps de ping) ou lors de l’utilisation d’eepget." #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." -msgstr "" -"Avec un ensemble limité de destinations et un ensemble limité de tunnels " -"par destination, un noeud I2P utilise seulement un ensemble limité de " -"tunnels à travers d’autres noeuds I2P.\n" -"Par exemple, si un noeud I2P est \"hop1\" dans le petit exemple ci-" -"dessus, nous voyons seulement 1 tunnel participant provenant du client.\n" -"Si nous résumons le réseau I2P entier, seul un nombre plutôt limité de " -"tunnels participants pourrait être construit avec une quantité limitée de" -" bande passante tous ensemble.\n" -"Si on distribue ces nombres limités à travers le numéro de noeuds I2P, il" -" y a seulement une fraction de bande passante/capacité disponible " -"disponible pour utilisation." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." +msgstr "Avec un ensemble limité de destinations et un ensemble limité de tunnels par destination, un noeud I2P utilise seulement un ensemble limité de tunnels à travers d’autres noeuds I2P.\nPar exemple, si un noeud I2P est \"hop1\" dans le petit exemple ci-dessus, nous voyons seulement 1 tunnel participant provenant du client.\nSi nous résumons le réseau I2P entier, seul un nombre plutôt limité de tunnels participants pourrait être construit avec une quantité limitée de bande passante tous ensemble.\nSi on distribue ces nombres limités à travers le numéro de noeuds I2P, il y a seulement une fraction de bande passante/capacité disponible disponible pour utilisation." #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." -msgstr "" -"Pour rester anonyme, un routeur ne devrait pas être utilisé par " -"l’ensemble du réseau pour la construction de tunnels.\n" -"Si un routeur agit comme routeur de tunnels pour tous les nÅ“uds d’I2P, il" -" devient un véritable point central de défaillance, ainsi qu’un point " -"central pour récolter des adresses IP et des données des clients. Ce " -"n’est pas souhaitable.\n" -"I2P tente de répartir la charge sur un grand nombre de nÅ“uds d’I2P pour " -"cette raison." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." +msgstr "Pour rester anonyme, un routeur ne devrait pas être utilisé par l’ensemble du réseau pour la construction de tunnels.\nSi un routeur agit comme routeur de tunnels pour tous les nÅ“uds d’I2P, il devient un véritable point central de défaillance, ainsi qu’un point central pour récolter des adresses IP et des données des clients. Ce n’est pas souhaitable.\nI2P tente de répartir la charge sur un grand nombre de nÅ“uds d’I2P pour cette raison." #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." -msgstr "" -"Un autre point est le réseau complètement maillé. Chaque connexion " -"saut-à -saut utilise une connexion TCP ou UDP sur les nÅ“uds I2P. Avec 1000" -" connexions, on voit\n" -"1000 connexions TCP. C’est beaucoup et certains routeurs (DSL, câble, …) " -"domestique ou de petit bureau permettent seulement un petit nombre de " -"connexions (ou deviennent simplement fous si vous utilisez plus de X " -"connexions.)\n" -"I2P essaie de limiter le nombre de ces connexions pour être en dessous de" -" 1500 par UDP et par type TCP.\n" -"Ce qui limite la quantité de trafic acheminé à travers votre nÅ“ud I2P " -"aussi." +msgstr "Un autre point est le réseau complètement maillé. Chaque connexion saut-à -saut utilise une connexion TCP ou UDP sur les nÅ“uds I2P. Avec 1000 connexions, on voit\n1000 connexions TCP. C’est beaucoup et certains routeurs (DSL, câble, …) domestique ou de petit bureau permettent seulement un petit nombre de connexions (ou deviennent simplement fous si vous utilisez plus de X connexions.)\nI2P essaie de limiter le nombre de ces connexions pour être en dessous de 1500 par UDP et par type TCP.\nCe qui limite la quantité de trafic acheminé à travers votre nÅ“ud I2P aussi." #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." -msgstr "" -"En résumé, I2P est très complexe et il n’y a aucune façon facile " -"d’identifier exactement pourquoi votre nÅ“ud n’est pas utilisé.\n" -"Si votre nÅ“ud est accessible, a un paramètre de bande passante partagée >" -" à 128 ko/s, est accessible jour et nuit, il devrait être utilisé après " -"quelque temps pour le trafic participant. \n" -"S’il est hors service entre temps, le test de votre nÅ“ud I2P par d’autres" -" nÅ“uds leur indiquera que vous n’êtes pas accessible. Pour les autres " -"nÅ“uds, votre nÅ“ud sera bloqué pour au moins 24 h. Ainsi, les autres nÅ“uds" -" qui vous ont testé comme étant hors service n’utiliseront pas votre nÅ“ud" -" pour construire des tunnels durant 24 h. C’est pourquoi votre trafic " -"sera inférieur après un redémarrage, une fermeture pendant au moins 24 h." +msgstr "En résumé, I2P est très complexe et il n’y a aucune façon facile d’identifier exactement pourquoi votre nÅ“ud n’est pas utilisé.\nSi votre nÅ“ud est accessible, a un paramètre de bande passante partagée > à 128 ko/s, est accessible jour et nuit, il devrait être utilisé après quelque temps pour le trafic participant. \nS’il est hors service entre temps, le test de votre nÅ“ud I2P par d’autres nÅ“uds leur indiquera que vous n’êtes pas accessible. Pour les autres nÅ“uds, votre nÅ“ud sera bloqué pour au moins 24 h. Ainsi, les autres nÅ“uds qui vous ont testé comme étant hors service n’utiliseront pas votre nÅ“ud pour construire des tunnels durant 24 h. C’est pourquoi votre trafic sera inférieur après un redémarrage, une fermeture pendant au moins 24 h." #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"Aussi : les autres noeuds I2P doivent connaître votre routeur I2P pour " -"tester son accessibilité et sa capacité. Cela prend du temps pour que les" -" autres noeuds prennent connaissance de votre noeud.\n" -"Cela sera plus rapide si vous utilisez I2P et construisez davantage de " -"tunnels, par exemple utilisez un torrent ou www pendant quelque temps." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "Aussi : les autres noeuds I2P doivent connaître votre routeur I2P pour tester son accessibilité et sa capacité. Cela prend du temps pour que les autres noeuds prennent connaissance de votre noeud.\nCela sera plus rapide si vous utilisez I2P et construisez davantage de tunnels, par exemple utilisez un torrent ou www pendant quelque temps." #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2922,7 +2158,4 @@ msgstr "Améliorations de performance" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Pour de possible futures améliorations de performance voir\n" -"<a href=\"%(future)s\">Améliorations de performance futures</a>." - +msgstr "Pour de possible futures améliorations de performance voir\n<a href=\"%(future)s\">Améliorations de performance futures</a>." diff --git a/i2p2www/translations/fr/LC_MESSAGES/comparison.po b/i2p2www/translations/fr/LC_MESSAGES/comparison.po index 0eae3f088491964ca1a19129cc8ddde7a3480bb0..d65b9a18540ac2f360db90f3e9d0ee46f97d47d9 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/fr/LC_MESSAGES/comparison.po @@ -1,28 +1,30 @@ -# French translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # bassmax, 2015 # AO <ao@localizationlab.org>, 2018-2020 # Boxoa590, 2013 # AO <ao@localizationlab.org>, 2017-2018 # magma <magma@mail.i2p>, 2011 +# Boxoa590, 2013 # syl_, 2013,2015-2016 # Towinet, 2013-2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2020-04-03 21:47+0000\n" -"Last-Translator: AO <ao@localizationlab.org>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n" "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: fr\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -30,89 +32,39 @@ msgstr "I2P comparé à Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet est entièrement distribué, c’est un réseau pair à pair de " -"publication anonyme, offrant\n" -"des moyens sûrs pour stocker des données, ainsi que des approches qui " -"tentent de répondre aux charges\n" -"d’une crue éclair. Alors que Freenet est conçu comme un magasin de " -"données distribuées, des gens ont\n" -"construit des applications par dessus celui-ci afin de faire de la " -"communication anonyme plus générique, tels\n" -"que des sites web statiques et des forums électroniques." +msgstr "Freenet est entièrement distribué, c’est un réseau pair à pair de publication anonyme, offrant\ndes moyens sûrs pour stocker des données, ainsi que des approches qui tentent de répondre aux charges\nd’une crue éclair. Alors que Freenet est conçu comme un magasin de données distribuées, des gens ont\nconstruit des applications par dessus celui-ci afin de faire de la communication anonyme plus générique, tels\nque des sites Web statiques et des forums électroniques." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"Comparé à I2P, Freenet offre des avantages considérables : c’est un " -"magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet " -"de récupérer les contenus publiés par autrui, même si l’éditeur n’est " -"plus en ligne. En outre, il devrait être en mesure de distribuer des " -"données populaires assez efficacement. I2P même n’offre et n’offrira pas " -"cette fonction. D’autre part, il existe un chevauchement pour les " -"utilisateurs qui veulent simplement communiquer anonymement les uns avec " -"les autres par les sites Web, les forums, les logiciels de partage de " -"fichiers, etc. Il y a aussi eu des tentatives de développement d’un " -"magasin de données distribuées qui fonctionnerait par-dessus I2P (plus " -"récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien " -"n’est encore prêt pour une utilisation générale." +msgstr "Comparé à I2P, Freenet offre des avantages considérables : c’est un magasin de données distribuées, alors qu’I2P ne l’est pas, ce qui permet de récupérer les contenus publiés par autrui, même si l’éditeur n’est plus en ligne. En outre, il devrait être en mesure de distribuer des données populaires assez efficacement. I2P même n’offre et n’offrira pas cette fonction. D’autre part, il existe un chevauchement pour les utilisateurs qui veulent simplement communiquer anonymement les uns avec les autres par les sites Web, les forums, les logiciels de partage de fichiers, etc. Il y a aussi eu des tentatives de développement d’un magasin de données distribuées qui fonctionnerait par-dessus I2P (plus récemment un portage de <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), mais rien n’est encore prêt pour une utilisation générale." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Cependant, même sans tenir compte des questions relatives aux mises en " -"Å“uvre, il y a des préoccupations sur les algorithmes de Freenet à la fois" -" sur l’évolutivité et la perspective d’anonymat, en raison en grande " -"partie du mode de routage de Freenet, axé heuristique. Les interactions " -"des différentes techniques peuvent certainement réussir à dissuader " -"diverses attaques, et peut-être que certains aspects des algorithmes de " -"routage peuvent faire espérer de l’évolutivité. Malheureusement, peu " -"d’analyses des algorithmes concernés ont abouti à des résultats positifs," -" mais il reste encore de l’espoir. À tout le moins, Freenet fournit un " -"anonymat substantiel contre un assaillant qui n’aurait pas les ressources" -" nécessaires pour l’analyser davantage." +msgstr "Cependant, même sans tenir compte des questions relatives aux mises en Å“uvre, il y a des préoccupations sur les algorithmes de Freenet à la fois sur l’évolutivité et la perspective d’anonymat, en raison en grande partie du mode de routage de Freenet, axé heuristique. Les interactions des différentes techniques peuvent certainement réussir à dissuader diverses attaques, et peut-être que certains aspects des algorithmes de routage peuvent faire espérer de l’évolutivité. Malheureusement, peu d’analyses des algorithmes concernés ont abouti à des résultats positifs, mais il reste encore de l’espoir. À tout le moins, Freenet fournit un anonymat substantiel contre un assaillant qui n’aurait pas les ressources nécessaires pour l’analyser davantage." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -120,49 +72,28 @@ msgstr "I2P comparé à d’autres projets" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Il existe un grand nombre d’autres applications et de projets travaillant" -" sur les communications anonymes et I2P s’en est largement inspiré. Cette" -" liste est loin d’être exhaustive concernant le thème de l’anonymat (<a " -"href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a> de Freehaven\n" -"et les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à " -"GNUnet servent à celà ). \n" -"Néanmoins, certains systèmes se prêtent bien à la comparaison. Les " -"suivants disposent d’ailleurs d’une page dédiée :" +msgstr "Il existe un grand nombre d’autres applications et de projets travaillant sur les communications anonymes et I2P s’en est largement inspiré. Cette liste est loin d’être exhaustive concernant le thème de l’anonymat (<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a> de Freehaven\net les <a href=\"https://www.gnunet.org/links/\">projets liés</a> à GNUnet servent à celà ). \nNéanmoins, certains systèmes se prêtent bien à la comparaison. Les suivants disposent d’ailleurs d’une page dédiée :" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Ceux qui suivent sont discuté sur la page <a " -"href=\"%(othernetworks)s\">autres réseaux</a>" +msgstr "Ceux qui suivent sont discuté sur la page <a href=\"%(othernetworks)s\">autres réseaux</a>" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Le contenu de cette page est soumis à mises à jour, discussions et " -"conflits, et nous accueillons avec plaisir les commentaires et ajouts.\n" -"Vous pouvez nous faire part de votre analyse en saisissant un <a " -"href=\"%(trac)s\">nouveau ticket dans Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -179,247 +110,116 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"La plupart des sections suivantes sont assez vieilles et peuvent ne pas " -"être précises.\n" -"Pour une vue d’ensemble des comparaisons disponibles, voir la\n" -"<a href=\"%(comparison)s\">page de comparaisons réseau principale</a>.\n" -"Vous pouvez également nous faire part de votre analyse en créant un\n" -"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." -msgstr "" -"Morphmix et Tarzan sont tous les deux des réseaux pair à pair de " -"mandataires d’anonymisation entièrement distribués, permettant aux " -"utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à " -"latence faible. Morphmix comportent des algorithmes très intéressants de " -"détection de collusion et des défenses contre les Sybil, tandis que " -"Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose." -" Les deux principales différences entre ces systèmes et I2P sont liées au" -" <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur " -"conception de mandataire sortant (au lieu de fournir de l’anonymat à la " -"fois à l’émetteur et au destinataire). Le code source est offert pour les" -" deux systèmes, mais nous ne sommes pas au courant d’une utilisation en " -"dehors des milieux universitaires." +msgstr "Morphmix et Tarzan sont tous les deux des réseaux pair à pair de mandataires d’anonymisation entièrement distribués, permettant aux utilisateurs de tunnelliser vers l’extérieur par le réseau de mélange à latence faible. Morphmix comportent des algorithmes très intéressants de détection de collusion et des défenses contre les Sybil, tandis que Tarzan fait appel à la rareté d’adresses IP pour accomplir la même chose. Les deux principales différences entre ces systèmes et I2P sont liées au <a href=\"%(threatmodel)s\">modèle de menace</a> d’I2P et à leur conception de mandataire sortant (au lieu de fournir de l’anonymat à la fois à l’émetteur et au destinataire). Le code source est offert pour les deux systèmes, mais nous ne sommes pas au courant d’une utilisation en dehors des milieux universitaires." #: i2p2www/pages/site/comparison/other-networks.html:172 #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." -msgstr "" -"\n" -"Mixminion et Mixmaster sont des réseaux pour offrir un système de " -"courriel anonyme contre des adversaires très puissants.\n" -"Les applications de messagerie à latence élevée fonctionnant sur I2P (par" -" exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se " -"révéler adéquates pour répondre au modèle de menace de ces adversaires, " -"en s’exécutant simultanément aux besoins des utilisateurs à latence " -"faible, pour fournir un jeu d’anonymat considérablement plus important.\n" -"La prise en charge d’une latence élevée dans le routeur I2P même pourrait" -" ou pas être ajoutée dans une version future éloignée.\n" -"Il est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs " -"exigeant une protection extrême pour le courriel." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." +msgstr "\nMixminion et Mixmaster sont des réseaux pour offrir un système de courriel anonyme contre des adversaires très puissants.\nLes applications de messagerie à latence élevée fonctionnant sur I2P (par exemple <a href=\"%(syndie)s\">Syndie</a> ou I2PBote) pourraient se révéler adéquates pour répondre au modèle de menace de ces adversaires, en s’exécutant simultanément aux besoins des utilisateurs à latence faible, pour fournir un jeu d’anonymat considérablement plus important.\nLa prise en charge d’une latence élevée dans le routeur I2P même pourrait ou pas être ajoutée dans une version future éloignée.\nIl est trop tôt pour dire si I2P répondra aux besoins d’utilisateurs exigeant une protection extrême pour le courriel." #: i2p2www/pages/site/comparison/other-networks.html:184 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." -msgstr "" -"Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée" -" sur un répertoire." +msgstr "Comme Tor et Onion Routing, Mixminion et Mixmaster ont une approche basée sur un répertoire." #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" -msgstr "" -"JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour " -"l’anonymisation de demandes Web et comme tel a quelques nÅ“uds centralisés" -" (participants à la cascade) qui brassent et mélangent les requêtes des " -"clients à travers la séquence de nÅ“uds (la cascade) avant de les relayer " -"vers le Toile par un mandataire. Le champ d’application, le modèle de " -"menace et la sécurité sont sensiblement\n" -"différents d’I2P, mais pour ceux qui n’exige pas un anonymat important, " -"mais qui ne sont quand même pas satisfaits par un service genre " -"Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute " -"personne relevant de la juridiction des tribunaux allemands, car le " -"bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec " -"succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la" -" méthode de cette attaque a ensuite été jugée illégale par les tribunaux " -"allemands, le fait que les données ont été recueillies avec succès est " -"une préoccupation. Les tribunaux changent d’avis selon les circonstances " -"et c’est la preuve que si un organisme gouvernemental ou une agence de " -"renseignement le voulaient, ils pourraient recueillir les données, même " -"si cela peut être déclaré irrecevable ultérieurement par certains " -"tribunaux)" +msgstr "JAP (mandataire anonyme Java) est un réseau de mélange en cascades pour l’anonymisation de demandes Web et comme tel a quelques nÅ“uds centralisés (participants à la cascade) qui brassent et mélangent les requêtes des clients à travers la séquence de nÅ“uds (la cascade) avant de les relayer vers le Toile par un mandataire. Le champ d’application, le modèle de menace et la sécurité sont sensiblement\ndifférents d’I2P, mais pour ceux qui n’exige pas un anonymat important, mais qui ne sont quand même pas satisfaits par un service genre Anonymizer, JAP mérite d’être examiné. Une précaution à noter pour toute personne relevant de la juridiction des tribunaux allemands, car le bureau fédéral allemand des enquêtes criminelles (FBCI) a monté avec succès une <a href=\"%(url)s\"> attaque </a> contre le réseau. Même si la méthode de cette attaque a ensuite été jugée illégale par les tribunaux allemands, le fait que les données ont été recueillies avec succès est une préoccupation. Les tribunaux changent d’avis selon les circonstances et c’est la preuve que si un organisme gouvernemental ou une agence de renseignement le voulaient, ils pourraient recueillir les données, même si cela peut être déclaré irrecevable ultérieurement par certains tribunaux)" #: i2p2www/pages/site/comparison/other-networks.html:216 #, python-format msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." -msgstr "" -"Ces deux systèmes fonctionnent par le même routage <a " -"href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré " -"d’anonymat d’après un modèle de menace qui consiste à fournir un déni " -"plausible contre un adversaire seul. Avec le routage d’antnet, soit ils " -"appliquent d’abord un cheminement aléatoire, soit une recherche par " -"diffusion pour trouver un pair ayant les données ou l’identité désirée. " -"Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce " -"chemin trouvé. Cela fonctionne bien pour les applications qui veulent " -"simplement savoir ce que les autres aux alentours ont à offrir. « Comment" -" allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». " -"Vous obtenez essentiellement une grappe locale de nÅ“uds qui peuvent " -"partager des fichiers et garder un certain niveau d’anonymat (quoique " -"vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de " -"pairs)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." +msgstr "Ces deux systèmes fonctionnent par le même routage <a href=\"%(antnet)s\">antnet</a> de base, fournissant un certain degré d’anonymat d’après un modèle de menace qui consiste à fournir un déni plausible contre un adversaire seul. Avec le routage d’antnet, soit ils appliquent d’abord un cheminement aléatoire, soit une recherche par diffusion pour trouver un pair ayant les données ou l’identité désirée. Ils utilisent ensuite un algorithme de rétroaction pour optimiser ce chemin trouvé. Cela fonctionne bien pour les applications qui veulent simplement savoir ce que les autres aux alentours ont à offrir. « Comment allez vous tous ? » par opposition à « Salut Alice, comment vas-tu ? ». Vous obtenez essentiellement une grappe locale de nÅ“uds qui peuvent partager des fichiers et garder un certain niveau d’anonymat (quoique vous n’ayez pas beaucoup de contrôle sur qui est dans ce groupe de pairs)." #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." -msgstr "" -"Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du " -"tout - si l’application veut parler avec un\n" -"pair en particulier cela finit par faire une large recherche (broadcast) " -"ou une promenade aléatoire (random walk) (quoique s’ils ont assez\n" -"de chance pour que cela réussisse, le routage antnet devrait optimiser " -"cette connexion trouvée). Cela signifie que\n" -"tandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne" -" sont pas appropriés pour de grands réseaux où\n" -"quelqu’un veut se mettre en contact avec un autre pair spécifique. Cela " -"ne signifie pas qu’il n’y a pas\n" -"de valeur dans ces systèmes, juste que leur applicabilité est limitée aux" -" situations où leur\n" -"problèmes (issues) particuliers peuvent être adressés." +msgstr "Cependant, l’algorithme d’adaptation en taille (scale) ne se fait pas du tout - si l’application veut parler avec un\npair en particulier cela finit par faire une large recherche (broadcast) ou une promenade aléatoire (random walk) (quoique s’ils ont assez\nde chance pour que cela réussisse, le routage antnet devrait optimiser cette connexion trouvée). Cela signifie que\ntandis que ces réseaux peuvent très bien marcher à petite échelle, ils ne sont pas appropriés pour de grands réseaux où\nquelqu’un veut se mettre en contact avec un autre pair spécifique. Cela ne signifie pas qu’il n’y a pas\nde valeur dans ces systèmes, juste que leur applicabilité est limitée aux situations où leur\nproblèmes (issues) particuliers peuvent être adressés." #: i2p2www/pages/site/comparison/other-networks.html:239 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." -msgstr "" -"C’était un réseau closed-source visant les utilisateurs iraniens.\n" -"Tor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on " -"doit chercher dans un outil de mise en échec</a>.\n" -"Suffit-il de dire que être closed-source et cibler publiquement un pays " -"spécifique ne sont pas de bonnes idées.\n" -"I2P est, bien sûr, open-source. Cependant, ce code source, et notre\n" -"<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup " -"plus d’examen." +msgstr "C’était un réseau closed-source visant les utilisateurs iraniens.\nTor a fait <a href=\"%(torpost)s\">une bonne réécriture de ce que l’on doit chercher dans un outil de mise en échec</a>.\nSuffit-il de dire que être closed-source et cibler publiquement un pays spécifique ne sont pas de bonnes idées.\nI2P est, bien sûr, open-source. Cependant, ce code source, et notre\n<a href=\"%(docs)s\">documentation technique</a>, nécessitent beaucoup plus d’examen." #: i2p2www/pages/site/comparison/other-networks.html:248 msgid "Paid VPN Services" @@ -430,10 +230,8 @@ msgstr "Services RPV payants" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Vous pouvez contribuer par votre analyse en saisissant un\n" -"<a href=\"%(trac)s\">nouveau ticket dans Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:254 msgid "Others" @@ -461,18 +259,7 @@ msgid "" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n" "database</a> and <a href=\"%(peerselection)s\">peer selection</a>." -msgstr "" -"Tor et le routage en oignon sont tous deux des réseaux mandataires " -"d’anonymisation, permettant aux gens de tunnelliser par leur réseau de " -"mélange à latence faible. Les deux principales différences entre Tor, le " -"routage en oignon et I2P sont, encore une fois, liées à des différences " -"dans le modèle de menaces et la conception du mandataire sortant (bien " -"que Tor prenne aussi en charge les services cachés). De plus, Tor\n" -"utilise une approche basée sur un annuaire, fournissant un point " -"centralisé de gestion de la « vue » d’ensemble du réseau, recueille et " -"rapporte aussi des statistiques, contrairement à la <a " -"href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la " -"<a href=\"%(peerselection)s\">sélection de pairs</a>." +msgstr "Tor et le routage en oignon sont tous deux des réseaux mandataires d’anonymisation, permettant aux gens de tunnelliser par leur réseau de mélange à latence faible. Les deux principales différences entre Tor, le routage en oignon et I2P sont, encore une fois, liées à des différences dans le modèle de menaces et la conception du mandataire sortant (bien que Tor prenne aussi en charge les services cachés). De plus, Tor\nutilise une approche basée sur un annuaire, fournissant un point centralisé de gestion de la « vue » d’ensemble du réseau, recueille et rapporte aussi des statistiques, contrairement à la <a href=\"%(netdb)s\">base de données de réseau</a> distribuée d’I2P et la <a href=\"%(peerselection)s\">sélection de pairs</a>." #: i2p2www/pages/site/comparison/tor.html:23 msgid "" @@ -485,15 +272,7 @@ msgid "" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." -msgstr "" -"La fonction de mandataire sortant d’I2P/Tor présente quelques\n" -"faiblesses importantes contre certains assaillants. Une fois que la " -"communication quitte le réseau de mélange, les adversaires\n" -"passifs de partout peuvent plus facilement mettre en place une analyse du" -" trafic. De plus, les mandataires sortants ont accès aux données en clair" -" transférées dans les deux sens, et les mandataires sortants sont sujets " -"aux abus, en plus de tous les autres problèmes de sécurité inhérents au " -"trafic normal d’Internet, que nous avons appris à connaître et à aimer." +msgstr "La fonction de mandataire sortant d’I2P/Tor présente quelques\nfaiblesses importantes contre certains assaillants. Une fois que la communication quitte le réseau de mélange, les adversaires\npassifs de partout peuvent plus facilement mettre en place une analyse du trafic. De plus, les mandataires sortants ont accès aux données en clair transférées dans les deux sens, et les mandataires sortants sont sujets aux abus, en plus de tous les autres problèmes de sécurité inhérents au trafic normal d’Internet, que nous avons appris à connaître et à aimer." #: i2p2www/pages/site/comparison/tor.html:35 msgid "" @@ -503,14 +282,7 @@ msgid "" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." -msgstr "" -"Cependant, la plupart des gens ne doivent pas s’inquiéter de\n" -"ces situations, car elles ne correspondent pas à leur modèle de menace. " -"Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si " -"des personnes veulent construire une fonction de mandataire sortant par-" -"dessus une couche de communication anonyme, elles le peuvent). En fait, " -"certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire " -"sortant." +msgstr "Cependant, la plupart des gens ne doivent pas s’inquiéter de\nces situations, car elles ne correspondent pas à leur modèle de menace. Et cela dépasse aussi le champ d’action fonctionnel (officiel) d’I2P (si des personnes veulent construire une fonction de mandataire sortant par-dessus une couche de communication anonyme, elles le peuvent). En fait, certains utilisateurs d’I2P utilisent actuellement Tor comme mandataire sortant." #: i2p2www/pages/site/comparison/tor.html:49 msgid "Comparison of Tor and I2P Terminology" @@ -520,9 +292,7 @@ msgstr "Comparaison de terminologie entre Tor et I2P" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Alors que Tor et I2P sont similaires à bien des égards, une grande partie" -" de la terminologie est différente." +msgstr "Alors que Tor et I2P sont similaires à bien des égards, une grande partie de la terminologie est différente." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -595,8 +365,8 @@ msgstr "Service caché" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite ou Destination" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -666,21 +436,14 @@ msgstr "Avantages de Tor sur I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les " -"communautés universitaires et hackers ; bénéficie\n" -"d’études formelles d’anonymat, de résistance, et de performance ;\n" -"a un chef de file universitaire non-anonyme, visible" +msgstr "Plus grand nombre d’utilisateurs ; beaucoup plus de visibilité dans les communautés universitaires et hackers ; bénéficie\nd’études formelles d’anonymat, de résistance, et de performance ;\na un chef de file universitaire non-anonyme, visible" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" -msgstr "" -"A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à " -"aborder" +msgstr "A déjà résolu certains problèmes d’échelle que I2P n’a pas eu encore à aborder" #: i2p2www/pages/site/comparison/tor.html:85 msgid "Has significant funding" @@ -692,33 +455,24 @@ msgstr "À plus de développeurs, dont plusieurs sont financés" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Plus résistant au blocage au niveau d’un État en raison de la couche " -"transport TLS et des ponts\n" -"(I2P a des propositions pour des \"routes restreintes pleines\" mais " -"celles-ci ne sont pas encore mises en Å“uvre)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Plus résistant au blocage au niveau d’un État en raison de la couche transport TLS et des ponts\n(I2P a des propositions pour des \"routes restreintes pleines\" mais celles-ci ne sont pas encore mises en Å“uvre)" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "Assez grand pour avoir dû s’adapter aux tentatives de blocage et de DOS" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Conçu et optimisé pour le trafic sortant, avec un grand nombre de nÅ“uds " -"de sortie" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Conçu et optimisé pour le trafic sortant, avec un grand nombre de nÅ“uds de sortie" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Une meilleure documentation avec des articles et des spécifications " -"formelles, un meilleur site Web, beaucoup plus de traductions" +msgstr "Une meilleure documentation avec des articles et des spécifications formelles, un meilleur site Web, beaucoup plus de traductions" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -732,17 +486,13 @@ msgstr "Les nÅ“uds client de Tor ont une très faible surcharge de la bande pass msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"Le contrôle centralisé réduit la complexité à chaque\n" -"nÅ“ud et peut répondre efficacement à des attaques Sybil" +msgstr "Le contrôle centralisé réduit la complexité à chaque\nnÅ“ud et peut répondre efficacement à des attaques Sybil" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"Un coeur de nÅ“uds à grande capacité a la possibilité de fournir un\n" -"plus haut débit tout en gardant une faible latence" +msgstr "Un coeur de nÅ“uds à grande capacité a la possibilité de fournir un\nplus haut débit tout en gardant une faible latence" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -754,11 +504,9 @@ msgstr "Avantages d’I2P sur Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide" -" que dans Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Conçu et optimisé pour les services cachés, qui sont beaucoup plus rapide que dans Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -768,25 +516,17 @@ msgstr "Entièrement distribué et auto-organisé" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Les pairs sont choisis par profilage continu et par classement de leurs " -"performances,\n" -"plutôt que de se contenter de faire confiance à la capacité qu’ils " -"revendiquent" +msgstr "Les pairs sont choisis par profilage continu et par classement de leurs performances,\nplutôt que de se contenter de faire confiance à la capacité qu’ils revendiquent" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" -msgstr "" -"Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne" -" sont pas fiables, plutôt que figés dans le code" +msgstr "Les pairs de remplissage par diffusion (serveurs annuaires) varient et ne sont pas fiables, plutôt que figés dans le code" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" -msgstr "" -"Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas " -"du tout" +msgstr "Tellement petit qu’il n’a pas été bloqué ni subi beaucoup de DOS, ou pas du tout" #: i2p2www/pages/site/comparison/tor.html:135 msgid "Peer-to-peer friendly" @@ -800,17 +540,13 @@ msgstr "Commutation de paquets à la place de commutation de circuit" msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" -msgstr "" -"équilibrage de charge transparent et implicite des messages\n" -"à travers plusieurs pairs, plutôt que par un seul chemin" +msgstr "équilibrage de charge transparent et implicite des messages\nà travers plusieurs pairs, plutôt que par un seul chemin" #: i2p2www/pages/site/comparison/tor.html:145 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" -msgstr "" -"résistance contre les défaillances, ceci par exécution de plusieurs\n" -"tunnels en parallèle, ainsi que par rotation des tunnels" +msgstr "résistance contre les défaillances, ceci par exécution de plusieurs\ntunnels en parallèle, ainsi que par rotation des tunnels" #: i2p2www/pages/site/comparison/tor.html:151 msgid "" @@ -818,21 +554,14 @@ msgid "" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" -msgstr "" -"s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\n" -"de O(N) (Alice a par exemple 2 tunnels entrants qui sont\n" -"utilisés par tous les pairs avec lesquels parle Alice,\n" -"plutôt qu’un circuit pour chaque)" +msgstr "s’adapte à l’échelle des connexions de chaque client à O(1) au lieu\nde O(N) (Alice a par exemple 2 tunnels entrants qui sont\nutilisés par tous les pairs avec lesquels parle Alice,\nplutôt qu’un circuit pour chaque)" #: i2p2www/pages/site/comparison/tor.html:161 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"Tunnels unidirectionnels au lieu de circuits\n" -"bidirectionnel, doublant le nombre de nÅ“uds qu’un\n" -"pair doit avoir à compromettre pour obtenir la même information." +msgstr "Tunnels unidirectionnels au lieu de circuits\nbidirectionnel, doublant le nombre de nÅ“uds qu’un\npair doit avoir à compromettre pour obtenir la même information." #: i2p2www/pages/site/comparison/tor.html:166 #, python-format @@ -846,11 +575,7 @@ msgid "" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" -msgstr "" -"Protection contre la détection de l’activité du client, même si un " -"assaillant participe au tunnel, puisque les tunnels ne sont pas juste " -"utilisés pour passer simplement des messages de bout en bout (p. ex. " -"BDréseau, gestion de tunnels, test de tunnels)" +msgstr "Protection contre la détection de l’activité du client, même si un assaillant participe au tunnel, puisque les tunnels ne sont pas juste utilisés pour passer simplement des messages de bout en bout (p. ex. BDréseau, gestion de tunnels, test de tunnels)" #: i2p2www/pages/site/comparison/tor.html:180 msgid "" @@ -858,19 +583,13 @@ msgid "" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." -msgstr "" -"Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le " -"nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\n" -"attaque active, contrairement aux circuits dans Tor, qui ont généralement" -" une durée de vie longue." +msgstr "Dans I2P, les tunnels ont une durée de vie courte, diminuant ainsi le nombre d’échantillons qu’un assaillant peut utiliser pour lancer une\nattaque active, contrairement aux circuits dans Tor, qui ont généralement une durée de vie longue." #: i2p2www/pages/site/comparison/tor.html:188 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." -msgstr "" -"Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité," -" tandis que SOCKS est conçu pour la fonctionnalité." +msgstr "Les API d’I2P sont conçues précisément pour assurer anonymat et sécurité, tandis que SOCKS est conçu pour la fonctionnalité." #: i2p2www/pages/site/comparison/tor.html:193 msgid "Essentially all peers participate in routing for others" @@ -881,11 +600,7 @@ msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." -msgstr "" -"Être un pair à part entière ne présente qu’une faible surcharge de bande " -"passante, alors que dans Tor, bien que les nÅ“uds client n’exigent que peu" -" de bande passante, ils ne participent pas complètement au réseau de " -"mélange." +msgstr "Être un pair à part entière ne présente qu’une faible surcharge de bande passante, alors que dans Tor, bien que les nÅ“uds client n’exigent que peu de bande passante, ils ne participent pas complètement au réseau de mélange." #: i2p2www/pages/site/comparison/tor.html:201 msgid "Integrated automatic update mechanism" @@ -905,27 +620,20 @@ msgstr "Autres avantages potentiels d’I2P, mais pas encore mis en Å“uvre" #: i2p2www/pages/site/comparison/tor.html:207 msgid "...and may never be implemented, so don't count on them!" -msgstr "" -"… et qui pourraient ne jamais être mis en Å“uvre, alors ne comptez pas sur" -" eux !" +msgstr "… et qui pourraient ne jamais être mis en Å“uvre, alors ne comptez pas sur eux !" #: i2p2www/pages/site/comparison/tor.html:210 msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" -msgstr "" -"Défense contre l’analyse du nombre de messages par enveloppement en ail\n" -"de plusieurs messages" +msgstr "Défense contre l’analyse du nombre de messages par enveloppement en ail\nde plusieurs messages" #: i2p2www/pages/site/comparison/tor.html:216 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" -msgstr "" -"Défense contre intersection long terme en ajoutant des retards\n" -"à différents sauts (où les retards ne sont pas discernables\n" -"par d’autres sauts)" +msgstr "Défense contre intersection long terme en ajoutant des retards\nà différents sauts (où les retards ne sont pas discernables\npar d’autres sauts)" #: i2p2www/pages/site/comparison/tor.html:223 msgid "" @@ -933,9 +641,4 @@ msgid "" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" -msgstr "" -"Diverses stratégies de mélange au niveau du tunnel (par exemple\n" -"créer un tunnel qui va gérer 500 messages / minute,\n" -"dans lequel le point final va injecter des messages factices si\n" -"il y a une nombre de messages insuffisant, etc)" - +msgstr "Diverses stratégies de mélange au niveau du tunnel (par exemple\ncréer un tunnel qui va gérer 500 messages / minute,\ndans lequel le point final va injecter des messages factices si\nil y a une nombre de messages insuffisant, etc)" diff --git a/i2p2www/translations/fr/LC_MESSAGES/docs.po b/i2p2www/translations/fr/LC_MESSAGES/docs.po index dd515ad826905dd9430b9ad1e2726b4cc21fe9c9..44a3e86d6ea4c9789798c12698fde60e56ff2577 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/docs.po +++ b/i2p2www/translations/fr/LC_MESSAGES/docs.po @@ -4556,7 +4556,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:72 msgid "for" -msgstr "" +msgstr "pour" #: i2p2www/pages/site/docs/applications/git.html:74 msgid "in order to obscure your local time zone." diff --git a/i2p2www/translations/fr/LC_MESSAGES/misc.po b/i2p2www/translations/fr/LC_MESSAGES/misc.po index 92ab2b3c3ce621f53237a321a572167e5f638801..1447c2973ca70c269908782353c593b1bb088484 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/misc.po +++ b/i2p2www/translations/fr/LC_MESSAGES/misc.po @@ -1,9 +1,9 @@ -# French translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# AO <ao@localizationlab.org>, 2018-2019 +# AO <ao@localizationlab.org>, 2018-2020 # AO <ao@localizationlab.org>, 2017 # Boxoa590, 2013 # Nicolas Belleau <nbbelleau@gmail.com>, 2019 @@ -11,17 +11,18 @@ # Towinet, 2014-2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2019-11-26 17:01+0000\n" -"Last-Translator: AO <ao@localizationlab.org>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: AO <ao@localizationlab.org>, 2018-2020\n" "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: fr\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -30,79 +31,39 @@ msgstr "I2P au CLT et PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Les membres d’I2P tiendront une conférence à CLT et PetCon 2009.1\n" -"Deux membres de l’équipe I2P assisteront à deux journées Linux et à une " -"conférence sur la sécurité à venir." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Les membres d’I2P tiendront une conférence à CLT et PetCon 2009.1\nDeux membres de l’équipe I2P assisteront à deux journées Linux et à une conférence sur la sécurité à venir." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"Le 14 mars 2009 il y aura une courte conférence de présentation générale " -"d’I2P lors du <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, " -"présentée par echelon.\n" -"Echelon et quelques autres membres de la famille I2P participeront à la " -"réunion Linux pendant les deux journées (samedi et dimanche) et seront " -"reconnaissables comme membres de la famille I2P. Rencontrez-les, posez-" -"leur vos questions, montrez-leur vos propositions ! Manifestez votre " -"soutien !" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "Le 14 mars 2009 il y aura une courte conférence de présentation générale d’I2P lors du <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, présentée par echelon.\nEchelon et quelques autres membres de la famille I2P participeront à la réunion Linux pendant les deux journées (samedi et dimanche) et seront reconnaissables comme membres de la famille I2P. Rencontrez-les, posez-leur vos questions, montrez-leur vos propositions ! Manifestez votre soutien !" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"Seulement 10 jours plus tard, le <a href=\"%(petcon)s\">congrès sur la " -"protection et la sécurité des données</a> aura lieu à Dresden.\n" -"Encore une fois, echelon participera à cet événement et donnera une brève" -" présentation générale d’I2P. Un autre exposé sur le profilage par les " -"clients I2P aura lieu." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "Seulement 10 jours plus tard, le <a href=\"%(petcon)s\">congrès sur la protection et la sécurité des données</a> aura lieu à Dresden.\nEncore une fois, echelon participera à cet événement et donnera une brève présentation générale d’I2P. Un autre exposé sur le profilage par les clients I2P aura lieu." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"Le code source d’I2P était conservé dans un dépôt CVS. De nos jours, il " -"est conservé dans un dépôt <a href=\"%(monotone)s\">Monotone</a>.\n" -"Pour ceux qui ne connaissent pas très bien CVS, il existe un <a " -"href=\"http://cvsbook.red-bean.com/cvsbook.html\">livre fantastique</a> " -"(en anglais) sur le sujet (les développeurs ne devront s’intéresser qu’au" -" premier chapitre « An overview of CVS », car les chapitres suivants " -"entrent dans de vilains détails, qui intéresseront peu de monde)." +msgstr "Le code source d’I2P était conservé dans un dépôt CVS. De nos jours, il est conservé dans un dépôt <a href=\"%(monotone)s\">Monotone</a>.\nPour ceux qui ne connaissent pas très bien CVS, il existe un <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">livre fantastique</a> (en anglais) sur le sujet (les développeurs ne devront s’intéresser qu’au premier chapitre « An overview of CVS », car les chapitres suivants entrent dans de vilains détails, qui intéresseront peu de monde)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Citation humoristique de WinCVS : « Le saviez-vous ? N’expérimentez " -"jamais de nouvelles commandes CVS sur votre dépôt de travail. Créez " -"plutôt un module d’entraînement. »" +msgstr "Citation humoristique de WinCVS : « Le saviez-vous ? N’expérimentez jamais de nouvelles commandes CVS sur votre dépôt de travail. Créez plutôt un module d’entraînement. »" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -113,14 +74,9 @@ msgstr "Migration d’I2PTunnel" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" -"Après mise à niveau vers la nouvelle architecture, vous aurez un peu de " -"travail pour mettre en fonction vos anciens serveurs propulsée par " -"I2PTunnel.\n" -"Prenons un exemple simple. Pour un site eep avec l’ancienne configuration" -" clientApp, vous aviez :" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16 msgid "To provide that same functionality on the new web architecture:" @@ -136,12 +92,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "Cliquez sur Ajouter : [tunnel serveur] « Aller »" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Pour le nom : <code>« site eep »</code>" +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Pour la description : <code>« Mon site eep, n’est-il pas beau ? »</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -155,10 +111,7 @@ msgstr "Pour le port cible :" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Pour le fichier de clé privée : <code>chemin vers " -"« monWebPriv.dat »</code><br />(il est recommandé de copier ce .dat vers " -"votre nouveau répertoire d’installation)" +msgstr "Pour le fichier de clé privée : <code>chemin vers « monWebPriv.dat »</code><br />(il est recommandé de copier ce .dat vers votre nouveau répertoire d’installation)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -174,14 +127,10 @@ msgstr "Vous obtiendrez :" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" msgstr "" @@ -199,7 +148,7 @@ msgid "I2PTunnel services" msgstr "Services d’I2PTunnel" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 @@ -215,23 +164,23 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 @@ -244,8 +193,8 @@ msgstr "" msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 @@ -260,28 +209,28 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 @@ -304,9 +253,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 @@ -317,27 +266,27 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 @@ -346,9 +295,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 @@ -373,9 +322,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 @@ -393,9 +342,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 @@ -429,45 +378,42 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"Ce qu’il y a de bien avec I2P, c’est qu’elle permet, pour la plupart des " -"protocoles, aux clients et serveurs Internet normaux d’être tunnellisés " -"de manière transparente par le réseau anonyme." +msgstr "Ce qu’il y a de bien avec I2P, c’est qu’elle permet, pour la plupart des protocoles, aux clients et serveurs Internet normaux d’être tunnellisés de manière transparente par le réseau anonyme." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 @@ -499,11 +445,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 @@ -514,25 +459,25 @@ msgstr "" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 @@ -541,8 +486,8 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 @@ -551,8 +496,8 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 @@ -563,16 +508,16 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." msgstr "" #: i2p2www/pages/site/misc/invisiblenet.html:2 @@ -581,13 +526,11 @@ msgstr "" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." +"However, the I2CP and I2NP documents in particular have some good information." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:3 @@ -600,8 +543,7 @@ msgstr "Vue d’ensemble" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." msgstr "" @@ -615,18 +557,15 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" @@ -640,8 +579,7 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." msgstr "" @@ -652,31 +590,25 @@ msgstr "Exigences" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " +"The required code is available in monotone database and the latest source " +"tarball. " msgstr "" #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." msgstr "" @@ -687,20 +619,13 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" -msgstr "" -"Vous trouverez les informations sur votre environnement d’exécution sur " -"<a href=\"http://localhost:7657/logs.jsp\">la page logs.jsp</a>.\n" -"Il devrait y avoir un message d’état pour JBigI sur deux possibilités. " -"Soit" +msgstr "Vous trouverez les informations sur votre environnement d’exécution sur <a href=\"http://localhost:7657/logs.jsp\">la page logs.jsp</a>.\nIl devrait y avoir un message d’état pour JBigI sur deux possibilités. Soit" #: i2p2www/pages/site/misc/jbigi.html:66 msgid "Locally optimized native BigInteger loaded from the library path" -msgstr "" -"BigInteger natif optimisé localement a été chargé du chemin de la " -"bibliothèque" +msgstr "BigInteger natif optimisé localement a été chargé du chemin de la bibliothèque" #: i2p2www/pages/site/misc/jbigi.html:68 msgid "or" @@ -708,9 +633,7 @@ msgstr "soit" #: i2p2www/pages/site/misc/jbigi.html:70 msgid "Native BigInteger library jbigi not loaded - using pure java" -msgstr "" -"La bibliothèque native BigInteger JBigI n’a pas été à chargée. " -"Utilisation de Java pur" +msgstr "La bibliothèque native BigInteger JBigI n’a pas été à chargée. Utilisation de Java pur" #: i2p2www/pages/site/misc/jbigi.html:71 msgid "" @@ -724,27 +647,20 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" msgstr "" @@ -758,18 +674,14 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." msgstr "" @@ -777,17 +689,13 @@ msgstr "" msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." msgstr "" @@ -815,11 +723,8 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." msgstr "" @@ -829,43 +734,28 @@ msgstr "Annonce de Jrandom" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"Le message ci-dessous a été reçu à la mi-novembre 2007. Nous n’avons " -"aucune information complémentaire concernant l’état de jrandom." +msgstr "Le message ci-dessous a été reçu à la mi-novembre 2007. Nous n’avons aucune information complémentaire concernant l’état de jrandom." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" "and related subdomains." -msgstr "" -"Par la suite, lors d’un incident distinct, l’entreprise d’hébergement de " -"tous les serveurs *.i2p.net (sauf le forum i2p.net) a subi une coupure de" -" courant le 13 janvier 2008 et les serveurs i2p.net n’ont pas " -"complètement été remis en service.\n" -"Comme seul jrandom avait les identifiants exigés pour restaurer le " -"service et qu’il ne pouvait pas être contacté, nous avons déménagé tous " -"les services publics vers <a href=\"%(site)s\">www.i2p2.de</a> et les " -"sous-domaines connexes." +msgstr "Par la suite, lors d’un incident distinct, l’entreprise d’hébergement de tous les serveurs *.i2p.net (sauf le forum i2p.net) a subi une coupure de courant le 13 janvier 2008 et les serveurs i2p.net n’ont pas complètement été remis en service.\nComme seul jrandom avait les identifiants exigés pour restaurer le service et qu’il ne pouvait pas être contacté, nous avons déménagé tous les services publics vers <a href=\"%(site)s\">www.i2p2.de</a> et les sous-domaines connexes." #: i2p2www/pages/site/misc/jrandom-awol.html:19 #, python-format msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"Environ deux mois plus tard, pour des raisons distinctes, le " -"forum i2p.net a été déménagé vers <a " -"href=\"http://%(forum)s/\">%(forum)s</a>." +msgstr "Environ deux mois plus tard, pour des raisons distinctes, le forum i2p.net a été déménagé vers <a href=\"http://%(forum)s/\">%(forum)s</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -875,33 +765,24 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." msgstr "" @@ -910,7 +791,8 @@ msgid "Using existing binaries" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -926,8 +808,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:43 @@ -936,16 +818,15 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:49 @@ -954,8 +835,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:54 @@ -994,191 +875,110 @@ msgstr "" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" msgstr "" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." msgstr "" #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." msgstr "" #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" msgstr "" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" msgstr "" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." -msgstr "" -"Depuis déjà quelques mois, il y a eu des discussions au sujet d’une " -"application distribuée de blogage appelée « MyI2P ». Bien que les " -"discussions originales aient été perdues, nous avons réussi à en " -"récupérer une version dans le <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de " -"Google. Ce n’est pas très beau, mais inclut un aperçu de base et " -"certaines discussions qui s’ensuivirent." +msgstr "Depuis déjà quelques mois, il y a eu des discussions au sujet d’une application distribuée de blogage appelée « MyI2P ». Bien que les discussions originales aient été perdues, nous avons réussi à en récupérer une version dans le <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> de Google. Ce n’est pas très beau, mais inclut un aperçu de base et certaines discussions qui s’ensuivirent." #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." -msgstr "" -"L’application même n’est pas encore mise en Å“uvre et les idées qui sous-" -"tendent sa conception sont devenues moins ambitieuses au fil du temps. " -"Elles sont cependant encore valides et le <a " -"href=\"%(roadmap)s\">plan</a> actuel prévoit que la fonctionnalité " -"principale MyI2P soit proposée en parallèle à la version 1.0 d’I2P. Un " -"carnet d’adresses distribué sera inclus afin de permettre un adressage " -"sécurisé, distribué et interprétable par l’utilisateur en sacrifiant le " -"besoin d’unicité globale. Essentiellement, tout le monde aura son propre " -"carnet d’adresses local et pourra « s’abonner » aux carnets d’adresses " -"d’autrui, en laissant MyI2P récupérer périodiquement les mappages des " -"nouveaux noms vers les destinations (en laissant la résolution des " -"conflits à l’utilisateur). En plus du carnet d’adresses, il y aura un " -"système de blogage distribué utilisant un sous-ensemble réduit et " -"sécurisé de <a " -"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> afin " -"d’offrir essentiellement un <a " -"href=\"http://www.livejournal.com/\">« LiveJournal »</a> anonyme avec une" -" liste d’amis et un contrôle d’accès transparent authentifié par les <a " -"href=\"%(datagrams)s\">datagrammes</a> d’I2P avec des règles définies " -"d’après le carnet d’adresses." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." +msgstr "L’application même n’est pas encore mise en Å“uvre et les idées qui sous-tendent sa conception sont devenues moins ambitieuses au fil du temps. Elles sont cependant encore valides et le <a href=\"%(roadmap)s\">plan</a> actuel prévoit que la fonctionnalité principale MyI2P soit proposée en parallèle à la version 1.0 d’I2P. Un carnet d’adresses distribué sera inclus afin de permettre un adréessage sécurisé, distribué et interprétable par l’utilisateur en sacrifiant le besoin d’unicité globale. Essentiellement, tout le monde aura son propre carnet d’adresses local et pourra « s’abonner » aux carnets d’adresses d’autrui, en laissant MyI2P récupérer périodiquement les mappages des nouveaux noms vers les destinations (en laissant la résolution des conflits à l’utilisateur). En plus du carnet d’adresses, il y aura un système de blogage distribué utilisant un sous-ensemble réduit et sécurisé de <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> afin d’offrir essentiellement un <a href=\"http://www.livejournal.com/\">« LiveJournal »</a> anonyme avec une liste d’amis et un contrôle d’accès transparent authentifié par les <a href=\"%(datagrams)s\">datagrammes</a> d’I2P avec des règles définies d’après le carnet d’adresses." #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." msgstr "" @@ -1193,8 +993,8 @@ msgstr "" #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" msgstr "" #: i2p2www/pages/site/misc/ratestats.html:10 @@ -1209,27 +1009,15 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"Le code source d’I2P est conservé sur plusieurs dépôts Monotone.\n" -"Consultez le <a href=\"http://www.monotone.ca/\">site web de Monotone</a>" -" pour obtenir des renseignements sur Monotone.\n" -"Consultez <a href=\"http://%(forum)s/viewtopic.php?t=2524\">cette article" -" de forum au sujet d’i2p monotone</a> pour obtenir de plus amples " -"renseignements sur la façon de débuter et de vérifier la source " -"anonymement.\n" -"Un guide de démarrage se trouve aussi sur la <a href=\"%(newdevs)s\">page" -" du nouveau développeur</a>." +msgstr "Le code source d’I2P est conservé sur plusieurs dépôts Monotone.\nConsultez le <a href=\"http://www.monotone.ca/\">site Web de Monotone</a> pour obtenir des renseignements sur Monotone.\nConsultez <a href=\"http://%(forum)s/viewtopic.php?t=2524\">cette article de forum au sujet d’i2p monotone</a> pour obtenir de plus amples renseignements sur la façon de débuter et de vérifier la source anonymement.\nUn guide de démarrage se trouve aussi sur la <a href=\"%(newdevs)s\">page du nouveau développeur</a>." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." msgstr "" @@ -1258,24 +1046,20 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." @@ -1288,8 +1072,8 @@ msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 @@ -1311,8 +1095,7 @@ msgstr "Cliquez sur « Appliquer »" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." msgstr "" @@ -1321,7 +1104,5 @@ msgstr "" msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." +"Thank you for your support during this transition. For help please contact us on #i2p." msgstr "" - diff --git a/i2p2www/translations/fr/LC_MESSAGES/research.po b/i2p2www/translations/fr/LC_MESSAGES/research.po index c464621ac19406aa9d97256c55a0b2553c7a74e4..7d728c67eba64fb87b9eb42991583977fe65004d 100644 --- a/i2p2www/translations/fr/LC_MESSAGES/research.po +++ b/i2p2www/translations/fr/LC_MESSAGES/research.po @@ -1,7 +1,7 @@ -# French translations for I2P. -# Copyright (C) 2019 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # AO <ao@localizationlab.org>, 2017 # Boxoa590, 2013 @@ -11,17 +11,18 @@ # Towinet, 2013-2014,2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-06-24 13:48+0000\n" -"PO-Revision-Date: 2019-04-25 20:10+0000\n" -"Last-Translator: AO <ao@localizationlab.org>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:01+0000\n" +"Last-Translator: AO <ao@localizationlab.org>, 2017\n" "Language-Team: French (http://www.transifex.com/otf/I2P/language/fr/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: fr\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -42,16 +43,11 @@ msgstr "" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." msgstr "" @@ -59,48 +55,27 @@ msgstr "" #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" -msgstr "" -"\n" -"Il y a une large communauté de recherche examinant une vaste gamme des " -"aspects de\n" -"l’anonymat. Pour une liste actuelle et compréhensive des papiers " -"pertinents, voir la\n" -"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P bénéficie d’une grande partie de la recherche faite dans Tor et le " -"routage en oignon, mais il y a\n" -"peu d’intérêt en recherche consacrée à la théorie derrière I2P, et les " -"choix\n" -"et différences que le réseau fait. Cela présente une occasion unique pour" -" \n" -"de la recherche originale.\n" +msgstr "\nIl y a une large communauté de recherche examinant une vaste gamme des aspects de\nl’anonymat. Pour une liste actuelle et compréhensive des papiers pertinents, voir la\n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P bénéficie d’une grande partie de la recherche faite dans Tor et le routage en oignon, mais il y a\npeu d’intérêt en recherche consacrée à la théorie derrière I2P, et les choix\net différences que le réseau fait. Cela présente une occasion unique pour \nde la recherche originale.\n" #: i2p2www/pages/site/research/index.html:29 #, python-format msgid "" "A list of known published papers about I2P is available <a " "href=\"%(papers)s\">here</a>." -msgstr "" -"Une liste des articles publiés connus sur I2P est proposée <a " -"href=\"%(papers)s\">ici</a>." +msgstr "Une liste des articles publiés connus sur I2P est proposée <a href=\"%(papers)s\">ici</a>." #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" msgstr "" @@ -114,16 +89,12 @@ msgstr "" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" @@ -134,27 +105,17 @@ msgstr "" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"<b>please</b> \n" -"<a href=\"%(contact)s\">communicate your ideas</a> to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to <b>please</b> \n" +"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" @@ -170,13 +131,11 @@ msgstr "" msgid "" "<ol>\n" " <li>\n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" " </li>\n" " <li>\n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" " </li>\n" " <li>\n" @@ -184,10 +143,8 @@ msgid "" " collecting data about yourself\n" " </li>\n" " <li>\n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" " </li>\n" " <li>\n" @@ -195,10 +152,8 @@ msgid "" " publication and collect as little as possible\n" " </li>\n" " <li>\n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is <b><i>not</i></b> intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is <b><i>not</i></b> intended to be private by the\n" " originator\n" " </li>\n" "</ol>" @@ -210,32 +165,24 @@ msgstr "" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n" "router.config before starting." msgstr "" @@ -246,13 +193,10 @@ msgstr "" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please <a " -"href=\"%(contact)s\">contact\n" +"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n" " us</a> before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -262,35 +206,23 @@ msgstr "Configuration d’une famille de routeurs" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -342,59 +274,67 @@ msgstr "" msgid "Vulnerability Response Process" msgstr "" -#: i2p2www/pages/site/research/vrp.html:3 -msgid "January 2017" -msgstr "Janvier 2017" - #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." +"This process is subject to change. Please refer to this page for the current VRP." msgstr "" #: i2p2www/pages/site/research/vrp.html:10 +msgid "This page was last updated in June 2020." +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:12 +msgid "" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" +"centers" +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:15 +msgid "" +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internetâ€) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:18 msgid "Point of Contact for Security Issues" msgstr "" -#: i2p2www/pages/site/research/vrp.html:14 +#: i2p2www/pages/site/research/vrp.html:22 msgid "Security Response Team" msgstr "" -#: i2p2www/pages/site/research/vrp.html:16 -msgid "Only the following members have access to the security point of contact:" +#: i2p2www/pages/site/research/vrp.html:24 +msgid "" +"Echelon is the trusted security point-of-contact. He forwards e-mails to " +"team members as appropriate." msgstr "" -#: i2p2www/pages/site/research/vrp.html:25 +#: i2p2www/pages/site/research/vrp.html:28 msgid "Incident Response" msgstr "" -#: i2p2www/pages/site/research/vrp.html:28 -msgid "Researcher submits report via one or both of two methods:" +#: i2p2www/pages/site/research/vrp.html:31 +msgid "Researcher submits report via:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:32 -msgid "Email" -msgstr "Courriel" - #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." msgstr "" #: i2p2www/pages/site/research/vrp.html:42 #, python-format msgid "" -"In no more than %(limit)s working days, Response Team should gratefully\n" +"In no more than %(limit)s working days, Response Team should\n" "respond to researcher using only encrypted methods." msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." msgstr "" @@ -414,369 +354,357 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." msgstr "" #: i2p2www/pages/site/research/vrp.html:70 msgid "" -"If over email, Response Manager opens a HackerOne issue for new " -"submission." -msgstr "" - -#: i2p2www/pages/site/research/vrp.html:74 -msgid "" "\n" "Establish severity of vulnerability:\n" " " msgstr "" -#: i2p2www/pages/site/research/vrp.html:79 +#: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Effects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." msgstr "" -#: i2p2www/pages/site/research/vrp.html:83 -msgid "Effects individual routers, or must be carefully exploited." +#: i2p2www/pages/site/research/vrp.html:79 +msgid "Affects individual routers, or must be carefully exploited." msgstr "" -#: i2p2www/pages/site/research/vrp.html:87 +#: i2p2www/pages/site/research/vrp.html:83 msgid "Is not easily exploitable." msgstr "N’est pas facilement exploitable." -#: i2p2www/pages/site/research/vrp.html:93 +#: i2p2www/pages/site/research/vrp.html:89 msgid "Respond according to the severity of the vulnerability:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:97 +#: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." msgstr "" -#: i2p2www/pages/site/research/vrp.html:102 -msgid "The notification should list appropriate steps for users to take, if any." +#: i2p2www/pages/site/research/vrp.html:98 +msgid "" +"The notification should list appropriate steps for users to take, if any." msgstr "" -#: i2p2www/pages/site/research/vrp.html:105 +#: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." msgstr "" -#: i2p2www/pages/site/research/vrp.html:109 +#: i2p2www/pages/site/research/vrp.html:105 msgid "The latter takes precedence over the former." msgstr "" -#: i2p2www/pages/site/research/vrp.html:113 +#: i2p2www/pages/site/research/vrp.html:109 msgid "MEDIUM and HIGH severities will require a Point Release." msgstr "" -#: i2p2www/pages/site/research/vrp.html:116 +#: i2p2www/pages/site/research/vrp.html:112 msgid "LOW severities will be addressed in the next Regular Release." msgstr "" -#: i2p2www/pages/site/research/vrp.html:122 +#: i2p2www/pages/site/research/vrp.html:118 msgid "Response Team applies appropriate patch(es)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:126 +#: i2p2www/pages/site/research/vrp.html:122 msgid "" -"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work " -"in." +"Response Manager works on a patch LOCALLY, patches are shared by the " +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" -#: i2p2www/pages/site/research/vrp.html:129 +#: i2p2www/pages/site/research/vrp.html:125 msgid "Patches are reviewed with the researcher." msgstr "" -#: i2p2www/pages/site/research/vrp.html:132 +#: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." msgstr "" -#: i2p2www/pages/site/research/vrp.html:136 +#: i2p2www/pages/site/research/vrp.html:132 msgid "Vulnerability announcement is drafted." msgstr "" -#: i2p2www/pages/site/research/vrp.html:140 +#: i2p2www/pages/site/research/vrp.html:136 msgid "Include severity of vulnerability." msgstr "" -#: i2p2www/pages/site/research/vrp.html:143 +#: i2p2www/pages/site/research/vrp.html:139 msgid "Include systems/apps effected." msgstr "" -#: i2p2www/pages/site/research/vrp.html:146 +#: i2p2www/pages/site/research/vrp.html:142 msgid "Include solutions (if any) if patch cannot be applied." msgstr "" -#: i2p2www/pages/site/research/vrp.html:150 +#: i2p2www/pages/site/research/vrp.html:146 msgid "Release date is discussed." msgstr "" -#: i2p2www/pages/site/research/vrp.html:156 +#: i2p2www/pages/site/research/vrp.html:152 msgid "" "At release date, Response Team coordinates with developers to finalize " "update:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:160 +#: i2p2www/pages/site/research/vrp.html:156 msgid "Response Manager propagates the \"hotfix branch\" to trunk." msgstr "" -#: i2p2www/pages/site/research/vrp.html:163 +#: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." +"Response Manager includes vulnerability announcement draft in release notes." msgstr "" -#: i2p2www/pages/site/research/vrp.html:166 -msgid "Proceed with the Point or Regular Release." +#: i2p2www/pages/site/research/vrp.html:162 +msgid "" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" +"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" -#: i2p2www/pages/site/research/vrp.html:173 +#: i2p2www/pages/site/research/vrp.html:172 msgid "Post-release Disclosure Process" msgstr "" -#: i2p2www/pages/site/research/vrp.html:176 +#: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." msgstr "" -#: i2p2www/pages/site/research/vrp.html:180 -msgid "If the Incident Response process in section III is successfully completed:" +#: i2p2www/pages/site/research/vrp.html:179 +msgid "" +"If the Incident Response process in section III is successfully completed:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:184 +#: i2p2www/pages/site/research/vrp.html:183 msgid "" "Response Manager contacts researcher and asks if researcher wishes for " "credit." msgstr "" -#: i2p2www/pages/site/research/vrp.html:187 +#: i2p2www/pages/site/research/vrp.html:186 msgid "Finalize vulnerability announcement draft and include the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:191 +#: i2p2www/pages/site/research/vrp.html:190 msgid "Project name and URL." msgstr "Nom du projet et URL." -#: i2p2www/pages/site/research/vrp.html:194 +#: i2p2www/pages/site/research/vrp.html:193 msgid "Versions known to be affected." msgstr "" -#: i2p2www/pages/site/research/vrp.html:197 +#: i2p2www/pages/site/research/vrp.html:196 msgid "" "Versions known to be not affected (for example, the vulnerable code was " "introduced in a recent version, and older versions are therefore " "unaffected)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:200 +#: i2p2www/pages/site/research/vrp.html:199 msgid "Versions not checked." msgstr "" -#: i2p2www/pages/site/research/vrp.html:203 +#: i2p2www/pages/site/research/vrp.html:202 msgid "Type of vulnerability and its impact." msgstr "" -#: i2p2www/pages/site/research/vrp.html:206 +#: i2p2www/pages/site/research/vrp.html:205 msgid "If already obtained or applicable, a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:209 +#: i2p2www/pages/site/research/vrp.html:208 msgid "The planned, coordinated release date." msgstr "" -#: i2p2www/pages/site/research/vrp.html:212 +#: i2p2www/pages/site/research/vrp.html:211 msgid "" "Mitigating factors (for example, the vulnerability is only exposed in " "uncommon, non-default configurations)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:215 +#: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:218 +#: i2p2www/pages/site/research/vrp.html:217 msgid "If applicable, credits to the original reporter." msgstr "" -#: i2p2www/pages/site/research/vrp.html:223 -msgid "Release finalized vulnerability announcement on website and in news feed." +#: i2p2www/pages/site/research/vrp.html:222 +msgid "" +"Release finalized vulnerability announcement on website and in news feed." msgstr "" -#: i2p2www/pages/site/research/vrp.html:226 +#: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:234 +#: i2p2www/pages/site/research/vrp.html:238 msgid "If applicable, developers request a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:238 +#: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:246 +#: i2p2www/pages/site/research/vrp.html:250 msgid "" "If the Incident Response process in section III is *not* successfully " "completed:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:250 +#: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." msgstr "" -#: i2p2www/pages/site/research/vrp.html:255 +#: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." msgstr "" -#: i2p2www/pages/site/research/vrp.html:259 +#: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." msgstr "" -#: i2p2www/pages/site/research/vrp.html:264 +#: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." msgstr "" -#: i2p2www/pages/site/research/vrp.html:273 +#: i2p2www/pages/site/research/vrp.html:277 msgid "Incident Analysis" msgstr "" -#: i2p2www/pages/site/research/vrp.html:276 +#: i2p2www/pages/site/research/vrp.html:280 msgid "Isolate codebase" msgstr "" -#: i2p2www/pages/site/research/vrp.html:278 -#: i2p2www/pages/site/research/vrp.html:298 -msgid "Response Team and developers should coordinate to work on the following:" +#: i2p2www/pages/site/research/vrp.html:282 +#: i2p2www/pages/site/research/vrp.html:302 +msgid "" +"Response Team and developers should coordinate to work on the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:282 +#: i2p2www/pages/site/research/vrp.html:286 msgid "Problematic implementation of classes/libraries/functions, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:285 +#: i2p2www/pages/site/research/vrp.html:289 msgid "Focus on apps/distro packaging, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:288 +#: i2p2www/pages/site/research/vrp.html:292 msgid "Operator/config error, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:296 +#: i2p2www/pages/site/research/vrp.html:300 msgid "Auditing" msgstr "" -#: i2p2www/pages/site/research/vrp.html:302 +#: i2p2www/pages/site/research/vrp.html:306 msgid "Auditing of problem area(s) as discussed in point 1." msgstr "" -#: i2p2www/pages/site/research/vrp.html:305 +#: i2p2www/pages/site/research/vrp.html:309 msgid "Generate internal reports and store for future reference." msgstr "" -#: i2p2www/pages/site/research/vrp.html:308 +#: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." +"If results are not sensitive, share with the public via IRC or public Trac." msgstr "" -#: i2p2www/pages/site/research/vrp.html:316 +#: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." msgstr "" -#: i2p2www/pages/site/research/vrp.html:322 +#: i2p2www/pages/site/research/vrp.html:326 msgid "Resolutions" msgstr "" -#: i2p2www/pages/site/research/vrp.html:324 +#: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:338 +#: i2p2www/pages/site/research/vrp.html:341 msgid "Continuous Improvement" msgstr "" -#: i2p2www/pages/site/research/vrp.html:341 +#: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:346 +#: i2p2www/pages/site/research/vrp.html:349 msgid "" "Response Team or designated person(s) should give a brief presentation, " "including:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:350 +#: i2p2www/pages/site/research/vrp.html:353 msgid "Areas of I2P affected by the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:353 +#: i2p2www/pages/site/research/vrp.html:356 msgid "Any network downtime or monetary cost (if any) of the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:356 +#: i2p2www/pages/site/research/vrp.html:359 msgid "Ways in which the incidents could have been avoided (if any)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:359 +#: i2p2www/pages/site/research/vrp.html:362 msgid "How effective this process was in dealing with the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:365 +#: i2p2www/pages/site/research/vrp.html:368 msgid "After the presentation, Response Team and developers should discuss:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:369 +#: i2p2www/pages/site/research/vrp.html:372 msgid "Potential changes to development processes to reduce future incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:372 +#: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "" - diff --git a/i2p2www/translations/gl/LC_MESSAGES/about.po b/i2p2www/translations/gl/LC_MESSAGES/about.po index 2dedb2709a638d0aa6e07e956bf28da23c35b23a..d67849323877b541e410f4ed085a7a6fd71930d4 100644 --- a/i2p2www/translations/gl/LC_MESSAGES/about.po +++ b/i2p2www/translations/gl/LC_MESSAGES/about.po @@ -1,21 +1,22 @@ -# Galician translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:26+0000\n" -"PO-Revision-Date: 2021-10-11 16:29+0000\n" -"Last-Translator: zzzi2p\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: gl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -25,8 +26,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -49,8 +49,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -70,18 +69,15 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:9 msgid "" "I2P: Invisible Internet Project: a project meant to\n" -" provide an anonymity layer, so user can communicate anonymously " -"using a\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" " range of applications." msgstr "" #: i2p2www/pages/site/about/glossary.html:12 msgid "" "Router: The core I2P software, which routes encrypted\n" -" packets on the I2P network. All routers by default participate in" -" the\n" -" network, which both helps the network and provides cover traffic " -"for any\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" " clients or servers connecting to the I2P network through the\n" " router." msgstr "" @@ -89,26 +85,22 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:17 msgid "" "RouterIdentity: A collection of information required to\n" -" communicate directly with a router, such as its IP address and " -"listening\n" +" communicate directly with a router, such as its IP address and listening\n" " port, public signing and encryption keys etc." msgstr "" #: i2p2www/pages/site/about/glossary.html:20 msgid "" "Tunnel: An anonymous communication pathway between a\n" -" client or server and the I2P network. Tunnels are unidirectional," -" so any\n" -" one client or server must have at least two Tunnels - one for " -"inbound\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" " traffic and one for outbound traffic." msgstr "" #: i2p2www/pages/site/about/glossary.html:24 msgid "" "Destination: The cryptographic identity of a tunnel.\n" -" These are the identities of clients and servers within the I2P " -"network,\n" +" These are the identities of clients and servers within the I2P network,\n" " and are analogous to the IP:port of a computer on the normal\n" " internet." msgstr "" @@ -116,39 +108,32 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:28 msgid "" "LeaseSet: A collection of information required to\n" -" communicate with a client or server at a particular Destination, " -"such as\n" +" communicate with a client or server at a particular Destination, such as\n" " the gateways of the inbound Tunnels for that\n" " Destination." msgstr "" #: i2p2www/pages/site/about/glossary.html:34 msgid "" -"This table lists definition of different networks and their components. " -"These\n" +"This table lists definition of different networks and their components. These\n" "terms and the definitions provided are taken from\n" -"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization" -" Off The\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" "Shelf: 7 Maxims by Simply Secure</a>(used with permission)." msgstr "" #: i2p2www/pages/site/about/glossary.html:40 msgid "" "Decentralization: Network architecture that avoids\n" -" reliance on a single party. Encompasses peer-to-peer, blockchain," -"\n" -" federated, and distributed technologies that involve many " -"individual\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" " users." msgstr "" #: i2p2www/pages/site/about/glossary.html:44 msgid "" "Peer-to-Peer (p2p): Peers make a portion of their \n" -" resources, such as processing power, disk storage or network " -"bandwidth,\n" -" directly available to other network participants, without the " -"need for\n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" " central coordination by servers or stable hosts. Popularized by\n" " BitTorrent, Napster, and Bitcoin." msgstr "" @@ -156,32 +141,25 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:49 msgid "" "Federated: Federation allows separate deployments of a\n" -" service to communicate with each other through a common protocol," -" for\n" -" instance a mail server run by Google federates with a mail server" -" run by\n" -" Microsoft when you send an email from @gmail.com to @hotmail.com." -"\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" " Each deployment may host multiple users." msgstr "" #: i2p2www/pages/site/about/glossary.html:54 msgid "" "Blockchain: A distributed ledger that can record\n" -" transactions between multiple parties efficiently and in a " -"verifiable\n" +" transactions between multiple parties efficiently and in a verifiable\n" " and permanent way." msgstr "" #: i2p2www/pages/site/about/glossary.html:57 msgid "" "Distributed systems: Academic topic within the\n" -" discipline of Computer Science which is concerned with the design" -" of\n" -" computer systems that consist of many individual computers " -"connected\n" -" over a network. Peer-to-peer networks and blockchains are " -"examples of\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" " distributed systems architectures." msgstr "" @@ -195,8 +173,7 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:65 msgid "" "DHT: Distributed hash table, used in some projects to\n" -" connect peers to each other by storing information in the form of" -"\n" +" connect peers to each other by storing information in the form of\n" " key-value pairs in a distributed manner." msgstr "" @@ -216,16 +193,14 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:73 msgid "" "Hash: A number, usually displayed as a string of letters\n" -" and numbers. It can serve as a ‘fingerprint’ uniquely identifying" -"\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" " data." msgstr "" #: i2p2www/pages/site/about/glossary.html:76 msgid "" "UX: User experience, the overall experience of a person\n" -" using a product or a service, especially in terms of how easy it " -"is to\n" +" using a product or a service, especially in terms of how easy it is to\n" " use." msgstr "" @@ -235,14 +210,10 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -252,15 +223,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -274,12 +244,8 @@ msgstr "O Proxecto da Internet Invisible" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -289,13 +255,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -304,15 +270,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -321,28 +287,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -351,36 +316,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -389,13 +353,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -404,15 +368,11 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -431,9 +391,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -490,8 +449,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -510,8 +468,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -520,8 +477,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -534,8 +490,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -544,8 +499,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -553,8 +508,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -569,15 +523,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -589,8 +541,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -645,16 +596,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -663,11 +612,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -720,16 +667,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -745,12 +690,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -764,35 +706,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -801,16 +737,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -827,8 +761,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" @@ -838,29 +771,20 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:4 msgid "" -"This implementation of I2P (the Java implementation distributed on this " -"site)\n" -"includes a \"Strict Countries List\" which we use to decide how routers " -"should behave \n" -"within regions where applications like I2P may be limited by law. For " -"example, while\n" -"no countries that we know of prohibit using I2P, some have broad " -"prohibitions on\n" -"participating in routing for others. Routers that appear to be in the " -"\"Strict\"\n" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" "countries will automatically be placed into \"Hidden\" mode." msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:11 msgid "" -"The Project relies on the research provided by civil and digital rights " -"organizations in order\n" -"to make decisions that offer protections for its users. In this case the " -"ongoing research\n" -"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has " -"been referenced. General\n" -"guidance is to include countries with a Civil Liberties (CL) score of 16 " -"or less or an Internet\n" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" "Freedom score of 39 or less (not free)." msgstr "" @@ -870,16 +794,11 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:19 msgid "" -"When a router is placed into hidden mode, three key things change about " -"it's behavior.\n" -"It will no longer publish a routerInfo to the NetDB, it will no longer " -"accept\n" -"participating tunnels, and it will reject direct connections to routers " -"in the same\n" -"country that it is in. These defenses make the routers more difficult to " -"enumerate\n" -"reliably, and prevent them from running afoul of restrictions on routing " -"traffic for\n" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" "others." msgstr "" @@ -901,18 +820,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -923,84 +839,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1011,8 +904,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1020,27 +912,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1048,26 +936,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1078,10 +957,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1089,18 +966,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1111,10 +985,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1286,7 +1158,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1526,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1576,32 +1450,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1619,8 +1486,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1659,10 +1526,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1676,15 +1541,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1693,11 +1554,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1752,8 +1610,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1771,15 +1628,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1798,14 +1651,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1816,20 +1665,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1840,24 +1682,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1877,33 +1710,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1916,32 +1740,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1951,27 +1767,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1988,17 +1796,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -2011,8 +1816,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -2023,10 +1827,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -2045,30 +1847,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2082,55 +1877,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -2141,20 +1921,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2165,16 +1938,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -2184,17 +1952,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2205,20 +1970,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2232,26 +1990,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2260,18 +2008,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2279,16 +2021,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2304,52 +2041,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2364,102 +2082,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2472,4 +2149,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/gl/LC_MESSAGES/get-involved.po b/i2p2www/translations/gl/LC_MESSAGES/get-involved.po index 9ba9dcfd2a9b157ef6cb0874be1d4837ffcd2eaa..4502a0ef5529d34fa1d290358a50362cbaec2308 100644 --- a/i2p2www/translations/gl/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/gl/LC_MESSAGES/get-involved.po @@ -1,22 +1,23 @@ -# Galician translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Uberius Crypto <uberius@anonymail.tech>, 2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: zzzi2p\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Uberius Crypto <uberius@anonymail.tech>, 2016\n" "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: gl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +32,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +49,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +114,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +145,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +161,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +195,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +209,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +222,8 @@ msgstr "Tradución" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +234,12 @@ msgstr "Documentación" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +250,11 @@ msgstr "A probar..." #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +267,10 @@ msgstr "Servizos" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +280,9 @@ msgstr "Resementando" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +326,7 @@ msgstr "Análise" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +334,7 @@ msgstr "" msgid "Roadmap" msgstr "" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +395,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +458,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +471,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +495,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +565,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +620,8 @@ msgstr "Figura 1:" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +634,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +675,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +735,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +757,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +781,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +790,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +804,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +848,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +872,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +886,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +905,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +917,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +934,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +956,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +983,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1027,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1054,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1074,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1103,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1388,8 +1184,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1402,24 +1197,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1429,22 +1215,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1480,21 +1258,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1518,10 +1291,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1532,8 +1303,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1546,10 +1316,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1559,7 +1327,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1580,7 +1349,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1602,7 +1373,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1611,8 +1383,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1644,35 +1415,28 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1680,29 +1444,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1729,12 +1487,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1744,10 +1500,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1769,8 +1523,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1793,8 +1548,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1808,34 +1562,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1845,61 +1593,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1926,20 +1662,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1965,12 +1700,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1990,8 +1726,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2018,12 +1753,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2042,22 +1774,22 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2074,8 +1806,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2092,14 +1824,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2178,34 +1910,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2215,20 +1939,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2245,22 +1965,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2272,10 +1989,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2285,38 +2000,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2334,23 +2041,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2364,11 +2065,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2379,34 +2077,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2419,18 +2110,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2444,16 +2131,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2473,67 +2158,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2557,8 +2232,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2574,44 +2249,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2619,8 +2284,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2629,64 +2293,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "Traducións" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2694,42 +2353,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2742,143 +2393,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2887,93 +2426,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2993,11 +2481,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3012,10 +2498,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3035,12 +2519,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3051,27 +2532,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3087,10 +2564,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3108,8 +2583,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3122,19 +2596,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3142,15 +2612,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3159,8 +2627,8 @@ msgstr "PUF" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3176,67 +2644,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3261,10 +2727,8 @@ msgstr "Vista Xeral" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3273,21 +2737,17 @@ msgstr "Requerimentos" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3310,8 +2770,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3321,18 +2780,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3342,10 +2796,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3354,17 +2806,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3373,10 +2823,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3387,18 +2835,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/gl/LC_MESSAGES/misc.po b/i2p2www/translations/gl/LC_MESSAGES/misc.po index e80388b600abc0dc39afb7f6ef21ac31d4f2ff43..e2f30fb3e4088502955275c136a2955b56e17017 100644 --- a/i2p2www/translations/gl/LC_MESSAGES/misc.po +++ b/i2p2www/translations/gl/LC_MESSAGES/misc.po @@ -1,22 +1,23 @@ -# Galician translations for I2P. -# Copyright (C) 2017 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Uberius Crypto <uberius@anonymail.tech>, 2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2017-09-23 02:02+0000\n" -"Last-Translator: Uberius Crypto <uberius@anonymail.tech>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Uberius Crypto <uberius@anonymail.tech>, 2016\n" "Language-Team: Galician (http://www.transifex.com/otf/I2P/language/gl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: gl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -25,54 +26,37 @@ msgstr "I2P en CLT e PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Os membros de I2P darán unha conferencia en CLT e en PetCon 2009.1\n" -"Dous membros do equipo I2P estarán nas dúas seguintes convencións do dÃa " -"de Linux e seguridade." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Os membros de I2P darán unha conferencia en CLT e en PetCon 2009.1\nDous membros do equipo I2P estarán nas dúas seguintes convencións do dÃa de Linux e seguridade." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" msgstr "" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." msgstr "" #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." msgstr "" #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" msgstr "" @@ -85,7 +69,7 @@ msgstr "Migración dos túneles I2P" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" @@ -103,11 +87,11 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" +msgid "For the name: <code>\"I2P Site\"</code>" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 @@ -138,14 +122,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" msgstr "" @@ -163,7 +143,7 @@ msgid "I2PTunnel services" msgstr "Servizos do túnel I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 @@ -179,23 +159,23 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 @@ -208,8 +188,8 @@ msgstr "" msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 @@ -224,28 +204,28 @@ msgstr "Xerar un par de chaves de destino I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 @@ -268,9 +248,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 @@ -281,27 +261,27 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 @@ -310,9 +290,9 @@ msgstr "3 - Abre un 'Túnel' dende I2p ó teu servidor" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 @@ -337,9 +317,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 @@ -357,9 +337,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 @@ -393,42 +373,42 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 @@ -460,11 +440,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 @@ -475,25 +454,25 @@ msgstr "7 - Comparte os detalles do teu servidor con outros/as" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 @@ -502,8 +481,8 @@ msgstr "8 - Escribe algún script para manexar todas istas parvadas" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 @@ -512,8 +491,8 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 @@ -524,16 +503,16 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." msgstr "" #: i2p2www/pages/site/misc/invisiblenet.html:2 @@ -542,13 +521,11 @@ msgstr "Documentos antigos" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." +"However, the I2CP and I2NP documents in particular have some good information." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:3 @@ -561,8 +538,7 @@ msgstr "Vista Xeral" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." msgstr "" @@ -576,18 +552,15 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" @@ -601,8 +574,7 @@ msgstr "Reconstruindo e probando JBigI" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." msgstr "" @@ -613,31 +585,25 @@ msgstr "Requerimentos" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " +"The required code is available in monotone database and the latest source " +"tarball. " msgstr "" #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." msgstr "" @@ -648,8 +614,7 @@ msgstr "Instruccións paso a paso" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" msgstr "" @@ -677,27 +642,20 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" msgstr "" @@ -711,18 +669,14 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." msgstr "" @@ -730,17 +684,13 @@ msgstr "" msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." msgstr "" @@ -768,11 +718,8 @@ msgstr "Reinicia os teus programas de I2P" #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." msgstr "" @@ -782,8 +729,7 @@ msgstr "" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." msgstr "" @@ -792,8 +738,7 @@ msgstr "" msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" @@ -815,33 +760,24 @@ msgstr "A instalar manualmente o Java Wrapper" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." msgstr "" @@ -850,7 +786,8 @@ msgid "Using existing binaries" msgstr "A usar binarios existentes" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -866,8 +803,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:43 @@ -876,16 +813,15 @@ msgstr "A compilar dende o código fonte" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:49 @@ -894,8 +830,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:54 @@ -934,164 +870,110 @@ msgstr "" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" msgstr "" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." msgstr "" #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." msgstr "" #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" msgstr "" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" msgstr "" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." msgstr "" @@ -1106,8 +988,8 @@ msgstr "" #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" msgstr "" #: i2p2www/pages/site/misc/ratestats.html:10 @@ -1122,18 +1004,15 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." msgstr "" #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." msgstr "" @@ -1162,24 +1041,20 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." @@ -1192,8 +1067,8 @@ msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 @@ -1215,8 +1090,7 @@ msgstr "Preme en \"Aplicar\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." msgstr "" @@ -1225,7 +1099,5 @@ msgstr "" msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." +"Thank you for your support during this transition. For help please contact us on #i2p." msgstr "" - diff --git a/i2p2www/translations/he/LC_MESSAGES/about.po b/i2p2www/translations/he/LC_MESSAGES/about.po index f265c990b3ac5e5411a3db6f0ff4e8b181547966..fe7799173faf8fce9a04284c0717fc8b222d76fd 100644 --- a/i2p2www/translations/he/LC_MESSAGES/about.po +++ b/i2p2www/translations/he/LC_MESSAGES/about.po @@ -1,22 +1,22 @@ -# Hebrew translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: str4d <str4d@i2pmail.org>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n" -"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && " -"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: he\n" +"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -26,8 +26,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -50,8 +49,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -64,24 +62,158 @@ msgstr "מילון ×ž×•× ×—×™×" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -91,15 +223,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -113,12 +244,8 @@ msgstr "פרויקט ×”××™× ×˜×¨× ×˜ הבלתי × ×¨××”" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -128,13 +255,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -143,15 +270,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -160,28 +287,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -190,36 +316,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -228,13 +353,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -243,15 +368,11 @@ msgstr "השוו×ות" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -270,9 +391,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -329,8 +449,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -349,8 +468,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -359,8 +477,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -373,8 +490,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -383,8 +499,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -392,8 +508,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -408,15 +523,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -428,8 +541,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -484,16 +596,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -502,11 +612,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -559,16 +667,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -584,12 +690,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -603,35 +706,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -640,16 +737,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -666,11 +761,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -679,18 +820,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -701,84 +839,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -789,8 +904,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -798,27 +912,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -826,26 +936,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -856,10 +957,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -867,18 +966,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -889,10 +985,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1064,7 +1158,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1304,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1354,32 +1450,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1397,8 +1486,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1437,10 +1526,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1454,15 +1541,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1471,11 +1554,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1530,8 +1610,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1549,15 +1628,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1576,14 +1651,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1594,20 +1665,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1618,24 +1682,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1655,33 +1710,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1694,32 +1740,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1729,27 +1767,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1766,17 +1796,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1789,8 +1816,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1801,10 +1827,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1823,30 +1847,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1860,55 +1877,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1919,20 +1921,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1943,16 +1938,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1962,17 +1952,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -1983,20 +1970,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2010,26 +1990,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2038,18 +2008,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2057,16 +2021,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2082,52 +2041,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2142,102 +2082,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2250,4 +2149,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/he/LC_MESSAGES/get-involved.po b/i2p2www/translations/he/LC_MESSAGES/get-involved.po index d524d4b6d35703cd2b6280617c54213ecd9e57e6..4f6ad96a45e398ba4a22f9aa5bcbaff0db07a50a 100644 --- a/i2p2www/translations/he/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/he/LC_MESSAGES/get-involved.po @@ -1,22 +1,22 @@ -# Hebrew translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: ION\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n" -"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && " -"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: he\n" +"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +31,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +48,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +113,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +144,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +160,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +194,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +208,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +221,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +233,12 @@ msgstr "תיעוד" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +249,11 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +266,10 @@ msgstr "שירותי×" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +279,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +325,7 @@ msgstr "× ×™×ª×•×—" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +333,7 @@ msgstr "" msgid "Roadmap" msgstr "מפת דרכי×" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +394,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +457,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +470,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +494,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +564,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +619,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +633,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +674,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +734,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +756,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +780,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +789,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +803,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +847,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +871,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +885,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +904,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +916,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +933,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +955,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +982,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1026,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1053,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1073,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1102,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1388,8 +1183,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1402,24 +1196,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1429,22 +1214,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1480,21 +1257,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1518,10 +1290,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1532,8 +1302,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1546,10 +1315,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1559,7 +1326,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1580,7 +1348,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1588,13 +1357,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1602,7 +1372,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1611,8 +1382,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1644,35 +1414,28 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1680,29 +1443,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1729,12 +1486,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1744,10 +1499,8 @@ msgstr "קהילה" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1769,8 +1522,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1778,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1793,8 +1547,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1808,34 +1561,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1845,61 +1592,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1926,20 +1661,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1948,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1965,12 +1699,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1990,8 +1725,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2018,12 +1752,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2042,22 +1773,22 @@ msgstr "שימוש בסביבת פיתוח ×ž×•×‘× ×™×ª (IDE) ×¢× I2P" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2074,8 +1805,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2092,14 +1823,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2178,34 +1909,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2215,20 +1938,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2245,22 +1964,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2272,10 +1988,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2285,38 +1999,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2334,23 +2040,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2364,11 +2064,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2379,34 +2076,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2419,18 +2109,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2444,16 +2130,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2473,67 +2157,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2557,8 +2231,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2574,44 +2248,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2619,8 +2283,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2629,64 +2292,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "תרגומי×" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "כלי עבודה" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2694,42 +2352,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2742,143 +2392,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2887,93 +2425,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2993,11 +2480,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3012,10 +2497,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3035,12 +2518,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3051,27 +2531,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3087,10 +2563,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3108,8 +2582,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3122,19 +2595,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3142,15 +2611,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3159,8 +2626,8 @@ msgstr "ש×לות × ×¤×•×¦×•×ª" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3176,67 +2643,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3261,10 +2726,8 @@ msgstr "תשקיף" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3273,21 +2736,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3310,8 +2769,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3321,18 +2779,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3342,10 +2795,8 @@ msgstr "×ž×“×™× ×™×•×ª פרטיות" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3354,17 +2805,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3373,10 +2822,8 @@ msgstr "מתחילי×" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3387,18 +2834,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/he/LC_MESSAGES/priority.po b/i2p2www/translations/he/LC_MESSAGES/priority.po index c3fe08fa5e6f10e90ebdc3935a7162dfbe127b86..acca3ed551fef21ff2e0b9370bde7baeeaa8a94b 100644 --- a/i2p2www/translations/he/LC_MESSAGES/priority.po +++ b/i2p2www/translations/he/LC_MESSAGES/priority.po @@ -1,25 +1,25 @@ -# Hebrew translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # AnonWolf <anonwolf911@gmail.com>, 2015 # fengari <bokstafur@mail.i2p>, 2014 # Johnny Diralenzo, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:27+0000\n" -"PO-Revision-Date: 2021-10-11 16:30+0000\n" -"Last-Translator: ION\n" +"PO-Revision-Date: 2013-02-03 00:02+0000\n" +"Last-Translator: Johnny Diralenzo, 2015\n" "Language-Team: Hebrew (http://www.transifex.com/otf/I2P/language/he/)\n" -"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && " -"n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: he\n" +"Plural-Forms: nplurals=4; plural=(n == 1 && n % 1 == 0) ? 0 : (n == 2 && n % 1 == 0) ? 1: (n % 10 == 0 && n % 1 == 0 && n > 10) ? 2 : 3;\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" @@ -58,10 +58,8 @@ msgstr "יוצר:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P\n" -"and to utilize the outproxies available within I2P. Below are " -"walkthroughs for\n" +"Your web browser will need to be configured in order to browse web sites on I2P\n" +"and to utilize the outproxies available within I2P. Below are walkthroughs for\n" "some of the most popular browsers." msgstr "" @@ -72,15 +70,13 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:8 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" "<a href='%(profile)s'>Firefox profile</a>." msgstr "" #: i2p2www/pages/downloads/browser-content.html:12 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -"\n" +"If you do not wish to use that profile or are not on Windows, you need to\n" "configure your browser yourself. Read below on how to that." msgstr "" @@ -101,26 +97,21 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:30 msgid "" "A new way of automatically configuring the I2P Browser is\n" -"currently being tested. It uses the Firefox's \"Container Tabs\" to build" -" private\n" +"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n" "browsing tools for use with I2P and I2P applications." msgstr "" #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "It does pre-configuration of your browser by enabling some of\n" -"the privacy Browser Settings like ResistFingerprinting, and enforces " -"WebRTC proxy\n" -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving\n" -"Firefox's integration with I2P. It is a by-product of the I2P Browser " -"project.\n" +"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n" +"obedience. It also contains menus, shortcuts, and monitoring tools improving\n" +"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:38 msgid "" -"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon" -"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" +"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" "can be obtained from the Mozilla addon store.\n" msgstr "" @@ -131,8 +122,7 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:42 msgid "" "From the Menu button in the top right, select <em>Preferences</em>.\n" -"Scroll down until you see the <em>Network Proxy</em> section, as shown in" -" the\n" +"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n" "screenshot below. Click on <em>Settings</em>" msgstr "" @@ -144,8 +134,7 @@ msgstr "" msgid "" "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n" " configuration</em>. Set both the HTTP and SSL Proxy to address\n" -"<code>127.0.0.1</code> with port <code>4444</code> as shown in the " -"following\n" +"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n" "screenshot." msgstr "" @@ -182,17 +171,11 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:69 msgid "" "An experimental, partially-automated configuration process for\n" -"Chrome is available. In order to configure it, create a new " -"<em>Profile</em>\n" -"especially for your I2P browsing, separate from the default profile. Then" -" install\n" -"this <a " -"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>" -" in your newly-created profile. This profile\n" -"is now configured to use I2P. Highly detailed instructions are available " -"at the\n" -"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-" -"Chromium\">homepage.</a>\n" +"Chrome is available. In order to configure it, create a new <em>Profile</em>\n" +"especially for your I2P browsing, separate from the default profile. Then install\n" +"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n" +"is now configured to use I2P. Highly detailed instructions are available at the\n" +"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:76 @@ -201,14 +184,10 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:77 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their\n" -"proxy settings depending on variant and platform. These instructions may " -"be\n" -"slightly different in Brave or Iridium, for instance. From the " -"<em>Main</em>\n" -"menu, navigate to the <em>Settings</em>, and search for the <em></em> " -"menu item.\n" +"Chromium-Based Browsers like Chrome have slightly different places for their\n" +"proxy settings depending on variant and platform. These instructions may be\n" +"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n" +"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n" "Clicking it will open the right settings for your platform." msgstr "" @@ -218,10 +197,8 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:85 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used\n" -"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure" -" it by\n" +"On Windows, this button will launch you into the shared proxy settings used\n" +"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n" "following the Internet Explorer 8 guide." msgstr "" @@ -236,42 +213,29 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:94 msgid "" "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n" -"an about:config page for you to configure proxy settings manually. It is " -"further\n" -"not possible to use most extensions in Fenix-based Firefoxes. It is " -"possible to\n" -"enable support about:config and enable more extensions in Firefox Nightly" -" at the time \n" -"of this writing, but it's a manual and difficult process. " -"<em>IceRaven</em> is a fork\n" -"of Firefox which enables a collection of extensions while Mozilla and the" -" Mozilla\n" -"Community work on adding support for extensions to Firefox for Android. " -"It provides\n" -"the easiest way of configuring a modern Firefox-based Browser for " -"Android. It does\n" -"not come from Mozilla and carries no guarantees from them. <em>Installing" -" the extension\n" +"an about:config page for you to configure proxy settings manually. It is further\n" +"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n" +"enable support about:config and enable more extensions in Firefox Nightly at the time \n" +"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n" +"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n" +"Community work on adding support for extensions to Firefox for Android. It provides\n" +"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n" +"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P.</em>" msgstr "" #: i2p2www/pages/downloads/browser-content.html:104 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been\n" -"using IceRaven for a while, go to the main menu, select the History tab, " -"and make\n" -"sure that you have cleared information about your past browsing by " -"tapping the\n" +"If you have not installed IceRaven yet, go to the next step. If you have been\n" +"using IceRaven for a while, go to the main menu, select the History tab, and make\n" +"sure that you have cleared information about your past browsing by tapping the\n" "\"Delete History\" button." msgstr "" #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\"\n" -"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. " -"Install\n" +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n" +"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n" "the extension named <em>I2P Proxy for Android and other Systems</em>.\n" msgstr "" @@ -283,23 +247,19 @@ msgstr "" msgid "" "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n" "web browsers, if installed from the following addons.mozilla.org URL.\n" -"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-" -"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" +"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:118 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." +"This extension is identical to the Chromium extension and is built from the " +"same source." msgstr "" #: i2p2www/pages/downloads/browser-content.html:119 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their <a " -"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-" -"support-in-firefox-for-android-nightly/\">Blog</a>" +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>" msgstr "" #: i2p2www/pages/downloads/browser-content.html:124 @@ -308,8 +268,7 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:125 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." msgstr "" @@ -320,14 +279,10 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:131 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." msgstr "" @@ -337,18 +292,15 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:143 msgid "" -"Remember: I2P was not designed for creating proxies to the outer " -"Internet.\n" +"Remember: I2P was not designed for creating proxies to the outer Internet.\n" "Instead, it is meant to be used as an internal network." msgstr "" #: i2p2www/pages/downloads/browser-content.html:147 msgid "" -"<p><b>The I2P project itself does not run any proxies to the " -"Internet.</b>\n" +"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n" "The only outproxy is a service from the privacy solutions project.\n" -"Consider donating to them for a continued stable service. Increased " -"funding will\n" +"Consider donating to them for a continued stable service. Increased funding will\n" "allow them to improve this service. </p>\n" "<a href=\"http://privacysolutions.no\"\n" " target=\"_blank\">http://privacysolutions.no</a>" @@ -357,10 +309,8 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:155 #, python-format msgid "" -"By default, I2P comes with two outproxies configured: " -"<code>%(http)s</code>\n" -"and <code>%(https)s</code>. Even the domain names are different, it's the" -" same outproxy you hit.\n" +"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n" +"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n" "(multi-homed/keyed for better performance)" msgstr "" @@ -368,15 +318,13 @@ msgstr "" msgid "" "Filtering is active on these outproxies (for example, mibbit and torrent\n" "tracker access is blocked). I2P Sites\n" -"that are accessible via .i2p addresses are also not allowed via the " -"outproxies.\n" +"that are accessible via .i2p addresses are also not allowed via the outproxies.\n" "As a convenience, the outproxy blocks ad servers." msgstr "" #: i2p2www/pages/downloads/browser-content.html:166 msgid "" -"<a href=\"https://www.torproject.org\">Tor</a> is a good application to " -"use as an\n" +"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n" "outproxy to the Internet." msgstr "" @@ -394,13 +342,10 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:7 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have " -"older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" "If you are not running Debian Sid or the latest Ubuntu release,\n" -"use our Debian repo or Launchpad PPA to ensure you're running the latest " -"I2P version." +"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/debian.html:14 @@ -422,23 +367,16 @@ msgstr "<a href=\"#debian\">×œ×™× ×•×§×¡ דבי×ן</a> (Wheezy וגרס×ות #: i2p2www/pages/downloads/debian.html:23 #, python-format msgid "" -"The I2P packages <em>may</em> work on systems not listed above. Please " -"report any issues\n" +"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n" "with these packages on <a href=\"%(trac)s\">Trac</a> at\n" "<a href=\"%(trac)s\">https://trac.i2p2.de</a>." -msgstr "" -"החבילות של I2P <em>עשויות</em> לעבוד על מערכות ש××™× ×Ÿ רשומות למעלה. ×× × " -"דווחו על בעיות\n" -"בחבילות ×לה ב־<a href=\"%(trac)s\">Trac</a> at\n" -"<a href=\"%(trac)s\">https://trac.i2p2.de</a>." +msgstr "החבילות של I2P <em>עשויות</em> לעבוד על מערכות ש××™× ×Ÿ רשומות למעלה. ×× × ×“×•×•×—×• על בעיות\nבחבילות ×לה ב־<a href=\"%(trac)s\">Trac</a> at\n<a href=\"%(trac)s\">https://trac.i2p2.de</a>." #: i2p2www/pages/downloads/debian.html:29 msgid "" "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its " "derivatives (<em>Try this if you're not using Debian)</em>" -msgstr "" -"×פשרות 1: <a href=\"#ubuntu\">גרס×ות ×¢×“×›× ×™×•×ª</a> של ××•×‘×•× ×˜×• ושל × ×’×–×¨×•×ª×™×” " -"(<em>× ×¡×• ×–×ת ×× ××™× ×›× ×ž×©×ª×ž×©×™× ×‘×“×‘×™×ן</em>)" +msgstr "×פשרות 1: <a href=\"#ubuntu\">גרס×ות ×¢×“×›× ×™×•×ª</a> של ××•×‘×•× ×˜×• ושל × ×’×–×¨×•×ª×™×” (<em>× ×¡×• ×–×ת ×× ××™× ×›× ×ž×©×ª×ž×©×™× ×‘×“×‘×™×ן</em>)" #: i2p2www/pages/downloads/debian.html:30 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)" @@ -461,10 +399,7 @@ msgid "" "This command will add the PPA to /etc/apt/sources.list.d and fetch the\n" "gpg key that the repository has been signed with. The GPG key ensures\n" "that the packages have not been tampered with since being built." -msgstr "" -"פקודה זו תוסיף ×ת ×”Ö¾PPA ל־‎/etc/apt/sources.list.d â€×•×ª×™×™×‘× ×ת\n" -"מפתח ×”Ö¾gpg שב×מצעותו × ×—×ª× ×”×ž×גר. מפתח ×”Ö¾GPG מבטיח\n" -"×›×™ ×œ× × ×¢×¨×›×• ×©×™× ×•×™×™× ×–×“×•× ×™×™× ×‘×—×‘×™×œ×•×ª ל×חר יצירתן." +msgstr "פקודה זו תוסיף ×ת ×”Ö¾PPA ל־‎/etc/apt/sources.list.d â€×•×ª×™×™×‘× ×ת\nמפתח ×”Ö¾gpg שב×מצעותו × ×—×ª× ×”×ž×גר. מפתח ×”Ö¾GPG מבטיח\n×›×™ ×œ× × ×¢×¨×›×• ×©×™× ×•×™×™× ×–×“×•× ×™×™× ×‘×—×‘×™×œ×•×ª ל×חר יצירתן." #: i2p2www/pages/downloads/debian.html:46 msgid "Notify your package manager of the new PPA by entering:" @@ -475,10 +410,7 @@ msgid "" "This command will retrieve the latest list of software from each\n" "repository that is enabled on your system, including the I2P PPA that\n" "was added with the earlier command." -msgstr "" -"פקודה זו רשימת ×”×ª×•×›× ×•×ª ×”×¢×“×›× ×™×ª מכל מ×גר\n" -"המ×ופשר במערכת שלכ×, כולל ×”Ö¾PPA של I2P\n" -"×©× ×•×¡×£ ×§×•×“× ×œ×›×Ÿ." +msgstr "פקודה זו רשימת ×”×ª×•×›× ×•×ª ×”×¢×“×›× ×™×ª מכל מ×גר\nהמ×ופשר במערכת שלכ×, כולל ×”Ö¾PPA של I2P\n×©× ×•×¡×£ ×§×•×“× ×œ×›×Ÿ." #: i2p2www/pages/downloads/debian.html:54 msgid "You are now ready to install I2P!" @@ -490,51 +422,36 @@ msgstr "הוספת ×”Ö¾PPA דרך Synaptic" #: i2p2www/pages/downloads/debian.html:61 msgid "" -"Open Synaptic (System -> Administration -> Synaptic Package " -"Manager)." +"Open Synaptic (System -> Administration -> Synaptic Package Manager)." msgstr "פתחו ×ת Synaptic (מערכת -> × ×™×”×•×œ -> ×ž× ×”×œ החבילות Synaptic)." #: i2p2www/pages/downloads/debian.html:66 msgid "" -"Once Synaptic opens, select <em>Repositories</em> from the " -"<em>Settings</em> menu." +"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>" +" menu." msgstr "ל×חר ש־Synaptic × ×¤×ª×—, בחרו ב×פשרות <em>מ×גרי×</em> מתפריט <em>הגדרות</em>." #: i2p2www/pages/downloads/debian.html:71 msgid "" "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste " "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click " -"<em>Add Source</em>. Click the <em>Close</em> button then " -"<em>Reload</em>." -msgstr "" -"עברו ×œ×œ×©×•× ×™×ª <em>מקורות ×חרי×</em> (Other Software) ולחצו על " -"<em>הוספה</em> (Add). הדביקו ×ת השורה <code>ppa:i2p-" -"maintainers/i2p</code> לשדה <em>שורת APT</em> ולחצו על <em>הוספת " -"מקור</em> (Add Source). לחצו על <em>סגירה</em> ול×חר מכן על " -"<em>×¨×¢× ×•×Ÿ</em>." +"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>." +msgstr "עברו ×œ×œ×©×•× ×™×ª <em>מקורות ×חרי×</em> (Other Software) ולחצו על <em>הוספה</em> (Add). הדביקו ×ת השורה <code>ppa:i2p-maintainers/i2p</code> לשדה <em>שורת APT</em> ולחצו על <em>הוספת מקור</em> (Add Source). לחצו על <em>סגירה</em> ול×חר מכן על <em>×¨×¢× ×•×Ÿ</em>." #: i2p2www/pages/downloads/debian.html:76 msgid "" "In the Quick Filter box, type in <code>i2p</code> and press enter. When " "<code>i2p</code> is returned in the results list, right click " -"<code>i2p</code> and select <em>Mark for Installation</em>. After doing " -"so you may see a <em>Mark additional required changes?</em> popup. If so," -" click <em>Mark</em> then <em>Apply</em>." -msgstr "" -"בתיבת ×”×¡×™× ×•×Ÿ המהיר, ×”×–×™× ×• i2p ולחצו Enter. ×›×שר <code>i2p</code> מופיע " -"ברשימת התוצ×ות, לחצו עליו לחיצה ×™×ž× ×™×ª ובחרו <em>סימון עבור ×”×ª×§× ×”</em>. " -"ל×חר מכן ייתכן שתיש×לו ×”×× <em>לסמן ×©×™× ×•×™×™× × ×—×•×¦×™× × ×•×¡×¤×™×</em>. במקרה ×›×–×”" -" לחצו על <em>סימון</em> ול×חר מכן על <em>בצע</em>." +"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so " +"you may see a <em>Mark additional required changes?</em> popup. If so, click" +" <em>Mark</em> then <em>Apply</em>." +msgstr "בתיבת ×”×¡×™× ×•×Ÿ המהיר, ×”×–×™× ×• i2p ולחצו Enter. ×›×שר <code>i2p</code> מופיע ברשימת התוצ×ות, לחצו עליו לחיצה ×™×ž× ×™×ª ובחרו <em>סימון עבור ×”×ª×§× ×”</em>. ל×חר מכן ייתכן שתיש×לו ×”×× <em>לסמן ×©×™× ×•×™×™× × ×—×•×¦×™× × ×•×¡×¤×™×</em>. במקרה ×›×–×” לחצו על <em>סימון</em> ול×חר מכן על <em>בצע</em>." #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring " -"it for your system." -msgstr "" -"ל×חר ×¡×™×•× ×ª×”×œ×™×š ×”×”×ª×§× ×” ××ª× ×™×›×•×œ×™× ×œ×¢×‘×•×¨ לחלק הב×\n" -"<a href=\"#Post-install_work\">הרצת I2P</a> ולהגדיר ×ת התצורה של I2P עבור" -" המערכת שלכ×." +"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system." +msgstr "ל×חר ×¡×™×•× ×ª×”×œ×™×š ×”×”×ª×§× ×” ××ª× ×™×›×•×œ×™× ×œ×¢×‘×•×¨ לחלק הב×\n<a href=\"#Post-install_work\">הרצת I2P</a> ולהגדיר ×ת התצורה של I2P עבור המערכת שלכ×." #: i2p2www/pages/downloads/debian.html:87 msgid "Instructions for Debian" @@ -546,10 +463,8 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with <code>su</code> or by prefixing each command with " -"<code>sudo</code>)." +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)." msgstr "" #: i2p2www/pages/downloads/debian.html:96 @@ -562,8 +477,7 @@ msgstr "" #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the <a " -"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" +" Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" " and verify with <code>%(file2)s</code> on your system.\n" " Then, add lines like the following to <code>%(file)s</code>." msgstr "" @@ -594,31 +508,22 @@ msgstr "יידעו ×ת ×ž× ×”×œ החבילות ×©×œ×›× ×¢×œ המ×גר החד #: i2p2www/pages/downloads/debian.html:175 msgid "" "This command will retrieve the latest list of software from every\n" -"repository enabled on your system, including the I2P repository added in " -"step\n" -"1." -msgstr "" -"פקודה זו תוריד ×ת רשימת ×”×ª×•×›× ×•×ª ×”×¢×“×›× ×™×ª מכל מ×גר\n" -"המ×ופשר במערכת שלכ×, כולל המ×גר של I2P ×©× ×•×¡×£ בצעד\n" +"repository enabled on your system, including the I2P repository added in step\n" "1." +msgstr "פקודה זו תוריד ×ת רשימת ×”×ª×•×›× ×•×ª ×”×¢×“×›× ×™×ª מכל מ×גר\nהמ×ופשר במערכת שלכ×, כולל המ×גר של I2P ×©× ×•×¡×£ בצעד\n1." #: i2p2www/pages/downloads/debian.html:181 msgid "" -"You are now ready to install I2P! Installing the <code>i2p-keyring</code>" -"\n" +"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n" "package will ensure that you receive updates to the repository's GPG key." -msgstr "" -"כעת ××ª× ×ž×•×›× ×™× ×œ×”×ª×§× ×ª I2P! ×”×ª×§× ×ª החבילה <code>i2p-keyring</code>\n" -"תבטיח שתקבלו ×¢×“×›×•× ×™× ×œ×ž×¤×ª×— ×”Ö¾GPG של המ×גר." +msgstr "כעת ××ª× ×ž×•×›× ×™× ×œ×”×ª×§× ×ª I2P! ×”×ª×§× ×ª החבילה <code>i2p-keyring</code>\nתבטיח שתקבלו ×¢×“×›×•× ×™× ×œ×ž×¤×ª×— ×”Ö¾GPG של המ×גר." #: i2p2www/pages/downloads/debian.html:191 msgid "" -"After the installation process completes you can move on to the next part" -" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it " -"for your system." -msgstr "" -"ל×חר השלמת תהליך ×”×”×ª×§× ×” ××ª× ×™×›×•×œ×™× ×œ×”×ž×©×™×š הל××” לשלב הב×, <a href=\"#Post-" -"install_work\">הרצת I2P</a>, ולהגדיר ×ת התצורה של I2P עבור המערכת שלכ×." +"After the installation process completes you can move on to the next part of" +" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your" +" system." +msgstr "ל×חר השלמת תהליך ×”×”×ª×§× ×” ××ª× ×™×›×•×œ×™× ×œ×”×ž×©×™×š הל××” לשלב הב×, <a href=\"#Post-install_work\">הרצת I2P</a>, ולהגדיר ×ת התצורה של I2P עבור המערכת שלכ×." #: i2p2www/pages/downloads/debian.html:196 #: i2p2www/pages/downloads/post-install.html:1 @@ -629,89 +534,51 @@ msgstr "×¦×¢×“×™× ×œ×חר ×”×”×ª×§× ×”" msgid "" "Using these I2P packages the I2P router can be started in the following\n" "three ways:" -msgstr "" -"על־ידי שימוש בחבילות של I2P × ×™×ª×Ÿ להריץ ×ת × ×ª×‘ ×”Ö¾I2P בשלוש\n" -"×”×“×¨×›×™× ×”×‘×ות:" +msgstr "על־ידי שימוש בחבילות של I2P × ×™×ª×Ÿ להריץ ×ת × ×ª×‘ ×”Ö¾I2P בשלוש\n×”×“×¨×›×™× ×”×‘×ות:" #: i2p2www/pages/downloads/debian.html:204 msgid "" -""on demand" using the i2prouter script. Simply run " -""<code>i2prouter\n" -"start</code>" from a command prompt. (Note: Do " -"<strong><u>not</u></strong> use\n" +""on demand" using the i2prouter script. Simply run "<code>i2prouter\n" +"start</code>" from a command prompt. (Note: Do <strong><u>not</u></strong> use\n" "sudo or run it as root!)" -msgstr "" -"â€"לפי הצורך" ב×מצעות התסריט i2prouter. פשוט הריצו " -""<code>i2prouter\n" -"â€start</code>" בשורת הפקודה. (הערה: <strong><u>×ל</u></strong> תריצו" -"\n" -"כמשתמש root ו×ל תשתמשו ב־sudo!)" +msgstr "â€"לפי הצורך" ב×מצעות התסריט i2prouter. פשוט הריצו "<code>i2prouter\nâ€start</code>" בשורת הפקודה. (הערה: <strong><u>×ל</u></strong> תריצו\nכמשתמש root ו×ל תשתמשו ב־sudo!)" #: i2p2www/pages/downloads/debian.html:211 msgid "" -""on demand" without the <a " -"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" -"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-" -"nowrapper</code>\".\n" +""on demand" without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" +"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n" "(Note: Do <strong><u>not</u></strong>\n" "use sudo or run it as root!)" -msgstr "" -"â€"לפי הצורך" ×œ×œ× ×”Ö¾<a " -"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" -"(× ×“×¨×© במערכות ש××™× ×Ÿ מריצות ×’× ×•/×œ×™× ×•×§×¡ ×ו ש××™× ×Ÿ x86) על־ידי הרצת \"<code" -">i2prouter-nowrapper</code>\".\n" -"(הערה: <strong><u>×ל</u></strong> תריצו\n" -"כמשתמש root ו×ל תשתמשו ב־sudo!)" +msgstr "â€"לפי הצורך" ×œ×œ× ×”Ö¾<a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n(× ×“×¨×© במערכות ש××™× ×Ÿ מריצות ×’× ×•/×œ×™× ×•×§×¡ ×ו ש××™× ×Ÿ x86) על־ידי הרצת \"<code>i2prouter-nowrapper</code>\".\n(הערה: <strong><u>×ל</u></strong> תריצו\nכמשתמש root ו×ל תשתמשו ב־sudo!)" #: i2p2www/pages/downloads/debian.html:219 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"<code>dpkg-" -"reconfigure\n" -"i2p</code>\" as root or using sudo. This is the recommended means of " -"operation." -msgstr "" -"כשירות שרץ ב×ופן עצמ××™ ×›×שר המערכת עולה, עוד\n" -"×œ×¤× ×™ שהמשתמש × ×›× ×¡. × ×™×ª×Ÿ להפעיל ×ת השירות ×¢× \"<code>dpkg-reconfigure\n" -"â€i2p</code>\" בתור root ×ו על־ידי שימוש ב־sudo. זהו ×ופן השימוש המומלץ." +"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n" +"i2p</code>\" as root or using sudo. This is the recommended means of operation." +msgstr "כשירות שרץ ב×ופן עצמ××™ ×›×שר המערכת עולה, עוד\n×œ×¤× ×™ שהמשתמש × ×›× ×¡. × ×™×ª×Ÿ להפעיל ×ת השירות ×¢× \"<code>dpkg-reconfigure\nâ€i2p</code>\" בתור root ×ו על־ידי שימוש ב־sudo. זהו ×ופן השימוש המומלץ." #: i2p2www/pages/downloads/debian.html:227 msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" -"if you can. The ports to forward can be found on the <a " -"href=\"http://127.0.0.1:7657/confignet\">\n" -"network configuration page</a> in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find <a href=\"http://portforward.com\">portforward.com</a> to be" -" helpful." -msgstr "" -"בעת ×”×”×ª×§× ×” ×‘×¤×¢× ×”×¨××©×•× ×”, ×× × ×–×›×¨×• להגדיר ×ת ×”Ö¾<b>NAT/חומת ×”×ש</b>\n" -"×©×œ×›× ×× ××ª× ×™×›×•×œ×™×. × ×™×ª×Ÿ ×œ×ž×¦×•× ×ת הפתחות שיש להעביר ב<a " -"href=\"http://127.0.0.1:7657/confignet\">\n" -"עמוד הגדרות הרשת</a> בממשק ×”× ×ª×‘. ×× ××ª× ×–×§×•×§×™× ×œ×”×“×¨×›×” כיצד להעביר פתחות,\n" -"â€<a href=\"http://portforward.com\">portforward.com</a> יכול לעזור." +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" +"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n" +"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful." +msgstr "בעת ×”×”×ª×§× ×” ×‘×¤×¢× ×”×¨××©×•× ×”, ×× × ×–×›×¨×• להגדיר ×ת ×”Ö¾<b>NAT/חומת ×”×ש</b>\n×©×œ×›× ×× ××ª× ×™×›×•×œ×™×. × ×™×ª×Ÿ ×œ×ž×¦×•× ×ת הפתחות שיש להעביר ב<a href=\"http://127.0.0.1:7657/confignet\">\nעמוד הגדרות הרשת</a> בממשק ×”× ×ª×‘. ×× ××ª× ×–×§×•×§×™× ×œ×”×“×¨×›×” כיצד להעביר פתחות,\nâ€<a href=\"http://portforward.com\">portforward.com</a> יכול לעזור." #: i2p2www/pages/downloads/debian.html:234 msgid "" "Please review and <b>adjust the bandwidth settings</b> on the\n" "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." -msgstr "" -"×× × ×‘×“×§×• ×ת <b>הגדרות רוחב־הפס</b> ב<a " -"href=\"http://127.0.0.1:7657/config.jsp\">עמוד\n" -"הגדרות התצורה</a>,\n" -"מ×חר והגדרות ברירת המחדל (96 ק\"ב/×©× ×™×” בהורדה ו־40 ק\"ב/×©× ×™×” בהעל××”) די " -"× ×ž×•×›×•×ª." +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." +msgstr "×× × ×‘×“×§×• ×ת <b>הגדרות רוחב־הפס</b> ב<a href=\"http://127.0.0.1:7657/config.jsp\">עמוד\nהגדרות התצורה</a>,\nמ×חר והגדרות ברירת המחדל (96 ק\"ב/×©× ×™×” בהורדה ו־40 ק\"ב/×©× ×™×” בהעל××”) די × ×ž×•×›×•×ª." #: i2p2www/pages/downloads/debian.html:240 #: i2p2www/pages/downloads/post-install.html:34 #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the <a " -"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy " -"howto." +"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto." msgstr "" #: i2p2www/pages/downloads/docker.html:5 @@ -746,9 +613,9 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:24 msgid "" -"<p>Note that this quick-start approach is not suitable for production " -"use. If you want to use I2P in production please read all the " -"instructions on this page." +"<p>Note that this quick-start approach is not suitable for production use. " +"If you want to use I2P in production please read all the instructions on " +"this page." msgstr "" #: i2p2www/pages/downloads/docker.html:25 @@ -772,8 +639,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " "downloads. See the example below." msgstr "" @@ -794,8 +661,8 @@ msgstr "פתחות" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." msgstr "" #: i2p2www/pages/downloads/docker.html:38 @@ -869,11 +736,10 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:96 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." msgstr "" #: i2p2www/pages/downloads/docker.html:97 @@ -883,9 +749,9 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:98 msgid "" "Here is an example container that mounts <code>i2phome</code> as home " -"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." +"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:6 @@ -896,17 +762,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit <a href=\"%(firefox)s\">The " -"Firefox\n" +"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n" "Profile Page</a>." msgstr "" @@ -921,12 +782,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n" "product." @@ -939,17 +797,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." msgstr "" @@ -963,32 +816,24 @@ msgstr "" #, python-format msgid "" "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n" -"just download and install <a href=\"%(postfilename)s\">this " -"installer</a>. To\n" +"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n" "start an installer, \"double-click\" the downloaded .exe file." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:65 @@ -1028,10 +873,8 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." msgstr "" @@ -1043,16 +886,11 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:101 @@ -1063,19 +901,16 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the <code>i2p.firefox</code> " -"project." +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the <code>i2p.firefox</code> project." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:107 #: i2p2www/pages/downloads/easyinstall.html:115 #: i2p2www/pages/downloads/firefox.html:92 -#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79 -#: i2p2www/pages/downloads/mac.html:86 +#: i2p2www/pages/downloads/firefox.html:100 +#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86 msgid "Gitlab Repository" msgstr "" @@ -1087,11 +922,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:109 #: i2p2www/pages/downloads/firefox.html:94 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." msgstr "" @@ -1103,50 +936,34 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:117 #: i2p2www/pages/downloads/firefox.html:102 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:124 #: i2p2www/pages/downloads/firefox.html:109 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." msgstr "" #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>." msgstr "" @@ -1156,30 +973,20 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." msgstr "" #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" @@ -1212,8 +1019,7 @@ msgstr "" #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"<a href = \"%(lab)s\">I2P Lab</a>\n" +"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n" msgstr "" #: i2p2www/pages/downloads/list.html:26 @@ -1238,8 +1044,7 @@ msgstr "" #, python-format msgid "" " I2P is written in Java and requires\n" -"a Java system to be installed to run. In addition to the I2P download, " -"you need to install Java if you do not have it \n" +"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n" "already installed. I2P requires Java Runtime Version 7 or higher.\n" "(<a href=\"%(java)s\">Oracle</a>,\n" "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n" @@ -1250,8 +1055,7 @@ msgid "" "<br />\n" "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n" "or type <tt>java -version</tt> at your command prompt.\n" -"Only two platforms do not require Java to be installed before I2P is " -"installed, those platforms are:" +"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:" msgstr "" #: i2p2www/pages/downloads/list.html:50 @@ -1261,8 +1065,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:50 msgid "" "Android comes with a Java virtual machine\n" -"as part of the platform, which I2P for Android uses. Therefore it is not " -"necessary to install Java to use\n" +"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n" "I2P for Android." msgstr "" @@ -1273,8 +1076,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:53 msgid "" "On Debian and Ubuntu when using\n" -"a .deb package to install, the system will automatically install and " -"configure a Java environment for you." +"a .deb package to install, the system will automatically install and configure a Java environment for you." msgstr "" #: i2p2www/pages/downloads/list.html:56 @@ -1294,8 +1096,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:58 msgid "" "Finally, you'll need to\n" -"configure applications to use I2P. Many applications can use I2P, but the" -" first application most people configure is a Web\n" +"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n" "Browser for browsing I2P sites. Detailed instructions are available on the" msgstr "" @@ -1342,10 +1143,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:106 msgid "" "It's now possible to install all I2P components using\n" -" a single package(<strong>No Java Required</strong>). To try out the" -" new installer, click here.\n" -" This bundle can also be used to configure a Firefox Profile. It " -"will not\n" +" a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n" +" This bundle can also be used to configure a Firefox Profile. It will not\n" " interfere with an existing I2P installation if one exists.\n" " " msgstr "" @@ -1360,8 +1159,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:116 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." msgstr "" #: i2p2www/pages/downloads/list.html:120 @@ -1371,14 +1170,10 @@ msgstr "" #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will " -"launch the GUI installer.\n" -" Depending on how your computer is set up, you may be able to start " -"the\n" -" installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file or\n" +"The most reliable way to launch the installer is from a terminal like this:\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n" +" Depending on how your computer is set up, you may be able to start the\n" +" installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file or\n" " right-clicking the file and selecting "Open with Java".\n" " Unfortunately, this behaviour is difficult to predict." msgstr "" @@ -1390,13 +1185,10 @@ msgstr "×”×ª×§× ×” בשורת הפקודה (headless):" #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially\n" -" useful for servers, containers, or certain virtual machines. If you " -"wish to\n" +"I2P can also be installed in a terminal environment, which may be especially\n" +" useful for servers, containers, or certain virtual machines. If you wish to\n" " use the installer without a GUI, you can use the command \n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to " -"follow\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n" " the install procedure in your terminal." msgstr "" @@ -1422,13 +1214,10 @@ msgstr "קיימות חבילות לדבי×ן ול××•×‘×•× ×˜×•." #: i2p2www/pages/downloads/list.html:174 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -" However, Debian Buster and Ubuntu Bionic (LTS) distributions will " -"have older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +" However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" " If you are not running Debian Sid or the latest Ubuntu release,\n" -" use our Debian repo or Launchpad PPA to ensure you're running the " -"latest I2P version." +" use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/list.html:182 @@ -1437,10 +1226,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:185 msgid "" -"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed\n" -" I2P, unfortunately this release fixes some IPC issues which will " -"force you to uninstall your current installation before installing this." +"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n" +" I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this." msgstr "" #: i2p2www/pages/downloads/list.html:189 @@ -1449,10 +1236,8 @@ msgstr "×ž×™× ×™×ž×•× RAM 512 MB; מומלץ 1 GB." #: i2p2www/pages/downloads/list.html:192 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them\n" -" completely before installing any other version. The apk's from " -"download.i2p2.de are signed by idk." +"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n" +" completely before installing any other version. The apk's from download.i2p2.de are signed by idk." msgstr "" #: i2p2www/pages/downloads/list.html:199 @@ -1470,39 +1255,27 @@ msgid "docker pull geti2p/i2p" msgstr "" #: i2p2www/pages/downloads/list.html:219 -msgid "Additional instructions for configuring your container can be found here." +msgid "" +"Additional instructions for configuring your container can be found here." msgstr "" #: i2p2www/pages/downloads/list.html:224 #, python-format msgid "" -"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s" -"#getting-the-i2p-code\">monotone</a>\n" -" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a " -"href=\"%(github)s\">Github</a>.\n" +"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n" +" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n" " <br />\n" -" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg)</code> then either\n" +" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n" " run the GUI installer or headless install as above." -msgstr "" -"לחילופין, ××ª× ×™×›×•×œ×™× ×œ×”×•×¨×™×“ ×ת קבצי המקור מ־<a href=\"%(monotoneurl)s" -"#getting-the-i2p-code\">monotone</a>\n" -" ×ו דרך גיט בכתובת <a href=\"%(gitrepo)s\">git.repo.i2p</a> ×ו מ<a " -"href=\"%(github)s\">גיטה×ב</a>.\n" -" <br />\n" -" הריצו <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg)</code> ול×חר מכן\n" -" הריצו ×ת ×”×”×ª×§× ×” הגרפית ×ו ×ת ×”×”×ª×§× ×” בשורת הפקודה כפי שמתו×ר לעיל." +msgstr "לחילופין, ××ª× ×™×›×•×œ×™× ×œ×”×•×¨×™×“ ×ת קבצי המקור מ־<a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n ×ו דרך גיט בכתובת <a href=\"%(gitrepo)s\">git.repo.i2p</a> ×ו מ<a href=\"%(github)s\">גיטה×ב</a>.\n <br />\n הריצו <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> ול×חר מכן\n הריצו ×ת ×”×”×ª×§× ×” הגרפית ×ו ×ת ×”×”×ª×§× ×” בשורת הפקודה כפי שמתו×ר לעיל." #: i2p2www/pages/downloads/list.html:234 #, python-format msgid "" -"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-" -"code\">git</a>\n" +"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n" " and on <a href=\"%(github)s\">Github</a>.\n" " Android builds require the I2P source.\n" -" See the documentation in the Android source for additional build " -"requirements and instructions." +" See the documentation in the Android source for additional build requirements and instructions." msgstr "" #: i2p2www/pages/downloads/list.html:251 @@ -1515,8 +1288,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:257 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." msgstr "" @@ -1531,21 +1303,14 @@ msgstr "×¢×“×›×•× ×™× ××•×˜×•×ž×˜×™×™× ×•×’× ×™×“× ×™×™× ××¤×©×¨×™×™× ×¢ #: i2p2www/pages/downloads/list.html:270 msgid "" "If you are running 0.7.5 or later, your router should detect the\n" -"new release. To upgrade simply click the 'Download Update' button on your" -" router console\n" +"new release. To upgrade simply click the 'Download Update' button on your router console\n" "when it appears." -msgstr "" -"×× ××ª× ×ž×¨×™×¦×™× 0.7.5 ומעלה, ×”× ×ª×‘ ×©×œ×›× ×מור לגלות\n" -"×ת הגרסה החדשה. ×¢×œÖ¾×ž× ×ª לשדרג, פשוט לחצו על כפתור 'הורדת עדכון' בממשק ×”× ×ª×‘" -"\n" -"×›×שר ×”×•× ×ž×•×¤×™×¢." +msgstr "×× ××ª× ×ž×¨×™×¦×™× 0.7.5 ומעלה, ×”× ×ª×‘ ×©×œ×›× ×מור לגלות\n×ת הגרסה החדשה. ×¢×œÖ¾×ž× ×ª לשדרג, פשוט לחצו על כפתור 'הורדת עדכון' בממשק ×”× ×ª×‘\n×›×שר ×”×•× ×ž×•×¤×™×¢." #: i2p2www/pages/downloads/list.html:276 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router\n" -"since 0.9.9. Routers older than 0.9.9 will fail to verify update files " -"signed by str4d,\n" +"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n" +"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n" "and will need to be manually updated using the process below." msgstr "" @@ -1553,8 +1318,7 @@ msgstr "" msgid "" "Download the file to your I2P\n" " installation directory and <b>rename as i2pupdate.zip</b>.\n" -" (alternately, you can get the source as above and run \"ant " -"updater\", then copy the\n" +" (alternately, you can get the source as above and run \"ant updater\", then copy the\n" " resulting i2pupdate.zip to your I2P installation directory). You do\n" " NOT need to unzip the file." msgstr "" @@ -1581,25 +1345,15 @@ msgstr "גרס×ות קודמות" #: i2p2www/pages/downloads/list.html:316 #, python-format msgid "" -"Previous releases are available on <a " -"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google " -"Code</a>\n" +"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n" "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n" -"and within the I2P network on <a " -"href=\"http://%(echelon)s/\">%(echelon)s</a>." -msgstr "" -"× ×™×ª×Ÿ ×œ×ž×¦×•× ×’×¨×¡×ות קודמות ב<a " -"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">גוגל קוד</a>," -"\n" -"ב־<a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n" -"ובתוך רשת ×”Ö¾I2P בכתובת <a href=\"http://%(echelon)s/\">%(echelon)s</a>." +"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>." +msgstr "× ×™×ª×Ÿ ×œ×ž×¦×•× ×’×¨×¡×ות קודמות ב<a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">גוגל קוד</a>,\nב־<a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\nובתוך רשת ×”Ö¾I2P בכתובת <a href=\"http://%(echelon)s/\">%(echelon)s</a>." #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG bundle for Mac OS. It installs and " -"behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" @@ -1607,61 +1361,44 @@ msgstr "" #, python-format msgid "" "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n" -"<code>ARM(M1)</code> Macs in emulated mode, but the performance is " -"unknown. M1 Mac\n" -"users should report results to us at the <a href=\"%(perf)s\">Gitlab " -"Repository</a>." +"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n" +"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:18 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:27 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on <a href=\"%(browser)s\">the browser configuration\n" "page</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:34 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" #: i2p2www/pages/downloads/mac.html:61 msgid "" -"Download that file and double-click on it. Accept the License Agreement," -" then\n" -"drag the <code>I2P</code> icon on top of the <code>Applications</code> " -"icon.\n" +"Download that file and double-click on it. Accept the License Agreement, then\n" +"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n" "Launch I2P from Finder." msgstr "" @@ -1671,18 +1408,14 @@ msgstr "" #: i2p2www/pages/downloads/mac.html:69 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:75 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1690,77 +1423,45 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n" "which has further instructions." -msgstr "" -"ל×חר הרצת ×ª×•×›× ×ª ×”×”×ª×§× ×” על ×—×œ×•× ×•×ª, פשוט לחצו על הכפתור \"התחל ×ת I2P\",\n" -"מה שיפתח ×ת <a href=\"http://localhost:7657/index.jsp\">ממשק ×”× ×ª×‘</a>\n" -"המכיל הור×ות × ×•×¡×¤×•×ª." +msgstr "ל×חר הרצת ×ª×•×›× ×ª ×”×”×ª×§× ×” על ×—×œ×•× ×•×ª, פשוט לחצו על הכפתור \"התחל ×ת I2P\",\nמה שיפתח ×ת <a href=\"http://localhost:7657/index.jsp\">ממשק ×”× ×ª×‘</a>\nהמכיל הור×ות × ×•×¡×¤×•×ª." #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." -msgstr "" -"במערכות דמויות ×™×•× ×™×§×¡, × ×™×ª×Ÿ להריץ ×ת I2P כשירות\n" -"על־ידי שימוש בתסריט \"i2prouter\" ×”×ž×ž×•×§× ×‘×ª×™×§×™×” ×©×‘×—×¨×ª× ×¢×‘×•×¨ I2P.\n" -"מעבר לתיקיה זו והרצת הפקודה \"sh i2prouter status\" ×™×מר ×œ×›× ×ž×”\n" -"מצב ×”× ×ª×‘. ×”××¨×’×•×ž× ×˜×™× â€\"start\", â€\"stop\" ו־\"restart\" ×©×•×œ×˜×™× ×¢×œ " -"השירות.\n" -"× ×™×ª×Ÿ ×œ×”×™×›× ×¡ ל<a href=\"http://localhost:7657/index.jsp\">ממשק ×”× ×ª×‘</a>\n" -"×‘×ž×™×§×•× ×”×¨×’×™×œ שלו.\n" -"עבור ×ž×©×ª×ž×©×™× ×©×œ OpenSolaris ומערכות ×חרות בהן העוטף (i2psvc) ××™× ×• × ×ª×ž×š,\n" -"הריצו ×ת ×”× ×ª×‘ ×¢× ×”×¤×§×•×“×” \"sh runplain.sh\" ×‘×ž×§×•× ×–×ת." +msgstr "במערכות דמויות ×™×•× ×™×§×¡, × ×™×ª×Ÿ להריץ ×ת I2P כשירות\nעל־ידי שימוש בתסריט \"i2prouter\" ×”×ž×ž×•×§× ×‘×ª×™×§×™×” ×©×‘×—×¨×ª× ×¢×‘×•×¨ I2P.\nמעבר לתיקיה זו והרצת הפקודה \"sh i2prouter status\" ×™×מר ×œ×›× ×ž×”\nמצב ×”× ×ª×‘. ×”××¨×’×•×ž× ×˜×™× â€\"start\", â€\"stop\" ו־\"restart\" ×©×•×œ×˜×™× ×¢×œ השירות.\n× ×™×ª×Ÿ ×œ×”×™×›× ×¡ ל<a href=\"http://localhost:7657/index.jsp\">ממשק ×”× ×ª×‘</a>\n×‘×ž×™×§×•× ×”×¨×’×™×œ שלו.\nעבור ×ž×©×ª×ž×©×™× ×©×œ OpenSolaris ומערכות ×חרות בהן העוטף (i2psvc) ××™× ×• × ×ª×ž×š,\nהריצו ×ת ×”× ×ª×‘ ×¢× ×”×¤×§×•×“×” \"sh runplain.sh\" ×‘×ž×§×•× ×–×ת." #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>." -msgstr "" -"בעת ×”×”×ª×§× ×” ×‘×¤×¢× ×”×¨××©×•× ×”, ×× × ×–×›×¨×• <b>להגדיר ×ת ×”Ö¾NAT/חומת ×”×ש</b>\n" -"×× ××ª× ×™×›×•×œ×™×. שימו לב לפתחות ×”×¤×•× ×•×ª כלפי ×”××™× ×˜×¨× ×˜ בהן I2P משתמשת\n" -"â€<a href=\"%(faq)s#ports\">המתו×רות ×›×ן</a>.\n" -"×× ×¤×ª×—×ª× ×‘×”×¦×œ×—×” ×ת הפתחה לתקשורת TCP × ×›× ×¡×ª, ×פשרו תקשורת TCP\n" -"× ×›× ×¡×ª ×’× ×‘<a href=\"http://localhost:7657/confignet.jsp\">עמוד הגדרות " -"התצורה</a>." +msgstr "בעת ×”×”×ª×§× ×” ×‘×¤×¢× ×”×¨××©×•× ×”, ×× × ×–×›×¨×• <b>להגדיר ×ת ×”Ö¾NAT/חומת ×”×ש</b>\n×× ××ª× ×™×›×•×œ×™×. שימו לב לפתחות ×”×¤×•× ×•×ª כלפי ×”××™× ×˜×¨× ×˜ בהן I2P משתמשת\nâ€<a href=\"%(faq)s#ports\">המתו×רות ×›×ן</a>.\n×× ×¤×ª×—×ª× ×‘×”×¦×œ×—×” ×ת הפתחה לתקשורת TCP × ×›× ×¡×ª, ×פשרו תקשורת TCP\n× ×›× ×¡×ª ×’× ×‘<a href=\"http://localhost:7657/confignet.jsp\">עמוד הגדרות התצורה</a>." #: i2p2www/pages/downloads/post-install.html:28 msgid "" "Also, please review and <b>adjust the bandwidth settings</b> on the\n" "<a href=\"http://localhost:7657/config.jsp\">configuration page</a>,\n" "as the default settings of 96 KBps down / 40 KBps up are fairly slow." -msgstr "" -"כמו כן, ×× × ×‘×“×§×• ×ת <b>הגדרות רוחב הפס</b>\n" -"ב<a href=\"http://localhost:7657/config.jsp\">עמוד הגדרות התצורה</a>,\n" -"שכן הגדרות ברירת המחדל של 96 ק\"ב/×©× ×™×” בהורדה ו־40 ק\"ב/×©× ×™×” בהעל××” הן די" -" ×יטיות." +msgstr "כמו כן, ×× × ×‘×“×§×• ×ת <b>הגדרות רוחב הפס</b>\nב<a href=\"http://localhost:7657/config.jsp\">עמוד הגדרות התצורה</a>,\nשכן הגדרות ברירת המחדל של 96 ק\"ב/×©× ×™×” בהורדה ו־40 ק\"ב/×©× ×™×” בהעל××” הן די ×יטיות." #: i2p2www/pages/downloads/redirect.html:2 msgid "Downloading..." @@ -1771,9 +1472,7 @@ msgstr "מוריד..." msgid "" "Your download will begin shortly. If it doesn't start within 5 seconds, " "click <a href=\"%(url)s\">here</a>." -msgstr "" -"ההורדה תתחיל תוך זמן קצר. ×× ×”×™× ×œ× ×ž×ª×—×™×œ×” תוך 5 ×©× ×™×•×ª, לחצו <a " -"href=\"%(url)s\">×›×ן</a>." +msgstr "ההורדה תתחיל תוך זמן קצר. ×× ×”×™× ×œ× ×ž×ª×—×™×œ×” תוך 5 ×©× ×™×•×ª, לחצו <a href=\"%(url)s\">×›×ן</a>." #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4 msgid "Mirror selection" @@ -1795,12 +1494,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -1810,12 +1506,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." msgstr "" #: i2p2www/pages/downloads/windows.html:18 @@ -1848,10 +1541,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" msgstr "" @@ -1861,15 +1552,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" msgstr "" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." msgstr "" @@ -1879,15 +1568,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." msgstr "" #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." msgstr "" @@ -1912,7 +1599,8 @@ msgid "https://geti2p.net" msgstr "" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "" #: i2p2www/pages/downloads/windows.html:83 @@ -1921,22 +1609,19 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." msgstr "" #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." msgstr "" #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." msgstr "" @@ -1946,8 +1631,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." msgstr "" #: i2p2www/pages/downloads/windows.html:109 @@ -1956,18 +1641,15 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." msgstr "" #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." msgstr "" @@ -1997,10 +1679,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." msgstr "" #: i2p2www/pages/downloads/windows.html:147 @@ -2013,8 +1693,7 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." msgstr "" @@ -2033,22 +1712,20 @@ msgid "Here we have an overview of the applications." msgstr "" #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." msgstr "" #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the <a " -"href=\"https://localhost:7657/home\">router console homepage</a> to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n" "get started." msgstr "" @@ -2058,8 +1735,8 @@ msgstr "×œ× × ×ž×¦×" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." msgstr "כן ... המש×ב, ×ותו חיפשת, ×§×™×™× ×‘×©× ×©×•× ×”, ×œ× ×§×™×™× ×ו הוסר." #: i2p2www/pages/global/error_500.html:5 @@ -2128,9 +1805,7 @@ msgstr "פרויקט ×”××™× ×˜×¨× ×˜ הבלתי × ×¨××”" msgid "" "This page was last updated in %(lastupdated)s and is accurate for router " "version %(accuratefor)s." -msgstr "" -"עמוד ×–×” עודכן ל××—×¨×•× ×” ב־%(lastupdated)s ×•×”×•× ×ž×“×•×™×§ עבור גרסת ×”× ×ª×‘ " -"%(accuratefor)s." +msgstr "עמוד ×–×” עודכן ל××—×¨×•× ×” ב־%(lastupdated)s ×•×”×•× ×ž×“×•×™×§ עבור גרסת ×”× ×ª×‘ %(accuratefor)s." #: i2p2www/pages/global/layout.html:84 #, python-format @@ -2473,8 +2148,7 @@ msgstr "×–×¨× Atom של ישיבות I2P" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "<a href=\"%(mtgforum)s\">the meetings forum</a>." @@ -2483,13 +2157,9 @@ msgstr "" #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"<a href=\"%(blogindex)s\">Status updates</a> from developers are also " -"available." -msgstr "" -"×× ×™×© ×œ×›× ×ž×©×”×• לדון עליו, ×× × ×ž×¦×ו ×ת ×”×ž×¤×ª×—×™× ×‘Ö¾IRC בערוץ ‎#i2p-dev.\n" -"â€×™×©× × ×’× <a href=\"%(blogindex)s\">×¢×“×›×•× ×™ מצב</a> מהמפתחי×." +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available." +msgstr "×× ×™×© ×œ×›× ×ž×©×”×• לדון עליו, ×× × ×ž×¦×ו ×ת ×”×ž×¤×ª×—×™× ×‘Ö¾IRC בערוץ ‎#i2p-dev.\nâ€×™×©× × ×’× <a href=\"%(blogindex)s\">×¢×“×›×•× ×™ מצב</a> מהמפתחי×." #: i2p2www/pages/meetings/show.html:2 #, python-format @@ -2521,23 +2191,14 @@ msgid "" "<a href=\"%(bibtex)s\">BibTeX source page</a> for examples.<br />\n" "Remember to include URLs if possible:\n" "<a href=\"%(citeseer)s\">offline papers are less useful</a>." -msgstr "" -"× × ×©×œ×—×• רשומות חדשות ×ו ×ž×ª×•×§× ×•×ª\n" -"לכתובת <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br" -" />\n" -"×× ××ª× ×™×›×•×œ×™×, × × ×¡×“×¨×• ×ותן ×›Ö¾BibTex; ר×ו ×ת\n" -"â€<a href=\"%(bibtex)s\">עמוד המקור של BibTex</a> לדוגמ×ות.<br />\n" -"זכרו לכלול כתובות רשת ×× ×”×“×‘×¨ ×פשרי:\n" -"â€<a href=\"%(citeseer)s\">×ž×¡×ž×›×™× ×œ×Ö¾×ž×§×•×•× ×™× ×”× ×¤×—×•×ª שימושיי×</a>." +msgstr "× × ×©×œ×—×• רשומות חדשות ×ו ×ž×ª×•×§× ×•×ª\nלכתובת <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br />\n×× ××ª× ×™×›×•×œ×™×, × × ×¡×“×¨×• ×ותן ×›Ö¾BibTex; ר×ו ×ת\nâ€<a href=\"%(bibtex)s\">עמוד המקור של BibTex</a> לדוגמ×ות.<br />\nזכרו לכלול כתובות רשת ×× ×”×“×‘×¨ ×פשרי:\nâ€<a href=\"%(citeseer)s\">×ž×¡×ž×›×™× ×œ×Ö¾×ž×§×•×•× ×™× ×”× ×¤×—×•×ª שימושיי×</a>." #: i2p2www/pages/papers/list.html:80 #, python-format msgid "" "The source code for this page was adapted from\n" "<a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>." -msgstr "" -"קוד המקור של עמוד ×–×” הות××\n" -"מ<a href=\"%(anonbib)s\">הביבליוגרפיה של Free Haven על ×× ×•× ×™×ž×™×•×ª</a>." +msgstr "קוד המקור של עמוד ×–×” הות××\nמ<a href=\"%(anonbib)s\">הביבליוגרפיה של Free Haven על ×× ×•× ×™×ž×™×•×ª</a>." #: i2p2www/pages/site/contact.html:4 msgid "Email" @@ -2563,9 +2224,9 @@ msgstr "" #, python-format msgid "" "Most of the discussion about I2P's development happens on the <a " -"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." +"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." msgstr "" #: i2p2www/pages/site/contact.html:30 @@ -2575,34 +2236,19 @@ msgstr "" #: i2p2www/pages/site/contact.html:32 msgid "" "<ul>\n" -" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - " -"https://mastodon.social/@i2p</a></li>\n" -" <li><a href=\"https://twitter.com/GetI2P\">Twitter - " -"https://twitter.com/GetI2P</a></li>\n" -" <li><a href=\"https://old.reddit.com/i2p\">Reddit - " -"https://old.reddit.com/i2p</a></li>\n" +" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n" +" <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n" +" <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n" "</ul>" msgstr "" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like <a " -"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" -" <a href=\"http://www.einirc.de/\">EIN</a> and <a " -"href=\"http://freenode.net/\">Freenode</a>.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." -msgstr "" -"רשת ×”Ö¾IRC הר×שית ×©×œ× ×• ×”×™× ×¨×©×ª ×”Ö¾Irc2P שבתוך I2P; מסלול ברירת מחדל לרשת זו" -" מותקן בעת ×”×ª×§× ×ª ×”× ×ª×‘.\n" -" ×× ×—× ×• × ×ž×¦××™× ×’× ×‘×¨×©×ª×•×ª ×¡×˜× ×“×¨×˜×™×•×ª ×חדות כמו <a " -"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" -" â€<a href=\"http://www.einirc.de/\">EIN</a> ו־<a " -"href=\"http://freenode.net/\">Freenode</a>.\n" -" כל ×”×¢×¨×•×¦×™× ×”×§×©×•×¨×™× ×œÖ¾I2P ברשתות ×לה ×ž×§×•×©×¨×™× ×œ×¢×¨×•×¦×™× ×”×¨××©×™×™× ×‘Ö¾Irc2P דרך" -" רובוטי ממסור." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" +" <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." +msgstr "רשת ×”Ö¾IRC הר×שית ×©×œ× ×• ×”×™× ×¨×©×ª ×”Ö¾Irc2P שבתוך I2P; מסלול ברירת מחדל לרשת זו מותקן בעת ×”×ª×§× ×ª ×”× ×ª×‘.\n ×× ×—× ×• × ×ž×¦××™× ×’× ×‘×¨×©×ª×•×ª ×¡×˜× ×“×¨×˜×™×•×ª ×חדות כמו <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n â€<a href=\"http://www.einirc.de/\">EIN</a> ו־<a href=\"http://freenode.net/\">Freenode</a>.\n כל ×”×¢×¨×•×¦×™× ×”×§×©×•×¨×™× ×œÖ¾I2P ברשתות ×לה ×ž×§×•×©×¨×™× ×œ×¢×¨×•×¦×™× ×”×¨××©×™×™× ×‘Ö¾Irc2P דרך רובוטי ממסור." #: i2p2www/pages/site/contact.html:49 msgid "Channel list:" @@ -2643,8 +2289,8 @@ msgstr "×“×™×•× ×™ מפתח I2P - כל הקשור לפיתוח של I2P" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" msgstr "דיון כללי I2P - כל דבר ש××™× ×• מת××™× ×œ×¨×©×™×ž×” ×חרת הולך לכ×ן" #: i2p2www/pages/site/contact.html:80 @@ -2816,7 +2462,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/contact.html:189 @@ -3063,7 +2710,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/contact.html:397 @@ -3116,16 +2764,11 @@ msgstr "" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.<br>\n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n" "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.<br>\n" -"We work together to build a free world without hate, racism and " -"violence.<br>\n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n" +"We work together to build a free world without hate, racism and violence.<br>\n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." msgstr "" #: i2p2www/pages/site/faq.html:2 @@ -3146,8 +2789,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" msgstr "" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 @@ -3161,11 +2803,9 @@ msgstr "×œ× ×ª×‘ שלי יש מעט מ×וד ×¢×ž×™×ª×™× ×¤×¢×™×œ×™×, ×”×× #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" -msgstr "" -"×× ×™ ×ž×ª× ×’×“/ת לסוגי תוכן מסוימי×. כיצד ×œ×”×™×ž× ×¢ מלהפיץ ×ות×, ל×חסן ××•×ª× ×ו " -"לגשת ×ליה×?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" +msgstr "×× ×™ ×ž×ª× ×’×“/ת לסוגי תוכן מסוימי×. כיצד ×œ×”×™×ž× ×¢ מלהפיץ ×ות×, ל×חסן ××•×ª× ×ו לגשת ×ליה×?" #: i2p2www/pages/site/faq.html:14 msgid "Is it possible to block I2P?" @@ -3175,9 +2815,7 @@ msgstr "" msgid "" "In <code>wrapper.log</code> I see an error stating <code>Protocol family " "unavailable</code> when I2P is loading" -msgstr "" -"ב< code> wrapper.log </ code> ×× ×™ רו××” שגי××” ×”×ž×¦×™×™× ×ª <code> </ code> " -"פרוטוקול משפחה ×œ× ×–×ž×™×Ÿ ×›×שר I2P × ×˜×¢×Ÿ" +msgstr "ב< code> wrapper.log </ code> ×× ×™ רו××” שגי××” ×”×ž×¦×™×™× ×ª <code> </ code> פרוטוקול משפחה ×œ× ×–×ž×™×Ÿ ×›×שר I2P × ×˜×¢×Ÿ" #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189 msgid "Most of the I2P Sites within I2P are down?" @@ -3225,8 +2863,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" +"How can I access the web console from my other machines or password protect " +"it?" msgstr "כיצד לגשת לממשק הרשת של ×”× ×ª×‘ ×ž×ž×—×©×‘×™× ××—×¨×™× ×ו להגן עליו ×¢× ×¡×¡×ž×”?" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 @@ -3239,8 +2877,7 @@ msgstr "×”×× × ×™×ª×Ÿ להשתמש ב־I2P בתור מתווך SOCKS?" #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" msgstr "כיצד לגשת ל־IRC, ×œ×‘×™×˜×•×¨× ×˜ ×ו ×œ×©×™×¨×•×ª×™× ××—×¨×™× ×‘××™× ×˜×¨× ×˜ הרגיל?" #: i2p2www/pages/site/faq.html:34 @@ -3277,8 +2914,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 @@ -3305,14 +2942,12 @@ msgstr "" msgid "" "My active peers / known peers / participating tunnels / connections / " "bandwidth vary dramatically over time! Is anything wrong?" -msgstr "" -"×”×¢×ž×™×ª×™× ×”×¤×¢×™×œ×™× / ×”×¢×ž×™×ª×™× ×”×ž×•×›×¨×™× / ×”×ž×¡×œ×•×œ×™× ×”×ž×©×ª×ª×¤×™× / ×”×—×™×‘×•×¨×™× / רוחב " -"הפס שלי ×ž×©×ª× ×™× ×ž×וד במשך הזמן! ×”×× ×ž×©×”×• ××™× ×• כשורה?" +msgstr "×”×¢×ž×™×ª×™× ×”×¤×¢×™×œ×™× / ×”×¢×ž×™×ª×™× ×”×ž×•×›×¨×™× / ×”×ž×¡×œ×•×œ×™× ×”×ž×©×ª×ª×¤×™× / ×”×—×™×‘×•×¨×™× / רוחב הפס שלי ×ž×©×ª× ×™× ×ž×וד במשך הזמן! ×”×× ×ž×©×”×• ××™× ×• כשורה?" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" msgstr "" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 @@ -3326,41 +2961,31 @@ msgstr "יש לי ש×לה!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the <a href=\"%(java)s\">Java programming language</a>." -" \n" +"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An <a href=\"%(android)s\">Android port</a> is also available." msgstr "" #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." msgstr "" #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." msgstr "" #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "<a href=\"%(chart)s\">%(chart)s</a>.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." @@ -3369,8 +2994,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "<a href=\"%(alt)s\">alternative clients</a> which don't require Java." msgstr "" @@ -3381,36 +3005,22 @@ msgstr "" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the <a href=\"%(browsers)s\">browser configuration page</a>." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>." msgstr "" #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." msgstr "" #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" msgstr "" @@ -3418,50 +3028,34 @@ msgstr "" #: i2p2www/pages/site/faq.html:129 msgid "" "<b>Distribution</b><br> \n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an <a " -"href=\"#exit\">exit node</a> (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route <i>any</i> traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." msgstr "" #: i2p2www/pages/site/faq.html:139 msgid "" "<b>Storage</b><br> \n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, <a " -"href=\"http://freenetproject.org/\">Freenet</a>.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n" "By running I2P, you are not storing content for anyone." msgstr "" #: i2p2www/pages/site/faq.html:147 msgid "" "<b>Access</b><br>\n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." msgstr "" #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." msgstr "" #: i2p2www/pages/site/faq.html:161 @@ -3472,9 +3066,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" msgstr "" #: i2p2www/pages/site/faq.html:168 @@ -3489,8 +3083,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." msgstr "" #: i2p2www/pages/site/faq.html:177 @@ -3501,8 +3095,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:181 msgid "" -"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> " -"to take effect, you must completely\n" +"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n" "stop the router and the wrapper. Clicking <em>Restart</em> on your\n" "router console will NOT reread this file! You must\n" "click <em>Shutdown</em>, wait 11 minutes, then start I2P." @@ -3511,11 +3104,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites." msgstr "" @@ -3525,13 +3116,9 @@ msgstr "למה I2P מ×זין בפורט 32000?" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." msgstr "" #: i2p2www/pages/site/faq.html:206 @@ -3544,47 +3131,32 @@ msgstr "" #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a <a " -"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." +"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." msgstr "" #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the <a " -"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel " -"configuration page</a>), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to <code>localhost " -"6668</code>. \n" -"HexChat-like client users can create a new network with the server " -"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n" +"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" msgstr "" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the " -"top of your router console for instructions." +"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top " +"of your router console for instructions." msgstr "" #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." msgstr "" @@ -3598,23 +3170,23 @@ msgstr "" #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." msgstr "" #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." msgstr "" #: i2p2www/pages/site/faq.html:261 @@ -3637,12 +3209,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." +"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." msgstr "" #: i2p2www/pages/site/faq.html:278 @@ -3652,8 +3221,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to " -"arbitrary remote UDP ports, allowing for replies" +"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary" +" remote UDP ports, allowing for replies" msgstr "" #: i2p2www/pages/site/faq.html:281 @@ -3663,9 +3232,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" msgstr "" #: i2p2www/pages/site/faq.html:285 @@ -3718,133 +3285,100 @@ msgstr "" #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the bob.config file." msgstr "" #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.HTTPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +" May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." msgstr "" #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.SSDPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +" May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." msgstr "" #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>." +" May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>." msgstr "" #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" -" May be changed in the <code>clients.config</code> file with the" -" SAM command line option <code>sam.udp.port=nnnn</code>." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +" May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>." msgstr "" #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the <code>clients.config</code> file." msgstr "" #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the <code>clients.config</code>file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." +" May also be configured to be bound to a specific interface or all interfaces in that file." msgstr "" #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the <code>clients.config</code> file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the <code>jetty.xml</code> file." +" May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file." msgstr "" #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." +" May also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." msgstr "" #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." msgstr "" #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." msgstr "" #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." msgstr "" @@ -3860,22 +3394,16 @@ msgstr "" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as <i>http://website.i2p</i> are references" -" to a long, random string known as a <b>destination</b>. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a <a " -"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." +"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." msgstr "" #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." msgstr "" #: i2p2www/pages/site/faq.html:545 @@ -3884,8 +3412,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." msgstr "" #: i2p2www/pages/site/faq.html:547 @@ -3905,8 +3433,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" msgstr "" @@ -3927,17 +3454,14 @@ msgstr "" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example <a " -"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" msgstr "" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" msgstr "" #: i2p2www/pages/site/faq.html:593 @@ -3946,114 +3470,84 @@ msgstr "" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to <a " -"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." +"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." msgstr "" #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to <a " -"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and " -"hit \"Graceful restart\", \n" +"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" msgstr "" #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at <code>http://(System_IP):7657</code> and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." msgstr "" #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." msgstr "" #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"<a " -"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" msgstr "" #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." msgstr "" #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." msgstr "" #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>." msgstr "" #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project <a " -"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-" -"idea\">recommends against using BitTorrent over Tor</a>, \n" +"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n" "as there are serious anonymity-related issues associated with doing so." msgstr "" #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." msgstr "" #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our " -"forums, if you would like to learn more about running an outproxy." +"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy." msgstr "" #: i2p2www/pages/site/faq.html:679 @@ -4063,157 +3557,118 @@ msgstr "" #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" msgstr "" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." msgstr "" #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." msgstr "" #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through <a " -"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport" -" Layer Security (TLS)</a>. \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." msgstr "" #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"<a " -"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" +"For more information, you may read the Tor FAQ's answer to this question:\n" +"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" msgstr "" #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on <a " -"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" -"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our " -"forums</a> as well." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" +"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well." msgstr "" #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you " -"choose to trust the outproxy operator." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator." msgstr "" #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." msgstr "" #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." msgstr "" #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." msgstr "" #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the <a " -"href=\"#manual_reseed\">reseed instructions</a>." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>." msgstr "" #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." msgstr "" #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." msgstr "" #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." msgstr "" @@ -4221,10 +3676,8 @@ msgstr "" #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, " -"hostname, and port." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port." msgstr "" #: i2p2www/pages/site/faq.html:789 @@ -4233,18 +3686,12 @@ msgstr "" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." msgstr "" @@ -4282,8 +3729,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" msgstr "" #: i2p2www/pages/site/faq.html:815 @@ -4298,12 +3745,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." msgstr "" @@ -4313,12 +3757,13 @@ msgstr "" #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" msgstr "" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" msgstr "" #: i2p2www/pages/site/faq.html:830 @@ -4327,52 +3772,33 @@ msgstr "" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using <a " -"href=\"https://www.torproject.org/\">Tor</a>." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>." msgstr "" #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." msgstr "" #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." msgstr "" #: i2p2www/pages/site/faq.html:876 @@ -4389,10 +3815,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"<code>java -version</code> at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." msgstr "" @@ -4402,8 +3826,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." msgstr "" @@ -4413,10 +3836,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for <em>share bandwidth percentage</em> on the " -"<a href=\"http://localhost:7657/config\">configuration</a> page." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page." msgstr "" #: i2p2www/pages/site/faq.html:901 @@ -4425,11 +3846,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." -msgstr "" -"×•×“× ×©×תה מפעיל ×ת הגרסה ×”××—×¨×•× ×” של I2P כדי לקבל ×ת ×”×™×ª×¨×•× ×•×ª של ×ª×™×§×•× ×™ " -"ב××’×™× ×•×‘×™×¦×•×¢×™× ×ž×•×’×‘×¨×™×." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." +msgstr "×•×“× ×©×תה מפעיל ×ת הגרסה ×”××—×¨×•× ×” של I2P כדי לקבל ×ת ×”×™×ª×¨×•× ×•×ª של ×ª×™×§×•× ×™ ב××’×™× ×•×‘×™×¦×•×¢×™× ×ž×•×’×‘×¨×™×." #: i2p2www/pages/site/faq.html:907 msgid "Memory allocation" @@ -4437,12 +3856,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting <code>wrapper.java.maxmemory</code> in the file " -"<code>wrapper.config</code>." +"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>." msgstr "" #: i2p2www/pages/site/faq.html:915 @@ -4452,8 +3868,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." msgstr "" @@ -4464,11 +3879,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on " -"diagnosing, building, and testing methods." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods." msgstr "" #: i2p2www/pages/site/faq.html:929 @@ -4477,154 +3889,107 @@ msgstr "" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the <a " -"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" -"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a " -"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> " -"page." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" +"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page." msgstr "" #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" msgstr "" #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." msgstr "" #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" msgstr "" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." msgstr "" #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." msgstr "" #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." msgstr "" #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" msgstr "" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." msgstr "" #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." msgstr "" #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." msgstr "" #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." msgstr "" #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, <a href=\"%(downloadslist)s\">install the latest " -"release</a>." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>." msgstr "" #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." msgstr "" @@ -4646,14 +4011,10 @@ msgstr "" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-" -"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" -" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this" -" \n" -" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and" -" follow up on IRC in #i2p<" +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" +" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n" +" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<" msgstr "" #: i2p2www/pages/site/faq.html:1054 @@ -4662,13 +4023,10 @@ msgstr "" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." msgstr "" #: i2p2www/pages/site/faq.html:1070 @@ -4679,8 +4037,7 @@ msgid "" " <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n" " <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n" "</ul>\n" -"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it " -"here (with the answer, hopefully)." +"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)." msgstr "" #: i2p2www/pages/site/impressum.html:4 @@ -4694,8 +4051,8 @@ msgstr "הרשת ×”×× ×•× ×™×ž×™×ª I2P" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." msgstr "" #: i2p2www/pages/site/index.html:8 @@ -4704,8 +4061,7 @@ msgstr "" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " msgstr "" @@ -4721,14 +4077,10 @@ msgstr "מה ×”×•× I2P?" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." msgstr "" #: i2p2www/pages/site/index.html:23 @@ -4738,13 +4090,13 @@ msgstr "" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/index.html:27 @@ -4758,8 +4110,8 @@ msgstr "" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." msgstr "" #: i2p2www/pages/site/index.html:33 @@ -4808,8 +4160,7 @@ msgstr "×§×™×©×•×¨×™× ×•×ž×§×•×¨×•×ª מומלצי×" #, python-format msgid "" "See also the page with\n" -"<a href=\"%(media)s\">links to presentations, videos, and tutorials about" -" I2P</a>." +"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>." msgstr "" #: i2p2www/pages/site/links.html:12 @@ -4835,4 +4186,3 @@ msgstr "לוחות, ×תרי חדשות, ×חרי×" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" msgstr "×“×‘×¨×™× ×ž×וד ×™×©× ×™×" - diff --git a/i2p2www/translations/hu/LC_MESSAGES/comparison.po b/i2p2www/translations/hu/LC_MESSAGES/comparison.po index 03a9adb0404398aa2b57b04892cecbdc9d7f3794..d930498559d783161d05ce3b31ae1f7ab57921d9 100644 --- a/i2p2www/translations/hu/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/hu/LC_MESSAGES/comparison.po @@ -1,21 +1,22 @@ -# Hungarian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-10-04 00:57+0000\n" -"Last-Translator: erinm\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Hungarian (http://www.transifex.com/otf/I2P/language/hu/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: hu\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -23,34 +24,23 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." msgstr "" #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." @@ -58,20 +48,13 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -81,15 +64,11 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -104,10 +83,8 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -125,52 +102,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -178,19 +141,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -202,32 +161,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -236,36 +183,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -273,10 +207,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -290,7 +222,7 @@ msgstr "" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -425,7 +357,7 @@ msgstr "Rejtett Szolgáltatás" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" +msgid "I2P Site or Destination" msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 @@ -496,8 +428,7 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -516,10 +447,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -527,7 +456,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" #: i2p2www/pages/site/comparison/tor.html:96 @@ -566,8 +496,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -704,4 +634,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/hu/LC_MESSAGES/get-involved.po b/i2p2www/translations/hu/LC_MESSAGES/get-involved.po index 35ee425e4d6e80b7d1cd15c33b6d3cc53dd4a3ac..2bd8bd1fa77645b32631ffdad6f2889a6daf7c43 100644 --- a/i2p2www/translations/hu/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/hu/LC_MESSAGES/get-involved.po @@ -1,21 +1,22 @@ -# Hungarian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-06-19 15:11+0000\n" -"Last-Translator: Nyul Csoki <csokinyul@i2pmail.org>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Hungarian (http://www.transifex.com/otf/I2P/language/hu/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: hu\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -30,12 +31,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -50,44 +48,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -126,10 +113,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -159,10 +144,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -177,25 +160,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -221,8 +194,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -236,12 +208,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -252,10 +221,8 @@ msgstr "FordÃtás" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -266,17 +233,12 @@ msgstr "Dokumentáció" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -287,16 +249,11 @@ msgstr "Tesztelés" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -309,14 +266,10 @@ msgstr "Szolgáltatások" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -326,9 +279,9 @@ msgstr "Újratáplálás (reseed) folyamatban" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -372,8 +325,7 @@ msgstr "" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -381,7 +333,7 @@ msgstr "" msgid "Roadmap" msgstr "" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -442,84 +394,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -528,17 +457,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -546,29 +470,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -576,42 +494,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -655,72 +564,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -730,8 +619,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -744,33 +633,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -791,76 +674,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -870,25 +734,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -899,29 +756,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -931,10 +780,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -942,13 +789,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -959,43 +803,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1010,28 +847,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1042,8 +871,7 @@ msgstr "EltávolÃtva" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1057,8 +885,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1077,14 +904,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1093,17 +916,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1113,8 +933,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1136,32 +955,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1170,47 +982,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1222,12 +1026,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1252,8 +1053,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1272,8 +1073,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1302,20 +1102,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1387,8 +1183,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1401,24 +1196,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1428,22 +1214,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1479,21 +1257,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1517,10 +1290,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1531,8 +1302,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1545,10 +1315,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1558,7 +1326,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1579,7 +1348,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1587,13 +1357,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1601,7 +1372,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1610,8 +1382,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1643,35 +1414,28 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1679,29 +1443,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1728,12 +1486,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1743,10 +1499,8 @@ msgstr "Közösség" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1768,8 +1522,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1777,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1792,8 +1547,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1807,34 +1561,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1844,61 +1592,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1925,20 +1661,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1947,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1964,12 +1699,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1989,8 +1725,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2017,12 +1752,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2041,22 +1773,22 @@ msgstr "IDE használata az I2P-vel" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2073,8 +1805,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2091,14 +1823,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2177,34 +1909,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2214,20 +1938,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2244,22 +1964,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2271,10 +1988,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2284,38 +1999,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2333,23 +2040,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2363,11 +2064,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2378,34 +2076,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2418,18 +2109,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2443,16 +2130,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2472,67 +2157,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2556,8 +2231,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2573,44 +2248,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2618,8 +2283,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2628,64 +2292,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "FordÃtások" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2693,42 +2352,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2741,143 +2392,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2886,93 +2425,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2992,11 +2480,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3011,10 +2497,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3034,12 +2518,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3050,27 +2531,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3086,10 +2563,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3107,8 +2582,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3121,19 +2595,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3141,15 +2611,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3158,8 +2626,8 @@ msgstr "GYIK" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3175,67 +2643,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3260,10 +2726,8 @@ msgstr "Ãttekintés" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3272,21 +2736,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3309,8 +2769,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3320,18 +2779,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3341,10 +2795,8 @@ msgstr "Adatvédelmi irányelvek" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3353,17 +2805,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3372,10 +2822,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3386,18 +2834,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/id/LC_MESSAGES/about.po b/i2p2www/translations/id/LC_MESSAGES/about.po index 6fe5bb543530fc92701394963fad80247626306d..ff519d8a8717e2e4b852beca162524e13b56e1ff 100644 --- a/i2p2www/translations/id/LC_MESSAGES/about.po +++ b/i2p2www/translations/id/LC_MESSAGES/about.po @@ -1,24 +1,24 @@ -# Indonesian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Khairul Agasta <khairuldroids@gmail.com>, 2014 # Robert Dafis <robertdafis@gmail.com>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: Robert Dafis <robertdafis@gmail.com>\n" -"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)" -"\n" -"Plural-Forms: nplurals=1; plural=0\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Robert Dafis <robertdafis@gmail.com>, 2018\n" +"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: id\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -28,14 +28,9 @@ msgstr "Cient I2P alternatif" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"Implementasi client I2P utama menggunakan Java. Jika karena suatu alasan " -"tertentu anda tidak dapat menggunakan Java di perangkat anda, ada " -"beberapa alternatif implementasi yang dikembangkan oleh anggota " -"komunitas." +msgstr "Implementasi client I2P utama menggunakan Java. Jika karena suatu alasan tertentu anda tidak dapat menggunakan Java di perangkat anda, ada beberapa alternatif implementasi yang dikembangkan oleh anggota komunitas." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -43,30 +38,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">I2pd</a> adalah implementasi client I2P di C++.\n" -"Pada awal 2016, i2pd menjadi cukup stabil untuk digunakan dalam produksi," -" dan sejak musim panas 2016, semua API I2P sepenuhnya diterapkan." +msgstr "<a href=\"%(i2pd)s\">I2pd</a> adalah implementasi client I2P di C++.\nPada awal 2016, i2pd menjadi cukup stabil untuk digunakan dalam produksi, dan sejak musim panas 2016, semua API I2P sepenuhnya diterapkan." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> adalah fork aktif i2pd yang dikembangkan " -"untuk cryptocurrency Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> adalah fork aktif i2pd yang dikembangkan untuk cryptocurrency Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> adalah lient I2P yang dikembangkan " -"menggunakan bahasa pemrograman <a href=\"%(golang)s\">Go</a> . Proyek ini" -" masih dalam perkembangan awal." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> adalah lient I2P yang dikembangkan menggunakan bahasa pemrograman <a href=\"%(golang)s\">Go</a> . Proyek ini masih dalam perkembangan awal." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -78,11 +64,147 @@ msgstr "Glosarium" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Halaman ini menampilkan terminologi yang sering digunakan ketika " -"mendiskusikan I2P dan kriptografi." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -90,38 +212,27 @@ msgstr "Hall Of Fame " #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 msgid "Big thanks go to the following people who have donated to I2P!" -msgstr "" -"Terima kasih yang sebesar-besarnya kepada mereka yang telah mendonasikan " -"ke I2P!" +msgstr "Terima kasih yang sebesar-besarnya kepada mereka yang telah mendonasikan ke I2P!" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Jika anda telah melakukan donasi, silahkan kirimkan email ke <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" -"dengan nama atau alias Anda (dan homepage, jika ada) jadi kami dapat " -"mendaftarkan anda disini." +msgstr "Jika anda telah melakukan donasi, silahkan kirimkan email ke <a href=\"mailto:%(echelon)s\">echelon</a>\ndengan nama atau alias Anda (dan homepage, jika ada) jadi kami dapat mendaftarkan anda disini." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -135,12 +246,8 @@ msgstr "The Invisible Internet Project " #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -150,13 +257,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -165,15 +272,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -182,28 +289,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -212,36 +318,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -250,13 +355,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -265,38 +370,21 @@ msgstr "Perbandingan" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi" -" \n" -"anonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah" -" \n" -"daftar komprehensif sumber anonimitas - kedua freehaven \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi " -"Anonimitas</a>\n" -"dan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\n" -"melayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\n" -"untuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan " -"individu:" +msgstr "Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi \nanonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah \ndaftar komprehensif sumber anonimitas - kedua freehaven \n<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi Anonimitas</a>\ndan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\nmelayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\nuntuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan individu:" #: i2p2www/pages/site/about/intro.html:56 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman " -"jaringan lain:</a>" +msgstr "Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman jaringan lain:</a>" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -305,13 +393,9 @@ msgstr "Presentasi mengenai I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Berikut adalah link ke presentasi, video, dan tutorial tentang I2P. Link " -"ke makalah penelitian pada I2P juga tersedia <a href=\"%(papers)s\">di " -"sini</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Berikut adalah link ke presentasi, video, dan tutorial tentang I2P. Link ke makalah penelitian pada I2P juga tersedia <a href=\"%(papers)s\">di sini</a>." #: i2p2www/pages/site/about/media.html:8 #, python-format @@ -322,9 +406,7 @@ msgstr "Untuk meminta tambahan untuk Halaman ini, silahkan kirim ke %(email)s." msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"Link terbaru ada di bagian bawah di setiap bagian." +msgstr "\nLink terbaru ada di bagian bawah di setiap bagian." #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -337,10 +419,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"Presentasi IIP di CodeCon <a href=\"%(mp3)s\">MP3 audio</a>\n" -"<a href=\"%(transcript)s\">transkrip</a> Lance James (0x90), Februari " -"2002." +msgstr "Presentasi IIP di CodeCon <a href=\"%(mp3)s\">MP3 audio</a>\n<a href=\"%(transcript)s\">transkrip</a> Lance James (0x90), Februari 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -349,9 +428,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"Presentasi IIP di ToorCon <a href=\"%(mp3)s\">MP3 audio</a>\n" -"<a href=\"%(slides)s\">slide</a> Lance James (0x90), September 2002." +msgstr "Presentasi IIP di ToorCon <a href=\"%(mp3)s\">MP3 audio</a>\n<a href=\"%(slides)s\">slide</a> Lance James (0x90), September 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -361,12 +438,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To be atau I2P</a>\n" -"(Video Youtube)\n" -"Pengenalan kepada komunikasi anonim dengan I2P.\n" -"<a href=\"%(pdf)s\">To be atau I2P (PDF presentasi)</a>, Jens Kubieziel, " -"24C 3 Berlin, 28 Desember 2007." +msgstr "<a href=\"%(video)s\">To be atau I2P</a>\n(Video Youtube)\nPengenalan kepada komunikasi anonim dengan I2P.\n<a href=\"%(pdf)s\">To be atau I2P (PDF presentasi)</a>, Jens Kubieziel, 24C 3 Berlin, 28 Desember 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -374,15 +446,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Video diskusi I2P di Chemnitz Linux Tag</a>, Lars " -"Schimmer, 14-15 Maret 2009" +msgstr "<a href=\"%(video)s\">Video diskusi I2P di Chemnitz Linux Tag</a>, Lars Schimmer, 14-15 Maret 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -393,9 +462,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Ke Darknet I2P: Selamat Datang di Cipherspace</a> " -"Adrian Crenshaw. Schmoocon Firetalk, bulan January 2011" +msgstr "<a href=\"%(link)s\">Ke Darknet I2P: Selamat Datang di Cipherspace</a> Adrian Crenshaw. Schmoocon Firetalk, bulan January 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -403,111 +470,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Menggunakan teknologi untuk memajukan kebebasan</a>\n" -"(Youtube Video)\n" -"Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Maret " -"2011.\n" -"I2p dibahas pukul 10:00-20:00 di dalam video." +msgstr "<a href=\"%(link)s\">Menggunakan teknologi untuk memajukan kebebasan</a>\n(Youtube Video)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Maret 2011.\nI2p dibahas pukul 10:00-20:00 di dalam video." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Kelemahan Umum Darknet</a>\n" -"(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AJUDAN</a>, 11-15 " -"Juli 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Kelemahan Umum Darknet</a>\n(Youtube Video)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AJUDAN</a>, 11-15 Juli 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">Catatan Workshop I2P / Tor </a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 Agustus 2011." +msgstr "<a href=\"%(link)s\">Catatan Workshop I2P / Tor </a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 Agustus 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspaces Darknets: Overview Strategi Serangan - " -"DEF CON Versi Live (Youtube Video)</a>, <a href=\"%(studio)s\">\"versi " -"Studio\" (Youtube Video)</a>, Adrian Crenshaw <a " -"href=\"%(slides)s\">slide (ppt)</a> . DEF CON 19, Las Vegas, 7 Agustus " -"2011." +msgstr "<a href=\"%(live)s\">Cipherspaces Darknets: Overview Strategi Serangan - DEF CON Versi Live (Youtube Video)</a>, <a href=\"%(studio)s\">\"versi Studio\" (Youtube Video)</a>, Adrian Crenshaw <a href=\"%(slides)s\">slide (ppt)</a> . DEF CON 19, Las Vegas, 7 Agustus 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Ekosistem Modern cipherspace</a>, 0x375 " -"0x06 (Sesi Diskusi Thessaloniki Tech), 4 November 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Ekosistem Modern cipherspace</a>, 0x375 0x06 (Sesi Diskusi Thessaloniki Tech), 4 November 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2p - jaringan anonim</a>\n" -"(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 " -"Januari 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2p - jaringan anonim</a>\n(Youtube Video)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 Januari 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 Agustus 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 Agustus 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2p - masih hidup!</a> (pdf)</a>\n" -"<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 Desember 2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2p - masih hidup!</a> (pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 Desember 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, Real World Crypto, Stanford, 8 Januari 2016" +msgstr "Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 Januari 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -515,14 +543,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Onions and Garlic: the protocols of I2P\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, 17 Februari 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Onions and Garlic: the protocols of I2P\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 Februari 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -531,11 +553,7 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"The Invisible Internet Project - Penjelasan umum dan panduan teknologi\n" -"<a href=\"%(link)s\">(mp4)</a>\n" -"<a href=\"%(link2)s\">(webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Brussel, 4 Februari 2018" +msgstr "The Invisible Internet Project - Penjelasan umum dan panduan teknologi\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brussel, 4 Februari 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format @@ -555,12 +573,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2p Windows Tutorial</a>\n" -"(Youtube Video)\n" -"Panduan ini akan menunjukkan kepada anda tentang cara menginstal I2P di " -"Windows XP.\n" -"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2p Windows Tutorial</a>\n(Youtube Video)\nPanduan ini akan menunjukkan kepada anda tentang cara menginstal I2P di Windows XP.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -569,11 +582,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2p Debian Tutorial</a>\n" -"(Youtube Video)\n" -"Ini akan memandu anda dalam menginstal I2P pada sistem Debian Linux.\n" -"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2p Debian Tutorial</a>\n(Youtube Video)\nIni akan memandu anda dalam menginstal I2P pada sistem Debian Linux.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -582,56 +591,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Cara membuat situs anonim dalam I2P</a>\n" -"(Youtube Video)\n" -"Cara membuat sebuah situs web yang anonim di I2P.\n" -"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Cara membuat situs anonim dalam I2P</a>\n(Youtube Video)\nCara membuat sebuah situs web yang anonim di I2P.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" -"(Youtube Video)\n" -"Sebuah tutorial mengenai cara menjalankan i2p pada Mac OS X dan cara " -"untuk terhubung ke irc.telecomix.i2p.\n" -"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n(Youtube Video)\nSebuah tutorial mengenai cara menjalankan i2p pada Mac OS X dan cara untuk terhubung ke irc.telecomix.i2p.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari menjelaskan prinsip-prinsip dasar " -"I2P</a>\n" -"(Youtube Video)\n" -"Agen Felix Atari dari Telecomix Crypto Munitions Bureau.\n" -"Dengan <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari menjelaskan prinsip-prinsip dasar I2P</a>\n(Youtube Video)\nAgen Felix Atari dari Telecomix Crypto Munitions Bureau.\nDengan <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">Cara untuk mendapatkan I2P, Darknet P2P anonim " -"(menginstal Windows)</a>\n" -"(Youtube Video)\n" -"Tutorial ini menunjukkan cara menginstal dan mengkonfigurasi perangkat " -"lunak yang diperlukan untuk mengakses I2P." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">Cara untuk mendapatkan I2P, Darknet P2P anonim (menginstal Windows)</a>\n(Youtube Video)\nTutorial ini menunjukkan cara menginstal dan mengkonfigurasi perangkat lunak yang diperlukan untuk mengakses I2P." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -639,10 +625,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">Cara mengakses I2P</a>\n" -"(Youtube Video)\n" -"Cara Instal I2P pada Ubuntu." +msgstr "<a href=\"%(link)s\">Cara mengakses I2P</a>\n(Youtube Video)\nCara Instal I2P pada Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -651,12 +634,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Cara menginstal perangkat lunak darknet I2P di " -"Linux</a>\n" -"(Video)\n" -"Adrian Crenshaw.\n" -"Januari 2011" +msgstr "<a href=\"%(link)s\">Cara menginstal perangkat lunak darknet I2P di Linux</a>\n(Video)\nAdrian Crenshaw.\nJanuari 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -664,10 +642,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">animasi singkat garlic routing</a>\n" -"(Youtube Video)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">animasi singkat garlic routing</a>\n(Youtube Video)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -680,10 +655,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) yang diwawancarai oleh DistributedCity <a " -"href=\"%(link1)s\">Bagian 1</a>\n" -"<a href=\"%(link2)s\">Bagian 2</a> 26 Juli 2002." +msgstr "Lance James (0x90) yang diwawancarai oleh DistributedCity <a href=\"%(link1)s\">Bagian 1</a>\n<a href=\"%(link2)s\">Bagian 2</a> 26 Juli 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -692,34 +664,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) diwawancarai oleh El PaÃs (aslinya dalam bahasa " -"Spanyol) <a href=\"%(link)s\">terjemahan bahasa Inggris</a> 31 Oktober " -"2002." +msgstr "Lance James (0x90) diwawancarai oleh El PaÃs (aslinya dalam bahasa Spanyol) <a href=\"%(link)s\">terjemahan bahasa Inggris</a> 31 Oktober 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">2003 business Week artikel membahas invisiblenet</a>" -"\n" -"14 September 2003." +msgstr "<a href=\"%(link)s\">2003 business Week artikel membahas invisiblenet</a>\n14 September 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">artikel di Netzwelt.de tentang menjadi anonim di " -"Internet</a>\n" -"(bahasa Jerman)\n" -"November 2007." +msgstr "<a href=\"%(link)s\">artikel di Netzwelt.de tentang menjadi anonim di Internet</a>\n(bahasa Jerman)\nNovember 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -727,24 +687,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">Zzz diwawancarai oleh gulli.com</a>\n" -"Maret 2009 <a href=\"%(german)s\">terjemahan bahasa Jerman</a>" +msgstr "<a href=\"%(link)s\">Zzz diwawancarai oleh gulli.com</a>\nMaret 2009 <a href=\"%(german)s\">terjemahan bahasa Jerman</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">ZZZ diwawancarai InfoSec Daily Podcast Ep.</a> 454 " -"(mp3) 18 Agustus 2011 (link tidak aktif, di-seed di dalam I2P di <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">ZZZ diwawancarai InfoSec Daily Podcast Ep.</a> 454 (mp3) 18 Agustus 2011 (link tidak aktif, di-seed di dalam I2P di <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -752,51 +703,34 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - anonimitas untuk masyarakat luas</a>, Jonathan" -" Cox, 11 November 2011." +msgstr "<a href=\"%(link)s\">I2P - anonimitas untuk masyarakat luas</a>, Jonathan Cox, 11 November 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">ZZZ dan Lance James diwawancarai InfoSec Daily " -"Podcast Ep.</a> 596 (mp3) 16 Februari 2012 (link tidak aktif, di-seed di " -"dalam I2P di <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">ZZZ dan Lance James diwawancarai InfoSec Daily Podcast Ep.</a> 596 (mp3) 16 Februari 2012 (link tidak aktif, di-seed di dalam I2P di <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security" -" Podcast Ep.</a> 2015-010 (mp3) bagian 1, 28 Februari 2015" +msgstr "<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security Podcast Ep.</a> 2015-010 (mp3) bagian 1, 28 Februari 2015" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security" -" Podcast Ep.</a> 2015-011 (mp3) bagian 2, 6 Maret 2015" +msgstr "<a href=\"%(mp3)s\">Jeff dan Str4d diwawancarai di Brakeing Down Security Podcast Ep.</a> 2015-011 (mp3) bagian 2, 6 Maret 2015" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -805,16 +739,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -826,18 +758,62 @@ msgstr "Lainnya" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2p disebut di dalam Netflix's \"House of Cards\" Season 2 Episode 2, 14 " -"Februari 2014" +msgstr "I2p disebut di dalam Netflix's \"House of Cards\" Season 2 Episode 2, 14 Februari 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -846,18 +822,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -868,84 +841,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -956,8 +906,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -965,27 +914,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -993,26 +938,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1023,10 +959,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1034,18 +968,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1056,17 +987,11 @@ msgstr "Anggota Proyek i2p" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Kami adalah sekelompok kecil orang yang tersebar di beberapa benua, " -"bekerja untuk memajukan aspek yang berbeda dari proyek dan membahas " -"rancangan jaringan.\n" -"<a href=\"%(volunteer)s\">Ikut terlibat!</a>" +msgstr "Kami adalah sekelompok kecil orang yang tersebar di beberapa benua, bekerja untuk memajukan aspek yang berbeda dari proyek dan membahas rancangan jaringan.\n<a href=\"%(volunteer)s\">Ikut terlibat!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1228,16 +1153,15 @@ msgstr "User Advocate " #: i2p2www/pages/site/about/team.html:112 msgid "gather, prioritize, advocate for user needs" -msgstr "" -"mengumpulkan, memprioritaskan, dan melakukan advokasi untuk kebutuhan " -"pengguna" +msgstr "mengumpulkan, memprioritaskan, dan melakukan advokasi untuk kebutuhan pengguna" #: i2p2www/pages/site/about/team.html:115 msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1396,9 +1320,7 @@ msgstr "Debian/Ubuntu Packager and PPA maintainer " #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Router console backend dan pekerjaan UI, perombakan situs web, pekerjaan " -"tes unit" +msgstr "Router console backend dan pekerjaan UI, perombakan situs web, pekerjaan tes unit" #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1479,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "pengembangan jbigi, migrasi wiki, pembersihan doc" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "Debugging java dan pengembangan client di I2PTunnel dan router console" #: i2p2www/pages/site/about/team.html:323 @@ -1529,51 +1452,27 @@ msgstr "… dan banyak lagi" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." -msgstr "" -"I2PCon 2015 adalah acara pertama. Ini mempunyai dua tujuan jangka pendek." -"\n" -"Pertama, untuk menyediakan masyarakat umum dengan suatu peristiwa yang " -"mana pengetahuan tentang privasi dapat diperoleh.\n" -"Kedua, untuk memajukan proyek I2P dan komunitasnya dengan diskusi teknis" -" tentang kriptografi, anonimitas dan topik I2P-sentris." +msgstr "I2PCon 2015 adalah acara pertama. Ini mempunyai dua tujuan jangka pendek.\nPertama, untuk menyediakan masyarakat umum dengan suatu peristiwa yang mana pengetahuan tentang privasi dapat diperoleh.\nKedua, untuk memajukan proyek I2P dan komunitasnya dengan diskusi teknis tentang kriptografi, anonimitas dan topik I2P-sentris." #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." -msgstr "" -"Tujuan yang lebih besar dan lebih jangka panjang dari acara ini adalah " -"untuk membangun sebuah keberlangsungan dari individu yang sadar privasi. " -"Dengan menghubungkan orang-orang yang menyadari pentingnya privasi, kami " -"ingin menyediakan forum di mana komunitas ini dapat berkembang." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." +msgstr "Tujuan yang lebih besar dan lebih jangka panjang dari acara ini adalah untuk membangun sebuah keberlangsungan dari individu yang sadar privasi. Dengan menghubungkan orang-orang yang menyadari pentingnya privasi, kami ingin menyediakan forum di mana komunitas ini dapat berkembang." #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." -msgstr "" -"Ide untuk acara ini adalah pertama dilahirkan oleh teman-teman kita yang" -" luar biasa di <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>." -"\n" -"Tempat disediakan oleh <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" -"Pemasaran ini dipelopori oleh <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> dan Siew.\n" -"Tanpa mereka acara ini akan tidak mungkin dilaksanakan." +msgstr "Ide untuk acara ini adalah pertama dilahirkan oleh teman-teman kita yang luar biasa di <a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nTempat disediakan oleh <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nPemasaran ini dipelopori oleh <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> dan Siew.\nTanpa mereka acara ini akan tidak mungkin dilaksanakan." #: i2p2www/pages/site/about/i2pcon/2015.html:32 msgid "Slides and Video" @@ -1589,8 +1488,8 @@ msgstr "Catatan: Tautan video akan diposkan saat tersedia." #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1625,22 +1524,13 @@ msgstr "Pembicara" msgid "" "Colin Mahns has a strong interest in the use of anonymity and encryption " "technology to help preserve human rights in the digital age." -msgstr "" -"Colin Mahns memiliki minat yang kuat dalam penggunaan teknologi " -"anonimitas dan enkripsi untuk membantu melestarikan hak asasi manusia di " -"era digital." +msgstr "Colin Mahns memiliki minat yang kuat dalam penggunaan teknologi anonimitas dan enkripsi untuk membantu melestarikan hak asasi manusia di era digital." #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." -msgstr "" -"David Dagon adalah peneliti postdoc di Georgia Tech yang berfokus pada " -"botnet, malware, keamanan jaringan, dan DNS.\n" -"Minatnya I2P berpusat pada menjaga privasi pengguna, penyaringan otonom, " -"dan anti-pelecehan." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." +msgstr "David Dagon adalah peneliti postdoc di Georgia Tech yang berfokus pada botnet, malware, keamanan jaringan, dan DNS.\nMinatnya I2P berpusat pada menjaga privasi pengguna, penyaringan otonom, dan anti-pelecehan." #: i2p2www/pages/site/about/i2pcon/2015.html:89 #: i2p2www/pages/site/about/i2pcon/2015.html:105 @@ -1653,25 +1543,12 @@ msgstr "J adalah kepala Toronto Crypto." #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." -msgstr "" -"Lance James adalah pendiri dari Invisibile IRC Project, pendahulu I2P, " -"pada tahun 2002.\n" -"Dia mendirikan perusahaan intelijen cyber pada tahun 2003.\n" -"Dia sudah terfokus pada keamanan jaringan, penelitian malware dan " -"keamanan informasi sejak.\n" -"Selama 2011-2013, ia adalah Direktur intelijen ancaman untuk The " -"Vigilant, yang diakuisisi oleh Deloitte pada tahun 2013.\n" -"Ia baru saja meninggalkan Deloitte untuk melakukan konsultasi melalui " -"perusahaannya: The James Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." +msgstr "Lance James adalah pendiri dari Invisibile IRC Project, pendahulu I2P, pada tahun 2002.\nDia mendirikan perusahaan intelijen cyber pada tahun 2003.\nDia sudah terfokus pada keamanan jaringan, penelitian malware dan keamanan informasi sejak.\nSelama 2011-2013, ia adalah Direktur intelijen ancaman untuk The Vigilant, yang diakuisisi oleh Deloitte pada tahun 2013.\nIa baru saja meninggalkan Deloitte untuk melakukan konsultasi melalui perusahaannya: The James Group." #: i2p2www/pages/site/about/i2pcon/2015.html:109 msgid "Nicholas D. is a member of Hacklab Toronto." @@ -1679,20 +1556,11 @@ msgstr "Nicholas D. adalah anggota Hacklab Toronto." #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." -msgstr "" -"Nicholas Johnston adalah profesor informasi keamanan di Sheridan " -"College's School of Applied Computing di program sarjana S1 InfoSec.\n" -"Karier profesional sebelumnya adalah digital forensik dan investigasi.\n" -"Dia juga adalah kontraktor yang berspesialisasi di respon kejadian\n" -"Daerah penelitiannya termasuk analisis data dan pengembangan perangkat " -"lunak yang aman." +msgstr "Nicholas Johnston adalah profesor informasi keamanan di Sheridan College's School of Applied Computing di program sarjana S1 InfoSec.\nKarier profesional sebelumnya adalah digital forensik dan investigasi.\nDia juga adalah kontraktor yang berspesialisasi di respon kejadian\nDaerah penelitiannya termasuk analisis data dan pengembangan perangkat lunak yang aman." #: i2p2www/pages/site/about/i2pcon/2015.html:124 msgid "Psi is an I2P developer." @@ -1744,14 +1612,9 @@ msgstr "Hari 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." -msgstr "" -"Konferensi pertama didedikasikan untuk I2P diadakan di Toronto pada 15-16" -" Agustus 2015.\n" -"Lihat link di bawah untuk informasi lebih lanjut dan link ke slide dan " -"video." +msgstr "Konferensi pertama didedikasikan untuk I2P diadakan di Toronto pada 15-16 Agustus 2015.\nLihat link di bawah untuk informasi lebih lanjut dan link ke slide dan video." #: i2p2www/pages/site/about/i2pcon/index.html:9 msgid "Past years" @@ -1767,23 +1630,13 @@ msgstr "Agustus 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Ada beberapa teknik utama yang dapat dilakukan untuk meningkatkan kinerja" -" I2P - seperti yang terkait dengan CPU, yang terkait bandwidth, dan yang " -"terkait protokol. Namun, semua dimensi tersebut mempengaruhi latensi, " -"throughput, dan kinerja jaringan yang dirasakan, karena mengurangi " -"pertengkaran sumber daya yang langka. Daftar ini tentu tidak " -"komprehensif, tapi sudah mencakup hal-hal yang utama." +msgstr "Ada beberapa teknik utama yang dapat dilakukan untuk meningkatkan kinerja I2P - seperti yang terkait dengan CPU, yang terkait bandwidth, dan yang terkait protokol. Namun, semua dimensi tersebut mempengaruhi latensi, throughput, dan kinerja jaringan yang dirasakan, karena mengurangi pertengkaran sumber daya yang langka. Daftar ini tentu tidak komprehensif, tapi sudah mencakup hal-hal yang utama." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1791,9 +1644,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Untuk perbaikan kinerja masa lalu, lihat <a href=\"%(history)s\">Riwayat " -"kinerja</a>." +msgstr "Untuk perbaikan kinerja masa lalu, lihat <a href=\"%(history)s\">Riwayat kinerja</a>." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1802,24 +1653,13 @@ msgstr "Pembuatan profil dan seleksi peer yang lebih baik" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Mungkin salah satu bagian yang paling penting dari mendapatkan kinerja " -"yang lebih cepat adalah meningkatkan cara router memilih peer yang di " -"mana mereka membangun tunnel - memastikan mereka tidak menggunakan peer " -"dengan link lambat atau peer dengan link cepat yang kelebihan beban, dll." -" Selain itu, kita harus memastikan bahwa kami tidak membuka diri " -"terhadap serangan <a href=\"%(sybilpdf)s\">Sybil</a> dari musuh yang kuat" -" dengan banyak komputer yang cepat." +msgstr "Mungkin salah satu bagian yang paling penting dari mendapatkan kinerja yang lebih cepat adalah meningkatkan cara router memilih peer yang di mana mereka membangun tunnel - memastikan mereka tidak menggunakan peer dengan link lambat atau peer dengan link cepat yang kelebihan beban, dll. Selain itu, kita harus memastikan bahwa kami tidak membuka diri terhadap serangan <a href=\"%(sybilpdf)s\">Sybil</a> dari musuh yang kuat dengan banyak komputer yang cepat." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1827,32 +1667,15 @@ msgstr "Network database tuning " #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Kita akan ingin untuk menjadi lebih efisien dengan algoritma penyembuhan " -"database dan pemeliharaan - daripada terus-menerus menjelajahi keyspace " -"untuk peer baru - menyebabkan sejumlah besar pesan jaringan dan beban " -"router - kita dapat memperlambat atau bahkan berhenti menjelajahi sampai " -"mendeteksi yang ada sesuatu yang baru yang bernilai (misalnya decay dari " -"tingkat eksplorasi berdasarkan terakhir kali seseorang memberi kami " -"rujukan kepada seseorang yang kami belum pernah dengar). Kita juga dapat" -" melakukan beberapa tuning pada apa benar-benar kita kirimkan - berapa " -"banyak peer yang bounce back (atau bahkan jika kita bounce back balasan)," -" serta seberapa banyak kita melakukan pencarian simultan." +msgstr "Kita akan ingin untuk menjadi lebih efisien dengan algoritma penyembuhan database dan pemeliharaan - daripada terus-menerus menjelajahi keyspace untuk peer baru - menyebabkan sejumlah besar pesan jaringan dan beban router - kita dapat memperlambat atau bahkan berhenti menjelajahi sampai mendeteksi yang ada sesuatu yang baru yang bernilai (misalnya decay dari tingkat eksplorasi berdasarkan terakhir kali seseorang memberi kami rujukan kepada seseorang yang kami belum pernah dengar). Kita juga dapat melakukan beberapa tuning pada apa benar-benar kita kirimkan - berapa banyak peer yang bounce back (atau bahkan jika kita bounce back balasan), serta seberapa banyak kita melakukan pencarian simultan." #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -1861,47 +1684,24 @@ msgstr "Session Tag Tuning and Penyempurnaan" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"Cara <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> algoritma" -" bekerja adalah dengan mengelola serangkaian 32 byte array acak satu-" -"kali-digunakan, dan hal itu menjadi kadaluarsa jika tidak digunakan " -"dengan cukup cepat. Jika kita mengakhiri mereka terlalu cepat, kita " -"dipaksa untuk kembali kepada enkripsi ElGamal penuh (mahal), tapi jika " -"kita tidak membuat mereka kedaluwarsa dengan cukup cepat, kita harus " -"mengurangi jumlah mereka sehingga kita tidak kehabisan memori (dan jika " -"penerima entah bagaimana rusak dan kehilangan beberapa tag, bahkan lebih " -"banyak kegagalan enkripsi mungkin terjadi sebelum deteksi). Dengan " -"deteksi lebih aktif dan umpan balik yang didorong algoritma, kita bisa " -"dengan aman dan lebih efisien mengelola masa waktu tag, menggantikan " -"enkripsi ElGamal dengan operasi trivial AES ." +msgstr "Cara <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> algoritma bekerja adalah dengan mengelola serangkaian 32 byte array acak satu-kali-digunakan, dan hal itu menjadi kadaluarsa jika tidak digunakan dengan cukup cepat. Jika kita mengakhiri mereka terlalu cepat, kita dipaksa untuk kembali kepada enkripsi ElGamal penuh (mahal), tapi jika kita tidak membuat mereka kedaluwarsa dengan cukup cepat, kita harus mengurangi jumlah mereka sehingga kita tidak kehabisan memori (dan jika penerima entah bagaimana rusak dan kehilangan beberapa tag, bahkan lebih banyak kegagalan enkripsi mungkin terjadi sebelum deteksi). Dengan deteksi lebih aktif dan umpan balik yang didorong algoritma, kita bisa dengan aman dan lebih efisien mengelola masa waktu tag, menggantikan enkripsi ElGamal dengan operasi trivial AES ." #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Ide-ide tambahan untuk meningkatkan pengiriman sesi Tag dijelaskan pada " -"<a href=\"%(elgamalaes)s#future\">ElGamal / AES + SessionTag halaman</a>." +msgstr "Ide-ide tambahan untuk meningkatkan pengiriman sesi Tag dijelaskan pada <a href=\"%(elgamalaes)s#future\">ElGamal / AES + SessionTag halaman</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -1912,60 +1712,29 @@ msgstr "Memigrasi sessionTag ke PRNG tersinkronisasi" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." -msgstr "" -"Sekarang, algoritma <a href=\"%(elgamalaes)s\">ElGamal / AES + " -"SessionTag</a> bekerja dengan tagging setiap pesan terenkripsi dengan " -"unique random 32 byte (\"session tag\"), yang mengidentifikasi bahwa " -"pesan dienkripsi dengan session key AES terkait. Hal ini mencegah peer " -"dari membedakan pesan-pesan yang merupakan bagian dari sesi yang sama " -"karena setiap pesan memiliki tag acak yang benar-benar baru. Untuk " -"mencapai hal ini, setiap beberapa pesan menggabungkan keseluruhan tag " -"sesi baru dalam pesan terenkripsi itu sendiri, secara transparan " -"memberikan cara untuk mengidentifikasi pesan di masa mendatang. Kami " -"kemudian harus melacak pesan yang berhasil dikirim sehingga kami tahu tag" -" apa yang dapat digunakan." +msgstr "Sekarang, algoritma <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a> bekerja dengan tagging setiap pesan terenkripsi dengan unique random 32 byte (\"session tag\"), yang mengidentifikasi bahwa pesan dienkripsi dengan session key AES terkait. Hal ini mencegah peer dari membedakan pesan-pesan yang merupakan bagian dari sesi yang sama karena setiap pesan memiliki tag acak yang benar-benar baru. Untuk mencapai hal ini, setiap beberapa pesan menggabungkan keseluruhan tag sesi baru dalam pesan terenkripsi itu sendiri, secara transparan memberikan cara untuk mengidentifikasi pesan di masa mendatang. Kami kemudian harus melacak pesan yang berhasil dikirim sehingga kami tahu tag apa yang dapat digunakan." #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" "to handle out of order delivery)." -msgstr "" -"Ini bekerja dengan baik dan cukup berguna, namun ini tidak efisien dalam " -"penggunaan bandwidth, karena memerlukan pengiriman tag terlebih dahulu " -"(dan tidak semua tag mungkin diperlukan, atau beberapa mungkin terbuang " -"akibat mereka menjadi kadaluarsa). Rata-rata, predelivering tag sesi " -"memiliki biaya 32 byte per pesan (ukuran tagnya). Seperti yang disarankan" -" oleh Taral, ukuran sebesar itu dapat dihindari dengan mengganti " -"pengiriman tag dengan sebuah PRNG disinkronisasi - ketika sesi baru " -"dimulai (melalui blok dienkripsi oleh ElGamal), kedua belah pihak seed " -"sebuah PRNG untuk digunakan dan menghasilkan session tag on demand " -"(dengan penerima precalculating berikutnya beberapa nilai yang mungkin " -"untuk menangani pengiriman)." +msgstr "Ini bekerja dengan baik dan cukup berguna, namun ini tidak efisien dalam penggunaan bandwidth, karena memerlukan pengiriman tag terlebih dahulu (dan tidak semua tag mungkin diperlukan, atau beberapa mungkin terbuang akibat mereka menjadi kadaluarsa). Rata-rata, predelivering tag sesi memiliki biaya 32 byte per pesan (ukuran tagnya). Seperti yang disarankan oleh Taral, ukuran sebesar itu dapat dihindari dengan mengganti pengiriman tag dengan sebuah PRNG disinkronisasi - ketika sesi baru dimulai (melalui blok dienkripsi oleh ElGamal), kedua belah pihak seed sebuah PRNG untuk digunakan dan menghasilkan session tag on demand (dengan penerima precalculating berikutnya beberapa nilai yang mungkin untuk menangani pengiriman)." #: i2p2www/pages/site/about/performance/future.html:87 msgid "Longer lasting tunnels" @@ -1973,50 +1742,26 @@ msgstr "Tunnel yang bertahan lebih lama" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"Durasi default tunnel saat ini 10 menit cukup arbritrary, meski \"terasa " -"oke\". Begitu kita mendapat tunnel healing code dan deteksi kegagalan " -"yang lebih efektif, kita akan bisa lebih aman memvariasikan durasi, " -"mengurangi beban jaringan dan CPU (karena penciptaan message tunnel yang " -"mahal)." +msgstr "Durasi default tunnel saat ini 10 menit cukup arbritrary, meski \"terasa oke\". Begitu kita mendapat tunnel healing code dan deteksi kegagalan yang lebih efektif, kita akan bisa lebih aman memvariasikan durasi, mengurangi beban jaringan dan CPU (karena penciptaan message tunnel yang mahal)." #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Ini tampaknya merupakan perbaikan yang mudah untuk beban tinggi pada " -"router dengan bandwidth besar, namun kami sebaiknya tidak menggunakannya " -"sampai kami telah menyempurnakan algoritma pengembangan tunnel lebih " -"jauh.\n" -"Namun, 10 menit umur tunnel adalah hardcoded di beberapa tempat, sehingga" -" upaya substansial akan diperlukan untuk mengubah durasi.\n" -"Juga, akan sulit untuk menjaga kompatibilitas dengan perubahan seperti " -"itu." +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Ini tampaknya merupakan perbaikan yang mudah untuk beban tinggi pada router dengan bandwidth besar, namun kami sebaiknya tidak menggunakannya sampai kami telah menyempurnakan algoritma pengembangan tunnel lebih jauh.\nNamun, 10 menit umur tunnel adalah hardcoded di beberapa tempat, sehingga upaya substansial akan diperlukan untuk mengubah durasi.\nJuga, akan sulit untuk menjaga kompatibilitas dengan perubahan seperti itu." #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"Saat ini, karena rata-rata tingkat keberhasilan pembangunan jaringan " -"tunnel cukup tinggi, tidak ada rencana saat ini untuk memperpanjang umur " -"tunnel." +msgstr "Saat ini, karena rata-rata tingkat keberhasilan pembangunan jaringan tunnel cukup tinggi, tidak ada rencana saat ini untuk memperpanjang umur tunnel." #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -2024,44 +1769,22 @@ msgstr "Adjust the timeout" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" -msgstr "" -"Namun, hal lain yang cukup arbritrary namun \"rasanya oke\" yang kita " -"dapatkan adalah timeout saat ini untuk berbagai aktivitas. Mengapa kita " -"memiliki timeout 60 detik untuk \"peer unreachable\"? Mengapa kita " -"mencoba mengirimkan sebuah pesan melalui tunnel yang berbeda yang " -"diiklankan oleh LeaseSet setelah 10 detik? Mengapa query database " -"jaringan dibatasi oleh batas-batas 60 atau 20 detik? Mengapa destinasi " -"dikonfigurasi untuk meminta serangkaian tunnel baru setiap 10 menit? " -"Mengapa kita memperbolehkan 60 detik untuk peer untuk membalas permintaan" -" kami bahwa mereka bergabung dengan sebuah tunnel? Mengapa kita " -"menganggap sebuah tunnel yang tidak lulus tes kami dalam waktu 60 detik " -"dianggap \"mati\"?" +msgstr "Namun, hal lain yang cukup arbritrary namun \"rasanya oke\" yang kita dapatkan adalah timeout saat ini untuk berbagai aktivitas. Mengapa kita memiliki timeout 60 detik untuk \"peer unreachable\"? Mengapa kita mencoba mengirimkan sebuah pesan melalui tunnel yang berbeda yang diiklankan oleh LeaseSet setelah 10 detik? Mengapa query database jaringan dibatasi oleh batas-batas 60 atau 20 detik? Mengapa destinasi dikonfigurasi untuk meminta serangkaian tunnel baru setiap 10 menit? Mengapa kita memperbolehkan 60 detik untuk peer untuk membalas permintaan kami bahwa mereka bergabung dengan sebuah tunnel? Mengapa kita menganggap sebuah tunnel yang tidak lulus tes kami dalam waktu 60 detik dianggap \"mati\"?" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Setiap dari imponderables tersebut dapat diatasi dengan kode lebih " -"adaptif, serta tunable parameter untuk memungkinkan timbal balik lebih " -"tepat antara bandwidth, latensi, dan penggunaan CPU." +msgstr "Setiap dari imponderables tersebut dapat diatasi dengan kode lebih adaptif, serta tunable parameter untuk memungkinkan timbal balik lebih tepat antara bandwidth, latensi, dan penggunaan CPU." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2071,48 +1794,33 @@ msgstr "Perbaikan protokol streaming penuh" msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Mungkin kembali mengaktifkan profil stream interaktif (implementasi saat " -"ini hanya menggunakan sebagian besar stream profile)." +msgstr "Mungkin kembali mengaktifkan profil stream interaktif (implementasi saat ini hanya menggunakan sebagian besar stream profile)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Pembatasan bandwidth di tingkat client (dalam salah satu atau kedua arah " -"stream, atau mungkin dibagi di beberapa aliran). Ini akan menjadi " -"tambahan untuk keseluruhan pembatasan bandwidth router, tentu saja." +msgstr "Pembatasan bandwidth di tingkat client (dalam salah satu atau kedua arah stream, atau mungkin dibagi di beberapa aliran). Ini akan menjadi tambahan untuk keseluruhan pembatasan bandwidth router, tentu saja." #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Daftar kontrol akses (hanya mengizinkan arus ke atau dari tujuan estinasi" -" lainnya yang diketahui)." +msgstr "Daftar kontrol akses (hanya mengizinkan arus ke atau dari tujuan estinasi lainnya yang diketahui)." #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Kontrol web dan pemantauan kesehatan berbagai aliran, serta kemampuan " -"untuk secara eksplisit menutup atau meningkatkannya." +msgstr "Kontrol web dan pemantauan kesehatan berbagai aliran, serta kemampuan untuk secara eksplisit menutup atau meningkatkannya." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Ide-ide tambahan untuk meningkatkan streaming library dijelaskan pada <a " -"href=\"%(streaming)s#future\">halaman streaming library</a>." +msgstr "Ide-ide tambahan untuk meningkatkan streaming library dijelaskan pada <a href=\"%(streaming)s#future\">halaman streaming library</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2121,17 +1829,10 @@ msgstr "Riwayat kinerja" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Peningkatan kinerja yang baik adalah menggunakan teknik yang di bawah " -"ini.\n" -"Ada lebih banyak hal yang harus dilakukan, lihat halaman <a " -"href=\"%(performance)s\">kinerja</a> untuk isu-isu dan pemikiran saat " -"ini." +msgstr "Peningkatan kinerja yang baik adalah menggunakan teknik yang di bawah ini.\nAda lebih banyak hal yang harus dilakukan, lihat halaman <a href=\"%(performance)s\">kinerja</a> untuk isu-isu dan pemikiran saat ini." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2148,47 +1849,25 @@ msgstr "diimplementasikan" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" -msgstr "" -"Ketika saya terakhir memprofilkan kode I2P, sebagian besar waktu " -"dihabiskan dalam satu fungsi: java.math.BigInteger's <a " -"href=\"%(modpow)s\">modPow</a>.\n" -"Alih-alih mencoba menyesuaikan metode ini, kita akan memanggil <a " -"href=\"%(gmp)s\">GNU MP</a> - sebuah library matematika yang sangat cepat" -" (dengan assembler yang disetel untuk banyak arsitektur). (<i>Editor: " -"Lihat <a href=\"%(jbigi)s\">NativeBigInteger untuk kriptografi public key" -" lebih cepat </a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" +msgstr "Ketika saya terakhir memprofilkan kode I2P, sebagian besar waktu dihabiskan dalam satu fungsi: java.math.BigInteger's <a href=\"%(modpow)s\">modPow</a>.\nAlih-alih mencoba menyesuaikan metode ini, kita akan memanggil <a href=\"%(gmp)s\">GNU MP</a> - sebuah library matematika yang sangat cepat (dengan assembler yang disetel untuk banyak arsitektur). (<i>Editor: Lihat <a href=\"%(jbigi)s\">NativeBigInteger untuk kriptografi public key lebih cepat </a></i>)" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." -msgstr "" -"\n" -"ugha dan duck sedang mengerjakan kode C/JNI glue, dan kode Java yang ada " -"sudah diterapkan dengan hook untuk itu kapanpun itu siap. Hasil awal " -"terlihat fantastis - menjalankan router dengan modPow GMP asli " -"menyediakan lebih dari 800 % speedup dalam kinerja enkripsi, dan " -"beban sudah terpotong setengah. Ini hanya pada komputer yang digunakan " -"oleh satu pengguna, dan semuanya tidak siap untuk dipaket dan dipasang." +msgstr "\nugha dan duck sedang mengerjakan kode C/JNI glue, dan kode Java yang ada sudah diterapkan dengan hook untuk itu kapanpun itu siap. Hasil awal terlihat fantastis - menjalankan router dengan modPow GMP asli menyediakan lebih dari 800 % speedup dalam kinerja enkripsi, dan beban sudah terpotong setengah. Ini hanya pada komputer yang digunakan oleh satu pengguna, dan semuanya tidak siap untuk dipaket dan dipasang." #: i2p2www/pages/site/about/performance/history.html:32 msgid "Garlic wrapping a \"reply\" LeaseSet" @@ -2200,86 +1879,42 @@ msgstr "Diimplementasi namun memerlukan penyempurnaan" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Tweak algoritma ini hanya akan relevan untuk aplikasi yang ingin peer " -"membalas kepada mereka (meskipun yang meliputi segala sesuatu yang " -"menggunakan I2PTunnel atau mihi's ministreaming lib):" +msgstr "Tweak algoritma ini hanya akan relevan untuk aplikasi yang ingin peer membalas kepada mereka (meskipun yang meliputi segala sesuatu yang menggunakan I2PTunnel atau mihi's ministreaming lib):" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." -msgstr "" -"Sebelumnya, ketika Alice mengirim pesan kepada Bob, ketika Bob membalas, " -"Bob harus melakukan lookup dalam database jaringan - mengirimkan beberapa" -" permintaan untuk mendapatkan LeaseSet milik Alice saat ini. Jika Bob " -"sudah memiliki Alice LeaseSet saat ini, ia hanya dapat mengirim balasan " -"nya segera - ini (sebagian) penyebab biasanya dibutuhkan waktu sedikit " -"lebih lama untuk berbicara dengan seseorang saat pertama kalinya nda " -"terhubung, tetapi berikutnya komunikasi dapat lebih cepat. Saat ini - " -"untuk semua klien - kami membungkus pengirim LeaseSet saat ini dalam " -"garlic yang akan dikirim kepada penerima, sehingga ketika mereka " -"memberikan balasan, mereka akan <i>selalu</i> memiliki LeaseSet yang " -"tersimpan secara lokal - yang benar-benar menghilangkan kebutuhan untuk " -"sebuah jaringan database lookup balasan.\n" -"Ini trade off dari sebagian besar bandwidth pengirim untuk balasan yang " -"lebih cepat.\n" -"Jika kita tidak melakukan ini cukup sering, penggunaan bandwidth jaringan" -" secara keseluruhan akan menurun karena penerima tidak harus melakukan " -"lookup jaringan database." +msgstr "Sebelumnya, ketika Alice mengirim pesan kepada Bob, ketika Bob membalas, Bob harus melakukan lookup dalam database jaringan - mengirimkan beberapa permintaan untuk mendapatkan LeaseSet milik Alice saat ini. Jika Bob sudah memiliki Alice LeaseSet saat ini, ia hanya dapat mengirim balasan nya segera - ini (sebagian) penyebab biasanya dibutuhkan waktu sedikit lebih lama untuk berbicara dengan seseorang saat pertama kalinya nda terhubung, tetapi berikutnya komunikasi dapat lebih cepat. Saat ini - untuk semua klien - kami membungkus pengirim LeaseSet saat ini dalam garlic yang akan dikirim kepada penerima, sehingga ketika mereka memberikan balasan, mereka akan <i>selalu</i> memiliki LeaseSet yang tersimpan secara lokal - yang benar-benar menghilangkan kebutuhan untuk sebuah jaringan database lookup balasan.\nIni trade off dari sebagian besar bandwidth pengirim untuk balasan yang lebih cepat.\nJika kita tidak melakukan ini cukup sering, penggunaan bandwidth jaringan secara keseluruhan akan menurun karena penerima tidak harus melakukan lookup jaringan database." #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." -msgstr "" -"Untuk LeaseSets tidak diterbitkan seperti \"shared client\", ini adalah " -"satu-satunya cara untuk mengirimkan LeaseSet kepada Bob. Sayangnya " -"bundling ini setiap saat menambahkan hampir 100% overhead untuk " -"sambungan bandwidth tinggi, dan lebih untuk sambungan dengan pesan yang " -"lebih kecil." +msgstr "Untuk LeaseSets tidak diterbitkan seperti \"shared client\", ini adalah satu-satunya cara untuk mengirimkan LeaseSet kepada Bob. Sayangnya bundling ini setiap saat menambahkan hampir 100% overhead untuk sambungan bandwidth tinggi, dan lebih untuk sambungan dengan pesan yang lebih kecil." #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Perubahan yang dijadwalkan untuk rilis 0.6.2 akan mem-bundel LeaseSet " -"hanya bila diperlukan, pada awal koneksi atau ketika perubahan LeaseSet." -"\n" -"Ini secara substansial akan mengurangi overhead total dari pesan di I2P." +msgstr "Perubahan yang dijadwalkan untuk rilis 0.6.2 akan mem-bundel LeaseSet hanya bila diperlukan, pada awal koneksi atau ketika perubahan LeaseSet.\nIni secara substansial akan mengurangi overhead total dari pesan di I2P." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2288,35 +1923,16 @@ msgstr "Penokalan TCP yang lebih efisien" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." -msgstr "" -"Saat ini, semua koneksi TCP melakukan semua validasi peer mereka setelah " -"melalui handshaking Diffie-Hellman (mahal) untuk menegosiasikan sesi " -"private key. Ini berarti bahwa jika clock seseorang benar-benar salah, " -"atau NAT/firewall/etc dikonfigurasi secara tidak benar (atau mereka hanya" -" menjalankan versi yang tidak kompatibel di router), mereka akan secara " -"konsisten (meskipun tidak terus-menerus, karena daftar blokir) " -"menyebabkan operasi kriptografi mahal yang sia-sia pada semua peer yang " -"mereka ketahui. Sementara kita akan ingin menyimpan beberapa " -"verifikasi/validasi dalam batas enkripsi, pertama-tama kita akan ingin " -"memperbarui protokol untuk melakukan beberapa hal, sehingga kita dapat " -"menolak mereka secara bersih tanpa membuang-buang banyak CPU atau sumber " -"daya lainnya." +msgstr "Saat ini, semua koneksi TCP melakukan semua validasi peer mereka setelah melalui handshaking Diffie-Hellman (mahal) untuk menegosiasikan sesi private key. Ini berarti bahwa jika clock seseorang benar-benar salah, atau NAT/firewall/etc dikonfigurasi secara tidak benar (atau mereka hanya menjalankan versi yang tidak kompatibel di router), mereka akan secara konsisten (meskipun tidak terus-menerus, karena daftar blokir) menyebabkan operasi kriptografi mahal yang sia-sia pada semua peer yang mereka ketahui. Sementara kita akan ingin menyimpan beberapa verifikasi/validasi dalam batas enkripsi, pertama-tama kita akan ingin memperbarui protokol untuk melakukan beberapa hal, sehingga kita dapat menolak mereka secara bersih tanpa membuang-buang banyak CPU atau sumber daya lainnya." #: i2p2www/pages/site/about/performance/history.html:81 msgid "Adjust the tunnel testing" @@ -2324,26 +1940,13 @@ msgstr "Adjust the tunnel testing " #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." -msgstr "" -"Alih-alih menggunakan skema yang cukup acak yang kita miliki sekarang, " -"kita harus menggunakan algoritma yang lebih sadar konteks untuk menguji " -"tunnel. misalnya jika kita sudah tahu data yang lewat yang valid dengan " -"benar, ada tidak perlu untuk menguji, sementara jika kita belum melihat " -"data melalui itu baru-baru ini mungkin akan berguna untuk melemparkan " -"beberapa data sambil jalan. Ini akan mengurangi tunnel contention karena" -" kelebihan pesan, serta meningkatkan kecepatan di mana kita mendeteksi - " -"dan menyelesaikan - tunnel yang gagal." +msgstr "Alih-alih menggunakan skema yang cukup acak yang kita miliki sekarang, kita harus menggunakan algoritma yang lebih sadar konteks untuk menguji tunnel. misalnya jika kita sudah tahu data yang lewat yang valid dengan benar, ada tidak perlu untuk menguji, sementara jika kita belum melihat data melalui itu baru-baru ini mungkin akan berguna untuk melemparkan beberapa data sambil jalan. Ini akan mengurangi tunnel contention karena kelebihan pesan, serta meningkatkan kecepatan di mana kita mendeteksi - dan menyelesaikan - tunnel yang gagal." #: i2p2www/pages/site/about/performance/history.html:92 msgid "Persistent Tunnel / Lease Selection" @@ -2351,26 +1954,17 @@ msgstr "Persistent Tunnel/Lease Selection" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"Pemilihan outbound tunnel diterapkan di rilis 0.6.1.30, pemilihan inbound" -" least diterapkan dalam rilis 0.6.2." +msgstr "Pemilihan outbound tunnel diterapkan di rilis 0.6.1.30, pemilihan inbound least diterapkan dalam rilis 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Memilih tunnel dan lease secara acak untuk setiap pesan menciptakan " -"insiden out-of-order pengiriman yang besar, yang mencegah streaming lib " -"meningkatkan window size sebanyak mungkin. Dengan bertahan di pilihan " -"sama untuk koneksi tertentu, kecepatan transfer menjadi jauh lebih cepat." +msgstr "Memilih tunnel dan lease secara acak untuk setiap pesan menciptakan insiden out-of-order pengiriman yang besar, yang mencegah streaming lib meningkatkan window size sebanyak mungkin. Dengan bertahan di pilihan sama untuk koneksi tertentu, kecepatan transfer menjadi jauh lebih cepat." #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2378,32 +1972,15 @@ msgstr "Memampatkan beberapa struktur data" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." -msgstr "" -"Pesan I2NP dan data yang mereka kandung sudah didefinisikan dalam " -"struktur cukup padat, meskipun satu atribut RouterInfo struktur tidak " -"padat - \"option\" adalah nama plain ASCII = value mapping. Sekarang, " -"kami sedang mengisinya dengan statistik tersebut - sekitar 3300 byte per " -"peer. Menerapkan kompresi GZip akan hampir memotong itu untuk 1/3 " -"ukuran, dan jika anda mempertimbangkan seberapa sering RouterInfo " -"struktur lewat di seluruh jaringan, itu penghematan yang signifikan - " -"setiap kali sebuah router meminta router lain sebuah catatan networkDb " -"yang tidak memiliki peer, ia akan mengirimkan kembali 3-10 RouterInfo " -"dari mereka." +msgstr "Pesan I2NP dan data yang mereka kandung sudah didefinisikan dalam struktur cukup padat, meskipun satu atribut RouterInfo struktur tidak padat - \"option\" adalah nama plain ASCII = value mapping. Sekarang, kami sedang mengisinya dengan statistik tersebut - sekitar 3300 byte per peer. Menerapkan kompresi GZip akan hampir memotong itu untuk 1/3 ukuran, dan jika anda mempertimbangkan seberapa sering RouterInfo struktur lewat di seluruh jaringan, itu penghematan yang signifikan - setiap kali sebuah router meminta router lain sebuah catatan networkDb yang tidak memiliki peer, ia akan mengirimkan kembali 3-10 RouterInfo dari mereka." #: i2p2www/pages/site/about/performance/history.html:117 msgid "Update the ministreaming protocol" @@ -2415,39 +1992,17 @@ msgstr "digantikan oleh protokol streaming penuh" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." -msgstr "" -"Saat ini mihi's ministreaming library memiliki protokol negosiasi stream " -"yang cukup sederhana - Alice mengirim Bob sebuah pesan SYN, Bob menjawab " -"dengan pesan ACK, kemudian Alice dan Bob mengirimkan satu sama lain " -"beberapa data, sampai salah satu dari mereka mengirim satu pesan CLOSE. " -"Untuk koneksi yang tahan lama (ke IRC server, misalnya), overhead " -"diabaikan, tetapi untuk satu kali permintaan sederhana/tanggapan situasi " -"(HTTP request/reply, misalnya), itu adalah lebih dari dua kali lebih " -"banyak pesan yang diperlukan. Jika, namun, Alice bernama piggybacked " -"muatan pertamanya dengan pesan SYN, dan Bob piggybacked balasannya dengan" -" ACK - dan mungkin juga termasuk CLOSE tag - sementara transient stream " -"seperti HTTP bisa dikurangi menjadi sepasang pesan, bukan SYN + ACK + " -"request response + CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." +msgstr "Saat ini mihi's ministreaming library memiliki protokol negosiasi stream yang cukup sederhana - Alice mengirim Bob sebuah pesan SYN, Bob menjawab dengan pesan ACK, kemudian Alice dan Bob mengirimkan satu sama lain beberapa data, sampai salah satu dari mereka mengirim satu pesan CLOSE. Untuk koneksi yang tahan lama (ke IRC server, misalnya), overhead diabaikan, tetapi untuk satu kali permintaan sederhana/tanggapan situasi (HTTP request/reply, misalnya), itu adalah lebih dari dua kali lebih banyak pesan yang diperlukan. Jika, namun, Alice bernama piggybacked muatan pertamanya dengan pesan SYN, dan Bob piggybacked balasannya dengan ACK - dan mungkin juga termasuk CLOSE tag - sementara transient stream seperti HTTP bisa dikurangi menjadi sepasang pesan, bukan SYN + ACK + request response + CLOSE." #: i2p2www/pages/site/about/performance/history.html:132 msgid "Implement full streaming protocol" @@ -2455,53 +2010,26 @@ msgstr "Menerapkan protokol streaming penuh" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." -msgstr "" -"Protokol ministreaming mengambil keuntungan dari keputusan desain yang " -"buruk dalam protokol klien I2P (I2CP) - pemaparan \"mode=GUARANTEED\", " -"yang memungkinkan protokol berbasis pesan yang tidak dapat diandalkan, " -"best-effort, dapat digunakan untuk dapat diandalkan, menghalangi operasi " -"(di bawah cover, masih semua tidak dapat diandalkan dan berbasis pesan, " -"dengan router memberikan jaminan pengiriman pesan \"ACK\" oleh garlic " -"wrapping dengan muatan, jadi begitu data sampai ke sasaran, pesan ACK " -"diteruskan kembali kepada kami. [Melalui tunnel, tentu saja])." +msgstr "Protokol ministreaming mengambil keuntungan dari keputusan desain yang buruk dalam protokol klien I2P (I2CP) - pemaparan \"mode=GUARANTEED\", yang memungkinkan protokol berbasis pesan yang tidak dapat diandalkan, best-effort, dapat digunakan untuk dapat diandalkan, menghalangi operasi (di bawah cover, masih semua tidak dapat diandalkan dan berbasis pesan, dengan router memberikan jaminan pengiriman pesan \"ACK\" oleh garlic wrapping dengan muatan, jadi begitu data sampai ke sasaran, pesan ACK diteruskan kembali kepada kami. [Melalui tunnel, tentu saja])." #: i2p2www/pages/site/about/performance/history.html:143 #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." -msgstr "" -"Seperti yang saya telah <a href=\"%(link)s\">katakan</a>, membuat " -"I2PTunnel (dan ministreaming lib) melakukan rute ini adalah hal terbaik " -"yang bisa dilakukan, tapi mekanisme yang lebih efisien telah tersedia. " -"Kapan kita rip out fungsi \"mode=GUARANTEED\", kita pada dasarnya " -"mendapat I2CP yang terlihat seperti layer IP anonim, dan dengan demikian," -" kita akan mampu menerapkan streaming library untuk mengambil keuntungan " -"dari pengalaman desain TCP layer - ACKs selektif, deteksi kemacetan, " -"nagle, dll." +msgstr "Seperti yang saya telah <a href=\"%(link)s\">katakan</a>, membuat I2PTunnel (dan ministreaming lib) melakukan rute ini adalah hal terbaik yang bisa dilakukan, tapi mekanisme yang lebih efisien telah tersedia. Kapan kita rip out fungsi \"mode=GUARANTEED\", kita pada dasarnya mendapat I2CP yang terlihat seperti layer IP anonim, dan dengan demikian, kita akan mampu menerapkan streaming library untuk mengambil keuntungan dari pengalaman desain TCP layer - ACKs selektif, deteksi kemacetan, nagle, dll." #: i2p2www/pages/site/about/performance/index.html:2 msgid "Performance" @@ -2511,98 +2039,44 @@ msgstr "Kinerja" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"Bagaimana cara kerja I2P, mengapa I2P lambat, dan mengapa I2P tidak " -"menggunakan bandwidth penuh?" +msgstr "Bagaimana cara kerja I2P, mengapa I2P lambat, dan mengapa I2P tidak menggunakan bandwidth penuh?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Mungkin salah satu hal yang paling sering ditanya adalah \"seberapa cepat" -" I2P?\", dan tak seorang pun tampaknya menyukai jawaban - \"tergantung\"." -" Setelah mencoba I2P, hal berikutnya yang mereka tanyakan \"akankah " -"lebih cepat?\", dan jawabannya adalah paling tegas adalah <b>ya</b>." +msgstr "Mungkin salah satu hal yang paling sering ditanya adalah \"seberapa cepat I2P?\", dan tak seorang pun tampaknya menyukai jawaban - \"tergantung\". Setelah mencoba I2P, hal berikutnya yang mereka tanyakan \"akankah lebih cepat?\", dan jawabannya adalah paling tegas adalah <b>ya</b>." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." -msgstr "" -"I2p adalah jaringan dinamis penuh. Setiap client dikenal oleh node lain " -"dan menguji lokal known node untuk reachability dan kapasitas.\n" -"Hanya node yang terjangkau dan mampu, disimpan NetDB lokal (ini adalah " -"umumnya hanya sebagian dari jaringan, di sekitar 500-1000).\n" -"Ketika I2P membangun tunnel, I2P memilih sumber daya terbaik dari pool " -"ini. Sebagai contoh, subset kecil dari 20-50 node hanya tersedia untuk " -"membangun tunnel.\n" -"Karena pengujian terjadi setiap menit, pool dari node yang telah " -"digunakan berubah setiap menit.\n" -"Setiap node I2P tahu bagian yang berbeda dari internet, berarti bahwa " -"setiap router memiliki kumpulan I2P node digunakan untuk tunnel.\n" -"Bahkan jika kedua router memiliki subset known node yang sama, tes untuk " -"reachability dan kapasitas akan mungkin menunjukkan hasil yang berbeda, " -"seperti router lain bisa saja di bawah beban hanya sebagai satu router " -"tes, tetapi menjadi bebas jika router kedua menguji." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." +msgstr "I2p adalah jaringan dinamis penuh. Setiap client dikenal oleh node lain dan menguji lokal known node untuk reachability dan kapasitas.\nHanya node yang terjangkau dan mampu, disimpan NetDB lokal (ini adalah umumnya hanya sebagian dari jaringan, di sekitar 500-1000).\nKetika I2P membangun tunnel, I2P memilih sumber daya terbaik dari pool ini. Sebagai contoh, subset kecil dari 20-50 node hanya tersedia untuk membangun tunnel.\nKarena pengujian terjadi setiap menit, pool dari node yang telah digunakan berubah setiap menit.\nSetiap node I2P tahu bagian yang berbeda dari internet, berarti bahwa setiap router memiliki kumpulan I2P node digunakan untuk tunnel.\nBahkan jika kedua router memiliki subset known node yang sama, tes untuk reachability dan kapasitas akan mungkin menunjukkan hasil yang berbeda, seperti router lain bisa saja di bawah beban hanya sebagai satu router tes, tetapi menjadi bebas jika router kedua menguji." #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"Di atas menjelaskan mengapa setiap node I2P memiliki node berbeda untuk " -"membangun tunnel.\n" -"Karena setiap node I2P memiliki latency dan bandwidth berbeda, tunnel " -"(yang dibangun melalui node tersebut) memiliki nilai latency dan " -"bandwidth yang berbeda.\n" -"Karena setiap node I2P memiliki tunnel berbeda, tidak ada dua node I2P " -"yang memiliki tunnel set yang sama ." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "Di atas menjelaskan mengapa setiap node I2P memiliki node berbeda untuk membangun tunnel.\nKarena setiap node I2P memiliki latency dan bandwidth berbeda, tunnel (yang dibangun melalui node tersebut) memiliki nilai latency dan bandwidth yang berbeda.\nKarena setiap node I2P memiliki tunnel berbeda, tidak ada dua node I2P yang memiliki tunnel set yang sama ." #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Server/klien dikenal sebagai sebuah \"destinasi\" dan setiap destinasi " -"memiliki setidaknya satu tunnel inbound dan outbound. Defaultnya adalah 3" -" hop per tunnel.\n" -"Ini menambahkan hingga 12 hop (alias 12 I2P node berbeda ) untuk ulang-" -"alik penuh client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Server/klien dikenal sebagai sebuah \"destinasi\" dan setiap destinasi memiliki setidaknya satu tunnel inbound dan outbound. Defaultnya adalah 3 hop per tunnel.\nIni menambahkan hingga 12 hop (alias 12 I2P node berbeda ) untuk ulang-alik penuh client-server-client." #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Setiap paket data dikirim melalui 6 node I2P lainnya sampai mencapai " -"server:" +msgstr "Setiap paket data dikirim melalui 6 node I2P lainnya sampai mencapai server:" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2610,173 +2084,62 @@ msgstr "dan perjalanan kembali 6 I2P node yang berbeda :" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." -msgstr "" -"Karena sebagian besar lalu lintas di I2P (www, torrent,...) memerlukan " -"ack package sampai data baru dikirim, I2P perlu menunggu sampai ack " -"package kembali dari server.\n" -"Pada akhirnya: mengirim data, menunggu ack, mengirim lebih banyak data, " -"menunggu ack,...\n" -"Karena RTT (RoundTripTime) menambah latency dari setiap node I2P dan " -"setiap koneksi pada ulang-alik ini, dibutuhkan biasanya 1-3 detik sampai " -"ack package kembali ke klien.\n" -"Dengan beberapa transport TCP dan I2P internal, paket data memiliki " -"ukuran terbatas dan tidak dapat sebesar seperti yang kita inginkan.\n" -"Secara bersama-sama, kondisi ini menetapkan batas bandwidth maksimal per " -"terowongan sebesar 20-50 kbyte/detik.\n" -"Tetapi jika hanya satu hop di tunel memiliki bandwidth hanya 5 kb/detik, " -"seluruh tunnel terbatas untuk 5 kb/detik, tidak tergantung latency dan " -"keterbatasan lain." +msgstr "Karena sebagian besar lalu lintas di I2P (www, torrent,...) memerlukan ack package sampai data baru dikirim, I2P perlu menunggu sampai ack package kembali dari server.\nPada akhirnya: mengirim data, menunggu ack, mengirim lebih banyak data, menunggu ack,...\nKarena RTT (RoundTripTime) menambah latency dari setiap node I2P dan setiap koneksi pada ulang-alik ini, dibutuhkan biasanya 1-3 detik sampai ack package kembali ke klien.\nDengan beberapa transport TCP dan I2P internal, paket data memiliki ukuran terbatas dan tidak dapat sebesar seperti yang kita inginkan.\nSecara bersama-sama, kondisi ini menetapkan batas bandwidth maksimal per terowongan sebesar 20-50 kbyte/detik.\nTetapi jika hanya satu hop di tunel memiliki bandwidth hanya 5 kb/detik, seluruh tunnel terbatas untuk 5 kb/detik, tidak tergantung latency dan keterbatasan lain." #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." -msgstr "" -"Karena enkripsi yang digunakan dan setup lainnya di I2P (bagaimana " -"membangun terowongan, latency, ...) cukup mahal dalam waktu CPU untuk " -"membangun tunnel. Inilah sebabnya destinasi hanya diperbolehkan untuk " -"memiliki maks 6 tunnel MASUK dan 6 KELUAR untuk transportasi data. Dengan" -" max 50 kb/detik per terowongan, destinasi dapat menggunakan kira-kira " -"total 300 kb/detik lalu lintas (dalam kenyataannya mungkin lebih jika " -"terowongan lebih pendek digunakan dengan anonimitas tidak tersedia atau " -"rendah).\n" -"Tunnel bekas dibuang setiap 10 menit dan yang baru dibangun.\n" -"Perubahan terowongan ini (dan kadang-kadang klien yang hard shutdown " -"karena penggunaan \"shut down at once\" atau situasi di mana ada mati " -"lampu) kadang-kadang break tunnel dan koneksi, seperti yang terlihat pada" -" jaringan IRC2P kehilangan koneksi (ping timeout) atau pada saat " -"menggunakan eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." +msgstr "Karena enkripsi yang digunakan dan setup lainnya di I2P (bagaimana membangun terowongan, latency, ...) cukup mahal dalam waktu CPU untuk membangun tunnel. Inilah sebabnya destinasi hanya diperbolehkan untuk memiliki maks 6 tunnel MASUK dan 6 KELUAR untuk transportasi data. Dengan max 50 kb/detik per terowongan, destinasi dapat menggunakan kira-kira total 300 kb/detik lalu lintas (dalam kenyataannya mungkin lebih jika terowongan lebih pendek digunakan dengan anonimitas tidak tersedia atau rendah).\nTunnel bekas dibuang setiap 10 menit dan yang baru dibangun.\nPerubahan terowongan ini (dan kadang-kadang klien yang hard shutdown karena penggunaan \"shut down at once\" atau situasi di mana ada mati lampu) kadang-kadang break tunnel dan koneksi, seperti yang terlihat pada jaringan IRC2P kehilangan koneksi (ping timeout) atau pada saat menggunakan eepget." #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." -msgstr "" -"Dengan serangkaian destinasi dan serangkaian unnel per tujuan, satu node " -"I2P hanya menggunakan serangkaian tunnel di node I2P lain.\n" -"Misalnya, jika node I2P adalah \"hop1\" di dalam contoh kecil di atas, " -"kita hanya melihat 1 participating tunnel yang berasal dari client.\n" -"Jika kita menjumlahkan seluruh jaringan I2P, hanya sejumlah tunnel yang " -"terbatas yang bisa dibangun dengan jumlah bandwidth yang terbatas.\n" -"Jika salah satu mendistribusikan angka-angka terbatas ini di sejumlah " -"node I2P, ada hanya sebagian dari kapasitas bandwidth tersedia yang " -"tersedia untuk digunakan." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." +msgstr "Dengan serangkaian destinasi dan serangkaian unnel per tujuan, satu node I2P hanya menggunakan serangkaian tunnel di node I2P lain.\nMisalnya, jika node I2P adalah \"hop1\" di dalam contoh kecil di atas, kita hanya melihat 1 participating tunnel yang berasal dari client.\nJika kita menjumlahkan seluruh jaringan I2P, hanya sejumlah tunnel yang terbatas yang bisa dibangun dengan jumlah bandwidth yang terbatas.\nJika salah satu mendistribusikan angka-angka terbatas ini di sejumlah node I2P, ada hanya sebagian dari kapasitas bandwidth tersedia yang tersedia untuk digunakan." #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." -msgstr "" -"Untuk tetap anonim, satu router tidak boleh digunakan oleh seluruh " -"jaringan untuk membangun tunnel.\n" -"Jika satu router bertindak sebagai tunnel router untuk semua node I2P, " -"dia menjadi titik pusat kegagalan dan juga titik sentral untuk mengambil " -"data dari klien dan IPs. Ini tidak bagus.\n" -"I2P mencoba menyebarkan beban ke banyak node I2P karena alasan ini." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." +msgstr "Untuk tetap anonim, satu router tidak boleh digunakan oleh seluruh jaringan untuk membangun tunnel.\nJika satu router bertindak sebagai tunnel router untuk semua node I2P, dia menjadi titik pusat kegagalan dan juga titik sentral untuk mengambil data dari klien dan IPs. Ini tidak bagus.\nI2P mencoba menyebarkan beban ke banyak node I2P karena alasan ini." #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." -msgstr "" -"Hal lain adalah jaringan mesh penuh. Setiap hop-hop koneksi menggunakan " -"satu koneksi TCP atau UDP pada node I2P. Dengan 1000 koneksi, seseorang " -"melihat 1000 koneksi TCP. Itu cukup banyak dan router rumah dan kantor " -"kecil (DSL, kabel, ..) hanya mengizinkan sejumlah kecil koneksi (atau " -"hanya menjadi gila jika menggunakan lebih dari koneksi X).\n" -"I2P mencoba untuk membatasi koneksi ini di bawah 1500 per UDP dan per " -"tipe TCP.\n" -"Ini membatasi jumlah lalu lintas yang diarahkan ke node I2P milik anda " -"juga." +msgstr "Hal lain adalah jaringan mesh penuh. Setiap hop-hop koneksi menggunakan satu koneksi TCP atau UDP pada node I2P. Dengan 1000 koneksi, seseorang melihat 1000 koneksi TCP. Itu cukup banyak dan router rumah dan kantor kecil (DSL, kabel, ..) hanya mengizinkan sejumlah kecil koneksi (atau hanya menjadi gila jika menggunakan lebih dari koneksi X).\nI2P mencoba untuk membatasi koneksi ini di bawah 1500 per UDP dan per tipe TCP.\nIni membatasi jumlah lalu lintas yang diarahkan ke node I2P milik anda juga." #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." -msgstr "" -"Singkatnya, I2P sangat kompleks dan tidak ada cara mudah untuk menentukan" -" mengapa node anda tidak digunakan.\n" -"Jika node anda dapat dijangkau dan memiliki pengaturan bandwidth> 128 " -"kbyte / detik yang dibagi dan dapat dijangkau 24/7, itu harus digunakan " -"setelah beberapa waktu untuk participating traffic.\n" -"Jika berada di tengah-tengah, pengujian simpul I2P anda yang dilakukan " -"oleh node lain akan memberi tahu: anda tidak dapat dijangkau. Ini " -"memblokir node anda setidaknya 24 jam pada node lain. Jadi, node lain " -"yang menganggap anda sebagai tidak aktif tidak akan menggunakan simpul " -"Andaaselama 24 jam untuk membangun tunnel. Inilah sebabnya mengapa lalu " -"lintas anda akan menjadi lebih rendah setelah restart / shutdown selama " -"minimal 24 jam." +msgstr "Singkatnya, I2P sangat kompleks dan tidak ada cara mudah untuk menentukan mengapa node anda tidak digunakan.\nJika node anda dapat dijangkau dan memiliki pengaturan bandwidth> 128 kbyte / detik yang dibagi dan dapat dijangkau 24/7, itu harus digunakan setelah beberapa waktu untuk participating traffic.\nJika berada di tengah-tengah, pengujian simpul I2P anda yang dilakukan oleh node lain akan memberi tahu: anda tidak dapat dijangkau. Ini memblokir node anda setidaknya 24 jam pada node lain. Jadi, node lain yang menganggap anda sebagai tidak aktif tidak akan menggunakan simpul Andaaselama 24 jam untuk membangun tunnel. Inilah sebabnya mengapa lalu lintas anda akan menjadi lebih rendah setelah restart / shutdown selama minimal 24 jam." #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"Selain itu: node I2P lainnya perlu mengetahui router I2P Andaauntuk " -"mengujinya untuk reachability dan kapasitas. Butuh waktu untuk node lain " -"untuk diketahui node anda. \n" -"Ini akan lebih cepat jika anda menggunakan I2P dan membangun lebih banyak" -" tunnel, misalnya menggunakan torrent atau www untuk beberapa lama." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "Selain itu: node I2P lainnya perlu mengetahui router I2P Andaauntuk mengujinya untuk reachability dan kapasitas. Butuh waktu untuk node lain untuk diketahui node anda. \nIni akan lebih cepat jika anda menggunakan I2P dan membangun lebih banyak tunnel, misalnya menggunakan torrent atau www untuk beberapa lama." #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2787,7 +2150,4 @@ msgstr "Peningkatan Kinerja" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Untuk peningkatan kinerja masa depan, lihat <a " -"href=\"%(future)s\">Perbaikan Kinerja Masa Depan</a> ." - +msgstr "Untuk peningkatan kinerja masa depan, lihat <a href=\"%(future)s\">Perbaikan Kinerja Masa Depan</a> ." diff --git a/i2p2www/translations/id/LC_MESSAGES/comparison.po b/i2p2www/translations/id/LC_MESSAGES/comparison.po index bedaa65ab1208c48362a2de2dca8be6c25043275..c547123c69cf4d4e6473194973f5a641583740e6 100644 --- a/i2p2www/translations/id/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/id/LC_MESSAGES/comparison.po @@ -1,24 +1,24 @@ -# Indonesian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Khairul Agasta <khairuldroids@gmail.com>, 2014 # Robert Dafis <robertdafis@gmail.com>, 2017-2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-10-04 00:21+0000\n" -"Last-Translator: erinm\n" -"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)" -"\n" -"Plural-Forms: nplurals=1; plural=0\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Robert Dafis <robertdafis@gmail.com>, 2017-2018\n" +"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: id\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -26,103 +26,39 @@ msgstr "I2P Dibandingkan dengan Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer" -" to peer anonim, \n" -"menawarkan cara aman menyimpan data, serta beberapa pendekatan yang " -"berusaha\n" -"mengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah " -"penyimpanan\n" -"data terdistribusi, mereka telah membangun aplikasi diatas untuk " -"melakukan \n" -"komunikasi anonim yang lebih umum, seperti statistik website dan message " -"boards." +msgstr "Freenet adalah sepenuhnya didistribusikan, jaringan yang menerbitkan peer to peer anonim, \nmenawarkan cara aman menyimpan data, serta beberapa pendekatan yang berusaha\nmengatasi banjir flash. Sementara Freenet dirancang sebagai sebuah penyimpanan\ndata terdistribusi, mereka telah membangun aplikasi diatas untuk melakukan \nkomunikasi anonim yang lebih umum, seperti statistik website dan message boards." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan " -"substansial - \n" -"yaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan " -"masyarkat \n" -"mendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat " -"penerbit \n" -"tidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data " -"populer cukup \n" -"efisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini." -" Di sisi lain, \n" -"ada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan " -"satu \n" -"sama lain secara anonim melalui website, message boards, program file " -"sharing, etc.\n" -"Ada juga beberapa upaya untuk mengembangkan penyimpanan data " -"terdistribusi \n" -"untuk berjalan diatas I2P,\n" -"(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" -"tetapi saat ini belum siap untuk penggunaan umum." +msgstr "Dibandingkan dengan I2P, Freenet menawarkan beberapa keuntungan substansial - \nyaitu penyimpanan data terdistribusi, sementara I2P tidak, memungkinkan masyarkat \nmendapatkan konten yang diterbitkan oleh pengguna lain bahkan saat penerbit \ntidak lagi online. Selain itu, Freenet juga dapat mendistribusikan data populer cukup \nefisien. I2P sendiri tidak dan tidak akan menyediakan fungsionalitas ini. Di sisi lain, \nada tumpang tindih untuk pengguna yang hanya ingin berkomunikasi dengan satu \nsama lain secara anonim melalui website, message boards, program file sharing, etc.\nAda juga beberapa upaya untuk mengembangkan penyimpanan data terdistribusi \nuntuk berjalan diatas I2P,\n(yang terakhir port dari <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\ntetapi saat ini belum siap untuk penggunaan umum." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada " -"beberapa \n" -"kekhawatiran mengenai algoritma Freenet dari kedua perspektif " -"skalabilitas dan \n" -"anonimitas, karena sebagian besar untuk routing pendorongan heuristic " -"Freenet. \n" -"Interaksi dari beragam teknik tentu bisa berhasil mencegah berbagai " -"serangan, dan \n" -"mungkin beberapa aspek algoritma routing akan memberikan skalabilitas " -"yang \n" -"diharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut " -"sertakan berhasil\n" -"memberikan hasil yang positif, namun masih ada harapan. Setidaknya, " -"Freenet tidak\n" -"menyertakan anonimitas substansial terhadap penyerang yang tidak memiliki" -"\n" -"sumber daya yang diperlukan untuk menganalisa lebih jauh." +msgstr "Akan tetapi, meskipun menghiraukan segala masalah implementasi, ada beberapa \nkekhawatiran mengenai algoritma Freenet dari kedua perspektif skalabilitas dan \nanonimitas, karena sebagian besar untuk routing pendorongan heuristic Freenet. \nInteraksi dari beragam teknik tentu bisa berhasil mencegah berbagai serangan, dan \nmungkin beberapa aspek algoritma routing akan memberikan skalabilitas yang \ndiharapkan. Sayangnya, tidak banyak analisis algoritma yang diikut sertakan berhasil\nmemberikan hasil yang positif, namun masih ada harapan. Setidaknya, Freenet tidak\nmenyertakan anonimitas substansial terhadap penyerang yang tidak memiliki\nsumber daya yang diperlukan untuk menganalisa lebih jauh." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -130,51 +66,28 @@ msgstr "Membandingkan I2P dengan projek lain" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi" -" \n" -"anonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah" -" \n" -"daftar komprehensif sumber anonimitas - kedua freehaven \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi " -"Anonimitas</a>\n" -"dan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\n" -"melayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\n" -"untuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan " -"individu:" +msgstr "Ada banyak aplikasi hebat dan projek lainnya yang bekerja pada komunikasi \nanonim dan I2P telah terinspirasi oleh banyak upaya mereka. Ini bukanlah \ndaftar komprehensif sumber anonimitas - kedua freehaven \n<a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografi Anonimitas</a>\ndan <a href=\"https://www.gnunet.org/links/\">projek terkait</a> GNUnet\nmelayani tujuan yang baik. Mengatakan bahwa, beberapa sistem menonjol\nuntuk perbandingan lebih lanjut. Berikut ini memiliki laman perbandingan individu:" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman " -"jaringan lain:</a>" +msgstr "Berikut ini yang didiskusikan pada <a href=\"%(othernetworks)s\">laman jaringan lain:</a>" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Konten pada laman ini tunduk pada informasi, diskusi dan perdebatan, dan " -"kami menyambut komentar dan tambahan.\n" -"Anda dapat mengkontribusikan analisis dengan memasukkan <a " -"href=\"%(trac)s\">tiket baru di Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -191,251 +104,116 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Sebagian besar bagian berikut sudah cukup tua dan mungkin tidak akurat. \n" -"Untuk overview perbandingan yang tersedia, silakan baca <a " -"href=\"%(comparison)s\">halaman perbandingan jaringan utama</a>. Anda " -"dapat memberikan kontribusi analisis dengan memasukkan <a " -"href=\"%(trac)s\">tiket baru di Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." -msgstr "" -"RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam " -"jaringan\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti " -"jaringan F2F \n" -"membuat koneksi IP langsung hanya kepada peers (\"friends\") yang " -"terotentifikasi setelah\n" -"pertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang " -"tidak terotentifikasi (misalnya friends dari friends), \n" -"tapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi " -"dan anonimitas." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." +msgstr "RetroShare adalah kumpulam aplikasi peer-to-peer yang berjalan di dalam jaringan\n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a>. Setiap peer seperti jaringan F2F \nmembuat koneksi IP langsung hanya kepada peers (\"friends\") yang terotentifikasi setelah\npertukaran sertifikat secara eksplisit . Ini dapat menemukan peers yang tidak terotentifikasi (misalnya friends dari friends), \ntapi koneksi ke mereka dialihkan melalui \"friend\" peers untuk privasi dan anonimitas." #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." -msgstr "" -"RetroShare didesain untuk membangun jaringan pribadi yang berisi peers " -"terpercaya, sementara I2P didesain \n" -"sebagai jaringan publik anonim berskala besar. Versi-versi terbaru " -"RetroShare memiliki opsi untuk berjalan \n" -"sebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai " -"transport. Dengan itu, semua koneksi \n" -"menjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\"" -" baru." +msgstr "RetroShare didesain untuk membangun jaringan pribadi yang berisi peers terpercaya, sementara I2P didesain \nsebagai jaringan publik anonim berskala besar. Versi-versi terbaru RetroShare memiliki opsi untuk berjalan \nsebagai \"darknet\" publik dengan menggunakan I2P atau Tor sebagai transport. Dengan itu, semua koneksi \nmenjadi anonim dan kepercayaan tidak diperlukan untuk menambah \"friend\" baru." #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." -msgstr "" -"Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim " -"terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel " -"melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma " -"deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara " -"Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. " -"Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a " -"href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy " -"mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). " -"Ada source code yang tersedia untuk kedua sistem, tapi kami tidak " -"mengetahui penggunaannya di luar lingkungan akademis." +msgstr "Morphmix dan Tarzan adalah jaringan peer to peer proxi anonim terdistribusi penuh, yang memungkinkan orang untuk menggunakan tunnel melalui jaringan rendah latency. Morphmix mencakup beberapa algoritma deteksi collusion yang sangat menarik dan pertahanan Sybil, sementara Tarzan memanfaatkan kelangkaan alamat IP untuk mencapai hal yang sama. Dua perbedaan utama antara keduanya dan I2P ini adalah terkait dengan <a href=\"%(threatmodel)s\">model ancaman</a> I2P dan desain out-proxy mereka (berlawanan dengan penyediaan pengirim dan penerima anonimitas). Ada source code yang tersedia untuk kedua sistem, tapi kami tidak mengetahui penggunaannya di luar lingkungan akademis." #: i2p2www/pages/site/comparison/other-networks.html:172 #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." -msgstr "" -"\n" -"Mixminion dan Mixmaster adalah jaringan untuk mendukung email anonim " -"terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang " -"berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau " -"I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh " -"tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna " -"low-latency, untuk menyediakan anonimitas yang secara signifikan lebih " -"besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin " -"atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu " -"dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang " -"membutuhkan perlindungan ekstrim untuk email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." +msgstr "\nMixminion dan Mixmaster adalah jaringan untuk mendukung email anonim terhadap musuh yang sangat kuat. Aplikasi pesan high-latency yang berjalan di atas I2P (misalnya <a href=\"%(syndie)s\">Syndie</a> atau I2PBote) mungkin terbukti cukup untuk memenuhi ancaman model musuh tersebut, sementara berjalan secara paralel seiring kebutuhan pengguna low-latency, untuk menyediakan anonimitas yang secara signifikan lebih besar. Dukungan latency tinggi di dalam router I2P itu sendiri mungkin atau mungkin tidak ditambahkan dalam rilis di masa depan. Masih terlalu dini untuk mengatakan apakah I2P akan memenuhi kebutuhan pengguna yang membutuhkan perlindungan ekstrim untuk email." #: i2p2www/pages/site/comparison/other-networks.html:184 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." -msgstr "" -"Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil " -"pendekatan berbasis direktori." +msgstr "Seperti Tor dan Onion Routing, Mixminion dan Mixmaster juga mengambil pendekatan berbasis direktori." #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" -msgstr "" -"JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk " -"menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat " -"(peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien " -"melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet" -" biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda " -"dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang " -"signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, " -"JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah " -"bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin " -"berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) " -"berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski " -"metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa " -"data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan" -" keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan " -"intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian" -" tidak dapat diterima di pengadilan)" +msgstr "JAP (Java Anonymous Proxy) adalah jaringan mix cascades untuk menganonimkan web requests,Dan karena itu memiliki sedikit node terpusat (peserta dalam cascade) yang berbaurdan mencampur permintaan dari klien melalui urutan node (caskade) sebelummenggunakan proxy keluar ke internet biasa. Jangkauan, model ancaman, dan keamanan secara substansialberbeda dengan I2P, tapi bagi mereka yang tidak membutuhkan anonimitas yang signifikan tapi tetap sajatidak puas dengan layanan seperti Anonymizer, JAP layak untuk dipertimbangkan. Satuhal yang perlu diperhatikan adalah bahwa siapapun yang berada di bawah yurisdiksi pengadilan Jerman mungkin berhati-hati karena Biro Investigasi Kriminal Federal Jerman (FBCI) berhasil <a href=\"%(url)s\">menyerang</a> jaringan tersebut. Meski metode serangan ini ternyata ilegaldi pengadilan Jerman, faktanya bahwa data berhasil dikumpulkan. Pengadilan mengubah pikiran mereka berdasarkan keadaan, dan ini adalah bukti bahwajika badan pemerintah atau badan intelijen menginginkannya, mereka bisa mengumpulkan datanyawalau kemudian tidak dapat diterima di pengadilan)" #: i2p2www/pages/site/comparison/other-networks.html:216 #, python-format msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." -msgstr "" -"Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> " -"routing yang sama, yang memberikan beberapa derajat anonimitas " -"berdasarkan model ancaman untuk memberikan penolakan yang masuk akal " -"terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, " -"mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan " -"beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan " -"algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini " -"bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang " -"orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei " -"Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node " -"lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat " -"anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang " -"berada dalam kelompok peer itu)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." +msgstr "Kedua sistem ini bekerja melalui dasar <a href=\"%(antnet)s\">antnet</a> routing yang sama, yang memberikan beberapa derajat anonimitas berdasarkan model ancaman untuk memberikan penolakan yang masuk akal terhadap musuh sederhanya yang tidak berkolusi. Dengan antnet routing, mereka terlebih dahulu melakukan random walk atau siaran untuk menemukan beberapa peer dengan data atau identitas yang diinginkan, lalu gunakan algoritma umpan balik untuk mengoptimalkan jalur yang ditemukan. Ini bekerja dengan baik untuk aplikasi yang hanya ingin diketahui Apa yang orang lain di sekitar mereka tawarkan - \"Bagaimana kabarmu\" vs. \"Hei Alice, apa kabarmu\" -Anda pada dasarnya mendapatkan sekelompok node lokal yang dapat berbagi file dengan dan mempertahankan beberapa tingkat anonimitas (meski Anda tidak memiliki banyak kendali atas siapa yang berada dalam kelompok peer itu)." #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." -msgstr "" -"Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin " -"berbicara dengan peer tertentu akhirnya melakukan broadcast search atau " -"random walk (meski jika mereka cukup beruntung, antnet routing harus " -"mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan " -"ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk " -"jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik " -"lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja" -" penerapannya terbatas pada situasi di mana ada masalah tertentu harus " -"diatasi" +msgstr "Namun, algoritmanya sama sekali tidak bagus - jika aplikasi ingin berbicara dengan peer tertentu akhirnya melakukan broadcast search atau random walk (meski jika mereka cukup beruntung, antnet routing harus mengoptimalkan koneksi yang ditemukan). Ini berarti sementara jaringan ini bisa bekerja hebat pada skala kecil, mereka tidak cocok untuk jaringan besar di mana seseorang ingin berhubungan dengan peer spesifik lainnya. Itu tidak berarti tidak ada manfaat dalam sistem ini, hanya saja penerapannya terbatas pada situasi di mana ada masalah tertentu harus diatasi" #: i2p2www/pages/site/comparison/other-networks.html:239 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." -msgstr "" -"Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor" -" <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus " -"dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi " -"closed source dan menargetkan secara publik negara tertentu bukanlah ide " -"bagus. I2P tentu saja open source. Namun, source code-nya dan <a " -"href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut." +msgstr "Ini adalah jaringan closed source yang ditujukan untuk pengguna Iran. Tor <a href=\"%(torpost)s\">menulis dengan baik tentang apa yang harus dicari dengan alat pengelakan</a>. Cukup dengan mengatakan bahwa menjadi closed source dan menargetkan secara publik negara tertentu bukanlah ide bagus. I2P tentu saja open source. Namun, source code-nya dan <a href=\"%(docs)s\">dokumentasi teknis</a> perlu ditinjau lebih lanjut." #: i2p2www/pages/site/comparison/other-networks.html:248 msgid "Paid VPN Services" @@ -446,10 +224,8 @@ msgstr "Jasa VPN berbayar" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Anda dapat memberikan kontribusi analisis dengan memasukkan <a " -"href=\"%(trac)s\">tiket baru di Trac</a>" #: i2p2www/pages/site/comparison/other-networks.html:254 msgid "Others" @@ -477,17 +253,7 @@ msgid "" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n" "database</a> and <a href=\"%(peerselection)s\">peer selection</a>." -msgstr "" -"Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan" -" orang untuk menggunakan tunnel melalui campuran jaringan latency rendah." -" Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi " -"terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor" -" juga mendukung hidden service). Selain itu, Tor mengambil pendekatan " -"berbasis direktori - menyediakan titik terpusat untuk mengelola " -"keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan " -"statistik, berbeda dengan jaringan I2P di mana <a " -"href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer " -"selection</a> terdistribusi." +msgstr "Tor dan Onion Routing keduanya menganonimkan jaringan proxy, memungkinkan orang untuk menggunakan tunnel melalui campuran jaringan latency rendah. Dua perbedaan utama antara Tor/Onion-Routing dan I2P adalah lagi-lagi terkait dengan perbedaan model ancaman dan desain out-proxy (meskipun Tor juga mendukung hidden service). Selain itu, Tor mengambil pendekatan berbasis direktori - menyediakan titik terpusat untuk mengelola keseluruhan 'tampilan' dari jaringan, serta mengumpulkan dan melaporkan statistik, berbeda dengan jaringan I2P di mana <a href=\"%(netdb)s\">database</a> dan <a href=\"%(peerselection)s\">peer selection</a> terdistribusi." #: i2p2www/pages/site/comparison/tor.html:23 msgid "" @@ -500,14 +266,7 @@ msgid "" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." -msgstr "" -"Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial" -" terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, " -"global passive adversaries bisa lebih mudah melakukan analisis lalu " -"lintas. Selain itu, outproxies memiliki akses teks dari data yang " -"ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan " -"semua masalah keamanan lainnya yang kita kenal di lalu lintas internet " -"normal." +msgstr "Fungsi outproxy di I2P/Tor memang memiliki beberapa kelemahan substansial terhadap penyerang tertentu. Begitu komunikasi meninggalkan mixnet, global passive adversaries bisa lebih mudah melakukan analisis lalu lintas. Selain itu, outproxies memiliki akses teks dari data yang ditransfer kedua arah. Outproxies rentan terhadap penyalahgunaan dan semua masalah keamanan lainnya yang kita kenal di lalu lintas internet normal." #: i2p2www/pages/site/comparison/tor.html:35 msgid "" @@ -517,12 +276,7 @@ msgid "" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." -msgstr "" -"Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena " -"mereka berada di luar model ancaman mereka. Demikian juga, di luar " -"lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun " -"fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, " -"beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy." +msgstr "Namun, banyak orang tidak perlu khawatir dengan hal tersebut karena mereka berada di luar model ancaman mereka. Demikian juga, di luar lingkup fungsional I2P (formal) (jika orang menginginkan untuk membangun fungsionalitas di atas Lapisan komunikasi anonim, mereka bisa). Bahkan, beberapa pengguna I2P saat ini memanfaatkan Tor untuk outproxy." #: i2p2www/pages/site/comparison/tor.html:49 msgid "Comparison of Tor and I2P Terminology" @@ -532,9 +286,7 @@ msgstr "Perbandingan Terminologi di Tor dan I2P" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya " -"berbeda." +msgstr "Walau Tor dan I2P serupa dalam banyak hal, sebagian terminologinya berbeda." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -607,8 +359,8 @@ msgstr "Hidden Service" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite atau distinasi" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -678,21 +430,14 @@ msgstr "Manfaat Tor dibandingkan I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di " -"komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang" -" anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, " -"terlihat, bertempat di universitas" +msgstr "Jumlah pengguna yang jauh lebih besar; Lebih banyak diperhatikan di komunitas akademis dan hacker; Mendapat manfaat dari studi formal tentang anonimitas, perlawanan, dan kinerja; Memiliki pemimpin non-anonim, terlihat, bertempat di universitas" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" -msgstr "" -"Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat " -"ditangani" +msgstr "Sudah menyelesaikan beberapa masalah penskalaan I2P yang belum sempat ditangani" #: i2p2www/pages/site/comparison/tor.html:85 msgid "Has significant funding" @@ -700,40 +445,28 @@ msgstr "Memiliki pendanaan yang cukup banyak" #: i2p2www/pages/site/comparison/tor.html:86 msgid "Has more developers, including several that are funded" -msgstr "" -"Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat " -"pendanaan" +msgstr "Memiliki lebih banyak pengembang, termasuk beberapa yang mendapat pendanaan" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport " -"TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" " -"tapi ini belum diterapkan)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Lebih tahan terhadap pemblokiran tingkat negara karena lapisan transport TLS dan jembatan (I2P memiliki proposal untuk \"full restricted routes\" tapi ini belum diterapkan)" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" -msgstr "" -"Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha" -" DOS" +msgstr "Cukup besar bahwa ia harus menyesuaikan diri dengan pemblokiran dan usaha DOS" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan " -"jumlah exit node yang banyak" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Dirancang dan dioptimalkan untuk lalu lintas keluar jaringan, dengan jumlah exit node yang banyak" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, " -"situs web yang lebih baik, lebih banyak terjemahan" +msgstr "Dokumentasi yang lebih baik, memiliki dokumen dan spesifikasi formal, situs web yang lebih baik, lebih banyak terjemahan" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -747,17 +480,13 @@ msgstr "Tor client node memiliki overhead bandwidth yang sangat rendah" msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan " -"secara efisien dapat menangani serangan Sybil" +msgstr "Kontrol terpusat mengurangi kompleksitas pada masing-masing node dan secara efisien dapat menangani serangan Sybil" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi " -"dan latency lebih rendah" +msgstr "Inti node berkapasitas tinggi memberikan nilai throughput lebih tinggi dan latency lebih rendah" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -769,11 +498,9 @@ msgstr "Manfaat I2P dibandingkan Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat " -"daripada di Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Dirancang dan dioptimalkan untuk hidden servie, yang jauh lebih cepat daripada di Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -783,23 +510,17 @@ msgstr "Sepenuhnya terdistribusi dan mengorganisi diri sendiri" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, " -"daripada mempercayai kapasitas yang diklaim" +msgstr "Peer dipilih dengan terus melakukan profiling dan memeringkat kinerja, daripada mempercayai kapasitas yang diklaim" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" -msgstr "" -"Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, " -"bukan hardcoded" +msgstr "Floodfill peer (\"server direktori\") bervariasi dan tidak dipercaya, bukan hardcoded" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" -msgstr "" -"Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama" -" sekali di-DOS" +msgstr "Cukup kecil bahwa itu belum pernah diblokir atau banyak di-DOS, atau sama sekali di-DOS" #: i2p2www/pages/site/comparison/tor.html:135 msgid "Peer-to-peer friendly" @@ -813,17 +534,13 @@ msgstr "Packet switched alih-alih circuit switched" msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" -msgstr "" -"Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa" -" peer, bukan satu jalur tunggal" +msgstr "Penyeimbangan beban transparan secara implisit terhadap pesan di beberapa peer, bukan satu jalur tunggal" #: i2p2www/pages/site/comparison/tor.html:145 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" -msgstr "" -"Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel," -" ditambah rotating tunnel" +msgstr "Ketahanan vs kegagalan dengan menjalankan beberapa tunnel secara paralel, ditambah rotating tunnel" #: i2p2www/pages/site/comparison/tor.html:151 msgid "" @@ -831,26 +548,19 @@ msgid "" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" -msgstr "" -"Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 " -"inbound terowongan yang digunakan oleh semua peer yang sedang berbicara " -"dengan Alice, bukan satu rangkaian untuk masing-masing)" +msgstr "Skala setiap koneksi klien di O(1) dan bukan O(N) (Alice memiliki 2 inbound terowongan yang digunakan oleh semua peer yang sedang berbicara dengan Alice, bukan satu rangkaian untuk masing-masing)" #: i2p2www/pages/site/comparison/tor.html:161 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer" -" harus berkompromi untuk mendapatkan informasi yang sama." +msgstr "Tunnel searah dan bukan rangkaian dua arah, menggandakan jumlah node peer harus berkompromi untuk mendapatkan informasi yang sama." #: i2p2www/pages/site/comparison/tor.html:166 #, python-format msgid "Counter-arguments and further discussion <a href=\"%(netdb)s\">here</a>." -msgstr "" -"Argumen yang bertentangan dan pembahasan lebih lanjut ada <a " -"href=\"%(netdb)s\">di sini</a>." +msgstr "Argumen yang bertentangan dan pembahasan lebih lanjut ada <a href=\"%(netdb)s\">di sini</a>." #: i2p2www/pages/site/comparison/tor.html:171 msgid "" @@ -859,11 +569,7 @@ msgid "" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" -msgstr "" -"Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang " -"berpartisipasi dalam terowongan karena terowongan digunakan lebih dari " -"sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan " -"tunnel, pengujian tunnel)" +msgstr "Perlindungan terhadap mendeteksi aktivitas klien, bahkan saat penyerang berpartisipasi dalam terowongan karena terowongan digunakan lebih dari sekedar menyampaikan pesan end-to-end (misalnya netDb, pengelolaan tunnel, pengujian tunnel)" #: i2p2www/pages/site/comparison/tor.html:180 msgid "" @@ -871,18 +577,13 @@ msgid "" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." -msgstr "" -"Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat " -"digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit " -"di Tor, yang biasanya berumur panjang." +msgstr "Terowongan di I2P berumur pendek, mengurangi jumlah sampel yang dapat digunakan penyerang untuk memasang serangan aktif, tidak seperti sirkuit di Tor, yang biasanya berumur panjang." #: i2p2www/pages/site/comparison/tor.html:188 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." -msgstr "" -"API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS " -"dirancang untuk fungsionalitas." +msgstr "API I2P dirancang khusus untuk anonimitas dan keamanan, sementara SOCKS dirancang untuk fungsionalitas." #: i2p2www/pages/site/comparison/tor.html:193 msgid "Essentially all peers participate in routing for others" @@ -893,11 +594,7 @@ msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." -msgstr "" -"Pengeluaran tambahan bandwidth dengan menjadi\n" -"full peer sangat rendah, sementara Tor, ketika simpul\n" -"klien tidak memerlukan banyak bandwidth, mereka\n" -"tidak berpartisipasi penuh dalam mixnet." +msgstr "Pengeluaran tambahan bandwidth dengan menjadi\nfull peer sangat rendah, sementara Tor, ketika simpul\nklien tidak memerlukan banyak bandwidth, mereka\ntidak berpartisipasi penuh dalam mixnet." #: i2p2www/pages/site/comparison/tor.html:201 msgid "Integrated automatic update mechanism" @@ -917,27 +614,20 @@ msgstr "Potensi keuntungan I2P lainnya namun saat ini belum diimplementasikan" #: i2p2www/pages/site/comparison/tor.html:207 msgid "...and may never be implemented, so don't count on them!" -msgstr "" -"...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan " -"mereka!" +msgstr "...dan mungkin tidak pernah diimplementasikan, jadi jangan mengandalkan mereka!" #: i2p2www/pages/site/comparison/tor.html:210 msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" -msgstr "" -"Pertahanan vs. analisis penghitung pesan dengan membungkus \n" -"beberapa pesan seperti bawang" +msgstr "Pertahanan vs. analisis penghitung pesan dengan membungkus \nbeberapa pesan seperti bawang" #: i2p2www/pages/site/comparison/tor.html:216 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" -msgstr "" -"Pertahanan vs. persimpangan jangka panjang denga \n" -"menambahkan delay pada berbagai hop (dimana delay\n" -"tidak terlihat oleh hop lain)" +msgstr "Pertahanan vs. persimpangan jangka panjang denga \nmenambahkan delay pada berbagai hop (dimana delay\ntidak terlihat oleh hop lain)" #: i2p2www/pages/site/comparison/tor.html:223 msgid "" @@ -945,9 +635,4 @@ msgid "" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" -msgstr "" -"Berbagai strategi pencampuran pada level saluran\n" -"(misal, membuat saluran yang akan menangani 500 pesan\n" -"/ menit, yang mana titik akhir akan menginjek pesan dummy\n" -"jika ada ketidakcukupan pesan, dll)" - +msgstr "Berbagai strategi pencampuran pada level saluran\n(misal, membuat saluran yang akan menangani 500 pesan\n/ menit, yang mana titik akhir akan menginjek pesan dummy\njika ada ketidakcukupan pesan, dll)" diff --git a/i2p2www/translations/id/LC_MESSAGES/misc.po b/i2p2www/translations/id/LC_MESSAGES/misc.po index cdfb16f663a317074c404342f30b2a8be8b7f6ad..b2b6b401a17193812f383b710365552d8d71f452 100644 --- a/i2p2www/translations/id/LC_MESSAGES/misc.po +++ b/i2p2www/translations/id/LC_MESSAGES/misc.po @@ -1,23 +1,23 @@ -# Indonesian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Khairul Agasta <khairuldroids@gmail.com>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2018-09-09 03:44+0000\n" -"Last-Translator: Robert Dafis <robertdafis@gmail.com>\n" -"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)" -"\n" -"Plural-Forms: nplurals=1; plural=0\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Khairul Agasta <khairuldroids@gmail.com>, 2014\n" +"Language-Team: Indonesian (http://www.transifex.com/otf/I2P/language/id/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: id\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -26,78 +26,39 @@ msgstr "I2P di CLT dan PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Para anggota I2P akan melakukan perbincangan di CLT dan PetCon 2009.1\n" -"Dua anggota dari I2P team akan berada di hari Linux dan konvensi keamanan" -" yang akan datang." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Para anggota I2P akan melakukan perbincangan di CLT dan PetCon 2009.1\nDua anggota dari I2P team akan berada di hari Linux dan konvensi keamanan yang akan datang." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"Pada tanggal 14 maret 2009 akan ada pembicaraan singkat tentang " -"pengenalan umum I2P di <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009" -" yang</a> diadakan oleh Echelon.\n" -"Eselon dan beberapa anggota keuarga I2P lainnya akan menghadiri pertemuan" -" Linux tersebut selama penuh dua hari (Sabtu dan Minggu) dan akan " -"dikenali sebagai anggota keluarga I2P. Temui mereka, tanyakan pertanyaan " -"anda kepada mereka, tunjukkan alat peraga anda! Tunjukkan dukungan anda!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "Pada tanggal 14 maret 2009 akan ada pembicaraan singkat tentang pengenalan umum I2P di <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009 yang</a> diadakan oleh Echelon.\nEselon dan beberapa anggota keuarga I2P lainnya akan menghadiri pertemuan Linux tersebut selama penuh dua hari (Sabtu dan Minggu) dan akan dikenali sebagai anggota keluarga I2P. Temui mereka, tanyakan pertanyaan anda kepada mereka, tunjukkan alat peraga anda! Tunjukkan dukungan anda!" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"Baru 10 hari kemudian <a href=\"%(petcon)s\">konvensi Privacy and Data " -"Security</a> di Dresden akan berlangsung.\n" -"Sekali lagi, Echelon akan menghadiri acara ini dan mengadakan pembicaraan" -" singkat tentang pengenalan umum I2P. Pembicaraan lain tentang profiling " -"oleh klien I2P akan diadakan." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "Baru 10 hari kemudian <a href=\"%(petcon)s\">konvensi Privacy and Data Security</a> di Dresden akan berlangsung.\nSekali lagi, Echelon akan menghadiri acara ini dan mengadakan pembicaraan singkat tentang pengenalan umum I2P. Pembicaraan lain tentang profiling oleh klien I2P akan diadakan." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"Kode sumber I2P disimpan dalam repository CVS. Sekarang, ini disimpan di " -"repositori <a href=\"%(monotone)s\">Monotone</a> .\n" -"Bagi mereka yang tidak begitu mengenal CVS, ada sebuah <a " -"href=\"http://cvsbook.red-bean.com/cvsbook.html\">buku yang bagus</a> " -"tentang masalah ini (pengembang hanya perlu berurusan dengan bab pertama " -"- \"An Overview of CVS\", karena bab-bab berikutnya membahas beberapa " -"rincian rumit yang sangat sedikit yang perlu dilakukan)." +msgstr "Kode sumber I2P disimpan dalam repository CVS. Sekarang, ini disimpan di repositori <a href=\"%(monotone)s\">Monotone</a> .\nBagi mereka yang tidak begitu mengenal CVS, ada sebuah <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">buku yang bagus</a> tentang masalah ini (pengembang hanya perlu berurusan dengan bab pertama - \"An Overview of CVS\", karena bab-bab berikutnya membahas beberapa rincian rumit yang sangat sedikit yang perlu dilakukan)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Kutipan lucu dari WinCVS: \"Tahukah anda ... Jangan pernah bereksperimen " -"dengan perintah CVS baru di repositori kerja anda. Buat contoh modul " -"sebagai gantinya. \"" +msgstr "Kutipan lucu dari WinCVS: \"Tahukah anda ... Jangan pernah bereksperimen dengan perintah CVS baru di repositori kerja anda. Buat contoh modul sebagai gantinya. \"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -108,14 +69,9 @@ msgstr "Migrasi I2PTunnel" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" -"Setelah melakukan upgrade ke arsitektur baru, anda harus melakukan " -"sedikit pekerjaan untuk memuat bekerja server lama yang dioperasikan oleh" -" I2PTunnel. \n" -"Mari kita mencoba dengan contoh sederhana. Untuk eepsite dengan " -"konfigurasi clientApp yang lama, anda sebaiknya:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16 msgid "To provide that same functionality on the new web architecture:" @@ -131,12 +87,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "Klik pada Add new: [Server tunnel] \"GO\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Untuk nama: <code>\"eepsite\"</code>" +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Untuk deskripsi: <code>\"Eepsite saya, cantik bukan?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -150,10 +106,7 @@ msgstr "Untuk target port:" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Untuk file kunci pribadi: <code>jalur ke \"myWebPriv.dat\"</code><br /> \n" -"(direkomendasikan untuk menyalin .dat file tersebut ke direktori " -"pemasangan anda)" +msgstr "Untuk file kunci pribadi: <code>jalur ke \"myWebPriv.dat\"</code><br /> \n(direkomendasikan untuk menyalin .dat file tersebut ke direktori pemasangan anda)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -169,22 +122,12 @@ msgstr "Dia akan kembali mengatakan:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" -msgstr "" -"Itu saja! Membuat server I2PTunnel baru dikerjakan dengan cara yang sama" -" juga, kecuali tentu saja anda tidak perlu \"menyalin file lama\". Di " -"balik layar, semua digerakkan oleh file <code>i2ptunnel.config</code> , " -"yang dapat anda modifikasi secara eksternal (jika anda melakukannya, " -"tekan \"Reload config\" di halaman web I2PTunnel, yang akan merobohkan " -"semua tunnel yang ada dan membangun kembali yang baru)" +msgstr "Itu saja! Membuat server I2PTunnel baru dikerjakan dengan cara yang sama juga, kecuali tentu saja anda tidak perlu \"menyalin file lama\". Di balik layar, semua digerakkan oleh file <code>i2ptunnel.config</code> , yang dapat anda modifikasi secara eksternal (jika anda melakukannya, tekan \"Reload config\" di halaman web I2PTunnel, yang akan merobohkan semua tunnel yang ada dan membangun kembali yang baru)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47 msgid "" @@ -193,20 +136,15 @@ msgid "" "interface. It will say \"Please be patient\" if you try to \n" "beforehand, which means that it is still trying to build the \n" "necessary I2PTunnel sessions it has been configured to create." -msgstr "" -"Perhatikan bahwa anda AKAN perlu menunggu sampai router anda terintegrasi" -" ke dalam jaringan sebelum anda dapat menggunakan antarmuka " -"/i2ptunnel/web. Dia akan mengatakan \"Mohon bersabar\" jika anda mencoba" -" sebelumnya, yang berarti dia masih berusaha membangun sesi I2PTunnel " -"yang diperlukan yang telah dikonfigurasi untuk dibuat." +msgstr "Perhatikan bahwa anda AKAN perlu menunggu sampai router anda terintegrasi ke dalam jaringan sebelum anda dapat menggunakan antarmuka /i2ptunnel/web. Dia akan mengatakan \"Mohon bersabar\" jika anda mencoba sebelumnya, yang berarti dia masih berusaha membangun sesi I2PTunnel yang diperlukan yang telah dikonfigurasi untuk dibuat." #: i2p2www/pages/site/misc/i2ptunnel-services.html:2 msgid "I2PTunnel services" msgstr "I2PTunnel service" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." -msgstr "Berikut adalah salinan cepat panduan penyebaran eepsite Aum." +msgid "Below is quick copy of aum's I2P Site deployment guide." +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 msgid "1. - Deploy a local server" @@ -217,68 +155,48 @@ msgid "" "For simplicity's sake, we will walk through the setup of a web server; " "however, this procedure is the same regardless what protocol of servers " "and/or clients you are setting up." -msgstr "" -"Demi kesederhanaan, kita akan menjalankan setup server web; namun, " -"prosedur ini sama terlepas dari protokol server dan/atau klien yang anda " -"siapkan." +msgstr "Demi kesederhanaan, kita akan menjalankan setup server web; namun, prosedur ini sama terlepas dari protokol server dan/atau klien yang anda siapkan." #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." -msgstr "" -"Saya sarankan server web Tiny Httpd, thttpd, (versi windows tersedia di " -"situs) meskipun anda dapat menggunakan apa pun yang anda merasa nyaman." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." +msgstr "Saya sarankan server web Tiny Httpd, thttpd, (versi windows tersedia di situs) meskipun anda dapat menggunakan apa pun yang anda merasa nyaman." #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." -msgstr "" -"Pilihan lain yang lebih lengkap adalah menggunakan EasyPHP, yang juga " -"merupakan open source. Ini berisi PHPmyadmin, PHP, mySQL, dan Apache web " -"server. Untuk pemula yang tidak memiliki pengalaman pengaturan dan " -"hosting konten di dalam server, lihat halaman hosting untuk bantuan." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." +msgstr "Pilihan lain yang lebih lengkap adalah menggunakan EasyPHP, yang juga merupakan open source. Ini berisi PHPmyadmin, PHP, mySQL, dan Apache web server. Untuk pemula yang tidak memiliki pengalaman pengaturan dan hosting konten di dalam server, lihat halaman hosting untuk bantuan." #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." -msgstr "" -"Dengan server web yang dipilih, konfigurasinya untuk mendengarkan pada " -"port pilihan anda, dan melayani dokumennya dari direktori pilihan anda. " -"Untuk contoh ini, kita berasumsi port yang digunakan adalah 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." +msgstr "Dengan server web yang dipilih, konfigurasinya untuk mendengarkan pada port pilihan anda, dan melayani dokumennya dari direktori pilihan anda. Untuk contoh ini, kita berasumsi port yang digunakan adalah 10880." #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 msgid "" "Make sure your firewall is set up so that you cannot receive incoming " "connections on this port (which would breach your anonymity)." -msgstr "" -"Pastikan bahwa firewall anda diatur sehingga anda tidak bisa menerima " -"koneksi masuk pada port ini (yang akan menghilangkan anonimitas anda)." +msgstr "Pastikan bahwa firewall anda diatur sehingga anda tidak bisa menerima koneksi masuk pada port ini (yang akan menghilangkan anonimitas anda)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:25 msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." -msgstr "" -"Uji webserver dengan menunjuk webrowser biasa (yang punya \"direct " -"connection\") pada <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (ubah 10880 menjadi nomor " -"port yang anda pilih)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." +msgstr "Uji webserver dengan menunjuk webrowser biasa (yang punya \"direct connection\") pada <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> (ubah 10880 menjadi nomor port yang anda pilih)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 msgid "" "Once your webserver is working, and you can access it locally with your " "browser, continue to the next step." -msgstr "" -"Ketika webserver anda berfungsi, dan anda dapat mengaksesnya secara lokal" -" dengan browser anda, lanjutkan ke langkah berikutnya." +msgstr "Ketika webserver anda berfungsi, dan anda dapat mengaksesnya secara lokal dengan browser anda, lanjutkan ke langkah berikutnya." #: i2p2www/pages/site/misc/i2ptunnel-services.html:33 msgid "2 - Generate an I2P Destination Keypair" @@ -286,45 +204,29 @@ msgstr "2 - Buat Keypair Destinasi I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." -msgstr "" -"I2p tidak berurusan dengan alamat IP. Untuk melindungi anonimitas anda, " -"I2P berhubungan dengan alamat unik yang disebut destination key." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." +msgstr "I2p tidak berurusan dengan alamat IP. Untuk melindungi anonimitas anda, I2P berhubungan dengan alamat unik yang disebut destination key." #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" -msgstr "" -"Destination key bekerja seperti alamat IP yang biasa, kecuali bahwa itu " -"tidak dapat ditelusuri ke alamat IP atau lokasi fisik anda. Ketika " -"pengguna membuat permintaan untuk berbicara dengan anda, gateway adalah " -"pihak-pihak yang menjawab untuk anda. Jadi pengguna hanya dapat tahu " -"alamat IP Gateway anda. Namun, aateway tidak tahu alamat IP anda, karena " -"gateway adalah simpul-simpul terakhir pada terowongan, dan anda secara " -"anonim membuat tunnel dengan garlic routing. (Jadi Gateway adalah seperti" -" boneka yang tidak dapat melihat tuan mereka, dan semua orang " -"berkomunikasi melalui boneka ini)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" +msgstr "Destination key bekerja seperti alamat IP yang biasa, kecuali bahwa itu tidak dapat ditelusuri ke alamat IP atau lokasi fisik anda. Ketika pengguna membuat permintaan untuk berbicara dengan anda, gateway adalah pihak-pihak yang menjawab untuk anda. Jadi pengguna hanya dapat tahu alamat IP Gateway anda. Namun, aateway tidak tahu alamat IP anda, karena gateway adalah simpul-simpul terakhir pada terowongan, dan anda secara anonim membuat tunnel dengan garlic routing. (Jadi Gateway adalah seperti boneka yang tidak dapat melihat tuan mereka, dan semua orang berkomunikasi melalui boneka ini)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" -msgstr "" -"Untuk menggunakan server pada I2P, anda membuat destination keypair. Anda" -" menggunakan private key untuk mengotentikasi server anda saat tersambung" -" ke I2P, dan anda membuat public key (alias destination key) yang dikenal" -" publik, sehingga orang lain dapat terhubung ke server anda. (tidak " -"langsung, melalui gateway)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" +msgstr "Untuk menggunakan server pada I2P, anda membuat destination keypair. Anda menggunakan private key untuk mengotentikasi server anda saat tersambung ke I2P, dan anda membuat public key (alias destination key) yang dikenal publik, sehingga orang lain dapat terhubung ke server anda. (tidak langsung, melalui gateway)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 msgid "Each service you run on I2P requires a different keypair." @@ -335,75 +237,52 @@ msgid "" "To generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code> (all on one line)" -msgstr "" -"Untuk menghasilkan keypair anda, ketik perintah: <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code> (semua pada satu baris)" +msgstr "Untuk menghasilkan keypair anda, ketik perintah: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (semua pada satu baris)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:50 msgid "" "In windows, to generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code>" -msgstr "" -"Di Windows, untuk menghasilkan keypair anda, ketik perintah:<code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code>" +msgstr "Di Windows, untuk menghasilkan keypair anda, ketik perintah:<code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." -msgstr "" -"Nama file <code>myWebPrivKey.dat</code> dan <code>myWebPubKey.dat</code> " -"adalah arbitrary - pilih apapun yang anda inginkan di sini, asalkan anda " -"memahami pilihan anda sendiri." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." +msgstr "Nama file <code>myWebPrivKey.dat</code> dan <code>myWebPubKey.dat</code> adalah arbitrary - pilih apapun yang anda inginkan di sini, asalkan anda memahami pilihan anda sendiri." #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 msgid "" "We now need to export your public key into base64 format, which you will " "share with others." -msgstr "" -"Kita sekarang perlu untuk ekspor kunci publik ke format base64, yang anda" -" akan bagikan dengan orang lain." +msgstr "Kita sekarang perlu untuk ekspor kunci publik ke format base64, yang anda akan bagikan dengan orang lain." #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." -msgstr "" -"Untuk mengkonversi myWebPubKey.dat ke dalam shareable base64, ketik " -"perintah <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (semua pada satu baris)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." +msgstr "Untuk mengkonversi myWebPubKey.dat ke dalam shareable base64, ketik perintah <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > myWebPubKey.txt</code> (semua pada satu baris)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." -msgstr "" -"File yang dihasilkan, <code>myWebPubKey.txt</code> , berisi string base64" -" panjang (516 karakter di hitungan terakhir), yang disebut sebagai " -"destination key. Anda hanya perlu tahu tentang string ini untuk saat ini " -"adalah bahwa hal itu memungkinkan remote klien untuk unik menemukan dan " -"terhubung ke server anda, sama seperti alamat IP memungkinkan mesin " -"remote untuk mencari dan terhubung ke mesin anda." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." +msgstr "File yang dihasilkan, <code>myWebPubKey.txt</code> , berisi string base64 panjang (516 karakter di hitungan terakhir), yang disebut sebagai destination key. Anda hanya perlu tahu tentang string ini untuk saat ini adalah bahwa hal itu memungkinkan remote klien untuk unik menemukan dan terhubung ke server anda, sama seperti alamat IP memungkinkan mesin remote untuk mencari dan terhubung ke mesin anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." -msgstr "" -"Namun, tidak seperti alamat IP, tidak ada cara untuk melacak lokasi fisik" -" mesin anda - meskipun server anda bisa terhubung via I2P, alamat IP anda" -" tidak dapat ditelusuri atau terkait dengan destination key ini." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." +msgstr "Namun, tidak seperti alamat IP, tidak ada cara untuk melacak lokasi fisik mesin anda - meskipun server anda bisa terhubung via I2P, alamat IP anda tidak dapat ditelusuri atau terkait dengan destination key ini." #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 msgid "3 - Open a 'Tunnel' from I2P To Your Server" @@ -411,52 +290,37 @@ msgstr "3 - buka sebuah 'tunnel' dari I2P ke server anda" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." -msgstr "" -"Supaya klien lain di I2P mampu mengakses server anda, anda harus " -"menjalankan 'bridge' atau 'tunnel', yang membutuhkan koneksi dari klien " -"tersebut dan meneruskan mereka ke server lokal anda." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." +msgstr "Supaya klien lain di I2P mampu mengakses server anda, anda harus menjalankan 'bridge' atau 'tunnel', yang membutuhkan koneksi dari klien tersebut dan meneruskan mereka ke server lokal anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 msgid "" "To activate such a tunnel, type the command <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code> (all one line)." -msgstr "" -"Untuk mengaktifkan tunnel seperti itu, ketik perintah <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " -"myWebPrivKey.dat\"</code> (semua satu baris)." +msgstr "Untuk mengaktifkan tunnel seperti itu, ketik perintah <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (semua satu baris)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:78 msgid "" "If you used different filenames or port number earlier on, change these " "accordingly" -msgstr "" -"Jika Anda menggunakan nama file atau nomor port syang berbeda sebelumnya," -" ubah sesuai nama tersebut" +msgstr "Jika Anda menggunakan nama file atau nomor port syang berbeda sebelumnya, ubah sesuai nama tersebut" #: i2p2www/pages/site/misc/i2ptunnel-services.html:81 msgid "" "Windows users, remember to replace apostrophes with double quotes. Thus: " "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code>" -msgstr "" -"Pengguna Windows, ingatlah untuk mengganti tanda kutip tunggal dengan " -"tanda kutip ganda. Dengan demikian:<code>java -jar lib/i2ptunnel.jar " -"-nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>" +msgstr "Pengguna Windows, ingatlah untuk mengganti tanda kutip tunggal dengan tanda kutip ganda. Dengan demikian:<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." -msgstr "" -"Dalam beberapa detik, 'tunnel' tersebut sekarang seharusnya aktif, dan " -"remote klien seharusnya dapat mencapai server anda secara anonim. " -"Ingatlah untuk membiarkan router anda melakukan \"warming up\" sebelum " -"membuka tunnel kepada klien itu." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." +msgstr "Dalam beberapa detik, 'tunnel' tersebut sekarang seharusnya aktif, dan remote klien seharusnya dapat mencapai server anda secara anonim. Ingatlah untuk membiarkan router anda melakukan \"warming up\" sebelum membuka tunnel kepada klien itu." #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 msgid "4 - Update Your hosts.txt File " @@ -468,31 +332,21 @@ msgid "" "hosts.txt file, so I2P can translate the simple URL you place in the " "browser's address bar into the full public key text needed to find your " "server." -msgstr "" -"Untuk menguji server anda sendiri secara lokal, anda harus membuat entri " -"di file hosts.txt anda, sehingga I2P dapat menerjemahkan URL sederhana " -"yang Andaatempatkan di address bar web browser ke teks public key penuh " -"yang diperlukan untuk menemukan server anda." +msgstr "Untuk menguji server anda sendiri secara lokal, anda harus membuat entri di file hosts.txt anda, sehingga I2P dapat menerjemahkan URL sederhana yang Andaatempatkan di address bar web browser ke teks public key penuh yang diperlukan untuk menemukan server anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" -msgstr "" -"Edit hosts.txt anda, dan tambahkan baris myserver.i2p=blahblahblah, yang " -"mana myserver.i2p adalah 'domain' I2P anda yang anda ingin " -"mengasosiasikan dengan situs anda, dan blablabla adalah teks dari base64 " -"public key yang anda buat sebelumnya dalam file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" +msgstr "Edit hosts.txt anda, dan tambahkan baris myserver.i2p=blahblahblah, yang mana myserver.i2p adalah 'domain' I2P anda yang anda ingin mengasosiasikan dengan situs anda, dan blablabla adalah teks dari base64 public key yang anda buat sebelumnya dalam file myWebPubKey.txt" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 msgid "" "With this in place, you and others can reach your server with the simple " "domain name myserver.i2p in the browser's address bar." -msgstr "" -"Dengan ini , anda dan orang lain dapat mencapai server anda dengan nama " -"domain sederhana myserver.i2p di address bar di browser." +msgstr "Dengan ini , anda dan orang lain dapat mencapai server anda dengan nama domain sederhana myserver.i2p di address bar di browser." #: i2p2www/pages/site/misc/i2ptunnel-services.html:102 msgid "5 - Surf Your Site Within I2P" @@ -503,10 +357,7 @@ msgid "" "Using your secondary browser - the one you earlier configured to use " "localhost:4444 as a proxy - point this browser to the address <a " "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" -msgstr "" -"Gunakan browser yang lain - yang sebelumnya dikonfigurasi untuk " -"menggunakan localhost:4444 sebagai proxy - arahkan browser ini ke alamat " -"<a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" +msgstr "Gunakan browser yang lain - yang sebelumnya dikonfigurasi untuk menggunakan localhost:4444 sebagai proxy - arahkan browser ini ke alamat <a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:107 msgid "You should see the main page of your webserver come up." @@ -522,60 +373,43 @@ msgstr "Kita sekarang harus berpikir di luar web server." #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." -msgstr "" -"Ketika anda mulai menyukai I2P dan mendapatkan 'feeling' untuk itu, anda " -"akan ingin untuk menggunakan segala macam server dan klien." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." +msgstr "Ketika anda mulai menyukai I2P dan mendapatkan 'feeling' untuk itu, anda akan ingin untuk menggunakan segala macam server dan klien." #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"Keindahan I2P adalah bahwa hal itu memungkinkan Internet klien dan server" -" standar untuk kebanyakan protokol, untuk menjadi 'tunneled' melalui " -"jaringan anonim secara transparan." +msgstr "Keindahan I2P adalah bahwa hal itu memungkinkan Internet klien dan server standar untuk kebanyakan protokol, untuk menjadi 'tunneled' melalui jaringan anonim secara transparan." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." -msgstr "" -"Anda dapat menjalankan mailservers / clients, nameserver / clients, " -"newsservers / clients - hampir semuanya - bahkan mungkin FTP dalam mode " -"pasif." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." +msgstr "Anda dapat menjalankan mailservers / clients, nameserver / clients, newsservers / clients - hampir semuanya - bahkan mungkin FTP dalam mode pasif." #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." -msgstr "" -"Sekarang, kita akan membuat tunnel klien. Ini seperti tunnel server yang " -"kita buat tadi, tapi bekerja terbalik. Ini mendengarkan port di komputer " -"lokal anda; klien lokal anda terhubung ke port ini; koneksi akan " -"diteruskan melalui I2P ke service di ujung yang lain." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." +msgstr "Sekarang, kita akan membuat tunnel klien. Ini seperti tunnel server yang kita buat tadi, tapi bekerja terbalik. Ini mendengarkan port di komputer lokal anda; klien lokal anda terhubung ke port ini; koneksi akan diteruskan melalui I2P ke service di ujung yang lain." #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." -msgstr "" -"Untuk membuka tunnel klien anda untuk server anda, ketik perintah " -"<code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e " -"\"client 10888 textofbase64key\"</code> (semua satu baris)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." +msgstr "Untuk membuka tunnel klien anda untuk server anda, ketik perintah <code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (semua satu baris)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." -msgstr "" -"Port 10888 dapat diubah - hanya perlu hal selain port fisik yang " -"didengarkan server anda." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." +msgstr "Port 10888 dapat diubah - hanya perlu hal selain port fisik yang didengarkan server anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 msgid "" @@ -583,30 +417,20 @@ msgid "" "myWebPubKey.txt, reproduced fully on one line (alternately, instead of " "textofbase64key, you can specify the name from your hosts.txt - e.g. " "myserver.i2p)" -msgstr "" -"textofbase64key hanyalah isi dari file teks public key untuk " -"myWebPubKey.txt, direproduksi sepenuhnya pada satu baris (sebaliknya, " -"alih-alih textofbase64key, anda dapat menentukan namanya dari hosts.txt -" -" misal myserver.i2p)" +msgstr "textofbase64key hanyalah isi dari file teks public key untuk myWebPubKey.txt, direproduksi sepenuhnya pada satu baris (sebaliknya, alih-alih textofbase64key, anda dapat menentukan namanya dari hosts.txt - misal myserver.i2p)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:138 msgid "" "Within a minute or two of launching this command, the client tunnel from " "your local machine into I2P will be open and ready for use." -msgstr "" -"Dalam satu atau dua menit peluncuran perintah ini, tunnel klien akan " -"terbuka dari mesin lokal anda ke I2P dan siap digunakan." +msgstr "Dalam satu atau dua menit peluncuran perintah ini, tunnel klien akan terbuka dari mesin lokal anda ke I2P dan siap digunakan." #: i2p2www/pages/site/misc/i2ptunnel-services.html:141 msgid "" "Point your regular web browser (ie, not the one you configured to use " "localhost:4444), and point it to <a href=\"http://localhost:10888\" " "target=\"_blank\">http://localhost:10888</a>" -msgstr "" -"Arahkan browser web biasa anda (misalnya, bukan yang anda konfigurasikan " -"untuk menggunakan localhost: 4444), dan arahkan ke <a " -"href=\"http://localhost:10888\" target=\"_blank\">http: // localhost: " -"10888</a>" +msgstr "Arahkan browser web biasa anda (misalnya, bukan yang anda konfigurasikan untuk menggunakan localhost: 4444), dan arahkan ke <a href=\"http://localhost:10888\" target=\"_blank\">http: // localhost: 10888</a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:144 msgid "" @@ -616,17 +440,11 @@ msgstr "Pastikan halaman utama server anda akhirnya muncul di browser anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." -msgstr "" -"Anda menggunakan prosedur yang sama untuk menggunakan program klien lokal" -" manapun untuk mengakses server I2P jarak jauh - cukup dapatkan public " -"key base64 (disebut destinantion key) dari server jarak jauh, pilih port " -"lokal untuk terhubung ke server jarak jauh, buka tunnel, dan hubungkan " -"saja dengan klien anda sesuka hati Anda." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." +msgstr "Anda menggunakan prosedur yang sama untuk menggunakan program klien lokal manapun untuk mengakses server I2P jarak jauh - cukup dapatkan public key base64 (disebut destinantion key) dari server jarak jauh, pilih port lokal untuk terhubung ke server jarak jauh, buka tunnel, dan hubungkan saja dengan klien anda sesuka hati Anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 msgid "7 - Share your server details with others" @@ -636,46 +454,26 @@ msgstr "7 - Bagikan rincian server anda dengan orang lain" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." -msgstr "" -"Menggunakan media anonim (misalnya server I2P IRC atau wiki ugha), <a " -"href=\"http://www.mynick.i2p\" target=\"_blank\">kirimkan</a> nama domain" -" anda (misalnya <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> dan juga destination key anda. Orang" -" lain kemudian dapat menjangkau server anda dari jarak jauh, tanpa " -"membahayakan anonimitas anda." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." +msgstr "Menggunakan media anonim (misalnya server I2P IRC atau wiki ugha), <a href=\"http://www.mynick.i2p\" target=\"_blank\">kirimkan</a> nama domain anda (misalnya <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> dan juga destination key anda. Orang lain kemudian dapat menjangkau server anda dari jarak jauh, tanpa membahayakan anonimitas anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." -msgstr "" -"Ingat, anda bisa masuk ke What's on I2P dan menemukan public key terbaru " -"yang terkait dengan URL mereka. Anda juga sebaiknya memposting public key" -" anda sendiri dan URL mereka. Namun, anda pasti ingin melakukan hal ini " -"secara anonim, tentu saja. Drupal.i2p.net saat ini, seperti tulisan ini, " -"hanya bisa diakses dari internet. Jadi, untuk mengakses WWW luar secara " -"anonim dari dalam I2P, anda perlu memulai skrip anda yang disebut " -"startSquid. Lakukan dengan cara yang sama seperti anda telah menjalainkan" -" skrip lain. Konfigurasikan ulang browser anda ke proxy di localhost: " -"5555, seperti yang didefinisikan dalam skrip, dan saat skrip telah " -"menghasilkan kunci itu, anda dapat mengakses proxy squid. Letakkan URL " -"WWW (seperti Google atau situs i2p ini) ke bilah alamat browser anda dan " -"Anda akan berselancar di World Wide Web secara anonim. Sekarang anda " -"dapat memposting kunci publik anda dengan aman, dan tidak ada yang bisa " -"mendeteksi alamat IP Anda." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." +msgstr "Ingat, anda bisa masuk ke What's on I2P dan menemukan public key terbaru yang terkait dengan URL mereka. Anda juga sebaiknya memposting public key anda sendiri dan URL mereka. Namun, anda pasti ingin melakukan hal ini secara anonim, tentu saja. Drupal.i2p.net saat ini, seperti tulisan ini, hanya bisa diakses dari internet. Jadi, untuk mengakses WWW luar secara anonim dari dalam I2P, anda perlu memulai skrip anda yang disebut startSquid. Lakukan dengan cara yang sama seperti anda telah menjalainkan skrip lain. Konfigurasikan ulang browser anda ke proxy di localhost: 5555, seperti yang didefinisikan dalam skrip, dan saat skrip telah menghasilkan kunci itu, anda dapat mengakses proxy squid. Letakkan URL WWW (seperti Google atau situs i2p ini) ke bilah alamat browser anda dan Anda akan berselancar di World Wide Web secara anonim. Sekarang anda dapat memposting kunci publik anda dengan aman, dan tidak ada yang bisa mendeteksi alamat IP Anda." #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense" @@ -683,11 +481,9 @@ msgstr "8 - Tuliskan Beberapa Skrip untuk Menangani Semua Hal-hal Sepele Ini" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." -msgstr "" -"Ini akan membuat kebanyakan orang menjadi gila, melakukan semua langkah " -"ini setiap kali seseorang membuat server I2P, dan / atau membuat klien." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." +msgstr "Ini akan membuat kebanyakan orang menjadi gila, melakukan semua langkah ini setiap kali seseorang membuat server I2P, dan / atau membuat klien." #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 msgid "" @@ -695,43 +491,28 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." -msgstr "" -"Situs web milik Aum <a href=\"http://www.freenet.org.nz/i2p/\" " -"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> memiliki skrip yang " -"disebut setupServer.py yang mengotomatisasi semua omong kosong ini " -"menjadi satu baris perintah sederhana. Tapi saya menghargai selera " -"masing-masing orang dalam antarmuka pengguna, dan mencoba menulis sesuatu" -" yang memenuhi kebutuhan setiap orang biasanya menghasilkan sesuatu yang " -"sangat kompleks sehingga membuat pemula menjadi takut mencoba." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." +msgstr "Situs web milik Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> memiliki skrip yang disebut setupServer.py yang mengotomatisasi semua omong kosong ini menjadi satu baris perintah sederhana. Tapi saya menghargai selera masing-masing orang dalam antarmuka pengguna, dan mencoba menulis sesuatu yang memenuhi kebutuhan setiap orang biasanya menghasilkan sesuatu yang sangat kompleks sehingga membuat pemula menjadi takut mencoba." #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 msgid "" "So please feel free to use and/or customize setupServer.py to taste, or " "write your own in Python or another language." -msgstr "" -"Jadi, silakan gunakan dan / atau sesuaikan setupServer.py secukupnya, " -"atau tuliskan sendiri dengan Python atau bahasa pemograman lain." +msgstr "Jadi, silakan gunakan dan / atau sesuaikan setupServer.py secukupnya, atau tuliskan sendiri dengan Python atau bahasa pemograman lain." #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." -msgstr "" -"Selain itu, anda mungkin ingin menulis skrip yang menangani startup " -"Router I2P, eepProxy, ditambah terowongan yang anda gunakan. Saya punya " -"skrip yang disebut beginEverything.sh, yang diluncurkan pada saat startup" -" sistem. (Pastikan untuk mencari situs ini untuk template skrip untuk " -"mengotomatisasi perintah I2P anda. Jika saya membuat halaman untuk itu, " -"saya akan mencoba mengingat untuk menghubungkannya di sini." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." +msgstr "Selain itu, anda mungkin ingin menulis skrip yang menangani startup Router I2P, eepProxy, ditambah terowongan yang anda gunakan. Saya punya skrip yang disebut beginEverything.sh, yang diluncurkan pada saat startup sistem. (Pastikan untuk mencari situs ini untuk template skrip untuk mengotomatisasi perintah I2P anda. Jika saya membuat halaman untuk itu, saya akan mencoba mengingat untuk menghubungkannya di sini." #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." msgstr "Latihan untuk pengguna Windows - ubah setupServer.py ke file MS-DOS .BAT." #: i2p2www/pages/site/misc/invisiblenet.html:2 @@ -740,19 +521,12 @@ msgstr "Dokumen lama" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." -msgstr "" -"Berikut adalah daftar dokumen yang aslinya ada di " -"www.invisiblenet.net/i2p/ dan diselamatkan melalui <a " -"href=\"http://www.archive.org/\">Wayback Machine</a> .\n" -"Mereka cukup lama dan mungkin tidak akurat.\n" -"Namun, dokumen I2CP dan I2NP khususnya memiliki beberapa informasi bagus." +"However, the I2CP and I2NP documents in particular have some good information." +msgstr "Berikut adalah daftar dokumen yang aslinya ada di www.invisiblenet.net/i2p/ dan diselamatkan melalui <a href=\"http://www.archive.org/\">Wayback Machine</a> .\nMereka cukup lama dan mungkin tidak akurat.\nNamun, dokumen I2CP dan I2NP khususnya memiliki beberapa informasi bagus." #: i2p2www/pages/site/misc/jbigi.html:3 msgid "August 2011" @@ -764,14 +538,10 @@ msgstr "Overview " #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." -msgstr "" -"Menggunakan JNI (Java Native Interface), sedikit kode C (terima kasih " -"ugha!), sedikit kerja manual dan sepotong permen karet kami telah " -"melakukan beberapa operasi kriptografi sedikit lebih cepat." +msgstr "Menggunakan JNI (Java Native Interface), sedikit kode C (terima kasih ugha!), sedikit kerja manual dan sepotong permen karet kami telah melakukan beberapa operasi kriptografi sedikit lebih cepat." #: i2p2www/pages/site/misc/jbigi.html:13 #, python-format @@ -782,39 +552,21 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." -msgstr "" -"Penambahan kecepatan berasal dari\n" -"<a href=\"%(gmplib)s\">GNU MP Bignum library (libgmp)</a>.\n" -"Kami menggunakan satu fungsi dari libgmp - <a href=\"%(func)s\">mpz_powm " -"()</a> sebagai pengganti untuk <a href=\"%(bigint)s\">Java Math library's" -" BigInteger modPow ()</a> .\n" -"Karena modPow() adalah bagian komputasi yang signifikan dari banyak " -"operasi kripto, ini sangat bermanfaat." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." +msgstr "Penambahan kecepatan berasal dari\n<a href=\"%(gmplib)s\">GNU MP Bignum library (libgmp)</a>.\nKami menggunakan satu fungsi dari libgmp - <a href=\"%(func)s\">mpz_powm ()</a> sebagai pengganti untuk <a href=\"%(bigint)s\">Java Math library's BigInteger modPow ()</a> .\nKarena modPow() adalah bagian komputasi yang signifikan dari banyak operasi kripto, ini sangat bermanfaat." #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n" "is used." -msgstr "" -"Instalasi I2P standar mencakup sekitar 20 versi library untuk platform " -"yang berbeda, masing-masing sekitar 50KB, di dalam file jbigi.jar.\n" -"Inisialisasi library JBigI, termasuk identifikasi CPU, seleksi, dan " -"ekstraksi modul loadable yang benar, ditangani oleh <a " -"href=\"%(nativebigint)s\">NativeBigInteger class</a> .\n" -"Jika tidak ada modul yang tersedia untuk platform saat ini, <a " -"href=\"%(bigint)s\">library mod_ower JavaI Java Math</a> standar <a " -"href=\"%(bigint)s\">()</a> digunakan." +msgstr "Instalasi I2P standar mencakup sekitar 20 versi library untuk platform yang berbeda, masing-masing sekitar 50KB, di dalam file jbigi.jar.\nInisialisasi library JBigI, termasuk identifikasi CPU, seleksi, dan ekstraksi modul loadable yang benar, ditangani oleh <a href=\"%(nativebigint)s\">NativeBigInteger class</a> .\nJika tidak ada modul yang tersedia untuk platform saat ini, <a href=\"%(bigint)s\">library mod_ower JavaI Java Math</a> standar <a href=\"%(bigint)s\">()</a> digunakan." #: i2p2www/pages/site/misc/jbigi.html:38 msgid "Rebuilding and Testing JBigI" @@ -822,12 +574,9 @@ msgstr "Membangun kembali dan Menguji JBigI" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." -msgstr "" -"Berikut ini adalah petunjuk untuk membangun library jbigi baru untuk " -"platform anda dan menguji kinerjanya." +msgstr "Berikut ini adalah petunjuk untuk membangun library jbigi baru untuk platform anda dan menguji kinerjanya." #: i2p2www/pages/site/misc/jbigi.html:42 msgid "Requirements" @@ -836,49 +585,28 @@ msgstr "Persyaratan" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." -msgstr "" -"Ini berfungsi di Linux, dan dengan beberapa perubahan build.sh mungkin " -"juga ada pada platform lainnya. Ini dilaporkan juga berfungsi di FreeBSD." -" Pada Kaffee, peningkatan kecepatan sangat kecil karena sudah menggunakan" -" native BitInteger secara internal.\n" -"Blackdown tampaknya menyebabkan kesalahan aneh. Karena anda akan " -"melakukan kompilasi, anda perlu JDK; JRE tidak akan berfungsi." +msgstr "Ini berfungsi di Linux, dan dengan beberapa perubahan build.sh mungkin juga ada pada platform lainnya. Ini dilaporkan juga berfungsi di FreeBSD. Pada Kaffee, peningkatan kecepatan sangat kecil karena sudah menggunakan native BitInteger secara internal.\nBlackdown tampaknya menyebabkan kesalahan aneh. Karena anda akan melakukan kompilasi, anda perlu JDK; JRE tidak akan berfungsi." #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " -msgstr "" -"Kode yang diperlukan tersedia dalam database monoton dan sumber terbaru " -"tarball . " +"The required code is available in monotone database and the latest source " +"tarball. " +msgstr "Kode yang diperlukan tersedia dalam database monoton dan sumber terbaru tarball . " #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." -msgstr "" -"Library GNU MP Bignum (libgmp) perlu diinstal, jika itu tidak disertakan " -"dalam OS / distribusi atau sudah diinstal, itu dapat diambil dari <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Bahkan jika anda telah menginstal itu sebagai file biner, itu masih " -"mungkin patut dicoba untuk mengkompilasi GMP, setelah itu, ia akan mampu " -"menggunakan petunjuk khusus prosesor anda. GMP terbaru dapat juga " -"digunakan sebagai pengganti GMP 5.0.2, tapi ini belum diuji oleh kami." +msgstr "Library GNU MP Bignum (libgmp) perlu diinstal, jika itu tidak disertakan dalam OS / distribusi atau sudah diinstal, itu dapat diambil dari <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Bahkan jika anda telah menginstal itu sebagai file biner, itu masih mungkin patut dicoba untuk mengkompilasi GMP, setelah itu, ia akan mampu menggunakan petunjuk khusus prosesor anda. GMP terbaru dapat juga digunakan sebagai pengganti GMP 5.0.2, tapi ini belum diuji oleh kami." #: i2p2www/pages/site/misc/jbigi.html:61 msgid "Step-by-step instructions" @@ -886,13 +614,9 @@ msgstr "Petunjuk langkah demi langkah" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" -msgstr "" -"Lihatlah <a href=\"http://localhost:7657/logs.jsp\">running environment " -"anda di halaman logs.jsp</a>.\n" -"Harus ada salah satu dari dua status pesan untuk JBigI - bisa" +msgstr "Lihatlah <a href=\"http://localhost:7657/logs.jsp\">running environment anda di halaman logs.jsp</a>.\nHarus ada salah satu dari dua status pesan untuk JBigI - bisa" #: i2p2www/pages/site/misc/jbigi.html:66 msgid "Locally optimized native BigInteger loaded from the library path" @@ -914,53 +638,26 @@ msgid "" "may require you to compile your own library.\n" "If the BigInteger library was loaded, do at least the next step to see\n" "what your performance is." -msgstr "" -"Jika library BitInteger native TIDAK dimuat, anda pasti perlu untuk " -"mengkompilasi sendiri.\n" -"Platform tertentu, seperti OS X, OpenSolaris, dan sistem 64-bit, mungkin " -"mengharuskan anda untuk mengkompilasi library anda sendiri.\n" -"Jika library BigInteger dimuat, lakukan setidaknya langkah selanjutnya " -"untuk melihat kinerja anda." +msgstr "Jika library BitInteger native TIDAK dimuat, anda pasti perlu untuk mengkompilasi sendiri.\nPlatform tertentu, seperti OS X, OpenSolaris, dan sistem 64-bit, mungkin mengharuskan anda untuk mengkompilasi library anda sendiri.\nJika library BigInteger dimuat, lakukan setidaknya langkah selanjutnya untuk melihat kinerja anda." #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." -msgstr "" -"Lihatlah <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -" untuk melihat nilai rata-rata seumur hidup untuk " -"<code>crypto.elGamal.decrypt</code> dan " -"<code>crypto.elGamal.encrypt</code> . Jumlahnya adalah waktu dalam " -"milidetik. Salin ini ke suatu tempat sehingga anda dapat membandingkannya" -" nanti.\n" -"Rata-rata jaringan untuk mengenkripsi adalah sekitar 20ms.\n" -"Jika waktu enkripsi anda kurang dari 50ms untuk prosesor yang relatif " -"baru, atau kurang dari 100ms untuk prosesor yang lebih tua, dan library " -"BigInteger native dimuat, anda mungkin baik-baik saja." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." +msgstr "Lihatlah <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> untuk melihat nilai rata-rata seumur hidup untuk <code>crypto.elGamal.decrypt</code> dan <code>crypto.elGamal.encrypt</code> . Jumlahnya adalah waktu dalam milidetik. Salin ini ke suatu tempat sehingga anda dapat membandingkannya nanti.\nRata-rata jaringan untuk mengenkripsi adalah sekitar 20ms.\nJika waktu enkripsi anda kurang dari 50ms untuk prosesor yang relatif baru, atau kurang dari 100ms untuk prosesor yang lebih tua, dan library BigInteger native dimuat, anda mungkin baik-baik saja." #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" -msgstr "" -"Dapatkan kode sumber I2P terbaru dari <a href=\"%(downloads)s\">halaman " -"download</a> , atau dapatkan sumber mutakhir dari database monotone " -"mtn.i2p2.de" +msgstr "Dapatkan kode sumber I2P terbaru dari <a href=\"%(downloads)s\">halaman download</a> , atau dapatkan sumber mutakhir dari database monotone mtn.i2p2.de" #: i2p2www/pages/site/misc/jbigi.html:92 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>" @@ -972,62 +669,30 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." -msgstr "" -"Baca file README.\n" -"Jika anda memiliki file /usr/lib/libgmp.so, anda tidak perlu mendownload " -"GMP.\n" -"Gunakan argumen 'dinamis' untuk build.sh.\n" -"Jika tidak, anda harus mendownload GMP versi 5.0.2 dari <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"simpan ke gmp-5.0.2.tar.bz2.\n" -"Jika anda memutuskan untuk menggunakan versi yang lebih baru, ubahlah " -"VER=line di <code>core/c/jbigi/build.sh</code> ." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." +msgstr "Baca file README.\nJika anda memiliki file /usr/lib/libgmp.so, anda tidak perlu mendownload GMP.\nGunakan argumen 'dinamis' untuk build.sh.\nJika tidak, anda harus mendownload GMP versi 5.0.2 dari <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, simpan ke gmp-5.0.2.tar.bz2.\nJika anda memutuskan untuk menggunakan versi yang lebih baru, ubahlah VER=line di <code>core/c/jbigi/build.sh</code> ." #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." -msgstr "" -"Lihatlah <code>build.sh</code> , jika <code>JAVA_HOME</code> variabel " -"lingkungan <code>JAVA_HOME</code> anda ditetapkan dan anda menggunakan " -"Linux, maka ini mungkin berfungsi.\n" -"Jika tidak, ubah pengaturannya. Ingat, anda memerlukan Java SDK." +msgstr "Lihatlah <code>build.sh</code> , jika <code>JAVA_HOME</code> variabel lingkungan <code>JAVA_HOME</code> anda ditetapkan dan anda menggunakan Linux, maka ini mungkin berfungsi.\nJika tidak, ubah pengaturannya. Ingat, anda memerlukan Java SDK." #: i2p2www/pages/site/misc/jbigi.html:106 msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." -msgstr "" -"Jalankan <code>build.sh</code> (jika anda mendownload GMP) atau " -"<code>build.sh dynamic</code> (jika anda memiliki /usr/lib/libgmp.so). " -"<br/> mungkin build melaporkan beberapa kesalahan file jni.h dan jni_md.h" -" yang hilang.\n" -"Salin file-file ini dari java install ke direktori inti " -"/c/jbigi/jbigi/include/, atau perbaiki $JAVA_HOME. <br> Anda dapat " -"menjalankan <code>build.sh</code> dari direktori <code>core/c/</code> " -"yang akan membangun semua jbigi libs yang tersedia ke jbigi.jar. </br> " -"Sebuah file bernama <code>libjbigi.so</code> harus dibuat di current " -"directory. Jika ini tidak berfungsi dan/atau anda mendapat pesan error, " -"mohon laporkan kepada kami." +msgstr "Jalankan <code>build.sh</code> (jika anda mendownload GMP) atau <code>build.sh dynamic</code> (jika anda memiliki /usr/lib/libgmp.so). <br/> mungkin build melaporkan beberapa kesalahan file jni.h dan jni_md.h yang hilang.\nSalin file-file ini dari java install ke direktori inti /c/jbigi/jbigi/include/, atau perbaiki $JAVA_HOME. <br> Anda dapat menjalankan <code>build.sh</code> dari direktori <code>core/c/</code> yang akan membangun semua jbigi libs yang tersedia ke jbigi.jar. </br> Sebuah file bernama <code>libjbigi.so</code> harus dibuat di current directory. Jika ini tidak berfungsi dan/atau anda mendapat pesan error, mohon laporkan kepada kami." #: i2p2www/pages/site/misc/jbigi.html:118 msgid "" @@ -1035,19 +700,13 @@ msgid "" "the speed test.\n" "Read the final lines of the speed test's output for some additional\n" "info, it will be something like this:" -msgstr "" -"Ikuti instruksi di inti /c/README untuk menginstal library dan jalankan " -"tes kecepatan.\n" -"Baca baris terakhir dari output tes kecepatan untuk beberapa info " -"tambahan, ini akan seperti ini:" +msgstr "Ikuti instruksi di inti /c/README untuk menginstal library dan jalankan tes kecepatan.\nBaca baris terakhir dari output tes kecepatan untuk beberapa info tambahan, ini akan seperti ini:" #: i2p2www/pages/site/misc/jbigi.html:128 msgid "" "If the native is indeed 5-7x faster (or more) then it looks all good. If " "not, please report." -msgstr "" -"Jika yang native memang 5-7x lebih cepat (atau lebih) maka kelihatannya " -"bagus. Jika tidak, mohon laporkan kepada kami." +msgstr "Jika yang native memang 5-7x lebih cepat (atau lebih) maka kelihatannya bagus. Jika tidak, mohon laporkan kepada kami." #: i2p2www/pages/site/misc/jbigi.html:129 msgid "Copy <code>libjbigi.so</code> to your i2p directory" @@ -1059,17 +718,10 @@ msgstr "Restart program I2P anda." #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." -msgstr "" -"Pada <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -" <code>crypto.elGamal.decrypt</code> dan " -"<code>crypto.elGamal.encrypt</code> seharusnya jauh lebih cepat." +msgstr "Pada <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> <code>crypto.elGamal.decrypt</code> dan <code>crypto.elGamal.encrypt</code> seharusnya jauh lebih cepat." #: i2p2www/pages/site/misc/jrandom-awol.html:2 msgid "Jrandom's Announcement" @@ -1077,43 +729,28 @@ msgstr "Pengumuman Jrandom" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"Pesan berikut diterima pada pertengahan November 2007. Kami tidak " -"memiliki informasi lebih lanjut tentang status jrandom." +msgstr "Pesan berikut diterima pada pertengahan November 2007. Kami tidak memiliki informasi lebih lanjut tentang status jrandom." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" "and related subdomains." -msgstr "" -"Selanjutnya, dalam insiden yang tidak terkait, perusahaan hosting untuk " -"semua server * .i2p.net (kecuali forum.i2p.net) mengalami pemadaman " -"listrik pada tanggal 13 Januari 2008, dan server i2p.net tidak sepenuhnya" -" kembali beroperasi.\n" -"Karena hanya jrandom yang memiliki kredensial yang diperlukan untuk " -"memulihkan layanan, dan dia tidak dapat dihubungi, kami memindahkan semua" -" layanan publik ke <a href=\"%(site)s\">www.i2p2.de</a> dan subdomain " -"terkait." +msgstr "Selanjutnya, dalam insiden yang tidak terkait, perusahaan hosting untuk semua server * .i2p.net (kecuali forum.i2p.net) mengalami pemadaman listrik pada tanggal 13 Januari 2008, dan server i2p.net tidak sepenuhnya kembali beroperasi.\nKarena hanya jrandom yang memiliki kredensial yang diperlukan untuk memulihkan layanan, dan dia tidak dapat dihubungi, kami memindahkan semua layanan publik ke <a href=\"%(site)s\">www.i2p2.de</a> dan subdomain terkait." #: i2p2www/pages/site/misc/jrandom-awol.html:19 #, python-format msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"Kira-kira dua bulan kemudian, karena alasan yang tidak terkait, " -"forum.i2p.net dipindahkan ke <a href=\"http://%(forum)s/\">%(forum)s</a> " -"." +msgstr "Kira-kira dua bulan kemudian, karena alasan yang tidak terkait, forum.i2p.net dipindahkan ke <a href=\"http://%(forum)s/\">%(forum)s</a> ." #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -1123,57 +760,34 @@ msgstr "Instalasi Manual Java Wrapper" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." -msgstr "" -"Paket instalasi untuk <a href=\"%(downloads)s\">router I2P</a> hadir " -"pembungkus Java wrapper untuk arsitektur yang paling umum. Jika sistem " -"anda tidak didukung oleh installer kami - atau jika anda ingin mengupdate" -" wrappernya ke versi yang lebih baru - langkah-langkah berikut " -"menjelaskan instalasi wrappernya secara manual." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." +msgstr "Paket instalasi untuk <a href=\"%(downloads)s\">router I2P</a> hadir pembungkus Java wrapper untuk arsitektur yang paling umum. Jika sistem anda tidak didukung oleh installer kami - atau jika anda ingin mengupdate wrappernya ke versi yang lebih baru - langkah-langkah berikut menjelaskan instalasi wrappernya secara manual." #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." -msgstr "" -"Periksa perangkat lunak milik Tanuki di <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">halaman" -" downloadnya</a> untuk platform anda. Apakah platform anda terdaftar? " -"Jika demikian, anda beruntung! Download Versi Edisi Komunitas terbaru " -"untuk OS dan CPU anda dan lanjutkan ke <a href=\"#packaged\">langkah " -"berikutnya</a> ." +msgstr "Periksa perangkat lunak milik Tanuki di <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">halaman downloadnya</a> untuk platform anda. Apakah platform anda terdaftar? Jika demikian, anda beruntung! Download Versi Edisi Komunitas terbaru untuk OS dan CPU anda dan lanjutkan ke <a href=\"#packaged\">langkah berikutnya</a> ." #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." -msgstr "" -"Jika platform anda tidak memiliki wrapper yang sudah dikompilasi, anda " -"mungkin bisa mengkompilasinya sendiri. Jika anda bersedia melakukannya, " -"lanjutkan ke <a href=\"#compiling\">kompilasi</a> wrapper untuk sistem " -"anda." +msgstr "Jika platform anda tidak memiliki wrapper yang sudah dikompilasi, anda mungkin bisa mengkompilasinya sendiri. Jika anda bersedia melakukannya, lanjutkan ke <a href=\"#compiling\">kompilasi</a> wrapper untuk sistem anda." #: i2p2www/pages/site/misc/manual-wrapper.html:27 msgid "Using existing binaries" msgstr "Menggunakan file binari yang ada" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "Pada langkah di bawah, $I2P berarti <em>lokasi yang dipasang I2P</em> ." #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -1189,11 +803,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> dan cari apakah ada masalah." #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." -msgstr "" -"Jika ini tidak berhasil, anda harus menggunakan <code>runplain.sh</code> " -"untuk memulai I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." +msgstr "Jika ini tidak berhasil, anda harus menggunakan <code>runplain.sh</code> untuk memulai I2P." #: i2p2www/pages/site/misc/manual-wrapper.html:43 msgid "Compiling from source" @@ -1201,23 +813,16 @@ msgstr "Kompilasi dari kode sumber" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." -msgstr "" -"Langkah-langkah ini berfungsi untuk mengkompilasi wrappernya agar bisa " -"digunakan pada sistem mipsel yang menjalankan Debian. Langkah-langkah " -"yang <strong>perlu</strong> diubah untuk sistem anda." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." +msgstr "Langkah-langkah ini berfungsi untuk mengkompilasi wrappernya agar bisa digunakan pada sistem mipsel yang menjalankan Debian. Langkah-langkah yang <strong>perlu</strong> diubah untuk sistem anda." #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." -msgstr "" -"Download arsip sumber kode wrapper untuk versi komunitas dari <a " -"href=\"http://wrapper.tanukisoftware.com/downloads\"halaman download " -"wrapper</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." +msgstr "Download arsip sumber kode wrapper untuk versi komunitas dari <a href=\"http://wrapper.tanukisoftware.com/downloads\"halaman download wrapper</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:49 msgid "Extract the tarball" @@ -1225,19 +830,15 @@ msgstr "Ekstrak file tarball-nya" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" -msgstr "" -"Tetapkan variabel lingkungan <code>ANT_HOME</code> dan " -"<code>JAVA_HOME</code> . Sebagai contoh, dalam Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" +msgstr "Tetapkan variabel lingkungan <code>ANT_HOME</code> dan <code>JAVA_HOME</code> . Sebagai contoh, dalam Debian:" #: i2p2www/pages/site/misc/manual-wrapper.html:54 msgid "" "Since there isn't a Makefile for Mipsel, we'll make a copy of an already " "existing makefile:" -msgstr "" -"Karena tidak file Makefile untuk Mipsel, kami akan membuat salinan " -"makefile yang sudah ada:" +msgstr "Karena tidak file Makefile untuk Mipsel, kami akan membuat salinan makefile yang sudah ada:" #: i2p2www/pages/site/misc/manual-wrapper.html:56 msgid "Now we can attempt to compile the wrapper:" @@ -1255,9 +856,7 @@ msgstr "Salin wrapper ke tempat yang tepat:" msgid "" "Here's an outline and rationale for a minimal WWW proxy app for use over " "I2P." -msgstr "" -"Berikut adalah garis besar dan alasan untuk aplikasi proxy WWW minimal " -"untuk digunakan di I2P." +msgstr "Berikut adalah garis besar dan alasan untuk aplikasi proxy WWW minimal untuk digunakan di I2P." #: i2p2www/pages/site/misc/minwww.html:8 msgid "" @@ -1267,254 +866,116 @@ msgid "" "in the router (but later versions of the SocketLibrary will be able to\n" "use selective ACK and large window sizes, allowing more ACKs to be\n" "skipped)" -msgstr "" -"Operasi HTTP di I2P menggunakan I2PTunnel. Ketika base SocketLibrary " -"keluar, perbedaan signifikan hanya 'wrapRequest' dan 'unwrapRequest' yang" -" secara fungsional akan ditempatkan di socketLibrary, bukan di router " -"(tapi versi SocketLibrary akan mampu menggunakan ACK selektif dan ukuran " -"jendela besar, memungkinkan lebih banyak ACKs yang akan dilewatkan)" +msgstr "Operasi HTTP di I2P menggunakan I2PTunnel. Ketika base SocketLibrary keluar, perbedaan signifikan hanya 'wrapRequest' dan 'unwrapRequest' yang secara fungsional akan ditempatkan di socketLibrary, bukan di router (tapi versi SocketLibrary akan mampu menggunakan ACK selektif dan ukuran jendela besar, memungkinkan lebih banyak ACKs yang akan dilewatkan)" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" -msgstr "" -"Bentuk yang dioptimalkan, yang hanya dirancang untuk menangani file 128KB" -" [1] dan halaman, dapat beroperasi lebih cepat:" +msgstr "Bentuk yang dioptimalkan, yang hanya dirancang untuk menangani file 128KB [1] dan halaman, dapat beroperasi lebih cepat:" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." -msgstr "" -"Ada perbedaan signifikan dalam beban jaringan dan latensi - hal ini pada " -"dasarnya adalah UDP versi HTTP. Di web normal, kita tidak bisa benar-" -"benar melakukannya, karena kebanyakan permintaan HTTP dan tanggapan " -"berkalo kali lipat lebih besar daripada paket-paket UDP yang didukung, " -"tetapi dalam I2P, pesan dapat menjadi besar. Beban jaringan yang dihemat" -" berasal dari fakta bahwa kita tidak perlu untuk mengirim pesan ACK- " -"daripada permintaan wrap/unwrap sebelumnya (yang mem-bundle DataMessage " -"dengan DeliveryStatusMessage untuk memberikan jaminan pengiriman), proxy " -"MinWWW berkaitan dengan mengirim ulang (jika diperlukan - dalam I2PTunnel" -" hari ini, ada tidak mengirim ulang)." +msgstr "Ada perbedaan signifikan dalam beban jaringan dan latensi - hal ini pada dasarnya adalah UDP versi HTTP. Di web normal, kita tidak bisa benar-benar melakukannya, karena kebanyakan permintaan HTTP dan tanggapan berkalo kali lipat lebih besar daripada paket-paket UDP yang didukung, tetapi dalam I2P, pesan dapat menjadi besar. Beban jaringan yang dihemat berasal dari fakta bahwa kita tidak perlu untuk mengirim pesan ACK- daripada permintaan wrap/unwrap sebelumnya (yang mem-bundle DataMessage dengan DeliveryStatusMessage untuk memberikan jaminan pengiriman), proxy MinWWW berkaitan dengan mengirim ulang (jika diperlukan - dalam I2PTunnel hari ini, ada tidak mengirim ulang)." #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." -msgstr "" -"Data yang dibutuhkan oleh proxy dan server MinWWW untuk membungkus adalah" -" sangat kecil - ketika proxy ingin mengirim \"GET /\", ia menambahkannya " -"dengan destinasi I2P yang mengirim permintaan, diikuti oleh ID permintaan" -" 4 byte. Server MinWWW menerima permintaan tersebut, mengontak HTTPD " -"yang sesuai, mengirim permintaan, menunggu respon dan mengirim balasan ke" -" proxy MinWWW yang mengandung respon, diawali dengan permintaan id yang " -"asli. Respon itu diambil dan dilewatkan kembali ke browser lalu koneksi " -"ditutup." +msgstr "Data yang dibutuhkan oleh proxy dan server MinWWW untuk membungkus adalah sangat kecil - ketika proxy ingin mengirim \"GET /\", ia menambahkannya dengan destinasi I2P yang mengirim permintaan, diikuti oleh ID permintaan 4 byte. Server MinWWW menerima permintaan tersebut, mengontak HTTPD yang sesuai, mengirim permintaan, menunggu respon dan mengirim balasan ke proxy MinWWW yang mengandung respon, diawali dengan permintaan id yang asli. Respon itu diambil dan dilewatkan kembali ke browser lalu koneksi ditutup." #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." -msgstr "" -"Selain itu, proxy MinWWW dapat memilih server MinWWW untuk digunakan dari" -" sebuah daftar, melalui beberapa robin atau algoritma lainnya, sehingga " -"ada beberapa outproxies digabungkan secara transparan. Bandwidth yang " -"diperlukan untuk menjalankan salah satu outproxies ini juga sangat " -"berkurang, karena itu hanya akan menangani file 128KB (sehingga tidak ada" -" yang akan men-download porno, warez, dll)." +msgstr "Selain itu, proxy MinWWW dapat memilih server MinWWW untuk digunakan dari sebuah daftar, melalui beberapa robin atau algoritma lainnya, sehingga ada beberapa outproxies digabungkan secara transparan. Bandwidth yang diperlukan untuk menjalankan salah satu outproxies ini juga sangat berkurang, karena itu hanya akan menangani file 128KB (sehingga tidak ada yang akan men-download porno, warez, dll)." #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." -msgstr "" -"Fungsinya terbatas, tetapi 128KB data adalah banyak untuk satu permintaan" -" HTTP atau respon. Diagram di atas juga tidak realistis di hop mereka - " -"ROUTERA akan benar-benar tidak pernah berbicara langsung ke ROUTERB. " -"ROUTERA akan mengirimkan kepada setiap pesan melalui dua router outbound " -"tambahan, lalu meneruskan ke dua router inbound tambahan ke ROUTERB, " -"sehingga lag menjadi signifikan - sementara di atas hanya menghemat 11 " -"langkah, 8 langkah tersebut perlu melintasi seluruh jalur tunnel (4 " -"remote hop setiap kali ketika tunnel adalah 2 hop jarak jauh di setiap " -"strecth), meninggalkan MinWWW hanya dengan dua traversals penuh (satu " -"untuk permintaan, satu untuk tanggapannya), bukan 10." +msgstr "Fungsinya terbatas, tetapi 128KB data adalah banyak untuk satu permintaan HTTP atau respon. Diagram di atas juga tidak realistis di hop mereka - ROUTERA akan benar-benar tidak pernah berbicara langsung ke ROUTERB. ROUTERA akan mengirimkan kepada setiap pesan melalui dua router outbound tambahan, lalu meneruskan ke dua router inbound tambahan ke ROUTERB, sehingga lag menjadi signifikan - sementara di atas hanya menghemat 11 langkah, 8 langkah tersebut perlu melintasi seluruh jalur tunnel (4 remote hop setiap kali ketika tunnel adalah 2 hop jarak jauh di setiap strecth), meninggalkan MinWWW hanya dengan dua traversals penuh (satu untuk permintaan, satu untuk tanggapannya), bukan 10." #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" -msgstr "" -"Menerapkan MinWWW proxy dan server seharusnya cukup mudah - sepenuhnya " -"membaca permintaan HTTP dari klien (mungkin hanya dimulai dengan method " -"GET, menyisakan method POST untuk nanti), bungkus pesan, dan menunggu " -"respon. Server selanjutnya hanya perlu parsing permintaan untuk membuka " -"soket atau URL, mengirim permintaan, menunggu jawabannya, dan " -"mengirimkannya kembali melalui jaringan.\n" -"Jika seseorang menerapkan ini, itu akan menjadi baik :)" +msgstr "Menerapkan MinWWW proxy dan server seharusnya cukup mudah - sepenuhnya membaca permintaan HTTP dari klien (mungkin hanya dimulai dengan method GET, menyisakan method POST untuk nanti), bungkus pesan, dan menunggu respon. Server selanjutnya hanya perlu parsing permintaan untuk membuka soket atau URL, mengirim permintaan, menunggu jawabannya, dan mengirimkannya kembali melalui jaringan.\nJika seseorang menerapkan ini, itu akan menjadi baik :)" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" -msgstr "" -"[1] Mengapa file sebesar 128KB? Saat ini I2CP memungkinkan ukuran pesan " -"arbitrary secara fungsional, tapi itu akan hilang karena melibatkan " -"overhead memori yang berlebihan pada router intermediary, atau detail " -"implementasi tambahan yang harus ditangani. I2PTunnel saat ini terbatas " -"pada 128KB dan belum menjadi beban, jadi mungkin bisa ditingkatkan " -"menjadi 256KB saat spesifikasi I2CP diperbarui)" +msgstr "[1] Mengapa file sebesar 128KB? Saat ini I2CP memungkinkan ukuran pesan arbitrary secara fungsional, tapi itu akan hilang karena melibatkan overhead memori yang berlebihan pada router intermediary, atau detail implementasi tambahan yang harus ditangani. I2PTunnel saat ini terbatas pada 128KB dan belum menjadi beban, jadi mungkin bisa ditingkatkan menjadi 256KB saat spesifikasi I2CP diperbarui)" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." -msgstr "" -"Telah ada diskusi tentang aplikasi blogging terdistribusi selama beberapa" -" bulan yang sekarang disebut \"MyI2P\". Sementara diskusi asli hilang, " -"kami dapat mengambil <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> Google " -"dari situ. Ini tidak terlihat enak dipandang, tapi mencakup gambaran " -"dasar dan beberapa diskusi yang terjadi." +msgstr "Telah ada diskusi tentang aplikasi blogging terdistribusi selama beberapa bulan yang sekarang disebut \"MyI2P\". Sementara diskusi asli hilang, kami dapat mengambil <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a> Google dari situ. Ini tidak terlihat enak dipandang, tapi mencakup gambaran dasar dan beberapa diskusi yang terjadi." #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." -msgstr "" -"Aplikasinya sendiri belum diimplementasikan, dan gagasan di baliknya " -"telah dibuat kurang ambisius seiring berjalannya waktu, namun tetap valid" -" dan <a href=\"%(roadmap)s\">rencana</a> saat ini adalah memiliki " -"fungsionalitas MyI2P inti yang tersedia di sepanjang rilis I2P 1.0. Itu " -"akan mencakup buku alamat terdistribusi untuk memungkinkan penamaan yang " -"aman, terdistribusi, dan dapat dibaca manusia dengan mengorbankan " -"kebutuhan akan keunikan global - pada dasarnya setiap orang memiliki buku" -" alamat lokal mereka sendiri dan dapat 'berlangganan' ke buku alamat " -"orang lain, membiarkan MyI2P secara berkala mengambil nama baru ke " -"pemetaan tujuan (meninggalkan konflik untuk diselesaikan pengguna). " -"Selain buku alamat, akan ada sistem blogging terdistribusi yang " -"menggunakan <a " -"href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">subkunci bbcode " -"yang</a> dikurangi dan dijamin untuk memberikan <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> anonim secara " -"sederhana dengan 'daftar teman' dan kontrol akses transparan (disahkan " -"oleh <a href=\"%(datagrams)s\">datagram</a> I2P dengan peraturan yang " -"ditentukan berdasarkan buku alamat)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." +msgstr "Aplikasinya sendiri belum diimplementasikan, dan gagasan di baliknya telah dibuat kurang ambisius seiring berjalannya waktu, namun tetap valid dan <a href=\"%(roadmap)s\">rencana</a> saat ini adalah memiliki fungsionalitas MyI2P inti yang tersedia di sepanjang rilis I2P 1.0. Itu akan mencakup buku alamat terdistribusi untuk memungkinkan penamaan yang aman, terdistribusi, dan dapat dibaca manusia dengan mengorbankan kebutuhan akan keunikan global - pada dasarnya setiap orang memiliki buku alamat lokal mereka sendiri dan dapat 'berlangganan' ke buku alamat orang lain, membiarkan MyI2P secara berkala mengambil nama baru ke pemetaan tujuan (meninggalkan konflik untuk diselesaikan pengguna). Selain buku alamat, akan ada sistem blogging terdistribusi yang menggunakan <a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">subkunci bbcode yang</a> dikurangi dan dijamin untuk memberikan <a href=\"http://www.livejournal.com/\">LiveJournal</a> anonim secara sederhana dengan 'daftar teman' dan kontrol akses transparan (disahkan oleh <a href=\"%(datagrams)s\">datagram</a> I2P dengan peraturan yang ditentukan berdasarkan buku alamat)." #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." -msgstr "" -"Fungsi tambahan, seperti integrasi dengan DHT backing store atau transfer" -" file swarming untuk 'attachment' dapat ditambahkan nanti. Email mungkin" -" atau mungkin juga tidak masuk pertama kali, walaupun implementasinya " -"pada dasarnya hanya entri blog dengan akses pribadi, jadi mungkin " -"beberapa perancang UI dapat membuat sesuatu. Mengekspor data ke RSS atau" -" akses melalui ATOM akan menjadi sebuah pilihan juga." +msgstr "Fungsi tambahan, seperti integrasi dengan DHT backing store atau transfer file swarming untuk 'attachment' dapat ditambahkan nanti. Email mungkin atau mungkin juga tidak masuk pertama kali, walaupun implementasinya pada dasarnya hanya entri blog dengan akses pribadi, jadi mungkin beberapa perancang UI dapat membuat sesuatu. Mengekspor data ke RSS atau akses melalui ATOM akan menjadi sebuah pilihan juga." #: i2p2www/pages/site/misc/ratestats.html:2 #: i2p2www/pages/site/misc/ratestats.html:5 @@ -1527,11 +988,9 @@ msgstr "I2P memungkinkan pengumpulan berbagai rate." #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" -msgstr "" -"Daftar itu dikumpulkan dengan menggunakan perintah berikut di direktori " -"atas cabang i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" +msgstr "Daftar itu dikumpulkan dengan menggunakan perintah berikut di direktori atas cabang i2p.i2p:" #: i2p2www/pages/site/misc/ratestats.html:10 msgid "All options aren't needed, but it works." @@ -1545,32 +1004,17 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"Kode sumber I2P disimpan di beberapa repositori monotone yang " -"terdistribusi.\n" -"Lihat <a href=\"http://www.monotone.ca/\">situs Monotone</a> untuk " -"informasi tentang monotone.\n" -"Lihat <a href=\"http://%(forum)s/viewtopic.php?t=2524\">posting forum ini" -" di i2p monotone</a> untuk informasi lebih lanjut tentang cara memulai " -"dan memeriksa sumber kode secara anonim.\n" -"Ada juga panduan ringkas di <a href=\"%(newdevs)s\">halaman pengembang " -"baru</a> ." +msgstr "Kode sumber I2P disimpan di beberapa repositori monotone yang terdistribusi.\nLihat <a href=\"http://www.monotone.ca/\">situs Monotone</a> untuk informasi tentang monotone.\nLihat <a href=\"http://%(forum)s/viewtopic.php?t=2524\">posting forum ini di i2p monotone</a> untuk informasi lebih lanjut tentang cara memulai dan memeriksa sumber kode secara anonim.\nAda juga panduan ringkas di <a href=\"%(newdevs)s\">halaman pengembang baru</a> ." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." -msgstr "" -"Jika Anda ingin mendapatkan sumber kode secara non-anonim, ambil dari " -"server publik mtn.welterde.de.\n" -"Cabang kode sumber i2p adalah \"i2p.i2p\"." +msgstr "Jika Anda ingin mendapatkan sumber kode secara non-anonim, ambil dari server publik mtn.welterde.de.\nCabang kode sumber i2p adalah \"i2p.i2p\"." #: i2p2www/pages/site/misc/transition-guide.html:21 msgid "Guide" @@ -1580,9 +1024,7 @@ msgstr "Panduan" msgid "" "\n" "The following is a detailed guide by Complication." -msgstr "" -"\n" -"Berikut ini adalah panduan terperinci oleh Complication." +msgstr "\nBerikut ini adalah panduan terperinci oleh Complication." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2 msgid "How to Upgrade from 0.6.1.30 and Earlier" @@ -1599,41 +1041,24 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." -msgstr "" -"Karena pengembang utama i2p telah<a href=\"%(jrandom)s\">AWOL</a>, kami " -"tidak memiliki update signing key miliknya atau akses ke www.i2p [.net] " -"atau dev.i2p [.net].\n" -"Complication dan zzz telah menghasilkan signing key baru, dan mereka dan " -"Amiga menyediakan hosting file update. Perubahan ini harus dikonfigurasi " -"di router anda agar berlaku." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." +msgstr "Karena pengembang utama i2p telah<a href=\"%(jrandom)s\">AWOL</a>, kami tidak memiliki update signing key miliknya atau akses ke www.i2p [.net] atau dev.i2p [.net].\nComplication dan zzz telah menghasilkan signing key baru, dan mereka dan Amiga menyediakan hosting file update. Perubahan ini harus dikonfigurasi di router anda agar berlaku." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." -msgstr "" -"Buat perubahan konfigurasi berikut ini lalu router anda akan secara " -"otomatis menginstal rilis terbaru." +msgstr "Buat perubahan konfigurasi berikut ini lalu router anda akan secara otomatis menginstal rilis terbaru." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." -msgstr "" -"Kami merekomendasikan proses otomatis karena akan memverifikasi kunci " -"dari file pembaruan yang ditandatangani.\n" -"Jika anda tidak melakukan perubahan ini, anda dapat mendownload file " -"i2pupdate.zip secara manual dari <a href=\"%(downloads)s\">halaman " -"download</a> ." +msgstr "Kami merekomendasikan proses otomatis karena akan memverifikasi kunci dari file pembaruan yang ditandatangani.\nJika anda tidak melakukan perubahan ini, anda dapat mendownload file i2pupdate.zip secara manual dari <a href=\"%(downloads)s\">halaman download</a> ." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34 #, python-format @@ -1642,11 +1067,9 @@ msgstr "Ubah URL Berita ke: %(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " -msgstr "" -"Pilih SATU URL Update terbaru berikut ini secara acak dan masukkan ke " -"dalam kotak Update URL: " +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " +msgstr "Pilih SATU URL Update terbaru berikut ini secara acak dan masukkan ke dalam kotak Update URL: " #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 msgid "Check the box \"Update through the eepProxy?\"" @@ -1667,25 +1090,14 @@ msgstr "Klik \"Apply\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." -msgstr "" -"Anda sekarang siap untuk secara otomatis menerima file pembaruan rilis, " -"baik dengan cara menetapkan kebijakan pembaruan anda untuk \"mendownload " -"dan menginstal\" atau dengan mengklik link \"update available\" saat " -"muncul." +msgstr "Anda sekarang siap untuk secara otomatis menerima file pembaruan rilis, baik dengan cara menetapkan kebijakan pembaruan anda untuk \"mendownload dan menginstal\" atau dengan mengklik link \"update available\" saat muncul." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65 #, python-format msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." -msgstr "" -"Jika anda ingin memverifikasi trusted update key, mereka juga <a " -"href=\"%(url)s\">diposkan dan ditandatangani di sini</a> .\n" -"Terima kasih atas dukungan anda selama masa transisi ini. Untuk bantuan " -"silahkan hubungi kami di IRC channel #i2p." - +"Thank you for your support during this transition. For help please contact us on #i2p." +msgstr "Jika anda ingin memverifikasi trusted update key, mereka juga <a href=\"%(url)s\">diposkan dan ditandatangani di sini</a> .\nTerima kasih atas dukungan anda selama masa transisi ini. Untuk bantuan silahkan hubungi kami di IRC channel #i2p." diff --git a/i2p2www/translations/it/LC_MESSAGES/about.po b/i2p2www/translations/it/LC_MESSAGES/about.po index 618d7054c2e3e9afcabd57b740c53d48f326a3e2..7fcc2e856016523bee0ac773e5a06dfc4f92aeee 100644 --- a/i2p2www/translations/it/LC_MESSAGES/about.po +++ b/i2p2www/translations/it/LC_MESSAGES/about.po @@ -1,26 +1,31 @@ -# Italian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # agge92 <agge92@gmail.com>, 2014 +# agge92 <agge92@gmail.com>, 2014 +# alxbrb <al3xfree@gmail.com>, 2014 +# alamir <christianm@libero.it>, 2014 # alxbrb <al3xfree@gmail.com>, 2014 # alamir <christianm@libero.it>, 2014 # Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: alamir <christianm@libero.it>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Giuseppe Pignataro <rogepix@gmail.com>, 2014\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -30,14 +35,9 @@ msgstr "Altri client I2P" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"Le principali implementazioni del client I2P sono state scritte in Java. " -"Se per qualche motivo non potete eseguire codice Java sui vostri " -"terminali, ci sono delle implementazioni realizzate in altri linguaggi " -"dai membri della community." +msgstr "Le principali implementazioni del client I2P sono state scritte in Java. Se per qualche motivo non potete eseguire codice Java sui vostri terminali, ci sono delle implementazioni realizzate in altri linguaggi dai membri della community." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -45,30 +45,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> è un client I2P scritto in C++.\n" -"Agli inizi del 2016, i2pd è diventato abbastanza stabile da essere usato\n" -"in produzione, e dall'estate 2016 implementa tutte le API I2P." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> è un client I2P scritto in C++.\nAgli inizi del 2016, i2pd è diventato abbastanza stabile da essere usato\nin produzione, e dall'estate 2016 implementa tutte le API I2P." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> è un fork di i2pd attivamente sviluppato " -"per la criptomoneta Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> è un fork di i2pd attivamente sviluppato per la criptomoneta Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> è un client I2P scritto\n" -"in\n" -"<a href=\"%(golang)s\">Go</a>. Il progetto è ancora in fase di sviluppo." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> è un client I2P scritto\nin\n<a href=\"%(golang)s\">Go</a>. Il progetto è ancora in fase di sviluppo." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -80,11 +71,147 @@ msgstr "Glossario" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Questa pagina elenca i termini usati frequentemente quando si discute I2P" -" e la crittografia." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -92,37 +219,27 @@ msgstr "Hall of Fame" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 msgid "Big thanks go to the following people who have donated to I2P!" -msgstr "" -"Un sentito ringraziamento va a queste persone, che hanno effettuato " -"donazioni ad I2P!" +msgstr "Un sentito ringraziamento va a queste persone, che hanno effettuato donazioni ad I2P!" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Se hai fatto una donazione, invia una email a <a " -"href=\"mailto:%(echelon)s\">echelon</a> con il tuo nome o pseudonimo (ed " -"eventualmente l'homepage): potremo così aggiungerti a questa lista." +msgstr "Se hai fatto una donazione, invia una email a <a href=\"mailto:%(echelon)s\">echelon</a> con il tuo nome o pseudonimo (ed eventualmente l'homepage): potremo così aggiungerti a questa lista." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -136,12 +253,8 @@ msgstr "Invisible Internet Project" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -151,13 +264,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -166,15 +279,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -183,28 +296,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -213,36 +325,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -251,13 +362,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -266,15 +377,11 @@ msgstr "Confronti" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -284,9 +391,7 @@ msgstr "" msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina" -" della rete:</a>" +msgstr "I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina della rete:</a>" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -295,13 +400,9 @@ msgstr "Presentazioni su I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Ecco una selezione di link a presentazioni, video e guide su I2P. I link " -"alla documentazione approfondita su I2P sono disponibili <a " -"href=\"%(papers)s\">qui</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Ecco una selezione di link a presentazioni, video e guide su I2P. I link alla documentazione approfondita su I2P sono disponibili <a href=\"%(papers)s\">qui</a>." #: i2p2www/pages/site/about/media.html:8 #, python-format @@ -312,9 +413,7 @@ msgstr "Per richiedere un'aggiunta a questa pagina, invia una %(email)s." msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"I link più recenti sono in fondo ad ogni sezione." +msgstr "\nI link più recenti sono in fondo ad ogni sezione." #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -327,11 +426,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"Presentazione IIP al CodeCon\n" -"<a href=\"%(mp3)s\">audio MP3</a>\n" -"<a href=\"%(transcript)s\">trascrizione</a>\n" -"Lance James (0x90), Febbraio 2002." +msgstr "Presentazione IIP al CodeCon\n<a href=\"%(mp3)s\">audio MP3</a>\n<a href=\"%(transcript)s\">trascrizione</a>\nLance James (0x90), Febbraio 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -340,11 +435,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"Presentazione IIP al ToorCon\n" -"<a href=\"%(mp3)s\">Audio MP3</a>\n" -"<a href=\"%(slides)s\">Slide</a>\n" -"Lance James (0x90), Settembre 2002." +msgstr "Presentazione IIP al ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">Slide</a>\nLance James (0x90), Settembre 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -354,12 +445,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To Be or I2P</a>\n" -"(Video Youtube)\n" -"Una introduzione alla comunicazione anonima con I2P.\n" -"<a href=\"%(pdf)s\">To Be or I2P (presentazione in PDF)</a>,\n" -"Jens Kubieziel, 24C3 Berlino, 28 Dicembre 2007." +msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Video Youtube)\nUna introduzione alla comunicazione anonima con I2P.\n<a href=\"%(pdf)s\">To Be or I2P (presentazione in PDF)</a>,\nJens Kubieziel, 24C3 Berlino, 28 Dicembre 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -367,17 +453,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Video del discorso su I2P al Chemnitz Linux " -"Tag</a>,\n" -"Lars Schimmer,\n" -"14-15 March 2009" +msgstr "<a href=\"%(video)s\">Video del discorso su I2P al Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 March 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -388,10 +469,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Dentro la darknet I2P: benvenuti nel " -"cipherspazio</a>\n" -"Adrian Crenshaw. Schmoocon Firetalk, Gennaio 2011" +msgstr "<a href=\"%(link)s\">Dentro la darknet I2P: benvenuti nel cipherspazio</a>\nAdrian Crenshaw. Schmoocon Firetalk, Gennaio 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -399,72 +477,47 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Usare la tecnologia per aumentare la libertà </a>\n" -"(Video Youtube)\n" -"Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Marzo " -"2011.\n" -"I riferimenti ad I2P sono a partire da 10:00 fino 20:00 nel video." +msgstr "<a href=\"%(link)s\">Usare la tecnologia per aumentare la libertà </a>\n(Video Youtube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 Marzo 2011.\nI riferimenti ad I2P sono a partire da 10:00 fino 20:00 nel video." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Debolezze comuni delle darknet</a>\n" -"(Video Youtube)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 " -"Luglio 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Debolezze comuni delle darknet</a>\n(Video Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 Luglio 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">Corso avanzato di I2P / Tor</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 Agosto 2011." +msgstr "<a href=\"%(link)s\">Corso avanzato di I2P / Tor</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 Agosto 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspazio/Darknets: una rassegna delle strategie " -"di attacco -\n" -"DEF CON, versione dal vivo (Video Youtube)</a>,\n" -"<a href=\"%(studio)s\">Version \"Studio\" (Video Youtube)</a>,\n" -"<a href=\"%(slides)s\">Slide (ppt)</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 Agosto 2011." +msgstr "<a href=\"%(live)s\">Cipherspazio/Darknets: una rassegna delle strategie di attacco -\nDEF CON, versione dal vivo (Video Youtube)</a>,\n<a href=\"%(studio)s\">Version \"Studio\" (Video Youtube)</a>,\n<a href=\"%(slides)s\">Slide (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 Agosto 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Gli ecosistemi moderni del " -"cipherspazio</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), November " -"4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Gli ecosistemi moderni del cipherspazio</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -472,24 +525,20 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 agosto, 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 agosto, 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -501,8 +550,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -532,11 +580,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Guida ad I2P su Windows</a>\n" -"(Video Youtube)\n" -"Questa guida mostra come installare I2P su Windows XP.\n" -"Di <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Guida ad I2P su Windows</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su Windows XP.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -545,11 +589,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Guida ad I2P su Debian</a>\n" -"(Video Youtube)\n" -"Questa guida mostra come installare I2P su un sistema Linux Debian.\n" -"Di <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Guida ad I2P su Debian</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su un sistema Linux Debian.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -558,55 +598,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Come creare siti anonimi su I2P</a>\n" -"(Video Youtube)\n" -"Guida che mostra come creare siti anonimi su I2P.\n" -"Di <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Come creare siti anonimi su I2P</a>\n(Video Youtube)\nGuida che mostra come creare siti anonimi su I2P.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Guida ad I2P su Mac OS X</a>\n" -"(Video Youtube)\n" -"Questa guida mostra come installare I2P su Mac OS X e come connettersi a " -"irc.telecomix.i2p.\n" -"Di <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Guida ad I2P su Mac OS X</a>\n(Video Youtube)\nQuesta guida mostra come installare I2P su Mac OS X e come connettersi a irc.telecomix.i2p.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari spiega i principi di base di I2P</a>\n" -"(Video Youtube)\n" -"L'agente Felix Atari del Telecomix Crypto Munitions Bureau.\n" -"Di <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari spiega i principi di base di I2P</a>\n(Video Youtube)\nL'agente Felix Atari del Telecomix Crypto Munitions Bureau.\nDi <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">Essere consapevole su I2P, la darknet anonima basata" -" su P2P (Installazione Windows)</a>\n" -"(Video Youtube)\n" -"Questa guida mostra come installare e configurare il software necessario " -"per accedere ad I2P." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">Essere consapevole su I2P, la darknet anonima basata su P2P (Installazione Windows)</a>\n(Video Youtube)\nQuesta guida mostra come installare e configurare il software necessario per accedere ad I2P." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -614,10 +632,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">Come connettersi ad I2P</a>\n" -"(Video Youtube)\n" -"Come installare I2P su Ubuntu." +msgstr "<a href=\"%(link)s\">Come connettersi ad I2P</a>\n(Video Youtube)\nCome installare I2P su Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -626,12 +641,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Installare la il software della darknet I2P su " -"Linux</a>\n" -"(Video)\n" -"Adrian Crenshaw.\n" -"Gennaio 2011" +msgstr "<a href=\"%(link)s\">Installare la il software della darknet I2P su Linux</a>\n(Video)\nAdrian Crenshaw.\nGennaio 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -639,10 +649,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Breve animazione del sistema di routing garlic</a>\n" -"(Video Youtube)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Breve animazione del sistema di routing garlic</a>\n(Video Youtube)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -655,11 +662,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) Intervistato da DistributedCity\n" -"<a href=\"%(link1)s\">Parte 1</a>\n" -"<a href=\"%(link2)s\">Parte 2</a>\n" -"26 Luglio, 2002." +msgstr "Lance James (0x90) Intervistato da DistributedCity\n<a href=\"%(link1)s\">Parte 1</a>\n<a href=\"%(link2)s\">Parte 2</a>\n26 Luglio, 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -668,32 +671,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) Intervistato da El PaÃs\n" -"(originale in Spagnolo)\n" -"<a href=\"%(link)s\">Traduzione in Inglese</a>\n" -"31 Ottobre, 2002." +msgstr "Lance James (0x90) Intervistato da El PaÃs\n(originale in Spagnolo)\n<a href=\"%(link)s\">Traduzione in Inglese</a>\n31 Ottobre, 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">Articolo di Netzwelt.de su come essere anonimi su " -"Internet</a>\n" -"(In tedesco)\n" -"Novembre 2007." +msgstr "<a href=\"%(link)s\">Articolo di Netzwelt.de su come essere anonimi su Internet</a>\n(In tedesco)\nNovembre 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -701,20 +694,14 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz intervistato da gulli.com</a>\n" -"Marzo 2009\n" -"<a href=\"%(german)s\">traduzione in Tedesco</a>" +msgstr "<a href=\"%(link)s\">zzz intervistato da gulli.com</a>\nMarzo 2009\n<a href=\"%(german)s\">traduzione in Tedesco</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -723,43 +710,34 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonimato per le masse</a>,\n" -"Jonathan Cox,\n" -"11 Novembre 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonimato per le masse</a>,\nJonathan Cox,\n11 Novembre 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -768,16 +746,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -789,19 +765,62 @@ msgstr "Altro" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P è stato menzionato nell' episodio 2 della seconda stagione di \"House" -" of Cards\" andato in onda su Netflix \n" -"il 14 Febbraio 2014" +msgstr "I2P è stato menzionato nell' episodio 2 della seconda stagione di \"House of Cards\" andato in onda su Netflix \nil 14 Febbraio 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -810,18 +829,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -832,84 +848,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -920,8 +913,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -929,27 +921,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -957,26 +945,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -987,10 +966,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -998,18 +975,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1020,17 +994,11 @@ msgstr "Membri del progetto I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Siamo un piccolo gruppo di persone sparse su molti continenti, impegnate " -"a migliorare diversi aspetti del progetto e discutere l'implementazione " -"della rete.\n" -"<a href=\"%(volunteer)s\">Collabora con noi!</a>" +msgstr "Siamo un piccolo gruppo di persone sparse su molti continenti, impegnate a migliorare diversi aspetti del progetto e discutere l'implementazione della rete.\n<a href=\"%(volunteer)s\">Collabora con noi!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1199,7 +1167,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1208,9 +1177,7 @@ msgstr "" #: i2p2www/pages/site/about/team.html:122 msgid "manage the public project website content design" -msgstr "" -"gestione della progettazione dei contenuti per il sito web pubblico del " -"progetto" +msgstr "gestione della progettazione dei contenuti per il sito web pubblico del progetto" #: i2p2www/pages/site/about/team.html:125 #, python-format @@ -1356,15 +1323,11 @@ msgstr "desktopgui, dijjer port" #: i2p2www/pages/site/about/team.html:228 msgid "Debian/Ubuntu Packager and PPA maintainer" -msgstr "" -"Assemblatore del pacchetto per Debian/Ubuntu Packager e manutentore della" -" PPA" +msgstr "Assemblatore del pacchetto per Debian/Ubuntu Packager e manutentore della PPA" #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"Backend del routerconsole, migliorie alla interfaccia utente, rinnovo " -"sito web, lavoro sul testing d'unità " +msgstr "Backend del routerconsole, migliorie alla interfaccia utente, rinnovo sito web, lavoro sul testing d'unità " #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1445,7 +1408,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "sviluppo jbigi, migrazione wiki, pulizia documentazione" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "debugging java, sviluppo del client I2PTunnel e della console del router" #: i2p2www/pages/site/about/team.html:323 @@ -1495,32 +1459,25 @@ msgstr "… e molti altri" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1538,8 +1495,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1578,10 +1535,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1595,15 +1550,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1612,11 +1563,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1671,8 +1619,7 @@ msgstr "Secondo giorno" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1690,24 +1637,13 @@ msgstr "Agosto 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Ci sono alcune tecniche principali che si possono usare per aumentare le " -"prestazioni percepite di I2P: alcune delle seguenti sono relative alla " -"CPU, altre alla larghezza di banda, ed altre ancora al protocollo. " -"Comunque, tutte influiscono sulla latenza, sulla velocità di " -"trasmissione, e sulla prestazioni percepite della rete, perché riducono " -"la lotta per le scarse risorse. Questa lista non è ovviamente esaustiva, " -"ma copre le principali tecniche che si possono usare." +msgstr "Ci sono alcune tecniche principali che si possono usare per aumentare le prestazioni percepite di I2P: alcune delle seguenti sono relative alla CPU, altre alla larghezza di banda, ed altre ancora al protocollo. Comunque, tutte influiscono sulla latenza, sulla velocità di trasmissione, e sulla prestazioni percepite della rete, perché riducono la lotta per le scarse risorse. Questa lista non è ovviamente esaustiva, ma copre le principali tecniche che si possono usare." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1715,9 +1651,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Per conoscere i miglioramenti alle prestazioni apportati in passato, " -"consulta lo <a href=\"%(history)s\">Storico delle prestazioni</a>." +msgstr "Per conoscere i miglioramenti alle prestazioni apportati in passato, consulta lo <a href=\"%(history)s\">Storico delle prestazioni</a>." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1726,24 +1660,13 @@ msgstr "Miglior profilo e selezione dei peer" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Probabilmente una delle strategie più importanti per aumentare le " -"prestazioni è migliorare come i router scelgono i peer tramite cui " -"costruire il percorso dei tunnel: assicurati che i router non usino peer " -"con collegamenti lenti, né quelli che abbiano collegamenti veloci ma " -"sovraccarichi, ecc. In aggiunta, assicurati di non esporti ai tipi di " -"attacco <a href=\"%(sybilpdf)s\">Sybil</a> perpetrati da un avversario " -"potente che ha a disposizione molti elaboratori veloci." +msgstr "Probabilmente una delle strategie più importanti per aumentare le prestazioni è migliorare come i router scelgono i peer tramite cui costruire il percorso dei tunnel: assicurati che i router non usino peer con collegamenti lenti, né quelli che abbiano collegamenti veloci ma sovraccarichi, ecc. In aggiunta, assicurati di non esporti ai tipi di attacco <a href=\"%(sybilpdf)s\">Sybil</a> perpetrati da un avversario potente che ha a disposizione molti elaboratori veloci." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1751,33 +1674,15 @@ msgstr "Affinamento del database di rete" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Vorremmo rendere più efficienti gli algoritmi di manutenzione e salute " -"del database della rete, invece di esplorare costantemente la keyspace " -"per nuovi peer: ciò infatti causa incrementa significativamente il numero" -" di messaggi di rete e il carico del router. Possiamo rallentare o anche " -"fermare l'esplorazione fino a che ci accorgiamo che c'è qualcosa di nuovo" -" che val la pena di essere trovato (p. es. diminuire il tasso di " -"esplorazione, basato sull'ultima occasione in cui qualcuno ci ha indicato" -" qualcun altro di cui non sappiamo nulla). Possiamo anche affinare quello" -" che inviamo correntemente: quanti peer rimandiamo indietro (o anche se " -"rimandiamo indietro una risposta), così come quante ricerche effettuiamo " -"in contemporanea." +msgstr "Vorremmo rendere più efficienti gli algoritmi di manutenzione e salute del database della rete, invece di esplorare costantemente la keyspace per nuovi peer: ciò infatti causa incrementa significativamente il numero di messaggi di rete e il carico del router. Possiamo rallentare o anche fermare l'esplorazione fino a che ci accorgiamo che c'è qualcosa di nuovo che val la pena di essere trovato (p. es. diminuire il tasso di esplorazione, basato sull'ultima occasione in cui qualcuno ci ha indicato qualcun altro di cui non sappiamo nulla). Possiamo anche affinare quello che inviamo correntemente: quanti peer rimandiamo indietro (o anche se rimandiamo indietro una risposta), così come quante ricerche effettuiamo in contemporanea." #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -1786,48 +1691,24 @@ msgstr "Miglioramenti e affinamento del tag di sessione" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"L'algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"funziona gestendo un insieme di array di 32 byte, utilizzabili solo una " -"volta, eliminandoli se non sono rapidamente usati. Se eliminiamo questi " -"array troppo presto, siamo costretti a una nuova ricodifica di tipo " -"ElGamal, che è dispendiosa; d'altra parte, se non li eliminiamo " -"abbastanza velocemente, dobbiamo ridurre la loro quantità , per non " -"occupare troppa memoria (ed evitare che, se il destinatario presenta " -"errori e perde alcune etichette, ulteriori errori di codifica occorrano " -"primo di essere trovati). Possiamo, in sicurezza e con maggiore " -"efficienza, migliorare la durata delle etichette, utilizzando rilevazioni" -" attive e algoritmi di feedback: ciò si ottiene rimpiazzando la codifica " -"ElGamal con una più banale AES." +msgstr "L'algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> funziona gestendo un insieme di array di 32 byte, utilizzabili solo una volta, eliminandoli se non sono rapidamente usati. Se eliminiamo questi array troppo presto, siamo costretti a una nuova ricodifica di tipo ElGamal, che è dispendiosa; d'altra parte, se non li eliminiamo abbastanza velocemente, dobbiamo ridurre la loro quantità , per non occupare troppa memoria (ed evitare che, se il destinatario presenta errori e perde alcune etichette, ulteriori errori di codifica occorrano primo di essere trovati). Possiamo, in sicurezza e con maggiore efficienza, migliorare la durata delle etichette, utilizzando rilevazioni attive e algoritmi di feedback: ciò si ottiene rimpiazzando la codifica ElGamal con una più banale AES." #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Altre idee su come migliorare la spedizione di etichette di sessione sono" -" descritte qui:\n" -"<a href=\"%(elgamalaes)s#future\">Pagina di ElGamal/AES+SessionTag</a>." +msgstr "Altre idee su come migliorare la spedizione di etichette di sessione sono descritte qui:\n<a href=\"%(elgamalaes)s#future\">Pagina di ElGamal/AES+SessionTag</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -1838,64 +1719,29 @@ msgstr "Migrare sessionTag per sincronizzare PRNG" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." -msgstr "" -"Adesso, il nostro algoritmo <a " -"href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> lavora etichettando " -"ogni messaggio cifrato con un numero casuale unico di 32, di tipo nonce " -"(una \"etichetta di sessione\"), che identifica quel messaggio come " -"codificato con la chiave di sessione AES associata. Questo impedisce ai " -"peer di distinguere i messaggi che appartengono alla stessa sessione, " -"visto che ogni messaggio possiede una etichetta casuale completamente " -"nuova. Per far questo, l'algoritmo impacchetta pochi messaggi alla volta " -"ed usa un nuovo insieme di etichette di sessione, all'interno dello " -"stesso messaggio codificato, inviando così, in modo trasparente, un " -"metodo per identificare i messaggi futuri. In seguito bisogna tener " -"traccia di quali messaggi sono stati inviati con successo, per sapere " -"quali etichette possiamo usare." +msgstr "Adesso, il nostro algoritmo <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> lavora etichettando ogni messaggio cifrato con un numero casuale unico di 32, di tipo nonce (una \"etichetta di sessione\"), che identifica quel messaggio come codificato con la chiave di sessione AES associata. Questo impedisce ai peer di distinguere i messaggi che appartengono alla stessa sessione, visto che ogni messaggio possiede una etichetta casuale completamente nuova. Per far questo, l'algoritmo impacchetta pochi messaggi alla volta ed usa un nuovo insieme di etichette di sessione, all'interno dello stesso messaggio codificato, inviando così, in modo trasparente, un metodo per identificare i messaggi futuri. In seguito bisogna tener traccia di quali messaggi sono stati inviati con successo, per sapere quali etichette possiamo usare." #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" "to handle out of order delivery)." -msgstr "" -"Questo funziona bene ed è abbastanza robusto, però è inefficiente per " -"quanto riguarda l'uso della larghezza di banda, perché richiede la " -"spedizione delle etichette in anticipo (e non tutte le etichette sono " -"sempre necessarie: alcune possono anche essere sprecate, a causa della " -"loro breve durata). Comunque, mediamente, la spedizione anticipata " -"dell'etichetta di sessione costa 32 byte per ogni messaggio (cioè la " -"dimensione di un'etichetta). Tuttavia, Taral ha suggerito che la " -"dimensione può essere evitata rimpiazzando la spedizione delle etichette " -"con un PRNG sincronizzato: quando si stabilisce una nuova sessione " -"(attraverso un blocco codificato con ElGamal), entrambi i lati diffondono" -" un PRNG da usare e generano le etichette di sessione su richiesta (con " -"il ricevente che calcola anticipatamente i possibili valori futuri per " -"gestire un invio non ordinato)." +msgstr "Questo funziona bene ed è abbastanza robusto, però è inefficiente per quanto riguarda l'uso della larghezza di banda, perché richiede la spedizione delle etichette in anticipo (e non tutte le etichette sono sempre necessarie: alcune possono anche essere sprecate, a causa della loro breve durata). Comunque, mediamente, la spedizione anticipata dell'etichetta di sessione costa 32 byte per ogni messaggio (cioè la dimensione di un'etichetta). Tuttavia, Taral ha suggerito che la dimensione può essere evitata rimpiazzando la spedizione delle etichette con un PRNG sincronizzato: quando si stabilisce una nuova sessione (attraverso un blocco codificato con ElGamal), entrambi i lati diffondono un PRNG da usare e generano le etichette di sessione su richiesta (con il ricevente che calcola anticipatamente i possibili valori futuri per gestire un invio non ordinato)." #: i2p2www/pages/site/about/performance/future.html:87 msgid "Longer lasting tunnels" @@ -1903,50 +1749,26 @@ msgstr "Tunnel di lunga durata" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"La durata attuale predefinita di un tunnel - 10 minuti - è del tutto " -"arbitraria, anche se \"sembra ok\". una volta che avremo un codice che " -"risani il tunnel e una rilevazione dei malfunzionamenti più efficace, " -"saremo in grado di variare questa durata con maggior sicurezza, riducendo" -" il carico della rete e della CPU (a causa dei messaggi di creazione " -"tunnel, avidi di risorse)." +msgstr "La durata attuale predefinita di un tunnel - 10 minuti - è del tutto arbitraria, anche se \"sembra ok\". una volta che avremo un codice che risani il tunnel e una rilevazione dei malfunzionamenti più efficace, saremo in grado di variare questa durata con maggior sicurezza, riducendo il carico della rete e della CPU (a causa dei messaggi di creazione tunnel, avidi di risorse)." #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Questo sembra una facile soluzione per elevati carichi su router con " -"ampia larghezza di banda, ma non possiamo ricorrere a ciò fino a che non " -"avremo affinato maggiormente gli algoritmi di costruzione del tunnel. " -"Comunque, il ciclo di vita di 10 minuti del tunnel è codificato in molti " -"punti, pertanto un notevole impegno sarebbe richiesto per modificare la " -"durata. Inoltre, sarebbe difficile mantenere la retrocompatibilità con " -"una tale modifica." +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Questo sembra una facile soluzione per elevati carichi su router con ampia larghezza di banda, ma non possiamo ricorrere a ciò fino a che non avremo affinato maggiormente gli algoritmi di costruzione del tunnel. Comunque, il ciclo di vita di 10 minuti del tunnel è codificato in molti punti, pertanto un notevole impegno sarebbe richiesto per modificare la durata. Inoltre, sarebbe difficile mantenere la retrocompatibilità con una tale modifica." #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"Attualmente, siccome la media delle percentuali di successo nella " -"creazione di tunnel della rete è piuttosto alta, non abbiamo pianificato " -"di estendere la durata dei tunnel." +msgstr "Attualmente, siccome la media delle percentuali di successo nella creazione di tunnel della rete è piuttosto alta, non abbiamo pianificato di estendere la durata dei tunnel." #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -1954,43 +1776,22 @@ msgstr "Impostare i timeout" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" -msgstr "" -"I timeout attuali per varie attività sono un altro esempio di " -"impostazioni abbastanza arbitrarie ma che \"sembrano ok\". Perché abbiamo" -" un timeout di 60 secondi per il \"peer irraggiungibile\"? Perché " -"cerchiamo di inviare, dopo 10 secondi, attraverso un tunnel diverso che " -"ci mostra un LeaseSet? Perché le richieste al database di rete hanno un " -"limite temporale di 20 o 60 secondi? Perché le destinazioni sono " -"impostate per richiedere un nuovo insieme di tunnel ogni 10 minuti? " -"Perché concediamo 60 secondi ad un peer per rispondere alla nostra " -"richiesta di unirsi al tunnel? Perché consideriamo \"morto\" un tunnel " -"che non supera i nostri test entro 60 secondi?" +msgstr "I timeout attuali per varie attività sono un altro esempio di impostazioni abbastanza arbitrarie ma che \"sembrano ok\". Perché abbiamo un timeout di 60 secondi per il \"peer irraggiungibile\"? Perché cerchiamo di inviare, dopo 10 secondi, attraverso un tunnel diverso che ci mostra un LeaseSet? Perché le richieste al database di rete hanno un limite temporale di 20 o 60 secondi? Perché le destinazioni sono impostate per richiedere un nuovo insieme di tunnel ogni 10 minuti? Perché concediamo 60 secondi ad un peer per rispondere alla nostra richiesta di unirsi al tunnel? Perché consideriamo \"morto\" un tunnel che non supera i nostri test entro 60 secondi?" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Ciascuna di queste evenienze può essere risolta con un codice più " -"adattivo, e anche con parametri di affinamento che permettano un adeguato" -" compromesso tra larghezza di banda, latenza e uso della CPU." +msgstr "Ciascuna di queste evenienze può essere risolta con un codice più adattivo, e anche con parametri di affinamento che permettano un adeguato compromesso tra larghezza di banda, latenza e uso della CPU." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2000,49 +1801,33 @@ msgstr "Miglioramenti al protocollo di Full streaming" msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Probabilmente riabilitare il profilo interattivo dello stream \n" -"(l'implementazione corrente usa solo il profilo di stream puro)." +msgstr "Probabilmente riabilitare il profilo interattivo dello stream \n(l'implementazione corrente usa solo il profilo di stream puro)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Limitare il livello della larghezza di banda di un client (in una o " -"entrambe le direzioni di un flusso, o eventualmente condiviso attraverso " -"flussi paralleli). Questo sarebbe ovviamente in aggiunta al limite medio " -"di larghezza di banda del router." +msgstr "Limitare il livello della larghezza di banda di un client (in una o entrambe le direzioni di un flusso, o eventualmente condiviso attraverso flussi paralleli). Questo sarebbe ovviamente in aggiunta al limite medio di larghezza di banda del router." #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Liste di controllo accesso (permette lo stream solo da o per alcune " -"destinazioni conosciute)." +msgstr "Liste di controllo accesso (permette lo stream solo da o per alcune destinazioni conosciute)." #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Controlli web e salute dei vari flussi, e anche la capacità di chiuderli " -"esplicitamente oppure troncarli." +msgstr "Controlli web e salute dei vari flussi, e anche la capacità di chiuderli esplicitamente oppure troncarli." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Altre idee per migliorare la libreria di streaming sono descritte nella\n" -"<a href=\"%(streaming)s#future\">pagina della libreria di streaming</a>." +msgstr "Altre idee per migliorare la libreria di streaming sono descritte nella\n<a href=\"%(streaming)s#future\">pagina della libreria di streaming</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2051,17 +1836,10 @@ msgstr "Storico delle prestazioni" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Importanti miglioramenti delle prestazioni sono stati ottenuti usando le " -"tecniche che seguono.\n" -"C'è ancora altro da fare, consulta la pagina delle <a " -"href=\"%(performance)s\">Prestazioni</a> per gli attuali problemi e " -"riflessioni." +msgstr "Importanti miglioramenti delle prestazioni sono stati ottenuti usando le tecniche che seguono.\nC'è ancora altro da fare, consulta la pagina delle <a href=\"%(performance)s\">Prestazioni</a> per gli attuali problemi e riflessioni." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2078,30 +1856,23 @@ msgstr "implementato" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2115,79 +1886,42 @@ msgstr "implementato ma necessita affinamenti" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Questo algoritmo di tweak può avere rilievo solo per le applicazioni che " -"richiedono che i peer rispondano loro (comunque è incluso tutto ciò che " -"utilizza I2PTunnel o la libreria ministreaming di mihi):" +msgstr "Questo algoritmo di tweak può avere rilievo solo per le applicazioni che richiedono che i peer rispondano loro (comunque è incluso tutto ciò che utilizza I2PTunnel o la libreria ministreaming di mihi):" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." -msgstr "" -"In precedenza, quando Alice invia un messaggio a Bob, quando Bob risponde" -" deve controllare nel database della rete, spedire alcune richieste per " -"ottenere il LeaseSet attuale di Alice. Se Bob ha già l'attuale LeaseSet " -"di Alice, può allora inviare la risposta immediatamente: questo è uno dei" -" motivi per cui generalmente si impiega più tempo per parlare con " -"qualcuno la prima volta che ti connetti, mentre le comunicazioni " -"successive sono più veloci. Attualmente, per tutti i client, incapsuliamo" -" l'attuale LeaseSet del mittente nel garlic che è spedito al " -"destinatario: in tal modo, quando si risponderanno, il LeaseSet sarà " -"<i>sempre</i> memorizzato localmente, eliminando completamente ogni " -"necessità di controlli nel database di rete quando si risponde. Ciò " -"impegna un'ampia porzione della larghezza di banda del mittente per " -"ottenere una risposta veloce. Se non facessimo questo molto spesso, " -"diminuirebbe l'utilizzo medio della larghezza di banda delle rete, visto " -"che il destinatario non dovrebbe controllare il database di rete." +msgstr "In precedenza, quando Alice invia un messaggio a Bob, quando Bob risponde deve controllare nel database della rete, spedire alcune richieste per ottenere il LeaseSet attuale di Alice. Se Bob ha già l'attuale LeaseSet di Alice, può allora inviare la risposta immediatamente: questo è uno dei motivi per cui generalmente si impiega più tempo per parlare con qualcuno la prima volta che ti connetti, mentre le comunicazioni successive sono più veloci. Attualmente, per tutti i client, incapsuliamo l'attuale LeaseSet del mittente nel garlic che è spedito al destinatario: in tal modo, quando si risponderanno, il LeaseSet sarà <i>sempre</i> memorizzato localmente, eliminando completamente ogni necessità di controlli nel database di rete quando si risponde. Ciò impegna un'ampia porzione della larghezza di banda del mittente per ottenere una risposta veloce. Se non facessimo questo molto spesso, diminuirebbe l'utilizzo medio della larghezza di banda delle rete, visto che il destinatario non dovrebbe controllare il database di rete." #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Le modifiche previste per la versione 0.6.2 includeranno il LeaseSet solo" -" quando necessario, all'inizio di una connessione o quando il LeaseSet " -"cambia. Questo ridurrà sensibilmente il sovraccarico dello scambio " -"messaggi di I2P." +msgstr "Le modifiche previste per la versione 0.6.2 includeranno il LeaseSet solo quando necessario, all'inizio di una connessione o quando il LeaseSet cambia. Questo ridurrà sensibilmente il sovraccarico dello scambio messaggi di I2P." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2196,20 +1930,13 @@ msgstr "Sistema di TCP rejection più efficiente" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2220,25 +1947,13 @@ msgstr "Impostazione del tunnel di prova" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." -msgstr "" -"Al posto di usare lo schema abbastanza casuale che abbiamo ora, potremmo " -"usare un algoritmo sensibile al contesto per i tunnel di test, ad esempio" -" se noi stimiamo corretti i dati validi per passare, non c'è bisogno di " -"testare il tunnel, mentre se recentemente non abbiamo visto passare alcun" -" dato, forse è meglio inviare qualche dato di prova. Questo ridurrà i " -"problemi del tunnel causati da troppi messaggi, e potrà migliorare la " -"velocità con cui vengono rilevati - e indirizzati - i tunnel difettosi." +msgstr "Al posto di usare lo schema abbastanza casuale che abbiamo ora, potremmo usare un algoritmo sensibile al contesto per i tunnel di test, ad esempio se noi stimiamo corretti i dati validi per passare, non c'è bisogno di testare il tunnel, mentre se recentemente non abbiamo visto passare alcun dato, forse è meglio inviare qualche dato di prova. Questo ridurrà i problemi del tunnel causati da troppi messaggi, e potrà migliorare la velocità con cui vengono rilevati - e indirizzati - i tunnel difettosi." #: i2p2www/pages/site/about/performance/history.html:92 msgid "Persistent Tunnel / Lease Selection" @@ -2246,27 +1961,17 @@ msgstr "Tunnel persistente / Scelta della locazione" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"Selezione dei tunnel in uscita implementata nella versione 0.6.1.30, " -"selezione dei lease in uscita implementata nella versione 0.6.2." +msgstr "Selezione dei tunnel in uscita implementata nella versione 0.6.1.30, selezione dei lease in uscita implementata nella versione 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Selezionare i tunnel e i lease casualmente per ogni messaggio crea " -"un'alta incidenza di spedizioni out-of-order: ciò impedisce che la " -"libreria di streaming incrementi la dimensione della finestra troppo " -"velocemente. Insistendo con le stesse selezioni per una data connessione," -" la velocità di trasferimento è notevolmente più alta." +msgstr "Selezionare i tunnel e i lease casualmente per ogni messaggio crea un'alta incidenza di spedizioni out-of-order: ciò impedisce che la libreria di streaming incrementi la dimensione della finestra troppo velocemente. Insistendo con le stesse selezioni per una data connessione, la velocità di trasferimento è notevolmente più alta." #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2274,20 +1979,13 @@ msgstr "Compressione di alcune strutture di dati" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2301,26 +1999,16 @@ msgstr "rimpiazzato dal protocollo full streaming" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2329,18 +2017,12 @@ msgstr "Implementa protocollo \"full streaming\"" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2348,16 +2030,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2369,100 +2046,44 @@ msgstr "Prestazioni" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"Come funziona I2P, perché è lenta, e perché non usa tutta la mia " -"larghezza di banda?" +msgstr "Come funziona I2P, perché è lenta, e perché non usa tutta la mia larghezza di banda?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Una delle cose che le persone domandano più spesso è \"quanto è veloce " -"I2P?\", e nessuno apprezza la risposta: \"dipende\". Dopo aver provato " -"I2P, ciò che chiedono è \"si può velocizzare?\", e la risposta a ciò è " -"più empatica: \"<b>sì</b>\"." +msgstr "Una delle cose che le persone domandano più spesso è \"quanto è veloce I2P?\", e nessuno apprezza la risposta: \"dipende\". Dopo aver provato I2P, ciò che chiedono è \"si può velocizzare?\", e la risposta a ciò è più empatica: \"<b>sì</b>\"." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." -msgstr "" -"I2P è una rete completamente dinamica. Ogni client è conosciuto dagli " -"altri nodi e analizza i nodi locali conosciuti per verificare la " -"raggiungibilità e la capacità .\n" -"Solo i nodi raggiungibili e idonei sono salvati nel NetDB locale (Questo " -"è generalmente solo una porzione della rete, circa 500-1000).\n" -"Quando I2P costruisce i tunnel, seleziona la risorsa migliore da questo " -"gruppo. Per esempio, un piccolo sottogruppo di 20-50 nodi sono " -"disponibili solo per costruire tunnel.\n" -"Siccome le analisi sono effettuate ogni minuto, il gruppo dei nodi " -"utilizzati cambia ogni minuto.\n" -"Ogni nodo I2P conosce una parte differente della rete: ciò significa che " -"ogni router ha un differente insieme di nodi I2P da essere usati come " -"tunnel.\n" -"Anche se due router hanno lo stesso sottogruppo di nodi conosciuti, le " -"analisi di raggiungibilità e capacità probabilmente mostreranno risultati" -" differenti, perché gli altri router saranno sotto carico appena un " -"router analizza, ma saranno liberi se il secondo router analizza." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." +msgstr "I2P è una rete completamente dinamica. Ogni client è conosciuto dagli altri nodi e analizza i nodi locali conosciuti per verificare la raggiungibilità e la capacità .\nSolo i nodi raggiungibili e idonei sono salvati nel NetDB locale (Questo è generalmente solo una porzione della rete, circa 500-1000).\nQuando I2P costruisce i tunnel, seleziona la risorsa migliore da questo gruppo. Per esempio, un piccolo sottogruppo di 20-50 nodi sono disponibili solo per costruire tunnel.\nSiccome le analisi sono effettuate ogni minuto, il gruppo dei nodi utilizzati cambia ogni minuto.\nOgni nodo I2P conosce una parte differente della rete: ciò significa che ogni router ha un differente insieme di nodi I2P da essere usati come tunnel.\nAnche se due router hanno lo stesso sottogruppo di nodi conosciuti, le analisi di raggiungibilità e capacità probabilmente mostreranno risultati differenti, perché gli altri router saranno sotto carico appena un router analizza, ma saranno liberi se il secondo router analizza." #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"L'immagine sopra descrive perchè ogni nodo I2P ha diversi nodi per " -"costruire i tunnel. \n" -"Perchè ogni nodo I2P ha diversa latenza e larghezza di banda, i tunnel (i" -" quali sono costruiti attraverso quei nodi) hanno valori diversi di " -"latenza e larghezza di banda. \n" -"E poichè ogni nodo I2P ha diversi costrutti dei tunnel, due nodi I2P non " -"hanno le stesse impostazioni dei tunnel." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "L'immagine sopra descrive perchè ogni nodo I2P ha diversi nodi per costruire i tunnel. \nPerchè ogni nodo I2P ha diversa latenza e larghezza di banda, i tunnel (i quali sono costruiti attraverso quei nodi) hanno valori diversi di latenza e larghezza di banda. \nE poichè ogni nodo I2P ha diversi costrutti dei tunnel, due nodi I2P non hanno le stesse impostazioni dei tunnel." #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Un server/client è conosciuto come \"destinazione\" e ogni destinazione " -"possiede almeno un tunnel in entrata e uno in uscita. Sono predefiniti 3 " -"HOPS per tunnel\n" -"Vengono così aggiunti fino a 12 HOPS (cioè 12 diversi nodi I2P) per " -"ottenere un completo percorso client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Un server/client è conosciuto come \"destinazione\" e ogni destinazione possiede almeno un tunnel in entrata e uno in uscita. Sono predefiniti 3 HOPS per tunnel\nVengono così aggiunti fino a 12 HOPS (cioè 12 diversi nodi I2P) per ottenere un completo percorso client-server-client." #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Ogni pacchetto dati è inviato attraverso 6 altri nodi I2P fino a che " -"raggiunge il server:" +msgstr "Ogni pacchetto dati è inviato attraverso 6 altri nodi I2P fino a che raggiunge il server:" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2470,108 +2091,62 @@ msgstr "e a ritroso attraverso 6 diversi nodi I2P:" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"Altro: gli altri nodi I2P hanno bisogno di conoscere il tuo router I2P " -"per poter effettuare i test di raggiungibilità e capacità . Gli altri nodi" -" possono impiegare del tempo per analizzare il tuo nodo. \n" -"Per risparmiare tempo, prova a costruire più tunnels con I2P, ad esempio:" -" usa un torrent o un sito www per qualche secondo." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "Altro: gli altri nodi I2P hanno bisogno di conoscere il tuo router I2P per poter effettuare i test di raggiungibilità e capacità . Gli altri nodi possono impiegare del tempo per analizzare il tuo nodo. \nPer risparmiare tempo, prova a costruire più tunnels con I2P, ad esempio: usa un torrent o un sito www per qualche secondo." #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2582,7 +2157,4 @@ msgstr "Miglioramenti alle prestazioni" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Per le possibili migliorie di performance future guarda su\n" -"<a href=\"%(future)s\">Migliorie di Performance in Arrivo</a>." - +msgstr "Per le possibili migliorie di performance future guarda su\n<a href=\"%(future)s\">Migliorie di Performance in Arrivo</a>." diff --git a/i2p2www/translations/it/LC_MESSAGES/blog.po b/i2p2www/translations/it/LC_MESSAGES/blog.po index 75567d1c2bd7f8b4ad4da598b8f8261d8e194fce..c96d903ce058fb0ecd32489120659ae9029e98e4 100644 --- a/i2p2www/translations/it/LC_MESSAGES/blog.po +++ b/i2p2www/translations/it/LC_MESSAGES/blog.po @@ -1,27 +1,31 @@ -# Italian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 # Jacopo Tumminello <tummarellox@gmail.com>, 2014 # khanjant <khanjant@riseup.net>, 2015 +# khanjant <khanjant@riseup.net>, 2015 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2015-2017 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2017 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020 +# Jacopo Tumminello <tummarellox@gmail.com>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-05-07 14:22+0000\n" -"Last-Translator: Fabio Roman <romanfabio@protonmail.com>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11 @@ -94,6 +98,8 @@ msgstr "I file sono disponibili nella `Pagina download`__." #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34 msgid "RELEASE DETAILS" msgstr "DETTAGLI DELLA RELEASE" @@ -165,6 +171,8 @@ msgstr "Cambiamenti maggiori" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43 msgid "Bug Fixes" msgstr "Bug fix" @@ -226,6 +234,8 @@ msgstr "Bug fix" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52 msgid "Other" msgstr "Altro" @@ -288,6 +298,8 @@ msgstr "Altro" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66 msgid "SHA256 Checksums:" msgstr "Checksum SHA256:" @@ -318,11 +330,11 @@ msgstr "Release 0.9.2" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10 msgid "" -"0.9.2 includes extensive low-level changes to improve the performance and" -" efficiency of the router. We have updated our UPnP library, to hopefully" -" make UPnP work for more people. I2PSnark now has DHT support, but it is " -"not yet enabled by default, as we plan to do more testing during the " -"upcoming 0.9.3 development cycle." +"0.9.2 includes extensive low-level changes to improve the performance and " +"efficiency of the router. We have updated our UPnP library, to hopefully " +"make UPnP work for more people. I2PSnark now has DHT support, but it is not " +"yet enabled by default, as we plan to do more testing during the upcoming " +"0.9.3 development cycle." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13 @@ -330,14 +342,12 @@ msgstr "" msgid "" "As usual, there's also lots of bug fixes in this release, so updating is " "recommended." -msgstr "" -"Come al solito ci sono molti bug risolti in questa release, ed è quindi " -"raccomandato aggiornare." +msgstr "Come al solito ci sono molti bug risolti in questa release, ed è quindi raccomandato aggiornare." #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27 msgid "" -"SSU: Fix several problems in our UDP transport, to improve efficiency and" -" reliability for connection setup. Also improve defenses against various " +"SSU: Fix several problems in our UDP transport, to improve efficiency and " +"reliability for connection setup. Also improve defenses against various " "types of bad input." msgstr "" @@ -345,9 +355,7 @@ msgstr "" msgid "" "UPnP: Updated our library to fix several issues, should work for more " "routers now" -msgstr "" -"UPnP: Aggiornata la libreria, ora dovrebbe essere compatibile con molti " -"più router" +msgstr "UPnP: Aggiornata la libreria, ora dovrebbe essere compatibile con molti più router" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:29 msgid "" @@ -357,9 +365,9 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30 msgid "" -"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered " -"are now much more flexible, which should lessen protocol overhead and " -"reduce stalls caused by dropped tags." +"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are " +"now much more flexible, which should lessen protocol overhead and reduce " +"stalls caused by dropped tags." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31 @@ -370,16 +378,18 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35 msgid "" -"Fix various issues affecting memory usage and performance on high-" -"bandwidth routers" +"Fix various issues affecting memory usage and performance on high-bandwidth " +"routers" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36 -msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" +msgid "" +"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37 -msgid "Fix i2psnark bug that prevented a completion announcement to the tracker" +msgid "" +"Fix i2psnark bug that prevented a completion announcement to the tracker" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38 @@ -466,14 +476,14 @@ msgstr "Release 0.9.3" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10 msgid "" -"0.9.3 includes extensive low-level changes to the queueing of messages in" -" the router. We implement the CoDel Active Queue Management (AQM) " -"algorithm. We also unify the queueing and priority mechanisms in the " -"transports to aid diagnosis and reduce network latency. Work continues " -"on fixing UDP transport bugs and making UDP more resistant to attacks. " -"There are more changes to improve the performance of the router and " -"reduce its memory usage. Also, we enable i2psnark's DHT support, " -"introduced last release, by default." +"0.9.3 includes extensive low-level changes to the queueing of messages in " +"the router. We implement the CoDel Active Queue Management (AQM) algorithm." +" We also unify the queueing and priority mechanisms in the transports to " +"aid diagnosis and reduce network latency. Work continues on fixing UDP " +"transport bugs and making UDP more resistant to attacks. There are more " +"changes to improve the performance of the router and reduce its memory " +"usage. Also, we enable i2psnark's DHT support, introduced last release, by " +"default." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27 @@ -491,8 +501,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33 msgid "" "Several SSU fixes including memory leak, and better handling of routers " -"behind firewalls that change UDP ports; additional defenses for malicious" -" packets." +"behind firewalls that change UDP ports; additional defenses for malicious " +"packets." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34 @@ -517,9 +527,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42 msgid "" -"Fix streaming connection timeout back to 1 minute, was inadvertently " -"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was" -" unlimited" +"Fix streaming connection timeout back to 1 minute, was inadvertently changed" +" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited" msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43 @@ -575,28 +584,24 @@ msgstr "Release 0.9.4" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10 msgid "" -"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, " -"that was reducing network performance and reliability. It also includes " -"major changes in the in-network update system, and adds the capability to" -" update via in-network torrents." +"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that " +"was reducing network performance and reliability. It also includes major " +"changes in the in-network update system, and adds the capability to update " +"via in-network torrents." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14 msgid "" -"We fixed several bugs in the i2psnark DHT implementation that was " -"introduced\n" +"We fixed several bugs in the i2psnark DHT implementation that was introduced\n" "last release. For those of you using console or http proxy passwords,\n" -"we converted to the more-secure digest method and improved the security " -"for console forms." +"we converted to the more-secure digest method and improved the security for console forms." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20 msgid "" -"For those of you already running development builds, your router should " -"automatically\n" +"For those of you already running development builds, your router should automatically\n" "update to 0.9.4-0 using the new in-network torrent facility.\n" -"For those running 0.9.3-0, you will update normally using in-network " -"HTTP, and\n" +"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n" "we will have more information for you when we release 0.9.5." msgstr "" @@ -612,12 +617,13 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42 msgid "" -"Fix major bug that reduced SSU connection limits which reduced tunnel " -"build success rates" +"Fix major bug that reduced SSU connection limits which reduced tunnel build " +"success rates" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43 -msgid "Fix bug with external I2CP that prevented some external apps from working" +msgid "" +"Fix bug with external I2CP that prevented some external apps from working" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44 @@ -650,8 +656,7 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54 msgid "" -"More performance improvements, memory reduction, and object churn " -"reduction" +"More performance improvements, memory reduction, and object churn reduction" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55 @@ -668,15 +673,15 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58 msgid "" -"Convert http proxy and console from basic to digest authentication for " -"added security" +"Convert http proxy and console from basic to digest authentication for added" +" security" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59 msgid "" "Improved verification of console form submissions, using jsp sessions. " -"Cookies may now be required on forms, except when the console password is" -" enabled" +"Cookies may now be required on forms, except when the console password is " +"enabled" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60 @@ -695,11 +700,9 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63 msgid "" -"Translation updates: Chinese, French, German, Italian, Polish, " -"Portuguese, Swedish, and Ukrainian" -msgstr "" -"Aggiornamento traduzioni in cinese, francese, tedesco, italiano, polacco," -" portoghese, svedese ed ucraino" +"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, " +"Swedish, and Ukrainian" +msgstr "Aggiornamento traduzioni in cinese, francese, tedesco, italiano, polacco, portoghese, svedese ed ucraino" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65 msgid "Update wrapper to 3.5.16 (new installs and PPA only)" @@ -716,24 +719,21 @@ msgstr "Release 0.9.5" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10 msgid "" -"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities" -" that are being investigated by researchers at UCSB. We continue to work " -"with them on additional improvements. This is a good opportunity to " -"remind the community that while our network continues to grow rapidly, it" -" is still relatively small. There may be multiple weaknesses or bugs that" -" could compromise your anonymity. Help us grow the network by spreading " -"the word and contributing where you can." +"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities " +"that are being investigated by researchers at UCSB. We continue to work with" +" them on additional improvements. This is a good opportunity to remind the " +"community that while our network continues to grow rapidly, it is still " +"relatively small. There may be multiple weaknesses or bugs that could " +"compromise your anonymity. Help us grow the network by spreading the word " +"and contributing where you can." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14 #, python-format msgid "" -"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers " -"running a\n" -"development build) will attempt to update via the experimental in-network" -" bittorrent\n" -"with i2psnark. If this doesn't work, it should fall back to standard in-" -"network HTTP update." +"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n" +"development build) will attempt to update via the experimental in-network bittorrent\n" +"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28 @@ -778,8 +778,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39 msgid "" -"Encrypt database lookup messages end-to-end when sent through exploratory" -" tunnels" +"Encrypt database lookup messages end-to-end when sent through exploratory " +"tunnels" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40 @@ -824,11 +824,9 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 msgid "" -"Translation updates: French, German, Hungarian, Italian, Norwegian, " -"Polish, Portuguese, Russian, Swedish" -msgstr "" -"Aggiornamento traduzioni in francese, tedesco, ungherese, italiano, " -"norvegese, polacco, portoghese, russo e svedese" +"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, " +"Portuguese, Russian, Swedish" +msgstr "Aggiornamento traduzioni in francese, tedesco, ungherese, italiano, norvegese, polacco, portoghese, russo e svedese" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55 msgid "Update wrapper to 3.5.17 (new installs and PPA only)" @@ -842,17 +840,15 @@ msgstr "Release 0.9.6" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10 msgid "" "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to " -"Jetty 7.6.10 (2013-03-12). See below for important information on the " -"Jetty update. The Jetty 7 series is actively maintained and we plan to " -"stay current with it in future I2P releases." +"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty " +"update. The Jetty 7 series is actively maintained and we plan to stay " +"current with it in future I2P releases." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14 msgid "" -"Most users will update via HTTP. Those running development builds will " -"attempt to update via the\n" -"experimental in-network bittorrent with i2psnark. We've fixed some bugs " -"that will enable more users\n" +"Most users will update via HTTP. Those running development builds will attempt to update via the\n" +"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n" "to update via torrent in the 0.9.7 update cycle." msgstr "" @@ -862,12 +858,9 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28 msgid "" -"If you first installed I2P with version 0.9.5, on Windows only, we " -"recommend that you follow the\n" -"following instructions to fix your eepsite location **before** you update" -" to 0.9.6.\n" -"Only original installations of 0.9.5-0 on Windows are affected by this " -"issue. If your router version\n" +"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n" +"following instructions to fix your eepsite location **before** you update to 0.9.6.\n" +"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n" "is 0.9.5-0-win1, you already have the fix and need not take any action." msgstr "" @@ -881,36 +874,29 @@ msgstr "Dettagli di migrazione per Jetty 7" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43 msgid "" -"For most people, the update should just work. If you have multiple Jetty " -"eepsites,\n" -"OR have made changes to jetty.xml or other Jetty configuration files, " -"including changing the port\n" +"For most people, the update should just work. If you have multiple Jetty eepsites,\n" +"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n" "from 7658, you MUST take manual action AFTER updating." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49 msgid "" -"After update, the router will migrate your jetty.xml files to the new " -"Jetty 7 format." +"After update, the router will migrate your jetty.xml files to the new Jetty " +"7 format." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51 msgid "" -"The migration resets the port to 7658. If you have more than one Jetty " -"eepsite, OR your eepsite\n" -" is NOT on port 7658, OR you have made other modifications to jetty.xml " -"(for example changing the\n" -" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml " -"file for each eepsite to fix them up\n" +"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n" +" is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n" +" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n" " after updating, and restart again." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56 msgid "" -"**The following files will be backed up with a ".jetty6" suffix" -" and then migrated.**\n" -"If you have made local changes, you may have to edit them manually and " -"restart.\n" +"**The following files will be backed up with a ".jetty6" suffix and then migrated.**\n" +"If you have made local changes, you may have to edit them manually and restart.\n" "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7." msgstr "" @@ -929,7 +915,8 @@ msgid "" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78 -msgid "If a plugin does not work, please contact the maintainer for that plugin." +msgid "" +"If a plugin does not work, please contact the maintainer for that plugin." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84 @@ -958,14 +945,14 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90 msgid "" -"Ignore unsupported IPs in RouterInfos when selecting an address (prep for" -" IPv6)" +"Ignore unsupported IPs in RouterInfos when selecting an address (prep for " +"IPv6)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91 msgid "" -"Ignore unused option bits in Database Lookup Message (prep for requesting" -" encrypted response)" +"Ignore unused option bits in Database Lookup Message (prep for requesting " +"encrypted response)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92 @@ -1031,37 +1018,28 @@ msgstr "Release 0.9.7" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:8 #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:10 msgid "0.9.7 includes significant bug fixes and improvements." -msgstr "" -"La versione 0.9.7 include la correzione di gravi bug e importanti " -"miglioranti." +msgstr "La versione 0.9.7 include la correzione di gravi bug e importanti miglioranti." #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12 msgid "" -"For the first time, class 'N' routers (those with a minimumum of 128 " -"KBytes/sec of shared bandwidth)\n" -"will automatically become floodfill (previously it was only 'O' routers " -"with 256 KBps). This will\n" -"increase the floodfill population for additional resistance to certain " -"attacks (see below). Floodfill routers\n" -"don't consume much additional bandwidth, but they do tend to use " -"additional memory and concurrent\n" -"connections. If you do not wish your router to become floodfill, set the " -"advanced configuration\n" +"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n" +"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n" +"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n" +"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n" +"connections. If you do not wish your router to become floodfill, set the advanced configuration\n" "router.floodfillParticipant=false ." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21 #, python-format msgid "" -"As we think the last release fixed the experimental update-via-torrent " -"bugs, 3%(pc)s of routers should\n" +"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n" "update over in-network bittorrent this cycle." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26 msgid "" -"Plugin update checks, possibly broken for several releases, are fixed. " -"Your plugins should once again\n" +"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n" "auto-update after updating the router." msgstr "" @@ -1073,17 +1051,12 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35 msgid "" -"This release contains additional mitigations for the `\"practical " -"attacks\" paper`__.\n" -"However, we have a lot more work to do to resist Sybil attacks on the " -"floodfills, and resist\n" +"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n" +"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n" "traffic analysis at the gateways and endpoints of exploratory tunnels.\n" -"It's a good reminder for everybody that our network is still relatively " -"small and vulnerable.\n" -"We don't currently recommend any uses that would put anybody in serious " -"jeopardy.\n" -"We'll keep working to improve it... please keep working to spread the " -"word. A bigger network is a better network." +"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n" +"We don't currently recommend any uses that would put anybody in serious jeopardy.\n" +"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48 @@ -1128,8 +1101,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60 msgid "" -"Fix i2psnark bug that changed the infohash of torrents created by Robert " -"and fetched via magnet link" +"Fix i2psnark bug that changed the infohash of torrents created by Robert and" +" fetched via magnet link" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61 @@ -1164,8 +1137,8 @@ msgstr "Supporto IE 10" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71 msgid "" -"Individual expiration times in leases, for efficiency on destinations " -"with a high number of tunnels" +"Individual expiration times in leases, for efficiency on destinations with a" +" high number of tunnels" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72 @@ -1181,10 +1154,9 @@ msgid "Tomcat 6.0.37" msgstr "Tomcat 6.0.37" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75 -msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" -msgstr "" -"Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, " -"Spagnolo" +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" +msgstr "Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, Spagnolo" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76 msgid "New Turkish translation" @@ -1201,19 +1173,16 @@ msgstr "Reelase 0.9.7.1" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10 msgid "" -"This unscheduled release disables the RouterInfo verification messages " -"that were used in the attack published in the UCSB paper, which should " -"make correlating a LeaseSet and a Router much more difficult. We have " -"also included a limited number of other fixes listed below. Our 0.9.8 " -"release, which will include IPv6 support, is still on-schedule for late " -"September." +"This unscheduled release disables the RouterInfo verification messages that " +"were used in the attack published in the UCSB paper, which should make " +"correlating a LeaseSet and a Router much more difficult. We have also " +"included a limited number of other fixes listed below. Our 0.9.8 release, " +"which will include IPv6 support, is still on-schedule for late September." msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12 msgid "As usual, we recommend that all users update to this release." -msgstr "" -"Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a" -" questa versione." +msgstr "Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a questa versione." #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:18 msgid "Disable RouterInfo verification messages" @@ -1258,16 +1227,17 @@ msgstr "Release 0.9.8" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10 msgid "" -"0.9.8 includes the long-awaited support for IPv6. It's enabled by " -"default, but of course you need a public IPv6 address to use it. " -"Configuration is on the 'network' configuration tab in your console. We " -"also have anonymity improvements including padding of SSU packets and " -"longer router private keys." +"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, " +"but of course you need a public IPv6 address to use it. Configuration is on " +"the 'network' configuration tab in your console. We also have anonymity " +"improvements including padding of SSU packets and longer router private " +"keys." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12 #, python-format -msgid "30%(pc)s of you will update via in-network torrent in this update cycle." +msgid "" +"30%(pc)s of you will update via in-network torrent in this update cycle." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14 @@ -1276,41 +1246,30 @@ msgstr "Dettagli su IPv6" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16 msgid "" -"IPv6 is enabled and preferred by default. If you have a public IPv6 " -"address \n" -"and you are connecting to another router with a published IPv6 address, " -"it will \n" -"connect via IPv6. There is a new IPv6 configuration section on /confignet" -" in \n" +"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n" +"and you are connecting to another router with a published IPv6 address, it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n" "the router console. If IPv6 is causing problems you may disable it there." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23 msgid "" "As a part of the IPv6 development effort, I2P now supports multiple \n" -"published IP addresses. If you have multiple public IP addresses (IPv4, " -"IPv6, \n" -"or both), you may enable or disable them individually on /confignet. The" -" \n" -"default is to use the first IPv4 and IPv6 addresses it discovers. If you " -"have \n" -"multiple addresses you should review the configuration on /confignet and " -"adjust \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n" +"multiple addresses you should review the configuration on /confignet and adjust \n" "it if necessary.\n" -"Note that while you may enable multiple IPv4 and IPv6 addresses on " -"/confignet,\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n" "we recommend that you use only one IPv4 and one IPv6 address. There are\n" "bugs still to be fixed with multiple addresses of each type." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35 msgid "" -"While IPv6 support was designed and developed over several years, it has" -" \n" -"only been tested by a limited number of users and is still beta. If you " -"do have \n" -"a public IPv6 address, please monitor your router and the logs for " -"problems, \n" +"While IPv6 support was designed and developed over several years, it has \n" +"only been tested by a limited number of users and is still beta. If you do have \n" +"a public IPv6 address, please monitor your router and the logs for problems, \n" "and disable it necessary. Please report any bugs on \n" "http://trac.i2p2.i2p." msgstr "" @@ -1321,26 +1280,19 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45 msgid "" -"For those of you running I2P on faster hardware (generally, 64-bit x86) " -"the \n" -"router will generate a new identity using longer keys. This will " -"substantially \n" -"reduce your participating traffic for 48 hours or more, while your router" -" \n" -"re-integrates into the network. Due to the new keys, the large number of" -" \n" +"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n" +"router will generate a new identity using longer keys. This will substantially \n" +"reduce your participating traffic for 48 hours or more, while your router \n" +"re-integrates into the network. Due to the new keys, the large number of \n" "torrent updates, and the recent network growth, we expect substantial \n" -"disruption to the network for a week or more after the update is " -"released. \n" +"disruption to the network for a week or more after the update is released. \n" "Please be patient and things should start to improve after a few days." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55 msgid "" -"These changes may result in higher CPU usage for some of you. We're doing" -" \n" -"our best to increase efficiency, but stronger security generally requires" -" more \n" +"These changes may result in higher CPU usage for some of you. We're doing \n" +"our best to increase efficiency, but stronger security generally requires more \n" "computation. Performance may also be poor during the first week\n" "due to the network churn.\n" "We will evaluate the network performace before deciding whether to\n" @@ -1349,10 +1301,8 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64 msgid "" -"We are experiencing rapid network growth in the last few weeks, which is" -" \n" -"causing a bit of a bumpy ride for some, especially on weekends. However, " -"the \n" +"We are experiencing rapid network growth in the last few weeks, which is \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, the \n" "network is still performing fairly well, so keep spreading the word." msgstr "" @@ -1364,14 +1314,10 @@ msgstr "" msgid "" "We're in the initial stages of desiging major changes to strengthen our \n" "crypto. Stronger crypto will use more CPU and it may possibly \n" -"require a Java 7 JRE at a minimum. We understand your desire to run I2P " -"on low-power \n" -"and/or older hardware. We're working hard to minimize the impacts, but " -"some \n" -"loss of performance is inevitable. In addition, Java 5 and 6 are no " -"longer \n" -"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " -"in \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n" "minimum requirements will be announced well in advance." msgstr "" @@ -1398,8 +1344,7 @@ msgid "" "Last weekend, echelon attended the CTS IV conference in Berlin and\n" "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" "Several of us will be at 30C3 in Hamburg late this year.\n" -"It's great to see people participating at these events and representing " -"I2P." +"It's great to see people participating at these events and representing I2P." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106 @@ -1427,7 +1372,8 @@ msgid "Fix occasional runtime exception in NTCP" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 -msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgid "" +"Big rework of transport code to accommodate multiple addresses and IPv6" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 @@ -1435,16 +1381,15 @@ msgid "Streaming: Improved recovery from lost acks, other fixes" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 -msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgid "" +"Use Transifex for translation of initial news and HTTP proxy error pages" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 msgid "" -"Translation updates: Chinese, French, German, Portuguese, Russian, " -"Swedish, Turkish" -msgstr "" -"Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, " -"Svedese, Turco" +"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, " +"Turkish" +msgstr "Aggiornamento traduzioni: Cinese, Francese, Tedesco, Portoghese, Russo, Svedese, Turco" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125 msgid "New Romanian translation" @@ -1461,9 +1406,9 @@ msgstr "Release 0.9.8.1" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9 msgid "" -"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some " -"people. New installs and non-Windows platforms are not affected, however " -"all platforms will automatically update even if running 0.9.8." +"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. " +"New installs and non-Windows platforms are not affected, however all " +"platforms will automatically update even if running 0.9.8." msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11 @@ -1474,10 +1419,8 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20 msgid "" -"Due to recent attacks, logins are disabled on `Trac`_ and new " -"registrations are\n" -"disabled on `zzz.i2p`_. Until those services are restored, please report " -"all\n" +"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n" +"disabled on `zzz.i2p`_. Until those services are restored, please report all\n" "bugs on IRC freenode or IRC2P #i2p-dev." msgstr "" @@ -1490,9 +1433,9 @@ msgstr "Release 0.9.9" msgid "" "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and " "starts work on a year-long plan to increase the strength of the " -"cryptographic signing algorithms used in the router, and support multiple" -" algorithms and key lengths simultaneously. Automatic update files will " -"now be signed with 4096-bit RSA keys." +"cryptographic signing algorithms used in the router, and support multiple " +"algorithms and key lengths simultaneously. Automatic update files will now " +"be signed with 4096-bit RSA keys." msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11 @@ -1504,8 +1447,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release.\n" +"The best way to maintain security and help the network is to run the latest release.\n" "Several members of the I2P team will be at 30C3 in Hamburg this year.\n" "Come say hello and ask for an I2P sticker.\n" "Thanks to everyone for their support this year." @@ -1621,8 +1563,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62 msgid "" -"Extend router info expiration and other changes to reduce load on " -"floodfills" +"Extend router info expiration and other changes to reduce load on floodfills" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63 @@ -1659,11 +1600,9 @@ msgstr "Nuova traduzione in Giapponese (parziale)" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71 msgid "" -"Translation updates: French, German, Italian, Romanian, Russian, Spanish," -" Swedish, and others" -msgstr "" -"Aggiornamento traduzioni in Francese, Tedesco, Italiano, Romeno, Russo, " -"Spagnolo, Svedese ed altre" +"Translation updates: French, German, Italian, Romanian, Russian, Spanish, " +"Swedish, and others" +msgstr "Aggiornamento traduzioni in Francese, Tedesco, Italiano, Romeno, Russo, Spagnolo, Svedese ed altre" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73 msgid "Wrapper 3.5.22 (new installs and PPA only)" @@ -1674,10 +1613,7 @@ msgid "" "=====================\n" "Syndie 1.105b Release\n" "=====================" -msgstr "" -"=====================\n" -"Release di Syndie 1.105b\n" -"=====================" +msgstr "=====================\nRelease di Syndie 1.105b\n=====================" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:10 msgid "Update to HSQLDB 2.3.1" @@ -1704,19 +1640,15 @@ msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26 msgid "" "If you have a large database or an identity you wish to preserve,\n" -"you may wish to back up your entire ~/.syndie directory before you start." -"\n" -"The upgrade process does make its own backup, however you may find it " -"easier to use your own backup if the upgrade fails." +"you may wish to back up your entire ~/.syndie directory before you start.\n" +"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32 msgid "" -"Upgrades from 1.103b may fail for some people due to database corruption " -"due to bugs in the old HSQLDB.\n" +"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n" "Unfortunately, we don't know how to fix it.\n" -"Your alternatives are to start over with a clean database, or stay with " -"1.103b forever.\n" +"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n" "Sorry about that." msgstr "" @@ -1724,8 +1656,7 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release." +"The best way to maintain security and help the network is to run the latest release." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57 @@ -1785,6 +1716,8 @@ msgstr "Nuove traduzioni" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58 msgid "Translation updates" msgstr "Aggiornamenti traduzione" @@ -1793,10 +1726,7 @@ msgid "" "==============\n" "0.9.10 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.10\n" -"==============" +msgstr "==============\nRelease 0.9.10\n==============" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:10 msgid "" @@ -1806,19 +1736,15 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12 msgid "" -"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more " -"difficult for an attacker\n" -"to correlate a Destination with a Router. It also fixes character " -"encoding bugs in susimail,\n" +"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n" +"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n" "and includes lots of other bug fixes and translation updates.\n" -"Most of you will update via torrent, using the new \"su3\" update format " -"with stronger keys." +"Most of you will update via torrent, using the new \"su3\" update format with stronger keys." msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19 msgid "" -"We recently attended `30C3`__ and `Real World Crypto`__, making several " -"new\n" +"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n" "connections and formulating `big plans`__ for 2014. Thanks to those who\n" "supported our attendance with their `donations`__!" msgstr "" @@ -1829,8 +1755,8 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43 msgid "" -"Flood netdb stores to new location before midnight to prevent lookup " -"fails after midnight" +"Flood netdb stores to new location before midnight to prevent lookup fails " +"after midnight" msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44 @@ -1896,10 +1822,7 @@ msgid "" "==============\n" "0.9.11 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.11\n" -"==============" +msgstr "==============\nRelease 0.9.11\n==============" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:10 msgid "" @@ -1910,24 +1833,19 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12 #, python-format msgid "" -"0.9.11 continues improving LeaseSet lookup and storage to prevent an " -"attacker\n" +"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n" "from correlating a Destination with a Router. It adds support for the\n" "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n" -"reduction in memory usage due to fixes in the transports. We have some " -"I2CP\n" +"reduction in memory usage due to fixes in the transports. We have some I2CP\n" "protocol improvements that will provide better lookup facilities and\n" -"authorization protection for external clients. Of course, there's also " -"the\n" +"authorization protection for external clients. Of course, there's also the\n" "usual collection of bug fixes. All users should update." msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22 msgid "" -"This may be the last release that works with Java 5, which is very old " -"and\n" -"unsupported. If you are using a Java 5 or 6 runtime, we strongly " -"recommend that\n" +"This may be the last release that works with Java 5, which is very old and\n" +"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n" "you upgrade to Java 7." msgstr "" @@ -1969,13 +1887,12 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28 msgid "" "As usual, we recommend that you update to this release. The best way to\n" "maintain security and help the network is to run the latest release." -msgstr "" -"Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a" -" questa versione. Il modo migliore per essere anonimi ed aiutare gli " -"altri ad esserlo è eseguire un software aggiornato." +msgstr "Come sempre consigliamo ad ogni utente di aggiornare il proprio sistema a questa versione. Il modo migliore per essere anonimi ed aiutare gli altri ad esserlo è eseguire un software aggiornato." #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40 msgid "More leaseset handling improvements" @@ -2007,8 +1924,8 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53 msgid "" -"Stricter I2CP authorization enforcement of external clients (incompatible" -" change)" +"Stricter I2CP authorization enforcement of external clients (incompatible " +"change)" msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54 @@ -2028,30 +1945,25 @@ msgid "" "=========================\n" "Malware at i2pbrowser.net\n" "=========================" -msgstr "" -"=========================\n" -"Malware su i2pbrowser.net\n" -"=========================" +msgstr "=========================\nMalware su i2pbrowser.net\n=========================" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9 msgid "" -"The site i2pbrowser.net is a fake I2P website mirror serving up malware " -"for Windows." +"The site i2pbrowser.net is a fake I2P website mirror serving up malware for " +"Windows." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11 msgid "" -"We have recently been made aware of the existence of i2pbrowser.net. This" -"\n" -"website copies our homepage and download page, and attempts to trick " -"users into\n" +"We have recently been made aware of the existence of i2pbrowser.net. This\n" +"website copies our homepage and download page, and attempts to trick users into\n" "downloading Windows malware." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17 msgid "" -"There are several indicators that point to i2pbrowser.net being a malware" -" site:" +"There are several indicators that point to i2pbrowser.net being a malware " +"site:" msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21 @@ -2060,29 +1972,26 @@ msgstr "Il dominio è stato registrato il 10 febbraio 2014." #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22 msgid "" -"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to " -"the same .exe file." +"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the " +"same .exe file." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23 -msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." +msgid "" +"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25 msgid "" -"We have not examined the malware ourselves, but it does not appear to be " -"very\n" -"sophisticated; it is not integrated into or bundled with the I2P " -"software.\n" -"Information security expert `Lance James`__ posted `a tweet`__ labelling " -"it as\n" +"We have not examined the malware ourselves, but it does not appear to be very\n" +"sophisticated; it is not integrated into or bundled with the I2P software.\n" +"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n" "\"a standard dark comet rat\"." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35 msgid "" -"Spread the word. The only official download locations for I2P are linked " -"on our\n" +"Spread the word. The only official download locations for I2P are linked on our\n" "`download page`__. All I2P download packages are GPG-signed by the\n" "`release signing key`__." msgstr "" @@ -2092,10 +2001,7 @@ msgid "" "================================================================\n" "Search Engine DuckDuckGo Awards Invisible Internet Project $5000\n" "================================================================" -msgstr "" -"================================================================\n" -"Search Engine DuckDuckGo Awards Invisible Internet Project $5000\n" -"================================================================" +msgstr "================================================================\nSearch Engine DuckDuckGo Awards Invisible Internet Project $5000\n================================================================" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:10 msgid "" @@ -2106,31 +2012,21 @@ msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12 msgid "" "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n" -"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly" -" open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" -"on the DuckDuckGo community portal. With an emphasis on privacy, " -"DuckDuckGo provides a search\n" -"engine which does not track its users or store personal data. I2P is an " -"anonymous network intended to\n" -"protect individuals from dragnet surveillance regularly performed by ISPs" -" and governments." +"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" +"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n" +"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n" +"protect individuals from dragnet surveillance regularly performed by ISPs and governments." msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46 msgid "" -"This marks the single largest donation ever received by I2P and reflects " -"a growing interest in\n" -"privacy and security by the Internet community. The funding will help I2P" -" to reach more users, expand\n" -"development, and audit the code. It will also enable I2P developers to " -"attend conferences, such\n" -"as the `Real-World Cryptography`__ conference in New York City, where the" -" developers met and\n" -"collaborated with cryptography experts pursuant to I2P's goals of " -"providing anonymity to the\n" +"This marks the single largest donation ever received by I2P and reflects a growing interest in\n" +"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n" +"development, and audit the code. It will also enable I2P developers to attend conferences, such\n" +"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n" +"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n" "public." msgstr "" @@ -2151,10 +2047,7 @@ msgid "" "==============\n" "0.9.12 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.12\n" -"==============" +msgstr "==============\nRelease 0.9.12\n==============" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:11 msgid "0.9.12 adds support for ECDSA and updates to Jetty 8" @@ -2164,34 +2057,28 @@ msgstr "" msgid "" "I2P now requires Java 6 or higher.\n" "We strongly recommend that you upgrade to Java 7.\n" -"If you are still using Java 5, you must upgrade your Java before " -"installing I2P 0.9.12." +"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19 msgid "" "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n" -"It contains several fixes for the handling of Delivery Status Messages " -"(acknowledgements)\n" +"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n" "and those messages are now end-to-end encrypted for increased security." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24 msgid "" "We have upgraded to Jetty 8.\n" -"Jetty 8 is almost identical to Jetty 7, so there are no complex " -"configuration file conversions as there have been in past Jetty upgrades." -"\n" +"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n" "No manual changes should be necessary." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35 msgid "" "In early March, Internet search company `DuckDuckGo`__ `donated`__\n" -"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly " -"open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" +"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" "on the DuckDuckGo community portal." msgstr "" @@ -2246,7 +2133,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88 -msgid "Reduce target connection count again to reduce tunnel reject rate further" +msgid "" +"Reduce target connection count again to reduce tunnel reject rate further" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89 @@ -2286,10 +2174,7 @@ msgid "" "==============\n" "0.9.13 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.13\n" -"==============" +msgstr "==============\nRelease 0.9.13\n==============" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:11 msgid "0.9.13 with SusiMail improvements and fixes for firewalled routers" @@ -2297,10 +2182,8 @@ msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13 msgid "" -"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, " -"and a big SusiMail update.\n" -"Of course, there's also the usual collection of bug fixes and translation" -" updates." +"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n" +"Of course, there's also the usual collection of bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23 @@ -2390,10 +2273,7 @@ msgid "" "==============\n" "0.9.14 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.14\n" -"==============" +msgstr "==============\nRelease 0.9.14\n==============" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:11 msgid "0.9.14 includes critical security fixes" @@ -2401,30 +2281,24 @@ msgstr "La versione 0.9.14 contiene delle correzioni a falle di sicurezza critic #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13 msgid "" -"0.9.14 includes critical fixes for XSS and remote execution " -"vulnerabilities reported by Exodus Intelligence.\n" -"As an added precaution, we have disabled several advanced configuration " -"features in the router console,\n" +"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n" +"As an added precaution, we have disabled several advanced configuration features in the router console,\n" "including installation of new plugins.\n" "We plan to re-enable these in a future release after additional review." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20 msgid "" -"Due to I2P library changes, I2P-Bote users must upgrade their plugin to " -"version 0.2.10 to work with I2P 0.9.14.\n" -"Your router should update the plugin automatically after the router " -"restarts." +"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n" +"Your router should update the plugin automatically after the router restarts." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25 msgid "" -"The release also contains several bug fixes in i2ptunnel, i2psnark, and " -"other areas,\n" +"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n" "and updates to the latest Jetty, Tomcat, and Wrapper.\n" "We've also implemented a faster and more secure method for reseeding.\n" -"Of course, there's also the usual collection of minor bug fixes and " -"translation updates." +"Of course, there's also the usual collection of minor bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32 @@ -2475,14 +2349,14 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55 msgid "" -"Several i2psnark improvements and fixes (GUI and DHT), including changes " -"for better compatibility with Vuze" +"Several i2psnark improvements and fixes (GUI and DHT), including changes for" +" better compatibility with Vuze" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60 msgid "" -"Reseeding now fetches a signed zip file containing router infos for " -"security and speed" +"Reseeding now fetches a signed zip file containing router infos for security" +" and speed" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61 @@ -2495,8 +2369,8 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63 msgid "" -"Per-message reliabilitiy settings in I2CP and error propagation back from" -" router to client" +"Per-message reliabilitiy settings in I2CP and error propagation back from " +"router to client" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64 @@ -2520,10 +2394,7 @@ msgid "" "================\n" "0.9.14.1 Release\n" "================" -msgstr "" -"================\n" -"Reelase 0.9.14.1\n" -"================" +msgstr "================\nReelase 0.9.14.1\n================" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:11 msgid "0.9.14.1 includes i2psnark and console fixes" @@ -2531,33 +2402,23 @@ msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13 msgid "" -"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some" -" other web forms.\n" -"We've restored the ability to install plugins via the console, but you " -"must first edit your router.config file\n" -"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the " -"line routerconsole.enablePluginInstall=true.\n" -"Other rarely-used advanced features that were removed in 0.9.14 may be " -"restored by adding the line routerconsole.advanced=true." +"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n" +"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n" +"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n" +"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20 msgid "" -"As usual, if configured with the default \"Download and Verify\", the " -"router will automatically download the update and display a button to " -"restart.\n" -"However, due to a bug in 0.9.14, if your update is configured for " -"\"Notify only\", the download button will not be displayed.\n" -"You must change your configuration to \"Download and Verify\" or " -"\"Download, Verify, and Restart\" to update." +"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n" +"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n" +"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26 msgid "" -"If you are still running 0.9.13 or older, we recommend that you update to" -" this release as soon as possible.\n" -"If you don't often check your router console, please consider changing " -"your configuration to \"Download, Verify, and Restart\"\n" +"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n" +"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n" "to ensure you are always running the latest release." msgstr "" @@ -2601,10 +2462,7 @@ msgid "" "==============================\n" "The birth of Privacy Solutions\n" "==============================" -msgstr "" -"==============================\n" -"Nascita di Privacy Solutions\n" -"==============================" +msgstr "==============================\nNascita di Privacy Solutions\n==============================" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:11 msgid "Organization launch" @@ -2614,10 +2472,7 @@ msgstr "" msgid "" "Hello all!\n" "\n" -"Today we announce the Privacy Solutions project, a new organization that " -"develops and maintains I2P software. Privacy Solutions includes several " -"new development efforts designed to enhance the privacy, security, and " -"anonymity for users, based on I2P protocols and technology.\n" +"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n" "\n" "These efforts include\n" "\n" @@ -2627,40 +2482,23 @@ msgid "" "4) The Anoncoin crypto-coin project.\n" "5) The Monero crypto-coin project.\n" "\n" -"Privacy Solutions' initial funding was provided by the supporters of the " -"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-" -"profit type of organization registered within the Norwegian government " -"registers. ( Kind of like US 501(c)3. )\n" +"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n" "\n" -"Privacy Solutions plans to apply for funding from the Norwegian goverment" -" for network research, because of BigBrother (We'll get back to what that" -" is) and the coins that are planned to use low-latency networks as " -"primary transport layer. Our research will support advances in software " -"technology for anonymity, security, and privacy.\n" +"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n" "\n" "\n" -"First a little bit about the Abscond Browser Bundle. This was first a " -"one-man project by Meeh, but later on friends started sending patches, " -"the project is now trying to create the same easy access to I2P as Tor " -"has with their browser bundle. Our first release isn't far away, it's " -"just some gitian script tasks left, including setup of the Apple " -"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C" -" struct keeping vital proces information about an process) from the Java " -"instance to check on I2P before we declare it stable. I2pd will also " -"switch with the Java version once it's ready, and there is no point in " -"shipping a JRE in the bundle anymore. You can read more about the Abscond" -" Browser Bundle at https://hideme.today/dev" +"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev" msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35 msgid "" -"We would also like to inform of the current status of i2pd. I2pd supports" -" bi-directional streaming now, that allows to use not only HTTP but long-" -"lived communication channels. Instant IRC support has been added. I2pd " -"users are able to use it same way as Java I2P for access to I2P IRC " -"network. I2PTunnel is one of key features of I2P network, allowing non-" -"I2P applications communicate transparently. That's why it's vital feature" -" for i2pd and one of key milestones." +"We would also like to inform of the current status of i2pd. I2pd supports " +"bi-directional streaming now, that allows to use not only HTTP but long-" +"lived communication channels. Instant IRC support has been added. I2pd users" +" are able to use it same way as Java I2P for access to I2P IRC network. " +"I2PTunnel is one of key features of I2P network, allowing non-I2P " +"applications communicate transparently. That's why it's vital feature for " +"i2pd and one of key milestones." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39 @@ -2669,18 +2507,17 @@ msgid "" "Bigbrother.i2p, which is a metrics system Meeh made over a year back. " "Recently we noticed that Meeh actually have 100Gb of non-duplicated data " "from nodes reporting in since initial launch. This will also be moved to " -"Privacy Solutions and be rewritten with a NSPOF backend. With this we " -"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-" -"shots ). This will give us a great overview over the network without " -"privacy issues for our end users. The clients filter all data except " -"country, router hash and success rate on tunnel buildings. The name of " -"this service is as always a little joke from Meeh." +"Privacy Solutions and be rewritten with a NSPOF backend. With this we will " +"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). " +"This will give us a great overview over the network without privacy issues " +"for our end users. The clients filter all data except country, router hash " +"and success rate on tunnel buildings. The name of this service is as always " +"a little joke from Meeh." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46 msgid "" -"We have shorted down a bit of the news here, if you're interested in more" -" information please visit https://blog.privacysolutions.no/\n" +"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n" "We're still under construction and more content will come!\n" "\n" "\n" @@ -2704,67 +2541,50 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11 msgid "" -"I2P Android and Bote have been released on Google Play in Norway, as a " -"test run for a future worldwide release." +"I2P Android and Bote have been released on Google Play in Norway, as a test " +"run for a future worldwide release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13 msgid "" -"I2P Android has existed for over three years. In that time, it has " -"evolved from\n" -"a simple test project into a usable, useful Android port of the I2P " -"router. Our\n" -"eventual goal has been to release I2P Android on Google Play, to make it " -"easier\n" -"for users to discover, install and use I2P on their Android devices. " -"After much\n" -"work improving the user interface, fixing bugs and testing, we think that" -" I2P\n" +"I2P Android has existed for over three years. In that time, it has evolved from\n" +"a simple test project into a usable, useful Android port of the I2P router. Our\n" +"eventual goal has been to release I2P Android on Google Play, to make it easier\n" +"for users to discover, install and use I2P on their Android devices. After much\n" +"work improving the user interface, fixing bugs and testing, we think that I2P\n" "Android is finally ready to go where the users are." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22 msgid "" -"Initially, we are only releasing to Android users in Norway, as a test " -"run. I2P\n" -"Android will have far more exposure on Google Play than it has ever had " -"before,\n" -"and there will be bugs and usability issues that we need to fix. It will " -"be much\n" -"easier (and less stressful!) to respond to feedback if we only need to " -"deal with\n" -"reports from hundreds of users instead of thousands (already orders of " -"magnitude\n" +"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n" +"Android will have far more exposure on Google Play than it has ever had before,\n" +"and there will be bugs and usability issues that we need to fix. It will be much\n" +"easier (and less stressful!) to respond to feedback if we only need to deal with\n" +"reports from hundreds of users instead of thousands (already orders of magnitude\n" "more feedback than we have ever had)." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31 msgid "" -"Simultaneously we are making the first public release of Bote, an Android" -" port\n" -"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. " -"It runs\n" -"on top of the I2P network, and while it works as a standalone app, it " -"will use\n" +"Simultaneously we are making the first public release of Bote, an Android port\n" +"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n" +"on top of the I2P network, and while it works as a standalone app, it will use\n" "the I2P Android app by default if installed. As with I2P Android, we are\n" "initially only releasing Bote to Android users in Norway." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41 msgid "" -"The apps are being released on Google Play by `The Privacy Solutions " -"Project`__.\n" -"See their `blog post`__ for further information, and links to the Google " -"Play\n" +"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n" +"See their `blog post`__ for further information, and links to the Google Play\n" "page for Norway users." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50 msgid "" -"As lead developer for I2P Android and Bote, I look forward to your " -"comments. You\n" -"are the people who will be using them, and your perspectives will help me" -" craft\n" +"As lead developer for I2P Android and Bote, I look forward to your comments. You\n" +"are the people who will be using them, and your perspectives will help me craft\n" "simple, intuitive apps that make privacy accessible to everyone." msgstr "" @@ -2774,28 +2594,22 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59 msgid "" -"We have also updated I2P Android on the website to match the release " -"candidate\n" -"deployed in Norway. This version will be updated with changes as we " -"respond to\n" +"We have also updated I2P Android on the website to match the release candidate\n" +"deployed in Norway. This version will be updated with changes as we respond to\n" "feedback from Norwegian users, heading towards our next stable release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65 msgid "" -"Please note that we have upgraded the Android API to 9. This means that " -"Froyo\n" -"Android 2.2 will not be supported anymore; the minimum requirement is now" -"\n" +"Please note that we have upgraded the Android API to 9. This means that Froyo\n" +"Android 2.2 will not be supported anymore; the minimum requirement is now\n" "Gingerbread Android 2.3." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71 msgid "" -"Also note that if you have an earlier version of I2P Android, you will " -"need to\n" -"uninstall and reinstall because we have changed the release keys. Further" -"\n" +"Also note that if you have an earlier version of I2P Android, you will need to\n" +"uninstall and reinstall because we have changed the release keys. Further\n" "information about this will be provided in a subsequent blog post." msgstr "" @@ -2804,10 +2618,7 @@ msgid "" "==============\n" "0.9.15 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.15\n" -"==============" +msgstr "==============\nRelease 0.9.15\n==============" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:11 msgid "0.9.15 includes Ed25519 crypto and many fixes" @@ -2816,31 +2627,23 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13 msgid "" "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n" -"It includes a new persistent configuration backend for i2psnark and fixes" -" several issues with i2psnark's handling of file names.\n" +"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n" "There are several improvements to speed up SAM.\n" "Plugins now support stronger signatures in the su3 file format.\n" -"Plugin installation via the console, which was disabled in 0.9.14, is re-" -"enabled." +"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21 msgid "" -"We have supported ECDSA signatures since 0.9.12, and we would like to " -"start using ECDSA by default.\n" -"Unfortunately, some of you are still running older I2P versions, and for " -"others,\n" +"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n" +"Unfortunately, some of you are still running older I2P versions, and for others,\n" "their distribution or Java runtime does not support ECDSA. Red Hat\n" "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n" "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n" -"others have had success with installing the \"unlimited strength policy " -"files\".\n" -"We've added information about missing crypto to the log file and the " -"/logs page in the console.\n" -"After you update to 0.9.15, please check if you are missing ECDSA " -"support, and attempt to fix it if necessary.\n" -"This is particularly important for those that run popular eepsites and " -"services." +"others have had success with installing the \"unlimited strength policy files\".\n" +"We've added information about missing crypto to the log file and the /logs page in the console.\n" +"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n" +"This is particularly important for those that run popular eepsites and services." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42 @@ -2877,6 +2680,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36 msgid "Changes" msgstr "Modifiche" @@ -2948,8 +2753,8 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68 msgid "" -"i2ptunnel add support for local SSL connections for standard and IRC " -"client tunnels" +"i2ptunnel add support for local SSL connections for standard and IRC client " +"tunnels" msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69 @@ -2975,10 +2780,7 @@ msgid "" "==============\n" "0.9.16 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.16\n" -"==============" +msgstr "==============\nRelease 0.9.16\n==============" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:11 msgid "0.9.16 includes crypto migration and many fixes" @@ -2989,26 +2791,21 @@ msgid "" "0.9.16 is a significant step forward in our plan to migrate\n" "from DSA to ECDSA and then EdDSA cryptographic signatures,\n" "and makes several other changes to increase your anonymity and security.\n" -"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures" -" by default.\n" -"In addition, we've fixed a large number of serious bugs, including " -"console lockups." +"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n" +"In addition, we've fixed a large number of serious bugs, including console lockups." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21 msgid "" -"Changes in router data structures will require i2pcontrol plugin users to" -" update to version 0.0.9." +"Changes in router data structures will require i2pcontrol plugin users to " +"update to version 0.0.9." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25 msgid "" -"If you run an eepsite or a service and you are not running a recent " -"release,\n" -"or your Java or OS does not support ECDSA (as noted in the logs and on " -"the /logs page in the console),\n" -"please fix the issue as soon as possible or your users will soon be " -"unable to connect." +"If you run an eepsite or a service and you are not running a recent release,\n" +"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n" +"please fix the issue as soon as possible or your users will soon be unable to connect." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42 @@ -3021,8 +2818,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44 msgid "" -"Require I2CP authorization for all messages when enabled (requires 0.9.11" -" or higher client)" +"Require I2CP authorization for all messages when enabled (requires 0.9.11 or" +" higher client)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45 @@ -3041,8 +2838,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48 msgid "" -"New column sorting, set-all priority buttons, and upload ratio display in" -" i2psnark" +"New column sorting, set-all priority buttons, and upload ratio display in " +"i2psnark" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49 @@ -3103,14 +2900,14 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71 msgid "" -"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol" -" plugin)" +"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol " +"plugin)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72 msgid "" -"New router keys now stored in router.keys.dat (eepPriv.dat format) " -"instead of router.keys" +"New router keys now stored in router.keys.dat (eepPriv.dat format) instead " +"of router.keys" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73 @@ -3145,8 +2942,7 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80 msgid "" -"Change eepsite Jetty threadpool and queue configuration (new installs " -"only)" +"Change eepsite Jetty threadpool and queue configuration (new installs only)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81 @@ -3158,10 +2954,7 @@ msgid "" "==============\n" "0.9.17 Release\n" "==============" -msgstr "" -"==============\n" -"Reelase 0.9.17\n" -"==============" +msgstr "==============\nReelase 0.9.17\n==============" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:11 msgid "0.9.17 with more crypto migration and many fixes" @@ -3169,39 +2962,34 @@ msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13 msgid "" -"0.9.17 is primarily a bugfix release, but it also continues our migration" -" to stronger cryptographic signatures." +"0.9.17 is primarily a bugfix release, but it also continues our migration to" +" stronger cryptographic signatures." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17 msgid "" -"We have moved the news feed system used for the news on your console and " -"the latest router version indication\n" +"We have moved the news feed system used for the news on your console and the latest router version indication\n" "to a signed format using RSA 4096-bit keys for enhanced security." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22 msgid "" -"New eepsites and servers will be ECDSA-signed by default, if ECDSA is " -"available.\n" +"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n" "There is now a warning in the console sidebar if ECDSA is not available.\n" -"For RedHat users, we have reports of successful installs of the " -"BouncyCastle Provider (bcprov) jar to add ECDSA support." +"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28 msgid "" -"We've fixed several serious bugs, including an SSU packet corruption " -"problem,\n" +"We've fixed several serious bugs, including an SSU packet corruption problem,\n" "and a SAM bug affecting i2p-messenger and other SAM applications.\n" -"There are several fixes for the preliminary ECDSA router signatures added" -" in the last release but not yet enabled." +"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34 msgid "" -"Many of us will be attending 31C3 in Hamburg in December. Stop by our " -"table and say hi!" +"Many of us will be attending 31C3 in Hamburg in December. Stop by our table " +"and say hi!" msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49 @@ -3297,23 +3085,18 @@ msgid "" "====================\n" "Android app releases\n" "====================" -msgstr "" -"====================\n" -"Rilasci della app Android\n" -"====================" +msgstr "====================\nRilasci della app Android\n====================" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11 msgid "" -"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google" -" Play and F-Droid." +"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google " +"Play and F-Droid." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13 msgid "" -"It has been some time since I last posted updates about our Android " -"development,\n" -"and several I2P releases have gone by without any matching Android " -"releases.\n" +"It has been some time since I last posted updates about our Android development,\n" +"and several I2P releases have gone by without any matching Android releases.\n" "At last, the wait is over!" msgstr "" @@ -3321,53 +3104,35 @@ msgstr "" msgid "" "New app versions\n" "----------------" -msgstr "" -"Nuove versioni della app\n" -"----------------" +msgstr "Nuove versioni della app\n----------------" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24 msgid "" -"New versions of I2P Android and Bote have been released! They can be " -"downloaded\n" +"New versions of I2P Android and Bote have been released! They can be downloaded\n" "from these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35 msgid "" -"The main change in these releases is the transition to Android's new " -"Material\n" -"design system. Material has made it much easier for app developers with, " -"shall\n" -"we say, \"minimalist\" design skills (like myself) to create apps that " -"are nicer\n" -"to use. I2P Android also updates its underlying I2P router to the just-" -"released\n" -"version 0.9.17. Bote brings in several new features along with many " -"smaller\n" -"improvements; for example, you can now add new email destinations via QR " -"codes." +"The main change in these releases is the transition to Android's new Material\n" +"design system. Material has made it much easier for app developers with, shall\n" +"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n" +"to use. I2P Android also updates its underlying I2P router to the just-released\n" +"version 0.9.17. Bote brings in several new features along with many smaller\n" +"improvements; for example, you can now add new email destinations via QR codes." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44 msgid "" -"As I mentioned in `my last update`__, the release key that signs the apps" -" has\n" -"changed. The reason for this was because we needed to change the package " -"name\n" -"of I2P Android. The old package name (``net.i2p.android.router``) had " -"already\n" -"been taken on Google Play (we still don't know who was using it), and we " -"wanted\n" -"to use the same package name and signing key for all distributions of I2P" -"\n" -"Android. Doing so means that a user could initially install the app from " -"the I2P\n" -"website, and then later if the website was blocked they could upgrade it " -"using\n" -"Google Play. Android OS considers an application to be completely " -"different when\n" -"its package name changes, so we took the opportunity to increase the " -"strength of\n" +"As I mentioned in `my last update`__, the release key that signs the apps has\n" +"changed. The reason for this was because we needed to change the package name\n" +"of I2P Android. The old package name (``net.i2p.android.router``) had already\n" +"been taken on Google Play (we still don't know who was using it), and we wanted\n" +"to use the same package name and signing key for all distributions of I2P\n" +"Android. Doing so means that a user could initially install the app from the I2P\n" +"website, and then later if the website was blocked they could upgrade it using\n" +"Google Play. Android OS considers an application to be completely different when\n" +"its package name changes, so we took the opportunity to increase the strength of\n" "the signing key." msgstr "" @@ -3379,31 +3144,22 @@ msgstr "" msgid "" "Google Play\n" "-----------" -msgstr "" -"Google Play\n" -"-----------" +msgstr "Google Play\n-----------" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73 msgid "" -"A few months ago we `released`__ both I2P Android and Bote on Google Play" -" in\n" -"Norway, to test the release process there. We are pleased to announce " -"that both\n" -"apps are now being released globally by `Privacy Solutions`__. The apps " -"can be\n" +"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n" +"Norway, to test the release process there. We are pleased to announce that both\n" +"apps are now being released globally by `Privacy Solutions`__. The apps can be\n" "found at these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89 msgid "" -"The global release is being done in several stages, starting with the " -"countries\n" -"for which we have translations. The notable exception to this is France; " -"due to\n" -"import regulations on cryptographic code, we are unable yet to distribute" -" these\n" -"apps on Google Play France. This is the same issue that has affected " -"other apps\n" +"The global release is being done in several stages, starting with the countries\n" +"for which we have translations. The notable exception to this is France; due to\n" +"import regulations on cryptographic code, we are unable yet to distribute these\n" +"apps on Google Play France. This is the same issue that has affected other apps\n" "like TextSecure and Orbot." msgstr "" @@ -3411,45 +3167,32 @@ msgstr "" msgid "" "F-Droid\n" "-------" -msgstr "" -"F-Droid\n" -"-------" +msgstr "F-Droid\n-------" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103 msgid "" -"Don't think we have forgotten about you, F-Droid users! In addition to " -"the two\n" -"locations above, we have set up our own F-Droid repository. If you are " -"reading\n" -"this post on your phone, `click here`__ to add it to F-Droid (this only " -"works in\n" -"some Android browsers). Or, you can manually add the URL below to your " -"F-Droid\n" +"Don't think we have forgotten about you, F-Droid users! In addition to the two\n" +"locations above, we have set up our own F-Droid repository. If you are reading\n" +"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n" +"some Android browsers). Or, you can manually add the URL below to your F-Droid\n" "repository list:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115 msgid "" -"If you would like to manually verify the fingerprint (SHA-256) of the " -"repository\n" +"If you would like to manually verify the fingerprint (SHA-256) of the repository\n" "signing key, or type it in when adding the repository, here it is:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124 msgid "" -"Unfortunately the I2P app in the main F-Droid repository has not been " -"updated\n" -"because our F-Droid maintainer has disappeared. We hope that by " -"maintaining this\n" +"Unfortunately the I2P app in the main F-Droid repository has not been updated\n" +"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n" "binary repository, we can better support our F-Droid users and keep them\n" -"up-to-date. If you have already installed I2P from the main F-Droid " -"repository,\n" -"you will need to uninstall it if you want to upgrade, because the signing" -" key\n" -"will be different. The apps in our F-Droid repository are the same APKs " -"that are\n" -"provided on our website and on Google Play, so in future you will be able" -" to\n" +"up-to-date. If you have already installed I2P from the main F-Droid repository,\n" +"you will need to uninstall it if you want to upgrade, because the signing key\n" +"will be different. The apps in our F-Droid repository are the same APKs that are\n" +"provided on our website and on Google Play, so in future you will be able to\n" "upgrade using any of these sources." msgstr "" @@ -3468,25 +3211,18 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21 msgid "" -"We were, for the second year in a row, at a great location in the " -"Congress, in\n" -"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square " -"has\n" -"really increased our visibility and helped many people find us. Thanks to" -" Noisy\n" +"We were, for the second year in a row, at a great location in the Congress, in\n" +"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n" +"really increased our visibility and helped many people find us. Thanks to Noisy\n" "Square and the 31C3 organizers for a great Congress." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30 msgid "" -"We also thank Gabriel Weinberg and his fabulous search engine " -"`DuckDuckGo`__ for\n" -"their support of open source anonymity tools and their `generous " -"contribution`__\n" -"to I2P in 2014. Funding from DuckDuckGo and others helped support our " -"attendance\n" -"at CCC. This is the primary annual meetup for I2P developers and it is " -"critical\n" +"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n" +"their support of open source anonymity tools and their `generous contribution`__\n" +"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n" +"at CCC. This is the primary annual meetup for I2P developers and it is critical\n" "to our success." msgstr "" @@ -3498,127 +3234,88 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49 msgid "" -"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved " -"himself\n" -"and the project from TU Munich to `Inria`__ in France. He has a large " -"number of\n" -"`open positions`__. This is a great opportunity to get paid to work on " -"open\n" +"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n" +"and the project from TU Munich to `Inria`__ in France. He has a large number of\n" +"`open positions`__. This is a great opportunity to get paid to work on open\n" "source anonymity tools, we encourage everybody to contact him about it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60 msgid "" -"The prospect of an invigorated GNUnet with a large amount of new funding " -"is\n" -"quite interesting. We discussed more ways to work together. In early " -"2014, we\n" -"worked hard to understand the GnuNet DNS replacement, but we were unable " -"to\n" -"figure out a good fit for it in I2P. One of his new ideas is a " -"distributed,\n" -"anonymous statistics gathering subsystem, for detecting problems or " -"attacks on\n" +"The prospect of an invigorated GNUnet with a large amount of new funding is\n" +"quite interesting. We discussed more ways to work together. In early 2014, we\n" +"worked hard to understand the GnuNet DNS replacement, but we were unable to\n" +"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n" +"anonymous statistics gathering subsystem, for detecting problems or attacks on\n" "the network. We'd definitely be interested in that." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69 msgid "" -"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems " -"draft`__.\n" -"A new, greatly simplified version 3 was posted in December. The prospects" -" for\n" +"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n" +"A new, greatly simplified version 3 was posted in December. The prospects for\n" "approval remain unclear. The best way to monitor or participate in the\n" -"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to " -"do so\n" +"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n" "on our side, and also give Hellekin a new point-of-contact for this topic." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80 msgid "" -"We apologized to Christian for not being organized enough to have a talk " -"at his\n" -"`We Fix The Net assembly`__. One of our biggest failures as a project is " -"our\n" -"seeming inability to submit talks at conferences. We'll have to do better" -" in the\n" +"We apologized to Christian for not being organized enough to have a talk at his\n" +"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n" +"seeming inability to submit talks at conferences. We'll have to do better in the\n" "new year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92 msgid "" -"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in " -"with\n" -"other anonymity tools into this new Debian \"superpackage\" of some sort," -" and\n" -"would love to get I2P into Debian in 2015. He claims the process is now " -"easy,\n" +"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n" +"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n" +"would love to get I2P into Debian in 2015. He claims the process is now easy,\n" "just `follow the instructions`__. We said that's funny, we've been\n" "`stuck in the process for over 7 years`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103 msgid "" -"He said, well, try the new process, it works great, should be no problem " -"at all\n" -"if your package is in good shape. The people in Debian that run this " -"process are\n" -"eager volunteers who want nothing more than to get more packages in. We " -"said our\n" -"package is indeed in fantastic shape, and we would try out the new " -"process as\n" -"soon as possible. If all this is true, we will be in the next Debian " -"release in\n" +"He said, well, try the new process, it works great, should be no problem at all\n" +"if your package is in good shape. The people in Debian that run this process are\n" +"eager volunteers who want nothing more than to get more packages in. We said our\n" +"package is indeed in fantastic shape, and we would try out the new process as\n" +"soon as possible. If all this is true, we will be in the next Debian release in\n" "late 2015. This would be very very cool." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115 msgid "" -"We had a nice discussion with BitingBird of Tails. They are very happy " -"with our\n" -"rapid response to the `vulnerability disclosure`__ last summer, resulting" -" in our\n" -"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and " -"they\n" -"took `great offense`__ to that and the lack of private notification. We " -"thanked\n" +"We had a nice discussion with BitingBird of Tails. They are very happy with our\n" +"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n" +"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n" +"took `great offense`__ to that and the lack of private notification. We thanked\n" "them for taking the heat and fighting back." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127 msgid "" -"BitingBird also handles support, and she tells us the number one issue is" -" how\n" -"long I2P takes to start up and be useful for browsing I2P sites. Her " -"standard\n" -"answer is \"wait ten more minutes\" and that seems to be effective. I2P " -"is\n" -"particularly slow to startup on Tails since it does not persist peer data" -" by\n" -"default. It would be nice to change that, but there's also things we can " -"do on\n" -"the I2P side to make things start faster. Expect some improvement in our " -"0.9.18\n" +"BitingBird also handles support, and she tells us the number one issue is how\n" +"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n" +"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n" +"particularly slow to startup on Tails since it does not persist peer data by\n" +"default. It would be nice to change that, but there's also things we can do on\n" +"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n" "release." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140 msgid "" -"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The " -"upcoming\n" -"Tor Hidden Services changes mean that their keys will no longer fit into " -"a\n" -"portion of an IPv6 address, and he was working on a solution. We reminded" -" him\n" -"that this has always been the case for I2P (with \"GarliCat\"), that it's" -" not a\n" -"new problem. He pointed us to `a presentation`__ of his proposal. It " -"involves\n" +"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n" +"Tor Hidden Services changes mean that their keys will no longer fit into a\n" +"portion of an IPv6 address, and he was working on a solution. We reminded him\n" +"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n" +"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n" "storing an extra record in the hidden service directory (equivalent of a\n" -"leaseset I2P's network database). It wasn't completely clear how this " -"would\n" -"work, or if we would consider it abuse of the netDb. We'll follow up with" -" him\n" +"leaseset I2P's network database). It wasn't completely clear how this would\n" +"work, or if we would consider it abuse of the netDb. We'll follow up with him\n" "as he gets further." msgstr "" @@ -3626,29 +3323,19 @@ msgstr "" msgid "" "New users\n" "---------" -msgstr "" -"Nuovi utenti\n" -"---------" +msgstr "Nuovi utenti\n---------" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160 msgid "" -"We spent hours and hours explaining I2P to people stopping by our table. " -"Some\n" -"had heard of I2P before, some had not; everybody had heard of Tor and had" -" at\n" -"least a vague idea of what hidden services are. As usual, introducing " -"people to\n" -"I2P was a struggle. By the end of the Congress, we became convinced that " -"a part\n" -"of the problem was a difference in terminology. Back 12 years ago, when " -"I2P and\n" -"Tor were both getting started, we each came up with terms for the various" -" parts\n" +"We spent hours and hours explaining I2P to people stopping by our table. Some\n" +"had heard of I2P before, some had not; everybody had heard of Tor and had at\n" +"least a vague idea of what hidden services are. As usual, introducing people to\n" +"I2P was a struggle. By the end of the Congress, we became convinced that a part\n" +"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n" +"Tor were both getting started, we each came up with terms for the various parts\n" "of our systems. Today, the Tor terminology such as \"hidden service\" is\n" -"well-understood and commonplace. The I2P terminology such as \"eepsite\" " -"is\n" -"neither. We agreed to review our documentation, router console, and other" -" places\n" +"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n" +"neither. We agreed to review our documentation, router console, and other places\n" "for opportunities to simplify it and use common terms." msgstr "" @@ -3667,66 +3354,65 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182 msgid "" -"* *Toronto meetup:* CCC is such a productive time for us, and it seems " -"that a second meetup in the year would be quite helpful. We have proposed" -" it for August 2015 in Toronto, Canada, in conjunction with `Toronto " -"Crypto`__. It would include developer meetings together with " -"presentations and tutorials, all open to the public. We are attempting to" -" gauge interest and research possible venues. If you are considering " -"attending, please let us know by `tweeting @i2p`__ or posting `on the dev" -" forum thread`__." +"* *Toronto meetup:* CCC is such a productive time for us, and it seems that " +"a second meetup in the year would be quite helpful. We have proposed it for " +"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It " +"would include developer meetings together with presentations and tutorials, " +"all open to the public. We are attempting to gauge interest and research " +"possible venues. If you are considering attending, please let us know by " +"`tweeting @i2p`__ or posting `on the dev forum thread`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190 msgid "" -"* We discussed Meeh's workload and the state of the various services he " -"is running. We made some plans to reduce his load and have some other " -"people help out." +"* We discussed Meeh's workload and the state of the various services he is " +"running. We made some plans to reduce his load and have some other people " +"help out." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194 msgid "" -"* We reviewed our critieria for placing links to `i2pd`__ on our download" -" page. We agreed that the only remaining item is to have a nice page on " -"the `Privacy Solutions web site`__ or elsewhere with binary packages for " +"* We reviewed our critieria for placing links to `i2pd`__ on our download " +"page. We agreed that the only remaining item is to have a nice page on the " +"`Privacy Solutions web site`__ or elsewhere with binary packages for " "Windows, Linux, and Mac, and source packages. It's not clear who is " -"responsible for building the packages and where the \"official\" version " -"is. Once there's an established process for building and signing packages" -" and an official place to put them, we're ready to link to it. If it is " -"not feasible to host it on the Privacy Solutions website, we will discuss" -" alternatives with orignal, including possible migration to our download " +"responsible for building the packages and where the \"official\" version is." +" Once there's an established process for building and signing packages and " +"an official place to put them, we're ready to link to it. If it is not " +"feasible to host it on the Privacy Solutions website, we will discuss " +"alternatives with orignal, including possible migration to our download " "servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201 msgid "" -"* Lots of people coming by the table asked if we had a non-Java version. " -"It was great to finally answer \"yes\" and we're eager to get the word " -"out and get more users, testers, and developers on it." +"* Lots of people coming by the table asked if we had a non-Java version. It " +"was great to finally answer \"yes\" and we're eager to get the word out and " +"get more users, testers, and developers on it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205 msgid "" -"* `Vuze`__ continues to make good progress on their I2P integration. We " -"look forward to working with them in the new year on a managed rollout to" -" more users." +"* `Vuze`__ continues to make good progress on their I2P integration. We look" +" forward to working with them in the new year on a managed rollout to more " +"users." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211 msgid "" "* We discussed the state of Meeh's and Sindu's reseed servers. They made " -"several improvements while at the congress and are investigating " -"migration to `Matt Drollette's Go implementation`__. The security and " -"reliability of our reseed servers is vital to new users and network " -"operation. `User 'backup'`__ is doing a great job monitoring and managing" -" the pool of reseed servers." +"several improvements while at the congress and are investigating migration " +"to `Matt Drollette's Go implementation`__. The security and reliability of " +"our reseed servers is vital to new users and network operation. `User " +"'backup'`__ is doing a great job monitoring and managing the pool of reseed " +"servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218 msgid "" -"* We agreed to purchase a second root server for development, testing, " -"and services. Echelon will be adminstering it. Contact him if you would " -"like a VM." +"* We agreed to purchase a second root server for development, testing, and " +"services. Echelon will be adminstering it. Contact him if you would like a " +"VM." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222 @@ -3737,26 +3423,26 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226 msgid "" -"* We met with Welterde about the state of his services including his " -"`open tracker`__. These services are not being adequately maintained and " -"will soon become inaccessible due to crypto changes if they are not " -"upgraded. He committed to upgrading them soon." +"* We met with Welterde about the state of his services including his `open " +"tracker`__. These services are not being adequately maintained and will soon" +" become inaccessible due to crypto changes if they are not upgraded. He " +"committed to upgrading them soon." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232 msgid "" -"* We met lots of people interested in our `Android app`__. We passed " -"several ideas and bug reports back to str4d. We plan to make a big push " -"to give the app some development love early in the year." +"* We met lots of people interested in our `Android app`__. We passed several" +" ideas and bug reports back to str4d. We plan to make a big push to give the" +" app some development love early in the year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238 msgid "" -"* Regrettably, we didn't get to see too many talks at the Congress, as we" -" were so busy meeting with people. We plan to catch up and `watch them " -"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and" -" Jacob's talk was great. We hear that the cryptography talks were good as" -" well." +"* Regrettably, we didn't get to see too many talks at the Congress, as we " +"were so busy meeting with people. We plan to catch up and `watch them " +"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and " +"Jacob's talk was great. We hear that the cryptography talks were good as " +"well." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1 @@ -3764,10 +3450,7 @@ msgid "" "==============\n" "0.9.18 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.18\n" -"==============" +msgstr "==============\nRelease 0.9.18\n==============" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:11 msgid "0.9.18 with performance improvements and bug fixes" @@ -3776,13 +3459,11 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13 msgid "" "0.9.18 contains several bug fixes and performance improvements.\n" -"We have shortened the startup time, and reduced latency throughout our " -"network protocols.\n" +"We have shortened the startup time, and reduced latency throughout our network protocols.\n" "We've increased the default connection limits for the fastest routers,\n" "and reduced the thread usage in i2ptunnel.\n" "UPnP fixes should improve handling of external device changes.\n" -"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP " -"fixes." +"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33 @@ -3790,7 +3471,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34 -msgid "Fix news last-modified processing which prevented notification of update" +msgid "" +"Fix news last-modified processing which prevented notification of update" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35 @@ -3827,8 +3509,7 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46 msgid "" -"Add startup browser configuration with advanced config " -"routerconsole.browser" +"Add startup browser configuration with advanced config routerconsole.browser" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47 @@ -3880,10 +3561,7 @@ msgid "" "==============\n" "0.9.19 Release\n" "==============" -msgstr "" -"==============\n" -"Reelase 0.9.19\n" -"==============" +msgstr "==============\nReelase 0.9.19\n==============" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:11 msgid "0.9.19 with performance improvements and bug fixes" @@ -3893,21 +3571,16 @@ msgstr "" msgid "" "0.9.19 has several fixes and improvements for floodfill performance.\n" "Many of you saw high CPU usage after 0.9.18 was released.\n" -"This was caused by a combination of increased encryption usage, the big " -"influx of Vuze users into the network,\n" -"reduced floodfills due to tighter performance requirements, and some " -"longstanding bugs.\n" +"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n" +"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n" "Things should be a lot better after most of the network has updated.\n" -"As always, the best way to reduce CPU usage is to lower your bandwidth " -"limits." +"As always, the best way to reduce CPU usage is to lower your bandwidth limits." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21 msgid "" -"We've also added new ways to reseed manually, and to generate a reseed " -"file you can easily share with others who need it.\n" -"See the reseed configuration page in the router console for more " -"information." +"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n" +"See the reseed configuration page in the router console for more information." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35 @@ -3973,7 +3646,8 @@ msgid "Increase min and default bandwidth for i2psnark" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58 -msgid "Improved strategies for dropping jobs on high job lag to prevent overload" +msgid "" +"Improved strategies for dropping jobs on high job lag to prevent overload" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59 @@ -4005,10 +3679,7 @@ msgid "" "==============\n" "0.9.20 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.20\n" -"==============" +msgstr "==============\nRelease 0.9.20\n==============" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:11 msgid "0.9.20 with performance improvements and bug fixes" @@ -4016,35 +3687,28 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13 msgid "" -"0.9.20 contains many important bug fixes, and several changes to increase" -" floodfill capacity in the network." +"0.9.20 contains many important bug fixes, and several changes to increase " +"floodfill capacity in the network." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17 msgid "" -"Routers configured for 32-64 KB of shared bandwidth may now become " -"floodfill,\n" -"and routers configured for 512 KB or more of shared bandwidth will have " -"higher connection limits.\n" +"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n" +"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n" "These changes may cause your router to use more resources.\n" -"If the router becomes too busy, the best way to reduce usage is to lower " -"the bandwidth settings in your console.\n" -"If that doesn't help, you may now disable automatic floodfill on the " -"advanced configuration page in the console." +"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n" +"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25 msgid "" -"We're hopeful that these changes will increase network capacity and " -"performance,\n" -"and reduce the congestion that's been affecting the network the last " -"three months." +"We're hopeful that these changes will increase network capacity and performance,\n" +"and reduce the congestion that's been affecting the network the last three months." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35 msgid "" -"Finally, we're excited to announce our first-ever I2P meetup, in Toronto " -"August 15-16.\n" +"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n" "There will be lots of presentations and tutorials. All are welcome.\n" "For more information, see the `announcement`_." msgstr "" @@ -4063,8 +3727,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53 msgid "" -"Raise connection limits for new classes 'P' (512-2000 KBps share " -"bandwidth) and 'X' (over 2000 KBps)" +"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) " +"and 'X' (over 2000 KBps)" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54 @@ -4076,7 +3740,8 @@ msgid "Clock skew fixes" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62 -msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works" +msgid "" +"Fixes and configuration for when IPv4 is firewalled but IPv6 still works" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63 @@ -4149,8 +3814,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86 msgid "" -"Add Bloom filter warning when configured for high bandwidth but not " -"enough memory" +"Add Bloom filter warning when configured for high bandwidth but not enough " +"memory" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87 @@ -4163,8 +3828,7 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89 msgid "" -"Better error handling and user feedback when HTTP client tunnel is " -"disabled" +"Better error handling and user feedback when HTTP client tunnel is disabled" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90 @@ -4197,19 +3861,13 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13 msgid "" -"The I2P team is proud to announce that we are going to host a meetup in " -"Toronto on August 15-16.\n" -"A number of members of our community will be attending and are going to " -"host talks, workshops and discussions about and relating to I2P. This " -"event is not just for I2P people though, it's meant for everyone." +"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n" +"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18 msgid "" -"If you're curious about I2P, interested in privacy/cryptography/anonymity" -" or just want to come by and talk to us, please do. This is an event for " -"everyone. If you're not familiar with any of these topics, come by anyway" -" and we'll show you how I2P works and what you can do with it.\n" +"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n" "\n" "The event is entirely free, you don't need to sign up or register." msgstr "" @@ -4217,9 +3875,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24 msgid "" "The meetup couldn't have been arranged without our friends at `Toronto " -"Crypto <https://torontocrypto.org/>`_ which have been helping us organize" -" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are" -" providing us with a very nice space." +"Crypto <https://torontocrypto.org/>`_ which have been helping us organize " +"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are " +"providing us with a very nice space." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28 @@ -4247,9 +3905,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55 msgid "" -"The focus will be on an introduction to topics surrounding I2P, privacy " -"and anonymity online. People of all backgrounds and knowledge levels are " -"welcome to attend." +"The focus will be on an introduction to topics surrounding I2P, privacy and " +"anonymity online. People of all backgrounds and knowledge levels are welcome" +" to attend." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59 @@ -4266,9 +3924,9 @@ msgstr "Crypto party" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63 msgid "" -"The crypto party will contain a number of stations where " -"privacy/anonymity software will be demoed. The goal is to provide people " -"with the tools they need to communicate securely." +"The crypto party will contain a number of stations where privacy/anonymity " +"software will be demoed. The goal is to provide people with the tools they " +"need to communicate securely." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67 @@ -4289,11 +3947,10 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72 msgid "" -"We're currently looking for help staffing the stations. If you want to " -"help out, you can! Bring a monitor/laptop and run a station. The station " -"could be any of the ones listed above, or any other privacy/anonymity " -"related one you would like to run. Please contact us at `@geti2p`_ if " -"you're interested." +"We're currently looking for help staffing the stations. If you want to help " +"out, you can! Bring a monitor/laptop and run a station. The station could be" +" any of the ones listed above, or any other privacy/anonymity related one " +"you would like to run. Please contact us at `@geti2p`_ if you're interested." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81 @@ -4303,8 +3960,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86 msgid "" "The focus will be on in-depth topics surrounding I2P, the roadmap and " -"development. Anyone is welcome to attend, but the content will be " -"somewhat technical." +"development. Anyone is welcome to attend, but the content will be somewhat " +"technical." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90 @@ -4340,35 +3997,26 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:14 msgid "" -"I2PCon is the first event of its kind. It has two short term goals. Where" -" the\n" -"first one is to provide the general public with an event where knowledge " -"about\n" -"privacy and privacy concerns can be obtained. The second goal is to " -"further the\n" -"I2P project and its community. This will take the shape of technical " -"discussions\n" +"I2PCon is the first event of its kind. It has two short term goals. Where the\n" +"first one is to provide the general public with an event where knowledge about\n" +"privacy and privacy concerns can be obtained. The second goal is to further the\n" +"I2P project and its community. This will take the shape of technical discussions\n" "about cryptography, anonymity and I2P centric topics." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:22 msgid "" -"There is a larger and more long-term goal of this event, and it is to " -"build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we would like to provide a forum where this " -"community\n" +"There is a larger and more long-term goal of this event, and it is to build a\n" +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we would like to provide a forum where this community\n" "can grow." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:29 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" -"`Toronto Crypto`_. The venue and everything relating to it is provided by" -"\n" -"`Hacklab`_. Without either of them this event would not have been " -"possible, so\n" +"`Toronto Crypto`_. The venue and everything relating to it is provided by\n" +"`Hacklab`_. Without either of them this event would not have been possible, so\n" "thank you both." msgstr "" @@ -4378,12 +4026,9 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:49 msgid "" -"I2PCon is entirely free to attend! We ask you to register `here`__, to " -"give us\n" -"an estimate of how many people will be attending. No identifying " -"information has\n" -"to be given in order to register, but if you have any concerns, please " -"let us\n" +"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n" +"an estimate of how many people will be attending. No identifying information has\n" +"to be given in order to register, but if you have any concerns, please let us\n" "know." msgstr "" @@ -4420,10 +4065,7 @@ msgid "" "==============\n" "0.9.21 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.21\n" -"==============" +msgstr "==============\nRelease 0.9.21\n==============" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:11 msgid "0.9.21 with performance improvements and bug fixes" @@ -4431,19 +4073,15 @@ msgstr "" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13 msgid "" -"0.9.21 contains several changes to add capacity to the network, increase " -"the efficiency of the floodfills,\n" +"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n" "and use bandwidth more effectively.\n" -"We have migrated the shared clients tunnels to ECDSA signatures and added" -" a DSA fallback\n" -"using the new \"multisession\" capability for those sites that don't " -"support ECDSA." +"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n" +"using the new \"multisession\" capability for those sites that don't support ECDSA." msgstr "" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20 msgid "" -"The speakers and the schedule of the I2PCon in Toronto 2015 have been " -"announced.\n" +"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n" "Have a look on the `I2PCon page`_ for details.\n" "Reserve your seat on `Eventbrite`_." msgstr "" @@ -4547,10 +4185,7 @@ msgid "" "============================\n" "I2PCon: Mission Accomplished\n" "============================" -msgstr "" -"============================\n" -"I2PCon: Missione completata\n" -"============================" +msgstr "============================\nI2PCon: Missione completata\n============================" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:11 msgid "I2PCon: Mission Accomplished" @@ -4558,21 +4193,15 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14 msgid "" -"I2PCon has been a giant success. For us, the I2P contributors, it " -"represents a\n" -"leap forward in terms of what we're capable of pulling off as a " -"community, how we\n" -"communicate the usecases of I2P and reach out to privacy conscious " -"individuals.\n" +"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n" +"leap forward in terms of what we're capable of pulling off as a community, how we\n" +"communicate the usecases of I2P and reach out to privacy conscious individuals.\n" "\n" -"By arranging this event, we've also grown our community. People who've " -"previously\n" -"only lurked on our irc channels, or run our software or possibly hadn't " -"even heard\n" +"By arranging this event, we've also grown our community. People who've previously\n" +"only lurked on our irc channels, or run our software or possibly hadn't even heard\n" "of I2P are now a part of our comminuty.\n" "\n" -"This event has been our first active step towards building a large and " -"inclusive\n" +"This event has been our first active step towards building a large and inclusive\n" "community, and as such it's been great success." msgstr "" @@ -4580,20 +4209,16 @@ msgstr "" msgid "" "Minutiae\n" "========\n" -"On day 2 we had two short discussion sessions. A more general discussion " -"and a roadmapping discussion.\n" +"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n" "\n" -"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P " -"Discussion session minutiae`_." +"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37 msgid "" "Photos\n" "======" -msgstr "" -"Foto\n" -"======" +msgstr "Foto\n======" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:45 msgid "The learn how to setup I2P crypto party station" @@ -4611,38 +4236,29 @@ msgstr "" msgid "" "Thanks\n" "======" -msgstr "" -"Ringraziamenti\n" -"======" +msgstr "Ringraziamenti\n======" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62 msgid "" -"We've had some wonderful speakers, from both inside- and outside of our " -"community.\n" +"We've had some wonderful speakers, from both inside- and outside of our community.\n" "\n" -"`David Dagon`_ talked to us about the way forward and how I2P could " -"handle potential abuse.\n" +"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n" "\n" -"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us" -" his thoughts about how far I2P has come.\n" +"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n" "\n" -"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and " -"why you should care." +"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72 msgid "" -"I would also like to thank the speakers from our community. `psi`_, " -"`@str4d`_ and `zzz`_ who all had\n" -"wonderful talks. Improving our ability to inform people about I2P is " -"something that\n" +"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_ who all had\n" +"wonderful talks. Improving our ability to inform people about I2P is something that\n" "is going to be important for us going forward." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78 msgid "" -"I would like to thank `Sadie`_ and Siew for helping us out with marketing" -" and graphics.\n" +"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n" "Without you I2PCon would've been a very different event." msgstr "" @@ -4654,43 +4270,39 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87 msgid "" -"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto " -"Crypto`_ for their help during the event." +"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ " +"for their help during the event." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91 msgid "" -"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV " -"and doing all of the post-production\n" +"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n" "work for the videos of all the talks." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96 msgid "" -"I would like to thank `@killyourtv_i2p`_ for hosting a very popular " -"crypto party station." +"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto " +"party station." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100 msgid "" -"Thanks to our new favorite journalist `@robinlevinson`_, for showing an " -"interest in our cause and\n" +"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n" "educating yourself about the technologies involved." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105 msgid "" -"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very " -"much made this event better." +"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much " +"made this event better." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109 msgid "" -"Finally I would like to thank everyone else who just showed up to the " -"event and helped out in any way\n" +"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n" "they could.\n" -"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was " -"most excellent to hang out\n" +"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n" "with you." msgstr "" @@ -4699,10 +4311,7 @@ msgid "" "==============\n" "0.9.22 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.22\n" -"==============" +msgstr "==============\nRelease 0.9.22\n==============" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:11 msgid "0.9.22 with bug fixes and start of Ed25519 migration" @@ -4710,15 +4319,10 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13 msgid "" -"0.9.22 contains fixes for i2psnark getting stuck before completion, and " -"begins the migration of router infos to new, stronger Ed25519 signatures." -"\n" -"To reduce network churn, your router will have only a small probability " -"of converting to Ed25519 at each restart.\n" -"When it does rekey, expect to see lower bandwidth usage for a couple of " -"days as it reintegrates into the network with its new identity.\n" -"If all goes well, we will accelerate the rekeying process in the next " -"release." +"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n" +"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n" +"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n" +"If all goes well, we will accelerate the rekeying process in the next release." msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20 @@ -4737,14 +4341,13 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46 msgid "" -"Fix i2psnark getting stuck before download complete, and not deleting " -"temp files" +"Fix i2psnark getting stuck before download complete, and not deleting temp " +"files" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47 msgid "" -"Fix starting of torrents added by copying torrent file to i2psnark " -"directory" +"Fix starting of torrents added by copying torrent file to i2psnark directory" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48 @@ -4773,10 +4376,8 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15 msgid "" "Greetings!\n" -"This is the first in a long series of blogs to help the community see " -"what is happening in the I2P community.\n" -"Since many awesome events are happening *inside* the network, we think it" -" will be worthwhile to talk about some of activities here." +"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n" +"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21 @@ -4787,16 +4388,14 @@ msgstr "" msgid "" "Let's face it -- our console needs improvement.\n" "Our site could use an update as well.\n" -"We are looking for feedback on how to improve the usability of I2P for " -"new and existing users!" +"We are looking for feedback on how to improve the usability of I2P for new and existing users!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29 msgid "" "Any and all feedback is welcome.\n" "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n" -"If you don't feel comfortable using Twitter, we are always available via " -"the in-network IRC channel.\n" +"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n" "You don't have to be a long time user.\n" "We want to hear from all sorts of people!" msgstr "" @@ -4808,36 +4407,27 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43 msgid "" "On 03 November there was an I2P developer meeting (`log`_).\n" -"This meeting focused on adding new links to the router console, " -"preparation for CCC, finding a replacement for forum.i2p, and website " -"improvements." +"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50 msgid "" "The consensus was to not add dogecoindark.i2p.\n" -"There are concerns about usability due to many images being included on " -"the page.\n" -"Exchanged.i2p is conditionally added, as long as the maintainer adds a " -"disclaimer on the site.\n" -"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was " -"lenta.i2p (a russian news site)." +"There are concerns about usability due to many images being included on the page.\n" +"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n" +"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57 msgid "" -"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used" -" for developer's services.\n" -"He also suggested a more formalized technical proposal system, with more " -"prominence on the main website." +"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n" +"He also suggested a more formalized technical proposal system, with more prominence on the main website." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62 msgid "" -"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos " -"Computer Congress.\n" -"More details are to come on this, but we can promise there will be " -"stickers." +"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n" +"More details are to come on this, but we can promise there will be stickers." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67 @@ -4845,13 +4435,14 @@ msgid "General Announcements" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69 -msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" +msgid "" +"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75 msgid "" -"Translation deadline Thursday, 12 November, translators please update. " -"All translations are done via `Transifex`_ ." +"Translation deadline Thursday, 12 November, translators please update. All " +"translations are done via `Transifex`_ ." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1 @@ -4859,25 +4450,18 @@ msgid "" "==============\n" "0.9.23 Release\n" "==============" -msgstr "" -"==============\n" -" Release 0.9.23\n" -"==============" +msgstr "==============\n Release 0.9.23\n==============" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:11 msgid "" "0.9.23 contains a variety of bug fixes, and some minor improvements in " "I2PSnark" -msgstr "" -"La versione 0.9.23 risolve diversi bug; inoltre apporta alcuni piccoli " -"miglioramenti ad I2PSnark" +msgstr "La versione 0.9.23 risolve diversi bug; inoltre apporta alcuni piccoli miglioramenti ad I2PSnark" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13 msgid "" -"Hello I2P! This is the first release signed by me (str4d), after 49 " -"releases\n" -"signed by zzz. This is an important test of our redundancy for all " -"things,\n" +"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n" +"signed by zzz. This is an important test of our redundancy for all things,\n" "including people." msgstr "" @@ -4887,25 +4471,18 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24 msgid "" -"My signing key has been in router updates for over two years (since " -"0.9.9), so\n" -"if you are on a recent version of I2P this update should be just as easy " -"as\n" -"every other update. However, if you are running an older version than " -"0.9.9, you\n" -"will first need to manually update to a recent version. Update files for " -"recent\n" -"versions `can be downloaded here`__, and instructions on how to manually " -"update\n" -"`are provided here`__. Once you have manually updated, your router will " -"then find\n" +"My signing key has been in router updates for over two years (since 0.9.9), so\n" +"if you are on a recent version of I2P this update should be just as easy as\n" +"every other update. However, if you are running an older version than 0.9.9, you\n" +"will first need to manually update to a recent version. Update files for recent\n" +"versions `can be downloaded here`__, and instructions on how to manually update\n" +"`are provided here`__. Once you have manually updated, your router will then find\n" "and download the 0.9.23 update as usual." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38 msgid "" -"If you installed I2P via a package manager, you are not affected by the " -"change,\n" +"If you installed I2P via a package manager, you are not affected by the change,\n" "and can update as usual." msgstr "" @@ -4913,38 +4490,28 @@ msgstr "" msgid "" "Update details\n" "==============" -msgstr "" -"Dettagli dell'aggiornamento\n" -"==============" +msgstr "Dettagli dell'aggiornamento\n==============" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48 msgid "" -"The migration of RouterInfos to new, stronger Ed25519 signatures is going" -" well,\n" -"with at least half of the network already estimated to have rekeyed. This" -"\n" -"release accelerates the rekeying process. To reduce network churn, your " -"router\n" -"will have a small probability of converting to Ed25519 at each restart. " -"When it\n" -"does rekey, expect to see lower bandwidth usage for a couple of days as " -"it\n" +"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n" +"with at least half of the network already estimated to have rekeyed. This\n" +"release accelerates the rekeying process. To reduce network churn, your router\n" +"will have a small probability of converting to Ed25519 at each restart. When it\n" +"does rekey, expect to see lower bandwidth usage for a couple of days as it\n" "reintegrates into the network with its new identity." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57 msgid "" -"Note that this will be the last release to support Java 6. Please update " -"to\n" -"Java 7 or 8 as soon as possible. We are already working to make I2P " -"compatible\n" +"Note that this will be the last release to support Java 6. Please update to\n" +"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n" "with the upcoming Java 9, and some of that work is in this release." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63 msgid "" -"We have also made some minor improvements in I2PSnark, and added a new " -"page in\n" +"We have also made some minor improvements in I2PSnark, and added a new page in\n" "the routerconsole for viewing older news items." msgstr "" @@ -4954,14 +4521,13 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83 msgid "" -"Fix some bugs soft restarting after a large clock shift (e.g. resume) " -"(but more to do)" +"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but " +"more to do)" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84 msgid "" -"Fix streaming retransmission timers that were dying, and related timer " -"bugs" +"Fix streaming retransmission timers that were dying, and related timer bugs" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85 @@ -5005,7 +4571,8 @@ msgid "Detect for broken ECDSA support in Gentoo" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98 -msgid "Console: Add a Java 6 warning, this is the last release to support Java 6" +msgid "" +"Console: Add a Java 6 warning, this is the last release to support Java 6" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99 @@ -5014,8 +4581,8 @@ msgstr "Cambiamenti per preparare compatibilità con Java 9" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100 msgid "" -"Pass Accept-Encoding header through client and server proxies, to allow " -"end-to-end compression" +"Pass Accept-Encoding header through client and server proxies, to allow end-" +"to-end compression" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103 @@ -5031,7 +4598,8 @@ msgid "Save magnet parameters across restart" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106 -msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD" +msgid "" +"Don't delete .torrent file on errors at startup, rename to .torrent.BAD" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107 @@ -5063,8 +4631,7 @@ msgstr "CCC!" #: i2p2www/blog/2016/01/23/32C3.rst:13 msgid "" -"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and " -"eche|on." +"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:17 @@ -5072,21 +4639,15 @@ msgid "" "Start\n" "=====\n" "The project has had another successful year at CCC.\n" -"We would like to thank the volunteers at `32C3`__ for all of their help " -"in organizing this event and for being accommodating hosts for us.\n" -"Many I2P contributors were able to attend this year's Congress due to " -"many of the generous donations from supporters like you to the project.\n" -"If you would like to fund I2P, please see `our donation page`__ for more " -"information." +"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n" +"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n" +"If you would like to fund I2P, please see `our donation page`__ for more information." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:29 msgid "" -"Just like previous years we were located in Noisy Square, located near " -"the EFF's table.\n" -"This proved to be an ideal spot for us as our table was almost always " -"busy with current and new users who were interested in I2P, many of whom " -"we wouldn't have otherwise had the ability to talk to." +"Just like previous years we were located in Noisy Square, located near the EFF's table.\n" +"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:63 @@ -5101,13 +4662,10 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:72 msgid "" -"If you don't know what a reseed server is, it is first the connection new" -" routers use to find peers.\n" -"There was a lot of discussion around the current status of the reseed " -"network right now.\n" +"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n" +"There was a lot of discussion around the current status of the reseed network right now.\n" "As always, more reseed operators are needed!\n" -"If you would like to strengthen the reseed infrastructure, (or if you're " -"talented with Go) email `backup -at- i2pmail.org`__." +"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:81 @@ -5118,16 +4676,11 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:86 msgid "" -"Due to the decentralized nature of I2P detecting Sybil attacks is not as " -"straight forward as on other networks (i.e. Tor).\n" -"To mitigate this zzz has been working on a new router-based Sybil " -"detection tool.\n" -"To be brief, the tool runs in the router, and collects information on " -"floodfills your router is currently aware of.\n" -"Currently the tool is mainly collecting a baseline and does not act on " -"any of the information it is collecting.\n" -"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as " -"it is still in active development" +"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n" +"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n" +"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n" +"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n" +"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:94 @@ -5139,21 +4692,15 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:99 msgid "" "On the 30th we held an in person `meeting`__ at our table.\n" -"The meeting focused on organizationally preparing for more project " -"management, and public relations (both from Sadie)." +"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:106 msgid "" -"We discussed how much of the work done on I2P is lost in the commits and " -"there is not much to see for our users.\n" -"To remedy this lazygravy plans on preparing a series of posts explaining " -"some technical topics in I2P.\n" -"The initial ideas that we discussed writing posts on are what encrypted " -"lease sets are, why different tunnel types are needed, and some " -"observations seen in `I2Spy`__.\n" -"But these are just the start and we would like to hear feedback on topics" -" we should write about!" +"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n" +"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n" +"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n" +"But these are just the start and we would like to hear feedback on topics we should write about!" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:115 @@ -5187,10 +4734,7 @@ msgid "" "==============\n" "0.9.24 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.24\n" -"==============" +msgstr "==============\nRelease 0.9.24\n==============" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:11 msgid "0.9.24 contains a variety of bug fixes and performance enhancements" @@ -5223,13 +4767,14 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11 msgid "Update details" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18 msgid "" -"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and " -"efficiency improvements.\n" +"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n" "Note that this release is the first to require Java 7.\n" "Please update to Java 7 or 8 as soon as possible.\n" "Your router will not automatically update if you are using Java 6." @@ -5237,23 +4782,17 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25 msgid "" -"To prevent the problems caused by the ancient commons-logging library, we" -" have removed it.\n" -"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by " -"HungryHobo) to crash if they have IMAP enabled.\n" -"The recommended fix is to replace your old I2P-Bote plugin with the " -"current one signed by str4d.\n" +"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n" +"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n" +"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n" "For more details, see `this post`__." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34 msgid "" -"We had a great `32C3 Congress`__ and are making good progress on our 2016" -" project plans.\n" -"Echelon gave a talk on I2P's history and current status, and his slides " -"are `available here`__ (pdf).\n" -"Str4d attended `Real World Crypto`__ and gave a talk on our crypto " -"migration, his slides are `here`__ (pdf)." +"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n" +"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n" +"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58 @@ -5262,8 +4801,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59 msgid "" -"SAM 3.2, with several new advanced features, command parser improvements," -" and lots of bug fixes" +"SAM 3.2, with several new advanced features, command parser improvements, " +"and lots of bug fixes" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60 @@ -5288,8 +4827,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69 msgid "" -"Don't remove tunnel on next-hop failure indication from transport, it " -"isn't reliable" +"Don't remove tunnel on next-hop failure indication from transport, it isn't " +"reliable" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70 @@ -5297,13 +4836,13 @@ msgid "Fix formatting in summary bar to prevent overflow" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71 -msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port" +msgid "" +"Fix console links in i2ptunnel error pages when on nonstandard host/port" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72 msgid "" -"Don't query floodfills whose version is too old to support encrypted " -"replies" +"Don't query floodfills whose version is too old to support encrypted replies" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73 @@ -5350,8 +4889,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87 msgid "" -"Don't offer to introduce unless requested, to introduce only those that " -"need it" +"Don't offer to introduce unless requested, to introduce only those that need" +" it" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88 @@ -5416,6 +4955,8 @@ msgstr "Nuova traduzione in cinese (Taiwan)" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61 msgid "Full list of fixed bugs" msgstr "" @@ -5424,21 +4965,15 @@ msgid "" "==============\n" "0.9.25 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.25\n" -"==============" +msgstr "==============\nRelease 0.9.25\n==============" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:11 msgid "0.9.25 contains SAM 3.3, QR codes, and bug fixes" -msgstr "" -"0.9.25 contiene SAM 3.3, supporto per i codici QR e diverse correzioni di" -" bug" +msgstr "0.9.25 contiene SAM 3.3, supporto per i codici QR e diverse correzioni di bug" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18 msgid "" -"0.9.25 contains a major new version of SAM, v3.3, to support " -"sophisticated multiprotocol applications.\n" +"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n" "It adds QR codes for sharing hidden service addresses with others,\n" "and \"identicon\" images for visually distinguishing addresses." msgstr "" @@ -5446,10 +4981,8 @@ msgstr "" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24 msgid "" "We've added a new \"router family\" configuration page in the console,\n" -"to make it easier to declare that your group of routers is run by a " -"single person.\n" -"There are several changes to increase the capacity of the network and " -"hopefully improve tunnel build success." +"to make it easier to declare that your group of routers is run by a single person.\n" +"There are several changes to increase the capacity of the network and hopefully improve tunnel build success." msgstr "" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40 @@ -5542,34 +5075,26 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a " -"development program aimed at improving the privacy software ecosystem for" -" both developers and users." +"development program aimed at improving the privacy software ecosystem for " +"both developers and users." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13 msgid "" -"Over the last few years, the need for users to be in control of their own" -" data\n" -"has become increasingly apparent. Some excellent progress had been made " -"in this\n" -"regard with the rise of messaging apps like Signal_, and file storage " -"systems\n" -"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to " -"the\n" +"Over the last few years, the need for users to be in control of their own data\n" +"has become increasingly apparent. Some excellent progress had been made in this\n" +"regard with the rise of messaging apps like Signal_, and file storage systems\n" +"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n" "whole world is steadily gaining traction." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21 msgid "" -"But building privacy and anonymity into applications is not trivial. Much" -" of the\n" -"software people use every day was not designed to be privacy-preserving, " -"and the\n" +"But building privacy and anonymity into applications is not trivial. Much of the\n" +"software people use every day was not designed to be privacy-preserving, and the\n" "tools developers have available are generally not easy to work with. The\n" -"recently-published OnionScan_ survey gives some insight into just how " -"easy it is\n" -"for even technical users to mis-configure their services, completely " -"undermining\n" +"recently-published OnionScan_ survey gives some insight into just how easy it is\n" +"for even technical users to mis-configure their services, completely undermining\n" "their intentions." msgstr "" @@ -5582,16 +5107,14 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a\n" -"development program aimed at improving the privacy software ecosystem. " -"Our goal\n" -"is to make life easier both for developers wanting to leverage I2P in " -"their\n" -"applications, and for users trying to configure and run their apps " -"through I2P." +"development program aimed at improving the privacy software ecosystem. Our goal\n" +"is to make life easier both for developers wanting to leverage I2P in their\n" +"applications, and for users trying to configure and run their apps through I2P." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48 -msgid "We will be focusing our time this summer into three complementary areas:" +msgid "" +"We will be focusing our time this summer into three complementary areas:" msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52 @@ -5602,19 +5125,15 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57 msgid "" -"In June, we will be updating the various libraries that exist for " -"interfacing\n" -"with I2P. We have made significant progress this year on extending our " -"SAM_ API\n" -"with additional features, such as support for datagrams and ports. We " -"plan to\n" +"In June, we will be updating the various libraries that exist for interfacing\n" +"with I2P. We have made significant progress this year on extending our SAM_ API\n" +"with additional features, such as support for datagrams and ports. We plan to\n" "make these features easily accessible in our C++ and Python libraries." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64 msgid "" -"We will also soon be making it much easier for Java and Android " -"developers to\n" +"We will also soon be making it much easier for Java and Android developers to\n" "add I2P support to their applications. Stay tuned!" msgstr "" @@ -5626,18 +5145,12 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76 msgid "" -"In July we will be working with applications that have expressed interest" -" in\n" -"adding support for I2P. There are some really neat ideas being developed " -"in the\n" -"privacy space right now, and we want to help their communities leverage " -"over a\n" -"decade of research and development on peer-to-peer anonymity. Extending " -"these\n" -"applications to work natively over I2P is a good step forward for " -"usability, and\n" -"in the process will improve how these applications think about and handle" -" user\n" +"In July we will be working with applications that have expressed interest in\n" +"adding support for I2P. There are some really neat ideas being developed in the\n" +"privacy space right now, and we want to help their communities leverage over a\n" +"decade of research and development on peer-to-peer anonymity. Extending these\n" +"applications to work natively over I2P is a good step forward for usability, and\n" +"in the process will improve how these applications think about and handle user\n" "information." msgstr "" @@ -5649,12 +5162,9 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91 msgid "" -"Finally, in August we will turn out attention to the apps we bundle " -"inside I2P,\n" -"and the wider array of plugins. Some of these are due for some love, to " -"make\n" -"them more user-friendly - as well as fix any outstanding bugs! We hope " -"that\n" +"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n" +"and the wider array of plugins. Some of these are due for some love, to make\n" +"them more user-friendly - as well as fix any outstanding bugs! We hope that\n" "longtime I2P supporters will enjoy the outcome of this work." msgstr "" @@ -5669,14 +5179,10 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -" usable\n" -"websites or interfaces, or writing guides for users: come and chat with " -"us on\n" -"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our " -"community, both\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing usable\n" +"websites or interfaces, or writing guides for users: come and chat with us on\n" +"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n" "inside and outside I2P. We'll be sending I2P stickers out to all new\n" "contributors taking part (or possibly other pending I2P goodies)!" msgstr "" @@ -5684,24 +5190,18 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140 msgid "" -"Likewise, if you are an application developer who wants a hand with " -"integrating\n" -"I2P, or even just to chat about the concepts or details: get in touch! If" -" you\n" -"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ " -"or\n" -"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or " -"FreeNode." +"Likewise, if you are an application developer who wants a hand with integrating\n" +"I2P, or even just to chat about the concepts or details: get in touch! If you\n" +"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n" +"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131 msgid "" -"We'll be posting here as we go, but you can also follow our progress, and" -" share\n" -"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring" -" on the\n" +"We'll be posting here as we go, but you can also follow our progress, and share\n" +"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n" "summer!" msgstr "" @@ -5710,15 +5210,11 @@ msgid "" "==============\n" "0.9.26 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.26\n" -"==============" +msgstr "==============\nRelease 0.9.26\n==============" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11 msgid "" -"0.9.26 contains crypto updates, Debian packaging improvements, and bug " -"fixes" +"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13 @@ -5736,20 +5232,16 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31 msgid "" -"For crypto, we have upgraded to GMP 6.0.0, and added support for newer " -"processors,\n" +"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n" "which will speed up crypto operations considerably.\n" -"Also, we are now using constant-time GMP functions to prevent side-" -"channel attacks.\n" -"For caution, the GMP changes are enabled for new installs and " -"Debian/Ubuntu builds only;\n" +"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n" +"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n" "we will include them for in-net updates in the 0.9.27 release." msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39 msgid "" -"For Debian/Ubuntu builds, we have added dependencies on several packages," -"\n" +"For Debian/Ubuntu builds, we have added dependencies on several packages,\n" "including Jetty 8 and geoip, and removed the equivalent bundled code." msgstr "" @@ -5761,10 +5253,10 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59 msgid "" -"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant " -"speedups on newer architectures, and constant-time crypto operations " -"(new installs and Debian/Ubuntu builds only, will include in the updates " -"in the next release, 0.9.27)" +"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups " +"on newer architectures, and constant-time crypto operations (new installs " +"and Debian/Ubuntu builds only, will include in the updates in the next " +"release, 0.9.27)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60 @@ -5777,8 +5269,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62 msgid "" -"Enhance hosts blockfile format to allow for multiple destinations per " -"entry" +"Enhance hosts blockfile format to allow for multiple destinations per entry" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63 @@ -5787,8 +5278,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64 msgid "" -"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu " -"packages" +"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65 @@ -5806,8 +5296,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67 msgid "" -"Enhancements to the desktopgui system tray feature, to be enabled by " -"default in next release" +"Enhancements to the desktopgui system tray feature, to be enabled by default" +" in next release" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68 @@ -5822,8 +5312,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75 msgid "" -"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual" -" fix)" +"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual " +"fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76 @@ -5832,8 +5322,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77 msgid "" -"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 " -"for manual fix)" +"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for " +"manual fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78 @@ -5854,8 +5344,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87 msgid "" -"Rework resource bundle generation for 20x speedup in build time (requires" -" gettext version 0.19)" +"Rework resource bundle generation for 20x speedup in build time (requires " +"gettext version 0.19)" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1 @@ -5871,10 +5361,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13 msgid "" -"We're nearly half-way into the APIs month of Summer Dev, and making great" -"\n" -"progress on a number of fronts. I'm happy to announce that the first of " -"these is\n" +"We're nearly half-way into the APIs month of Summer Dev, and making great\n" +"progress on a number of fronts. I'm happy to announce that the first of these is\n" "complete: the I2P client libraries are now available on Maven Central!" msgstr "" @@ -5882,10 +5370,8 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51 msgid "" "This should make it much simpler for Java developers to use I2P in their\n" -"applications. Instead of needing to obtain the libraries from a current " -"install,\n" -"they can simply add I2P to their dependencies. Upgrading to new versions " -"will\n" +"applications. Instead of needing to obtain the libraries from a current install,\n" +"they can simply add I2P to their dependencies. Upgrading to new versions will\n" "similarly be much easier." msgstr "" @@ -5893,9 +5379,7 @@ msgstr "" msgid "" "How to use them\n" "===============" -msgstr "" -"Come si usa\n" -"===============" +msgstr "Come si usa\n===============" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:32 msgid "There are two libraries that you need to know about:" @@ -5911,25 +5395,21 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39 msgid "" -"Add one or both of these to your project's dependencies, and you're good " -"to go!" +"Add one or both of these to your project's dependencies, and you're good to " +"go!" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67 msgid "" -"For other build systems, see the Maven Central pages for the `core`__ and" -"\n" +"For other build systems, see the Maven Central pages for the `core`__ and\n" "`streaming`__ libraries." msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72 msgid "" -"Android developers should use the `I2P Android client library`__, which " -"contains\n" -"the same libraries along with Android-specific helpers. I'll be updating " -"it soon\n" -"to depend on the new I2P libraries, so that cross-platform applications " -"can work\n" +"Android developers should use the `I2P Android client library`__, which contains\n" +"the same libraries along with Android-specific helpers. I'll be updating it soon\n" +"to depend on the new I2P libraries, so that cross-platform applications can work\n" "natively with either I2P Android or desktop I2P." msgstr "" @@ -5941,10 +5421,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89 msgid "" -"See our `application development`__ guide for help getting started with " -"these\n" -"libraries. You can also chat with us about them in #i2p-dev on IRC. And " -"if you\n" +"See our `application development`__ guide for help getting started with these\n" +"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n" "do start using them, let us know what you're working on with the hashtag\n" "`#I2PSummer`__ on Twitter!" msgstr "" @@ -5958,26 +5436,22 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11 msgid "" -"In the first month of Summer Dev, we have improved the usability of our " -"APIs for Java, Android, and Python developers." +"In the first month of Summer Dev, we have improved the usability of our APIs" +" for Java, Android, and Python developers." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13 msgid "" -"Summer Dev is in full swing: we've been busy greasing wheels, sanding " -"edges, and\n" -"tidying the place up. Now it's time for our first roundup, where we bring" -" you up\n" +"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n" +"tidying the place up. Now it's time for our first roundup, where we bring you up\n" "to speed on the progress we are making!" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19 msgid "" "\n" -"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us" -" the\n" -"fantastic logo you see above. It adds a cheerful personality to our " -"development\n" +"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n" +"fantastic logo you see above. It adds a cheerful personality to our development\n" "program (and is going to look great on t-shirts)." msgstr "" @@ -5989,48 +5463,37 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33 msgid "" -"Our goal for this month was to \"blend in\" - to make our APIs and " -"libraries work\n" -"within the existing infrastructure of various communities, so that " -"application\n" -"developers can work with I2P more efficiently, and users don't need to " -"worry\n" +"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n" +"within the existing infrastructure of various communities, so that application\n" +"developers can work with I2P more efficiently, and users don't need to worry\n" "about the details." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43 msgid "" -"The I2P client libraries are now available on `Maven Central`__ ! See our" -"\n" +"The I2P client libraries are now available on `Maven Central`__ ! See our\n" "`previous blog post`__ for full details.\n" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58 msgid "" -"The `I2P Android client library`__ has also been updated to use the new " -"I2P\n" -"libraries. This means that cross-platform applications can work natively " -"with\n" +"The `I2P Android client library`__ has also been updated to use the new I2P\n" +"libraries. This means that cross-platform applications can work natively with\n" "either I2P Android or desktop I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71 msgid "" -"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work" -"\n" +"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n" "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n" -"`documentation`__ for usage instructions, and report any issues on " -"`GitHub`__." +"`documentation`__ for usage instructions, and report any issues on `GitHub`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84 msgid "" -"The first (beta) version of ``i2psocket`` has been released! This is a " -"direct\n" -"replacement for the standard Python ``socket`` library that extends it " -"with I2P\n" -"support over the SAM API. See its `GitHub page`__ for usage instructions," -" and\n" +"The first (beta) version of ``i2psocket`` has been released! This is a direct\n" +"replacement for the standard Python ``socket`` library that extends it with I2P\n" +"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n" "to report any issues." msgstr "" @@ -6042,15 +5505,15 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98 msgid "" -"zzz has been hard at work on Syndie, getting a headstart on Plugins " -"month. You can follow his progress on `the development forum thread`__." +"zzz has been hard at work on Syndie, getting a headstart on Plugins month. " +"You can follow his progress on `the development forum thread`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100 msgid "" -"psi has been creating an I2P test network using i2pd, and in the process " -"has found and fixed several i2pd bugs that will improve its compatibility" -" with Java I2P." +"psi has been creating an I2P test network using i2pd, and in the process has" +" found and fixed several i2pd bugs that will improve its compatibility with " +"Java I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104 @@ -6061,21 +5524,16 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109 msgid "" -"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a " -"long time\n" -"been home to one of the `largest public grids`__, using a patched version" -" of\n" -"Tahoe-LAFS. During Apps month we will be helping them with their ongoing " -"work to\n" -"add native support for I2P and Tor, so that I2P users can benefit from " -"all of\n" +"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n" +"been home to one of the `largest public grids`__, using a patched version of\n" +"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n" +"add native support for I2P and Tor, so that I2P users can benefit from all of\n" "the improvements upstream." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117 msgid "" -"There are several other projects that we will be talking with about their" -" plans\n" +"There are several other projects that we will be talking with about their plans\n" "for I2P integration, and helping with design. Stay tuned!" msgstr "" @@ -6084,10 +5542,7 @@ msgid "" "==============\n" "0.9.27 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.27\n" -"==============" +msgstr "==============\nRelease 0.9.27\n==============" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:11 msgid "0.9.27 contains bug fixes" @@ -6096,11 +5551,8 @@ msgstr "0.9.27 apporta diverse correzioni di errori" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18 msgid "" "0.9.27 contains a number of bug fixes.\n" -"The updated GMP library for crypto acceleration, which was bundled in the" -" 0.9.26 release for new installs and Debian builds only, is now included " -"in the in-network update for 0.9.27.\n" -"There are improvements in IPv6 transports, SSU peer testing, and hidden " -"mode." +"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n" +"There are improvements in IPv6 transports, SSU peer testing, and hidden mode." msgstr "" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24 @@ -6190,10 +5642,7 @@ msgid "" "==============\n" "0.9.28 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.28\n" -"==============" +msgstr "==============\nRelease 0.9.28\n==============" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:11 msgid "0.9.28 contains bug fixes" @@ -6201,20 +5650,15 @@ msgstr "La versione 0.9.28 corregge diversi errori" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18 msgid "" -"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number " -"of bundled software packages including Jetty.\n" -"There are fixes for the IPv6 peer testing feature introduced last " -"release.\n" -"We continue improvements to detect and block peers that are potentially " -"malicious.\n" -"There are preliminary fixes for Java 9, although we do not yet recommend " -"Java 9 for general use." +"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n" +"There are fixes for the IPv6 peer testing feature introduced last release.\n" +"We continue improvements to detect and block peers that are potentially malicious.\n" +"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use." msgstr "" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25 msgid "" -"I2P will be at 33C3, please stop by our table and give us your ideas on " -"how to improve the network.\n" +"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n" "We will review our 2017 roadmap and priorities 2017 at the Congress." msgstr "" @@ -6383,10 +5827,7 @@ msgid "" "==============\n" "0.9.29 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.29\n" -"==============" +msgstr "==============\nRelease 0.9.29\n==============" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:11 msgid "0.9.29 contains bug fixes" @@ -6394,14 +5835,12 @@ msgstr "La versione 0.9.29 corregge diversi errori" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18 msgid "" -"0.9.29 contains fixes for numerous Trac tickets, including workarounds " -"for corrupt compressed messages.\n" +"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n" "We now support NTP over IPv6.\n" "We've added preliminary Docker support.\n" "We now have translated man pages.\n" "We now pass same-origin Referer headers through the HTTP proxy.\n" -"There are more fixes for Java 9, although we do not yet recommend Java 9 " -"for general use." +"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use." msgstr "" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37 @@ -6513,11 +5952,9 @@ msgstr "Corretti problemi con l'installer Windows per la versione 0.9.29" #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18 msgid "" -"The 0.9.29 Windows installer posted on our website two days ago fails " -"during install with an Exception.\n" +"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n" "We have fixed the bug and posted the new installer to our website.\n" -"This does not affect upgrades from previous releases or non-Windows " -"installers.\n" +"This does not affect upgrades from previous releases or non-Windows installers.\n" "We apologize for the issue." msgstr "" @@ -6526,10 +5963,7 @@ msgid "" "==============\n" "0.9.30 Release\n" "==============" -msgstr "" -"==============\n" -"Release 0.9.30\n" -"==============" +msgstr "==============\nRelease 0.9.30\n==============" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:11 msgid "0.9.30 with Jetty 9" @@ -6538,47 +5972,37 @@ msgstr "0.9.30 con Jetty 9" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18 msgid "" "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n" -"The previous versions are no longer supported, and are not available in " -"the upcoming Debian Stretch and Ubuntu Zesty releases." +"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23 msgid "" -"The router will migrate the jetty.xml configuration file for each Jetty " -"website to the new Jetty 9 setup.\n" -"This should work for recent, unmodified configurations but may not work " -"for modified or very old setups.\n" -"Verify that your Jetty website works after upgrading, and contact us on " -"IRC if you need assistance." +"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n" +"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n" +"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29 msgid "" "Several plugins are not compatible with Jetty 9 and must be updated.\n" -"The following plugins have been updated to work with 0.9.30, and your " -"router should update them after restart:" +"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35 msgid "" -"The following plugins (with current versions listed) will not work with " -"0.9.30.\n" +"The following plugins (with current versions listed) will not work with 0.9.30.\n" "Contact the appropriate plugin developer for the status of new versions:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41 msgid "" -"This release also supports migration of old (2014 and earlier) DSA-SHA1 " -"hidden services to the more-secure EdDSA signature type.\n" -"See http://zzz.i2p/topics/2271 for further information, including a guide" -" and FAQ." +"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n" +"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46 msgid "" -"Note: On non-Android ARM platforms such as the Raspberry Pi, the " -"blockfile database will upgrade on restart, which may take several " -"minutes.\n" +"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n" "Please be patient." msgstr "" @@ -6691,41 +6115,32 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11 msgid "" -"This year's Summer Dev will be focused on metrics collection and " -"performance improvements for the network." +"This year's Summer Dev will be focused on metrics collection and performance" +" improvements for the network." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13 msgid "" "It's that time of year again! We're embarking on our summer development\n" -"programme, where we focus on a particular aspect of I2P to push it " -"forward. For\n" -"the next three months, we'll be encouraging both new contributors and " -"existing\n" +"programme, where we focus on a particular aspect of I2P to push it forward. For\n" +"the next three months, we'll be encouraging both new contributors and existing\n" "community members to pick a task and have fun with it!" msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20 msgid "" -"`Last year`__, we focused on helping users and developers leverage I2P, " -"by\n" -"improving API tooling and giving some love to applications that run over " -"I2P.\n" -"This year, we want to improve the user experience by working on an aspect" -" that\n" +"`Last year`__, we focused on helping users and developers leverage I2P, by\n" +"improving API tooling and giving some love to applications that run over I2P.\n" +"This year, we want to improve the user experience by working on an aspect that\n" "affects everyone: performance." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29 msgid "" -"Despite onion-routing networks often being called \"low-latency\" " -"networks, there\n" -"is significant overhead created by routing traffic through additional " -"computers.\n" -"I2P's unidirectional tunnel design means that by default, a round trip " -"between\n" -"two Destinations will involve twelve participants! Improving the " -"performance of\n" +"Despite onion-routing networks often being called \"low-latency\" networks, there\n" +"is significant overhead created by routing traffic through additional computers.\n" +"I2P's unidirectional tunnel design means that by default, a round trip between\n" +"two Destinations will involve twelve participants! Improving the performance of\n" "these participants will help to both reduce the latency of end-to-end\n" "connections [1]_, and increase the quality of tunnels network-wide." msgstr "" @@ -6748,11 +6163,9 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52 msgid "" -"We can't tell if we improve performance without a baseline! We'll be " -"creating a\n" +"We can't tell if we improve performance without a baseline! We'll be creating a\n" "metrics system for collecting usage and performance data about I2P in a\n" -"privacy-preserving way, as well as porting various benchmarking tools to " -"run\n" +"privacy-preserving way, as well as porting various benchmarking tools to run\n" "over I2P (e.g. iperf3_)." msgstr "" @@ -6764,10 +6177,8 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66 msgid "" -"There's a lot of scope for improving the performance of our existing " -"code, to\n" -"e.g. reduce the overhead of participating in tunnels. We will be looking " -"at\n" +"There's a lot of scope for improving the performance of our existing code, to\n" +"e.g. reduce the overhead of participating in tunnels. We will be looking at\n" "potential improvements to:" msgstr "" @@ -6797,14 +6208,10 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86 msgid "" -"We have several open proposals for improving the scalability of the I2P " -"network\n" -"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We " -"will be\n" -"working on these proposals, and begin implementing the finalised ones in " -"the\n" -"various network routers. The more feedback these proposals receive, the " -"sooner\n" +"We have several open proposals for improving the scalability of the I2P network\n" +"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n" +"working on these proposals, and begin implementing the finalised ones in the\n" +"various network routers. The more feedback these proposals receive, the sooner\n" "we can roll them out, and the sooner I2P services can start using them!" msgstr "" @@ -6816,46 +6223,36 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106 msgid "" -"I2P is a packet-switched network, like the internet it runs on top of. " -"This\n" -"gives us significant flexibility in how we route packets, both for " -"performance\n" +"I2P is a packet-switched network, like the internet it runs on top of. This\n" +"gives us significant flexibility in how we route packets, both for performance\n" "and privacy. The majority of this flexibility is unexplored! We want to\n" -"encourage research into how various clearnet techniques for improving " -"bandwidth\n" +"encourage research into how various clearnet techniques for improving bandwidth\n" "can be applied to I2P, and how they might affect the privacy of network\n" "participants." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -"\n" -"protocols (cryptographic or otherwise), or researching future ideas - " -"come and\n" -"chat with us on IRC or Twitter! We are always happy to welcome newcomers " -"into\n" -"our community, both inside and outside the I2P network. We'll also be " -"sending\n" -"I2P stickers out to all new contributors taking part! If you want to chat" -" about\n" -"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You" -" can\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing\n" +"protocols (cryptographic or otherwise), or researching future ideas - come and\n" +"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n" +"our community, both inside and outside the I2P network. We'll also be sending\n" +"I2P stickers out to all new contributors taking part! If you want to chat about\n" +"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n" "also find us in #i2p-dev on OFTC or Freenode." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142 msgid "" -"Low-latency onion-routing networks are vulnerable to traffic confirmation" -" attacks, so it would be reasonable to ask whether improved performance " +"Low-latency onion-routing networks are vulnerable to traffic confirmation " +"attacks, so it would be reasonable to ask whether improved performance " "equates to reduced privacy. Some latency can help privacy if applied " "correctly via random delays or batching (neither of which are currently " -"employed by any general-purpose onion-routing network). However, if a " -"tunnel has uniform overall latency, then traffic confirmation attacks " -"should be just as viable with or without that latency; thus there should " -"be little statistical difference when the latency is reduced uniformly." +"employed by any general-purpose onion-routing network). However, if a tunnel" +" has uniform overall latency, then traffic confirmation attacks should be " +"just as viable with or without that latency; thus there should be little " +"statistical difference when the latency is reduced uniformly." msgstr "" #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1 @@ -6875,8 +6272,7 @@ msgid "" "We have refreshed the router console to make it easier to understand,\n" "improve accessibility and cross-browser support,\n" "and generally tidy things up.\n" -"This is the first step in a longer-term plan to make the router console " -"more user-friendly.\n" +"This is the first step in a longer-term plan to make the router console more user-friendly.\n" "We have also added torrent ratings and comments support to i2psnark." msgstr "" @@ -6946,10 +6342,8 @@ msgstr "" #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18 msgid "" -"0.9.32 contains a number of fixes in the router console and associated " -"webapps (addressbook, i2psnark, and susimail).\n" -"We have also changed the way we handle configured hostnames for published" -" router infos, to eliminate some network enumeration attacks via DNS.\n" +"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n" +"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n" "We have added some checks in the console to resist rebinding attacks." msgstr "" @@ -6991,13 +6385,10 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17 msgid "" -"0.9.33 contains a large number of bug fixes, including i2psnark, " -"i2ptunnel, streaming, and SusiMail.\n" -"For those who cannot access the reseed sites directly, we now support " -"several types of proxies for reseeding.\n" +"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n" +"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n" "We now set rate limits by default in the hidden services manager.\n" -"For those that run high-traffic servers, please review and adjust the " -"limits as necessary." +"For those that run high-traffic servers, please review and adjust the limits as necessary." msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34 @@ -7085,7 +6476,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62 -msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies" +msgid "" +"SusuMail: Fix bugs corrupting text attachments and large message bodies" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63 @@ -7152,8 +6544,7 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83 msgid "" -"Debian: Remove ecj dependency; replace glassfish with libtaglibs where " -"able" +"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84 @@ -7223,12 +6614,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13 msgid "" -"One of the many things we discussed at 34C3 was what we should focus on " -"for the\n" -"coming year. In particular, we wanted a roadmap that was clear about what" -" we\n" -"want to ensure we get done, vs what would be really nice to have, and be " -"able to\n" +"One of the many things we discussed at 34C3 was what we should focus on for the\n" +"coming year. In particular, we wanted a roadmap that was clear about what we\n" +"want to ensure we get done, vs what would be really nice to have, and be able to\n" "help onboard newcomers to either category. Here is what we came up with:" msgstr "" @@ -7240,14 +6628,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25 msgid "" -"Many of the current primitives and protocols still retain their original " -"designs\n" -"from circa 2005, and need improvement. We have had a number of open " -"proposals\n" -"for several years with ideas, but forward progress has been slow. We all " -"agreed\n" -"that this needs to be our top priority for 2018. The core components are:" -"\n" +"Many of the current primitives and protocols still retain their original designs\n" +"from circa 2005, and need improvement. We have had a number of open proposals\n" +"for several years with ideas, but forward progress has been slow. We all agreed\n" +"that this needs to be our top priority for 2018. The core components are:\n" "\n" "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n" "- New onion-encryption protocol for building and using tunnels.\n" @@ -7266,8 +6650,7 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50 msgid "" -"We cannot release new protocol specifications across the entire network " -"without\n" +"We cannot release new protocol specifications across the entire network without\n" "work on all of these areas." msgstr "" @@ -7279,31 +6662,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60 msgid "" -"One of the benefits of starting the above work now, is that over the last" -" few\n" +"One of the benefits of starting the above work now, is that over the last few\n" "years there have been independent efforts to create simple protocols and\n" -"protocol frameworks that achieve many of the aims we have for our own " -"protocols,\n" -"and have gained traction with the wider community. By leveraging this " -"work, we\n" +"protocol frameworks that achieve many of the aims we have for our own protocols,\n" +"and have gained traction with the wider community. By leveraging this work, we\n" "get a \"force multiplier\" effect:\n" "\n" -"- We benefit from protocol designs, security proofs, and code written by " -"others,\n" +"- We benefit from protocol designs, security proofs, and code written by others,\n" " reducing the amount of work we need to do for the same level of\n" " feature-completeness and security assurances.\n" "\n" -"- Work we do can be leveraged by other communities, increasing their " -"interest in\n" +"- Work we do can be leveraged by other communities, increasing their interest in\n" " collaborating with us, and thinking about I2P as a whole." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76 msgid "" -"My proposals in particular will be leveraging the `Noise Protocol " -"Framework`_,\n" -"and the `SPHINX packet format`_. I have collaborations lined up with " -"several\n" +"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n" +"and the `SPHINX packet format`_. I have collaborations lined up with several\n" "people outside I2P for these!" msgstr "" @@ -7315,16 +6691,11 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90 msgid "" -"On that topic, we've been slowly building interest over the last six " -"months or\n" -"so. Across PETS2017, 34C3, and RWC2018, I've had some very good " -"discussions\n" -"about ways in which we can improve collaboration with the wider " -"community. This\n" -"is really important to ensure we can garner as much review as possible " -"for new\n" -"protocols. The biggest blocker I've seen is the fact that the majority of" -" I2P\n" +"On that topic, we've been slowly building interest over the last six months or\n" +"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n" +"about ways in which we can improve collaboration with the wider community. This\n" +"is really important to ensure we can garner as much review as possible for new\n" +"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n" "development collaboration currently happens inside I2P itself, which\n" "significantly increases the effort required to contribute." msgstr "" @@ -7333,8 +6704,7 @@ msgstr "" msgid "" "The two priorities in this area are:\n" "\n" -"- Set up a project-run development forum that is accessible both inside " -"and\n" +"- Set up a project-run development forum that is accessible both inside and\n" " outside I2P.\n" "\n" "- Set up mailing lists for review and discussion of proposals (possibly\n" @@ -7345,21 +6715,17 @@ msgstr "" msgid "" "Other goals which are classed as nice-to-have:\n" "\n" -"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit" -"\n" -" clearnet contributions on GitHub while keeping the canonical dev " -"environment\n" +"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n" +" clearnet contributions on GitHub while keeping the canonical dev environment\n" " on Monotone.\n" "\n" -"- Write a \"position paper\" that accurately explains I2P to academic " -"audiences,\n" +"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n" " and puts it in context with existing literature." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123 msgid "" -"I expect that collaborations with people outside I2P will be done " -"entirely on\n" +"I expect that collaborations with people outside I2P will be done entirely on\n" "GitHub, for minimal friction." msgstr "" @@ -7371,24 +6737,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133 msgid "" -"I2P is now in Debian Sid (their unstable repo) which will stablilise in " -"around a\n" +"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n" "year and a half, and has also been pulled into the Ubuntu repository for\n" -"inclusion in the next LTS release in April. We are going to start having " -"I2P\n" -"versions that end up hanging around for years, and we need to ensure we " -"can\n" +"inclusion in the next LTS release in April. We are going to start having I2P\n" +"versions that end up hanging around for years, and we need to ensure we can\n" "handle their presence in the network." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141 msgid "" -"The primary goal here is to roll out as many of the new protocols as we " -"feasibly\n" -"can in the next year, to hit the next Debian stable release. For those " -"that\n" -"require multi-year rollouts, we should incorporate the forward-" -"compatability\n" +"The primary goal here is to roll out as many of the new protocols as we feasibly\n" +"can in the next year, to hit the next Debian stable release. For those that\n" +"require multi-year rollouts, we should incorporate the forward-compatability\n" "changes as early as we can." msgstr "" @@ -7400,32 +6760,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153 msgid "" -"The Debian model encourages having separate packages for separate " -"components. We\n" -"agreed that decoupling the currently-bundled Java applications from the " -"core\n" +"The Debian model encourages having separate packages for separate components. We\n" +"agreed that decoupling the currently-bundled Java applications from the core\n" "Java router would be beneficial for several reasons:\n" "\n" "- It codifies the boundary between the applications and the router.\n" "\n" -"- It should make it easier to get these apps running with non-Java " -"routers.\n" +"- It should make it easier to get these apps running with non-Java routers.\n" "\n" -"- It would enable third parties to create \"I2P bundles\" containing just" -" the\n" +"- It would enable third parties to create \"I2P bundles\" containing just the\n" " applications they want." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167 msgid "" -"In combination with the earlier priorities, this moves the main I2P " -"project more\n" -"in the direction of e.g. the Linux kernel. We will spend more time " -"focusing on\n" -"the network itself, leaving third-party developers to focus on " -"applications that\n" -"use the network (something that is significantly easier to do after our " -"work in\n" +"In combination with the earlier priorities, this moves the main I2P project more\n" +"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n" +"the network itself, leaving third-party developers to focus on applications that\n" +"use the network (something that is significantly easier to do after our work in\n" "the last few years on APIs and libraries)." msgstr "" @@ -7437,25 +6789,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180 msgid "" -"There are a bunch of app-level improvements that we want to work on, but " -"do not\n" -"currently have the developer time to do so, given our other priorities. " -"This is\n" -"an area we would love to see new contributors for! Once the above " -"decoupling is\n" -"complete, it will be significantly easier for someone to work on a " -"specific\n" +"There are a bunch of app-level improvements that we want to work on, but do not\n" +"currently have the developer time to do so, given our other priorities. This is\n" +"an area we would love to see new contributors for! Once the above decoupling is\n" +"complete, it will be significantly easier for someone to work on a specific\n" "application independently of the main Java router." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188 msgid "" -"One such application we would love to have help with is I2P Android. We " -"will be\n" -"keeping it up-to-date with the core I2P releases, and fixing bugs as we " -"can, but\n" -"there is much that could be done to improve the underlying code as well " -"as the\n" +"One such application we would love to have help with is I2P Android. We will be\n" +"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n" +"there is much that could be done to improve the underlying code as well as the\n" "usability." msgstr "" @@ -7467,14 +6812,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200 msgid "" -"Having said that, we do want to work specifically on Susimail and I2P-" -"Bote fixes\n" -"in the near term (some of which have landed in 0.9.33). They have had " -"less work\n" -"over the last few years than other I2P apps, and so we want to spend some" -" time\n" -"bringing their codebases up to par, and making them easier for new " -"contributors\n" +"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n" +"in the near term (some of which have landed in 0.9.33). They have had less work\n" +"over the last few years than other I2P apps, and so we want to spend some time\n" +"bringing their codebases up to par, and making them easier for new contributors\n" "to jump into!" msgstr "" @@ -7486,14 +6827,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213 msgid "" -"We have a large backlog of tickets in a number of I2P subsystems and " -"apps. As\n" -"part of the above stabilisation effort, we would love to clean up some of" -" our\n" -"older long-standing issues. More importantly, we want to ensure that our " -"tickets\n" -"are correctly organised, so that new contributors can find good tickets " -"to work\n" +"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n" +"part of the above stabilisation effort, we would love to clean up some of our\n" +"older long-standing issues. More importantly, we want to ensure that our tickets\n" +"are correctly organised, so that new contributors can find good tickets to work\n" "on." msgstr "" @@ -7505,12 +6842,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226 msgid "" -"One aspect of the above we will be focusing on is keeping in touch with " -"users\n" -"who take the time to report issues. Thank you! The smaller we can make " -"the\n" -"feedback loop, the quicker we can resolve problems that new users face, " -"and the\n" +"One aspect of the above we will be focusing on is keeping in touch with users\n" +"who take the time to report issues. Thank you! The smaller we can make the\n" +"feedback loop, the quicker we can resolve problems that new users face, and the\n" "more likely it is that they keep participating in the community." msgstr "" @@ -7522,15 +6856,13 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238 msgid "" -"That all looks very ambitious, and it is! But many of the items above " -"overlap,\n" +"That all looks very ambitious, and it is! But many of the items above overlap,\n" "and with careful planning we can make a serious dent in them." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243 msgid "" -"If you are interested in helping with any of the goals above, come chat " -"to us!\n" +"If you are interested in helping with any of the goals above, come chat to us!\n" "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)." msgstr "" @@ -7556,11 +6888,9 @@ msgstr "" #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17 msgid "" "0.9.34 contains a lot of bug fixes!\n" -"It also has improvements in SusiMail, IPv6 handling, and tunnel peer " -"selection.\n" +"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n" "We add support for IGD2 schemas in UPnP.\n" -"There's also preparation for more improvements you will see in future " -"releases." +"There's also preparation for more improvements you will see in future releases." msgstr "" #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34 @@ -7623,8 +6953,7 @@ msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16 msgid "" -"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for " -"setting up HTTPS on your Hidden Service website.\n" +"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n" "We also have the usual collection of bug fixes, especially in SusiMail." msgstr "" @@ -7635,7 +6964,8 @@ msgid "" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25 -msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" +msgid "" +"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39 @@ -7655,7 +6985,8 @@ msgid "CPUID: Fix TBM detection" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48 -msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled" +msgid "" +"i2psnark: Fix torrents ignoring priority settings when autostart enabled" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49 @@ -7731,25 +7062,16 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:20 msgid "" -"I2P's transport protocols were originally developed around 15 years ago. " -"Back \n" -"then, the main goal was to hide the transferred data, not to hide the " -"fact that \n" -"one was using the protocol itself. Nobody thought seriously about " -"protecting \n" -"against DPI (deep packets inspection) and protocols censorship. Times " -"change, \n" -"and even though original transport protocols are still providing strong " -"security, \n" -"there was a demand for a new transport protocol. NTCP2 is designed to " -"resist \n" -"current censorship threats. Mainly, DPI analysis of packets length. Plus," -" the new \n" -"protocol uses the most modern cryptography developments. NTCP2 is based " -"on the \n" +"I2P's transport protocols were originally developed around 15 years ago. Back \n" +"then, the main goal was to hide the transferred data, not to hide the fact that \n" +"one was using the protocol itself. Nobody thought seriously about protecting \n" +"against DPI (deep packets inspection) and protocols censorship. Times change, \n" +"and even though original transport protocols are still providing strong security, \n" +"there was a demand for a new transport protocol. NTCP2 is designed to resist \n" +"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n" +"protocol uses the most modern cryptography developments. NTCP2 is based on the \n" "`Noise Protocol Framework`_, with SHA256 \n" -"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) " -"key \n" +"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n" "exchange." msgstr "" @@ -7771,23 +7093,17 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:59 msgid "" -"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of " -"ElGamal \n" -"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, " -"and uses \n" -"SipHash for obfuscating the packet's length information. The key " -"derivation \n" +"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n" +"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n" +"SipHash for obfuscating the packet's length information. The key derivation \n" "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:66 msgid "" -"i2pd (C++) implementation note: All of the algorithms mentioned above, " -"except \n" -"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the " -"coming \n" -"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is " -"used in \n" +"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n" +"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n" +"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n" "most of the current systems, core i2pd developer \n" "`Jeff Becker`_ has contributed standalone \n" "implementations of missing cryptographic algorithms." @@ -7801,40 +7117,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:82 msgid "" -"NTCP2 requires having a third (x25519) key in addition to existing two " -"(the \n" -"encryption and signature keys). It is called a static key and it has to " -"be added \n" -"to any of RouterInfo addresses as an \"s\" parameter. It is required for " -"both \n" -"NTCP2 initiator (Alice) and responder (Bob). If more than one address " -"supports \n" -"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for " -"all of \n" -"them. Alice's address is allowed to have just the \"s\" parameter without" -" \"host\" \n" -"and \"port\" set. Also, a \"v\" parameter is required, that is currently " -"always set \n" +"NTCP2 requires having a third (x25519) key in addition to existing two (the \n" +"encryption and signature keys). It is called a static key and it has to be added \n" +"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n" +"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n" +"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n" +"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n" +"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n" "to \"2\"." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:93 msgid "" -"NTCP2 address can be declared as a separate NTCP2 address or as an old-" -"style \n" -"NTCP address with additional parameters, in which case it will accept " -"both \n" -"NTCP and NTCP2 connections. Java I2P implementation uses the second " -"approach, \n" +"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n" +"NTCP address with additional parameters, in which case it will accept both \n" +"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n" "i2pd (C++ implementation) uses the first." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:100 msgid "" -"If a node accepts NTCP2 connections, it has to publish its RouterInfo " -"with the \n" -"\"i\" parameter, which is used as an initialization vector (IV) for the " -"public \n" +"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n" +"\"i\" parameter, which is used as an initialization vector (IV) for the public \n" "encryption key when that node establishes new connections." msgstr "" @@ -7846,14 +7150,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:111 msgid "" -"To establish a connection both sides need to generate pairs of ephemeral " -"x25519 \n" -"keys. Based on those keys and \"static\" keys they derive a set of keys " -"for data \n" -"transferring. Both parties must verify that the other side actually has a" -" \n" -"private key for that static key, and that static key is the same as in " -"RouterInfo." +"To establish a connection both sides need to generate pairs of ephemeral x25519 \n" +"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n" +"transferring. Both parties must verify that the other side actually has a \n" +"private key for that static key, and that static key is the same as in RouterInfo." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:118 @@ -7862,29 +7162,23 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:131 msgid "" -"A common x25519 key, called «input key material», is computed for each " -"message, \n" -"after which message encryption key is generated with a MixKey function. A" -" value \n" +"A common x25519 key, called «input key material», is computed for each message, \n" +"after which message encryption key is generated with a MixKey function. A value \n" "ck (chaining key) is kept while messages are being exchanged. \n" -"That value is used as a final input when generating keys for data " -"transferring." +"That value is used as a final input when generating keys for data transferring." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:138 msgid "" -"MixKey function looks something like this in the C++ implementation of " -"I2P:" +"MixKey function looks something like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:159 msgid "" -"**SessionRequest** message is made of a public x25519 Alice key (32 " -"bytes), a \n" +"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n" "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n" "(16 bytes) and some random data in the end (padding). Padding length is \n" -"defined in the encrypted block of data. Encrypted block also contains " -"length of \n" +"defined in the encrypted block of data. Encrypted block also contains length of \n" "the second part of the **SessionConfirmed** message. A block of data is \n" "encrypted and signed with a key derived from Alice's ephemeral key and \n" "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n" @@ -7893,38 +7187,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:170 msgid "" -"Since 32 bytes of public x25519 key can be detected by DPI, it is " -"encrypted with \n" -"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" " -"parameter \n" +"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n" +"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n" "from RouterInfo as an initialization vector (IV)." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:176 msgid "" -"**SessionCreated** message has the same structure as **SessionRequest**, " -"except \n" -"the key is computed based on ephemeral keys of both sides. IV generated " -"after \n" -"encrypting/decrypting public key from **SessionRequest** message is used " -"as IV \n" +"**SessionCreated** message has the same structure as **SessionRequest**, except \n" +"the key is computed based on ephemeral keys of both sides. IV generated after \n" +"encrypting/decrypting public key from **SessionRequest** message is used as IV \n" "for encrypting/decrypting ephemeral public key." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:183 msgid "" "**SessionConfirmed** message has 2 parts: public static key and Alice's \n" -"RouterInfo. The difference from previous messages is that ephemeral " -"public key \n" -"is encrypted with AEAD/Chaha20/Poly1305 using the same key as " -"**SessionCreated**. \n" +"RouterInfo. The difference from previous messages is that ephemeral public key \n" +"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n" "It leads to increasing first part of the message from 32 to 48 bytes. \n" -"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a" -" new \n" -"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo" -" part \n" -"can also be appended with random data padding, but it is not required, " -"since \n" +"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n" +"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n" +"can also be appended with random data padding, but it is not required, since \n" "RouterInfo usually has various length." msgstr "" @@ -7936,29 +7220,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:199 msgid "" -"If every hash and key verification has succeeded, a common ck value must " -"be \n" -"present after the last MixKey operation on both sides. This value is used" -" to \n" -"generate two sets of keys <k, sipk, sipiv> for each side of a connection." -" \"k\" is \n" -"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an " -"initial \n" +"If every hash and key verification has succeeded, a common ck value must be \n" +"present after the last MixKey operation on both sides. This value is used to \n" +"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n" +"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n" "value for SipHash IV, that is changed after each use." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:207 msgid "" -"Code used to generate keys looks like this in the C++ implementation of " -"I2P:" +"Code used to generate keys looks like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:246 msgid "" -"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array " -"are a \n" -"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, " -"but i2pd \n" +"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n" +"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n" "handles them as a single 16 bytes key." msgstr "" @@ -7985,28 +7262,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:271 msgid "" -"Message length is obfuscated by applying the XOR function with two first " -"bytes \n" +"Message length is obfuscated by applying the XOR function with two first bytes \n" "of the current SipHash IV." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:276 msgid "" -"Encrypted data part contains blocks of data. Each block is prepended with" -" 3 \n" -"bytes header, that defines block type and block length. Generally, I2NP " -"type \n" -"blocks are transferred, that are I2NP messages with an altered header. " -"One NTCP2 \n" +"Encrypted data part contains blocks of data. Each block is prepended with 3 \n" +"bytes header, that defines block type and block length. Generally, I2NP type \n" +"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n" "frame can transfer multiple I2NP blocks." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:283 msgid "" -"The other important data block type is a random data block. It is " -"recommended to \n" -"add a random data block to every NTCP2 frame. Only one random data block " -"can be \n" +"The other important data block type is a random data block. It is recommended to \n" +"add a random data block to every NTCP2 frame. Only one random data block can be \n" "added and it must be the last block." msgstr "" @@ -8016,12 +7287,8 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:293 msgid "" -"- RouterInfo — usually contains Bob's RouterInfo after the connection " -"has been established, but it can also contain RouterInfo of a random node" -" for the purpose of speeding up floodfills (there is a flags field for " -"that case). \n" -"- Termination — is used when a host explicitly terminates a connection " -"and specifies a reason for that.\n" +"- RouterInfo — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n" +"- Termination — is used when a host explicitly terminates a connection and specifies a reason for that.\n" "- DateTime — a current time in seconds." msgstr "" @@ -8033,14 +7300,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:305 msgid "" -"The new I2P transport protocol NTCP2 provides effective resistance " -"against DPI \n" -"censorship. It also results in reduced CPU load because of the faster, " -"modern \n" -"cryptography used. It makes I2P more likely to run on low-end devices, " -"such as \n" -"smartphones and home routers. Both major I2P implementations have full " -"support \n" +"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n" +"censorship. It also results in reduced CPU load because of the faster, modern \n" +"cryptography used. It makes I2P more likely to run on low-end devices, such as \n" +"smartphones and home routers. Both major I2P implementations have full support \n" "for NTCP2 and it make NTCP2 available for use starting with version \n" "0.9.36 (Java) and 2.20 (i2pd, C++)." msgstr "" @@ -8126,7 +7389,8 @@ msgid "i2psnark: Add icon for comments" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60 -msgid "i2ptunnel: Change read timeout defaults to account for streaming changes" +msgid "" +"i2ptunnel: Change read timeout defaults to account for streaming changes" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61 @@ -8151,7 +7415,8 @@ msgid "0.9.37 with NTCP2 enabled" msgstr "" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16 -msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2." +msgid "" +"0.9.37 enables the faster, more secure transport protocol called NTCP2." msgstr "" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30 @@ -8192,27 +7457,19 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:18 msgid "" "`Invisible Internet Project`_ (I2P) provides a framework for\n" -"developing privacy-aware applications. It is a virtual network working on" -" top of\n" -"the regular Internet, in which hosts can exchange data without disclosing" -" their\n" -"\"real\" IP addresses. Connections inside I2P network are established " -"between \n" -"virtual addresses called *I2P destinations*. It's possible to have as " -"many\n" -"of destinations as one needs, even use a new destination for each " -"connection,\n" -"they don't disclose any information about the real IP address to the " -"other\n" +"developing privacy-aware applications. It is a virtual network working on top of\n" +"the regular Internet, in which hosts can exchange data without disclosing their\n" +"\"real\" IP addresses. Connections inside I2P network are established between \n" +"virtual addresses called *I2P destinations*. It's possible to have as many\n" +"of destinations as one needs, even use a new destination for each connection,\n" +"they don't disclose any information about the real IP address to the other\n" "side." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:31 msgid "" -"This article describes basic concepts one needs to know when developing " -"I2P\n" -"applications. Code samples are written in Python with the use of built-in" -"\n" +"This article describes basic concepts one needs to know when developing I2P\n" +"applications. Code samples are written in Python with the use of built-in\n" "asynchronous framework asyncio." msgstr "" @@ -8225,15 +7482,11 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:42 msgid "" "I2P provides many different APIs to the client applications. Regular\n" -"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java " -"applications \n" -"usually use I2CP. For developing with other languages, like Python, the " -"best \n" +"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n" +"usually use I2CP. For developing with other languages, like Python, the best \n" "option is `SAM`_. SAM is disabled by \n" -"default in the original Java client implementation, so we need to enable " -"it. \n" -"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run " -"at Startup\" \n" +"default in the original Java client implementation, so we need to enable it. \n" +"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n" "and press \"Start\", then \"Save Client Configuration\"." msgstr "" @@ -8254,12 +7507,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:79 msgid "" -"This library works with the Python's built-in `asynchronous framework " -"asyncio`_,\n" -"so please note that code samples are taken from async functions " -"(coroutines)\n" -"which are running inside the event loop. Additional examples of i2plib " -"usage can\n" +"This library works with the Python's built-in `asynchronous framework asyncio`_,\n" +"so please note that code samples are taken from async functions (coroutines)\n" +"which are running inside the event loop. Additional examples of i2plib usage can\n" "be found in the `source code repository`_." msgstr "" @@ -8271,10 +7521,8 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:94 msgid "" -"I2P destination is literally a set of encryption and cryptographic " -"signature\n" -"keys. Public keys from this set are published to the I2P network and are " -"used to\n" +"I2P destination is literally a set of encryption and cryptographic signature\n" +"keys. Public keys from this set are published to the I2P network and are used to\n" "make connections instead of IP addresses." msgstr "" @@ -8284,28 +7532,22 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:112 msgid "" -"base32 address is a hash which is used by other peers to discover your " -"full\n" -"Destination in the network. If you plan to use this destination as a " -"permanent\n" -"address in your program, save the binary data from " -"*dest.private\\_key.data* \n" +"base32 address is a hash which is used by other peers to discover your full\n" +"Destination in the network. If you plan to use this destination as a permanent\n" +"address in your program, save the binary data from *dest.private\\_key.data* \n" "to a local file." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:119 msgid "" -"Now you can create a SAM session, which literally means to make the " -"Destination\n" +"Now you can create a SAM session, which literally means to make the Destination\n" "online in I2P:" msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:130 msgid "" -"Important note here: Destination will remain online while " -"*session\\_writer* socket\n" -"is kept open. If you wish to switch it off, you can call " -"*session\\_writer.close()*." +"Important note here: Destination will remain online while *session\\_writer* socket\n" +"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:135 @@ -8316,11 +7558,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:140 msgid "" -"Now when the Destination is online, you can use it to connect to other " -"peers.\n" +"Now when the Destination is online, you can use it to connect to other peers.\n" "For example, this is how you connect to\n" -"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send " -"HTTP GET\n" +"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n" "request and read the response (it is \"i2p-projekt.i2p\" web server):" msgstr "" @@ -8332,20 +7572,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:171 msgid "" -"While making outgoing connections is trivial, when you accept connections" -" there\n" -"is one important detail. After a new client is connected, SAM API sends " -"an ASCII\n" -"string with base64-encoded client's Destination to the socket. Since " -"Destination \n" +"While making outgoing connections is trivial, when you accept connections there\n" +"is one important detail. After a new client is connected, SAM API sends an ASCII\n" +"string with base64-encoded client's Destination to the socket. Since Destination \n" "and data can come in one chunk, you should be aware of it." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:178 msgid "" "This is how a simple PING-PONG server looks like. It accepts incoming\n" -"connection, saves client's Destination to a *remote\\_destination* " -"variable and\n" +"connection, saves client's Destination to a *remote\\_destination* variable and\n" "sends back \"PONG\" string:" msgstr "" @@ -8357,21 +7593,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:208 msgid "" -"This article describes the usage of a TCP-like Streaming protocol. SAM " -"API also\n" -"provides a UDP-like protocol to send and receive datagrams. This feature " -"will\n" +"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n" +"provides a UDP-like protocol to send and receive datagrams. This feature will\n" "be added to i2plib later." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:214 msgid "" -"This is just a basic information, but it's enough to start your own " -"project with\n" -"the use of I2P. Invisible Internet is a great tool to develop all kinds " -"of\n" -"privacy-aware applications. There are no design constraints by the " -"network,\n" +"This is just a basic information, but it's enough to start your own project with\n" +"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n" +"privacy-aware applications. There are no design constraints by the network,\n" "those applications can be client-server as well as P2P." msgstr "" @@ -8387,8 +7618,7 @@ msgstr "" msgid "" "0.9.38 includes a new first-install wizard with a bandwidth tester.\n" "We've added support for the latest GeoIP database format.\n" -"There's a new Firefox profile installer and a new, native Mac OSX " -"installer on our website.\n" +"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n" "Work continues on supporting the new \"LS2\" netdb format." msgstr "" @@ -8480,25 +7710,25 @@ msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:16 msgid "" -"There are many projects in the I2P world that we are excited about, but " -"not all of them are ready for prime-time. We decided to create a place " -"where we can make those available for anyone interested in trying them " -"out, that will serve as proving grounds for projects that may one day " -"become official I2P products. This place is the `I2P Laboratory`_." +"There are many projects in the I2P world that we are excited about, but not " +"all of them are ready for prime-time. We decided to create a place where we" +" can make those available for anyone interested in trying them out, that " +"will serve as proving grounds for projects that may one day become official " +"I2P products. This place is the `I2P Laboratory`_." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:22 msgid "" -"In the lab we will be offering downoads ready for you to try. Keep in " -"mind that they are not going to be \"release\" quality, and some may not " -"even be \"beta\" quality. We do not offer official support for them. " -"Any of the lab projects may get discontinued at any time." +"In the lab we will be offering downoads ready for you to try. Keep in mind " +"that they are not going to be \"release\" quality, and some may not even be " +"\"beta\" quality. We do not offer official support for them. Any of the " +"lab projects may get discontinued at any time." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:26 msgid "" -"If you are feeling adventurous we invite you to try our ideas. We " -"welcome your feedback at the `I2P Lab Forum`_." +"If you are feeling adventurous we invite you to try our ideas. We welcome " +"your feedback at the `I2P Lab Forum`_." msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2 @@ -8511,17 +7741,14 @@ msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16 msgid "" -"0.9.39 includes extensive changes for the new network database types " -"(proposal 123).\n" -"We've bundled the i2pcontrol plugin as a webapp to support development of" -" RPC applications.\n" +"0.9.39 includes extensive changes for the new network database types (proposal 123).\n" +"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n" "There are numerous performance improvements and bug fixes." msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22 msgid "" -"We've removed the midnight and classic themes to reduce the maintenance " -"burden;\n" +"We've removed the midnight and classic themes to reduce the maintenance burden;\n" "previous users of those themes will now see the dark or light theme.\n" "There's also new home page icons, a first step in updating the console." msgstr "" @@ -8598,14 +7825,12 @@ msgstr "" msgid "" "0.9.40 includes support for the new encrypted leaseset format.\n" "We disabled the old NTCP 1 transport protocol.\n" -"There's a new SusiDNS import feature, and a new scripted filtering " -"mechanism for incoming connections." +"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections." msgstr "" #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22 msgid "" -"We've made a lot of improvements to the OSX native installer, and we've " -"updated the IzPack installer as well.\n" +"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n" "The work continues on refreshing the console with new icons.\n" "As usual, we've fixed lots of bugs as well!" msgstr "" @@ -8708,24 +7933,16 @@ msgid "" "::\n" "\n" " What is I2P-bote?\n" -" I2P-bote is a private messaging system built on i2p, which has " -"additional\n" -" features to make it even more difficult to discern information " -"about the\n" -" messages that are transmitted. Because of this, it can be used " -"to transmit\n" -" private messages securely while tolerating high latency and not" -" relying on\n" -" a centralized relay to send messages when the sender goes " -"offline. This is\n" -" in contrast to almost every other popular private messaging " -"system, which\n" -" either require both parties to be online or rely on a semi-" -"trusted service\n" +" I2P-bote is a private messaging system built on i2p, which has additional\n" +" features to make it even more difficult to discern information about the\n" +" messages that are transmitted. Because of this, it can be used to transmit\n" +" private messages securely while tolerating high latency and not relying on\n" +" a centralized relay to send messages when the sender goes offline. This is\n" +" in contrast to almost every other popular private messaging system, which\n" +" either require both parties to be online or rely on a semi-trusted service\n" " which transmits messages on behalf of senders who go offline.\n" "\n" -" or, ELI5: It's used similarly to e-mail, but it suffers from " -"none of e-mail's\n" +" or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n" " privacy defects." msgstr "" @@ -8807,11 +8024,9 @@ msgid "" " character set into binary.\n" "2. Second, take bytes 386 and 387 and convert them to a single\n" " Big-Endian integer.\n" -"3. Add the number you computed from the two bytes in step two to 387. " -"This is\n" +"3. Add the number you computed from the two bytes in step two to 387. This is\n" " the length of the base64 destination.\n" -"4. Take that nummber of bytes from the front of the full destination to " -"get\n" +"4. Take that nummber of bytes from the front of the full destination to get\n" " the destination as a range of bytes.\n" "5. Convert back to a base64 representation using i2p's base64 character\n" " set." @@ -8862,8 +8077,7 @@ msgid "" "\n" "::\n" "\n" -" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-" -"config/i2pbote/local_dest.key" +" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149 @@ -8918,8 +8132,7 @@ msgid "" "\n" "Now that you've got the correct destination for your I2P-Bote node, the\n" "final step is to add yourself to the default peers list for `I2P-Bote\n" -"here <https://github.com/i2p/i2p.i2p-" -"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" +"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" "here. You can do this by forking the repository, adding yourself to the\n" "list with your name commented out, and your 516-char destination\n" "directly below it, like this:" @@ -8932,12 +8145,7 @@ msgid "" "::\n" "\n" " # idk\n" -" QuabT3H5ljZyd-PXCQjvDzdfCec-" -"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-" -"bkSo0gEhB-" -"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA" -"~z0Nus-" -"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" +" QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205 @@ -8958,38 +8166,25 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10 msgid "" -"Although the Java I2P router comes pre-configured with a static web " -"server,\n" -"jetty, to provide the user's first eepSite, many require more " -"sophisticated\n" -"functionality from their web server and would rather create an eepSite " -"with a\n" -"different server. This is of course possible, and actually is really easy" -" once\n" +"Although the Java I2P router comes pre-configured with a static web server,\n" +"jetty, to provide the user's first eepSite, many require more sophisticated\n" +"functionality from their web server and would rather create an eepSite with a\n" +"different server. This is of course possible, and actually is really easy once\n" "you've done it one time." msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18 msgid "" -"Although it is easy to do, there are a few things you should consider " -"before\n" -"doing it. You will want to remove identifying characteristics from your " -"web\n" -"server, like potentially identifying headers and default error pages that" -"\n" -"report the server/distro type. More information about threats to " -"anonymity\n" +"Although it is easy to do, there are a few things you should consider before\n" +"doing it. You will want to remove identifying characteristics from your web\n" +"server, like potentially identifying headers and default error pages that\n" +"report the server/distro type. More information about threats to anonymity\n" "posed by improperly configured applications see:\n" -"`Riseup here: <https://riseup.net/en/security/network-security/tor" -"/onionservices-best-practices>`__,\n" +"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n" "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n" -"`This blog article for some opsec fails: " -"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__," -"\n" -"`and the I2P applications page here " -"<https://geti2p.net/en/docs/applications/supported>`__.\n" -"Although much of this information is expressed for Tor Onion Services, " -"the same\n" +"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n" +"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n" +"Although much of this information is expressed for Tor Onion Services, the same\n" "procedures and principles apply to hosting applications over I2P." msgstr "" @@ -9000,8 +8195,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35 msgid "" "Go to the I2P web interface at 127.0.0.1:7657 and open the\n" -"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links" -" to\n" +"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n" "localhost). Click the button that says \"Tunnel Wizard\" to begin." msgstr "" @@ -9011,8 +8205,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48 msgid "" -"The tunnel wizard is very simple. Since we're setting up an http " -"*server*, all\n" +"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n" "we need to do is select a *server* tunnel." msgstr "" @@ -9022,15 +8215,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60 msgid "" -"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP " -"services.\n" +"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n" "It has filtering and rate-limiting features enabled that are tailored\n" -"specifically to that purpose. A standard tunnel may work as well, but if " -"you\n" -"select a atandard tunnel you'll need to take care of those security " -"features\n" -"yourself. A more in-depth dive into the HTTP Tunnel configuration is " -"available\n" +"specifically to that purpose. A standard tunnel may work as well, but if you\n" +"select a atandard tunnel you'll need to take care of those security features\n" +"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n" "in the next tutorial." msgstr "" @@ -9040,12 +8229,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76 msgid "" -"For your own benefit and ability to remeber and distinguish the what you " -"are\n" -"using the tunnel for, give it a good nickname and description. If you " -"need to\n" -"come back and do more management later, then this is how you will " -"identify the\n" +"For your own benefit and ability to remeber and distinguish the what you are\n" +"using the tunnel for, give it a good nickname and description. If you need to\n" +"come back and do more management later, then this is how you will identify the\n" "tunnel in the hidden services manager." msgstr "" @@ -9055,12 +8241,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90 msgid "" -"In this step, you point the web server at the TCP port where your web " -"server is\n" -"listening. Since most web servers listen on port 80 or port 8080, the " -"example\n" -"shows that. If you use alternate ports or virtual machines or containers " -"to\n" +"In this step, you point the web server at the TCP port where your web server is\n" +"listening. Since most web servers listen on port 80 or port 8080, the example\n" +"shows that. If you use alternate ports or virtual machines or containers to\n" "isolate your web services, you may need to adjust the host, port, or both." msgstr "" @@ -9078,12 +8261,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115 msgid "" -"Finally, take a look at the settings you have selected. If you approve, " -"save\n" -"them. If you did not choose to start the tunnel automatically, go to the " -"hidden\n" -"services manager and start it manually when you wish to make your service" -"\n" +"Finally, take a look at the settings you have selected. If you approve, save\n" +"them. If you did not choose to start the tunnel automatically, go to the hidden\n" +"services manager and start it manually when you wish to make your service\n" "available." msgstr "" @@ -9093,10 +8273,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129 msgid "" -"I2P provides a detailed panel for configuring the http server tunnel in " -"custom\n" -"ways. I'll finish this tutorial by walking through all of them. " -"Eventually." +"I2P provides a detailed panel for configuring the http server tunnel in custom\n" +"ways. I'll finish this tutorial by walking through all of them. Eventually." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4 @@ -9109,38 +8287,28 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10 msgid "" -"This blog post is intended as a general guide to running a mirror of a " -"clear-net\n" -"service as an eepSite. It elaborates on the previous blog post about " -"basic\n" +"This blog post is intended as a general guide to running a mirror of a clear-net\n" +"service as an eepSite. It elaborates on the previous blog post about basic\n" "I2PTunnel tunnels." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16 msgid "" -"Unfortunately, it's probably impossible to *completely* cover all " -"possible cases\n" -"of making an existing web site available as an eepSite, there's simply " -"too\n" +"Unfortunately, it's probably impossible to *completely* cover all possible cases\n" +"of making an existing web site available as an eepSite, there's simply too\n" "diverse an array of server-side software, not to mention the in-practice\n" -"peculiarities of any particular deployment of software. Instead, I'm " -"going to\n" -"try and convey, as specifically as possible, the general process " -"preparing a\n" +"peculiarities of any particular deployment of software. Instead, I'm going to\n" +"try and convey, as specifically as possible, the general process preparing a\n" "service for deployment to the eepWeb or other hidden services." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25 msgid "" -"Much of this guide will be treating the reader as a conversational " -"participant,\n" -"in particular If I really mean it I will address the reader directly(i.e." -" using\n" -"\"you\" instead of \"one\") and I'll frequently head sections with " -"questions I think\n" +"Much of this guide will be treating the reader as a conversational participant,\n" +"in particular If I really mean it I will address the reader directly(i.e. using\n" +"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n" "the reader might be asking. This is, after all, a \"process\" that an\n" -"administrator must consider themselves \"involved\" in just like hosting " -"any other\n" +"administrator must consider themselves \"involved\" in just like hosting any other\n" "service." msgstr "" @@ -9150,16 +8318,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37 msgid "" -"While it would be wonderful, it's probably impossible for me to put " -"specific\n" -"instructions for every single kind of software that one might use to host" -" web\n" -"sites. As such, this tutorial requires some assumptions on the part of " -"the\n" -"writer and some critical thinking and common sense on the part of the " -"reader.\n" -"To be clear, **I have assumed that the person following this tutorial " -"is**\n" +"While it would be wonderful, it's probably impossible for me to put specific\n" +"instructions for every single kind of software that one might use to host web\n" +"sites. As such, this tutorial requires some assumptions on the part of the\n" +"writer and some critical thinking and common sense on the part of the reader.\n" +"To be clear, **I have assumed that the person following this tutorial is**\n" "**already operating a clear-web service linkable to a real identity or**\n" "**organization** and thus is simply offering anonymous access and not\n" "anonymizing themselves." @@ -9167,22 +8330,17 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48 msgid "" -"Thus, **it makes no attempt whatsoever to anonymize** a connection from " -"one\n" -"server to another. If you want to run a new, un-linkable hidden service " -"that\n" -"makes server-to-server connections, additional steps will be required and" -" will\n" +"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n" +"server to another. If you want to run a new, un-linkable hidden service that\n" +"makes server-to-server connections, additional steps will be required and will\n" "be covered in another tutorial." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55 msgid "" "That said: If you can be sure that a *brand new service* which is *not*\n" -"*available to the clear-web* will never make a server-to-server " -"connection and\n" -"will not leak server metadata in responses to clients, then services " -"configured\n" +"*available to the clear-web* will never make a server-to-server connection and\n" +"will not leak server metadata in responses to clients, then services configured\n" "in this way will be anonymous." msgstr "" @@ -9196,16 +8354,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68 msgid "" -"In practice, your web service probably uses a number of things to enhance" -" it's\n" -"reliability and security. These things could be proxies, reverse proxies," -"\n" -"containers, tunnels, Intrusion Detection Systems, rate-limiters, load " -"balancers,\n" -"among many other things. When you get started, you should go through your" -"\n" -"deployment and determine which software you are using, and what you are " -"using it\n" +"In practice, your web service probably uses a number of things to enhance it's\n" +"reliability and security. These things could be proxies, reverse proxies,\n" +"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n" +"among many other things. When you get started, you should go through your\n" +"deployment and determine which software you are using, and what you are using it\n" "for." msgstr "" @@ -9215,8 +8368,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80 msgid "" -"These questions should help you evaluate what parts of your software " -"stack are\n" +"These questions should help you evaluate what parts of your software stack are\n" "relevant to your I2P eepSite." msgstr "" @@ -9226,16 +8378,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88 msgid "" -"If you are using software which alters the behavior of traffic based on " -"the IP\n" -"address of the sender, these things will probably not work with I2P, or " -"may work\n" -"in complicated or unexpected ways. This is because the address will " -"usually be\n" -"the localhost, or at least the host where your I2P router is running. " -"Software\n" -"which sometimes does things based on IP addresses could be Fail2Ban, " -"iptables,\n" +"If you are using software which alters the behavior of traffic based on the IP\n" +"address of the sender, these things will probably not work with I2P, or may work\n" +"in complicated or unexpected ways. This is because the address will usually be\n" +"the localhost, or at least the host where your I2P router is running. Software\n" +"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n" "and similar applications." msgstr "" @@ -9245,10 +8392,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100 msgid "" -"Some software may be configured to add information to the traffic it " -"handles.\n" -"Obviously, if this information is identifying it should not be part of " -"the chain\n" +"Some software may be configured to add information to the traffic it handles.\n" +"Obviously, if this information is identifying it should not be part of the chain\n" "of services that is exposed to the I2P network." msgstr "" @@ -9260,37 +8405,27 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109 msgid "" -"Some software may also draw from remote resources, to find up-to-date " -"rules and\n" -"block lists which can be used to prevent attacks. Some of these might be " -"useful\n" -"as part of the service that is exposed to I2P, but you should make sure " -"that the\n" -"rules are applicable and that a rules update cannot be triggered as a " -"result of\n" -"a normal client request. This would create a server-to-server " -"communication\n" +"Some software may also draw from remote resources, to find up-to-date rules and\n" +"block lists which can be used to prevent attacks. Some of these might be useful\n" +"as part of the service that is exposed to I2P, but you should make sure that the\n" +"rules are applicable and that a rules update cannot be triggered as a result of\n" +"a normal client request. This would create a server-to-server communication\n" "which could reveal the timing of an I2P communication to a third party." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118 msgid "" -"Step two: Determine which port to Forward to I2P and Optionally locate " -"your TLS certificate" +"Step two: Determine which port to Forward to I2P and Optionally locate your " +"TLS certificate" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121 msgid "" -"Now you've gathered all the information that you will require to forward " -"your\n" -"service to I2P. Once you've selected the point at which you would like to" -" make\n" -"your site available to I2P, you will need to note the port you wish to " -"foward.\n" -"In simple scenarios, this will probably just be port 80 or port 8080. In " -"more\n" -"sophisticated scenarios, this might be a reverse proxy or something like " -"that.\n" +"Now you've gathered all the information that you will require to forward your\n" +"service to I2P. Once you've selected the point at which you would like to make\n" +"your site available to I2P, you will need to note the port you wish to foward.\n" +"In simple scenarios, this will probably just be port 80 or port 8080. In more\n" +"sophisticated scenarios, this might be a reverse proxy or something like that.\n" "Make a note of the port." msgstr "" @@ -9300,18 +8435,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133 msgid "" -"Should you be a non-anonymous organization that wishes to provide " -"enhanced\n" -"privacy to your users by providing a hidden service, you may wish to " -"establish\n" -"a common identity between versions of your site. However, since we can't " -"add\n" -"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we " -"have to do\n" -"this in another way. To do this, **even if you are forwarding the HTTP " -"port**\n" -"**and not HTTPS**, make a note of the location of your TLS certificate " -"for use\n" +"Should you be a non-anonymous organization that wishes to provide enhanced\n" +"privacy to your users by providing a hidden service, you may wish to establish\n" +"a common identity between versions of your site. However, since we can't add\n" +"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n" +"this in another way. To do this, **even if you are forwarding the HTTP port**\n" +"**and not HTTPS**, make a note of the location of your TLS certificate for use\n" "in the final step." msgstr "" @@ -9321,10 +8450,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146 msgid "" -"Congratulations! You've completed the most difficult part. From here on, " -"the\n" -"decisions you must make, and the consequences that they will have, are " -"much\n" +"Congratulations! You've completed the most difficult part. From here on, the\n" +"decisions you must make, and the consequences that they will have, are much\n" "more straightforward and easy to enumerate. Such is the beauty of a\n" "cryptographically secure network layer like I2P!" msgstr "" @@ -9336,20 +8463,13 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158 msgid "" "For eepSites, you will need to create an HTTP Server Tunnel. This is\n" -"an I2P destination with a few special features for hosting HTTP services " -"to\n" -"enable things like rate-limiting, filtering, and the inclusion of headers" -" to\n" -"identify the destination of the client to the server. These enable " -"flexibility\n" -"in how you handle connections in terms of load-balancing and rate-" -"limiting on\n" -"a case-by-case basis, among other things. Explore these options and how " -"they\n" -"relate to the applications which you considered in step one, even though " -"a very\n" -"simple setup is easy, larger sites may benefit from taking advantage of " -"these\n" +"an I2P destination with a few special features for hosting HTTP services to\n" +"enable things like rate-limiting, filtering, and the inclusion of headers to\n" +"identify the destination of the client to the server. These enable flexibility\n" +"in how you handle connections in terms of load-balancing and rate-limiting on\n" +"a case-by-case basis, among other things. Explore these options and how they\n" +"relate to the applications which you considered in step one, even though a very\n" +"simple setup is easy, larger sites may benefit from taking advantage of these\n" "features." msgstr "" @@ -9359,98 +8479,70 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173 msgid "" -"If you've configured a reverse proxy or an SSH tunnel before, then the " -"general\n" +"If you've configured a reverse proxy or an SSH tunnel before, then the general\n" "idea here should be very familiar to you. I2PTunnel, in essence, is just\n" -"forwarding ports from the host to the I2P Network. To set this up using " -"the web\n" +"forwarding ports from the host to the I2P Network. To set this up using the web\n" "interface, go to the I2PTunnel configuration page." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180 msgid "" -"At the bottom of the \"I2P Hidden Services\" section of the page, select " -"an HTTP\n" +"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n" "Service from the drop-down and click \"Create.\"" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189 msgid "" -"It will immediately drop you into the granular tunnel configuration page," -" which\n" -"we're about to explore from top-to-bottom. The first, most essential " -"settings\n" -"are the tunnel name and the target host:port. **The target host:port is**" -"\n" -"**the place where you input the address of the service you are forwarding" -" to**\n" -"**I2P**. Once you've configured that, your web site will become available" -" over\n" +"It will immediately drop you into the granular tunnel configuration page, which\n" +"we're about to explore from top-to-bottom. The first, most essential settings\n" +"are the tunnel name and the target host:port. **The target host:port is**\n" +"**the place where you input the address of the service you are forwarding to**\n" +"**I2P**. Once you've configured that, your web site will become available over\n" "i2p. However, there are probably a few things that we can improve." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202 msgid "" -"Next, you may want to pick a hostname to use for your eepSite. This " -"hostname\n" -"doesn't need to be universally unique, for now, it will only be used " -"locally.\n" -"We'll publish it to an address helper later. **If** the *Local " -"Destination*\n" -"field isn't populated with your Base64 Destination yet, you should scroll" -" down\n" +"Next, you may want to pick a hostname to use for your eepSite. This hostname\n" +"doesn't need to be universally unique, for now, it will only be used locally.\n" +"We'll publish it to an address helper later. **If** the *Local Destination*\n" +"field isn't populated with your Base64 Destination yet, you should scroll down\n" "to the bottom, save the tunnel configuration, and return to the tunnel\n" "configuration." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215 msgid "" -"A little further down the configuration page, the tunnel options are " -"available.\n" -"Since you've got a site which is not intended to be anonymous, but rather" -" to\n" -"provide anonymous access to others by an alternate gateway, it may be " -"good to\n" +"A little further down the configuration page, the tunnel options are available.\n" +"Since you've got a site which is not intended to be anonymous, but rather to\n" +"provide anonymous access to others by an alternate gateway, it may be good to\n" "reduce the number of hops the tunnel takes on the I2P network." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226 msgid "" -"Next are the encrypted leaseset options. You can probably leave these as " -"the\n" -"defaults, since your site isn't anonymous it probably doesn't need " -"features like\n" -"blinding or encrypted leasesets. If you were to choose encrypted " -"leasesets, you\n" -"would not be accessible to anyone unless you shared a key with them in " -"advance." +"Next are the encrypted leaseset options. You can probably leave these as the\n" +"defaults, since your site isn't anonymous it probably doesn't need features like\n" +"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n" +"would not be accessible to anyone unless you shared a key with them in advance." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237 msgid "" -"The next few parts may be especially useful to you if you run a high-" -"traffic\n" -"site or find yourself subject to DDOS attacks. Here you can configure " -"various\n" +"The next few parts may be especially useful to you if you run a high-traffic\n" +"site or find yourself subject to DDOS attacks. Here you can configure various\n" "kinds of connection limits." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247 msgid "" -"After that, there are a few other ways of filtering connections by client" -"\n" -"characteristics. First, you can block access via inproxies like I2P.to " -"and\n" -"similar. Since you have a clearnet presence already, changing this may be" -" better\n" -"if you want to encourage I2P users to only use your eepSite. You can also" -" block\n" -"accesses via specific user-agents, for instance blocking wget may be " -"helpful if\n" -"you want to prevent spidering. Finally, and of particular interest to " -"Fail2Ban\n" -"users, the \"Unique local address per client\" will give each client it's" -" own\n" +"After that, there are a few other ways of filtering connections by client\n" +"characteristics. First, you can block access via inproxies like I2P.to and\n" +"similar. Since you have a clearnet presence already, changing this may be better\n" +"if you want to encourage I2P users to only use your eepSite. You can also block\n" +"accesses via specific user-agents, for instance blocking wget may be helpful if\n" +"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n" +"users, the \"Unique local address per client\" will give each client it's own\n" "local IP address instead of them all appearing to the server to be from\n" "127.0.0.1." msgstr "" @@ -9461,10 +8553,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271 msgid "" -"Lastly, you can set up an advanced filter definition. Writing filters is " -"beyond\n" -"what I'm prepared to do in this document, for more information see the " -"format\n" +"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n" +"what I'm prepared to do in this document, for more information see the format\n" "specification for now." msgstr "" @@ -9474,22 +8564,16 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284 msgid "" -"One interesting thing that I2P can do is host the same site on multiple " -"servers\n" -"at the same time transparently, which is referred to as \"Multihoming.\" " -"In order\n" -"to multihome your application, you will need to return to the tunnel menu" -" and\n" -"change the location of your private key file to it's own, non-shared " -"location." +"One interesting thing that I2P can do is host the same site on multiple servers\n" +"at the same time transparently, which is referred to as \"Multihoming.\" In order\n" +"to multihome your application, you will need to return to the tunnel menu and\n" +"change the location of your private key file to it's own, non-shared location." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295 msgid "" -"When you're done, copy the new key file for your new multihomed service " -"to a\n" -"storage device. Now, you can re-produce your service/tunnel configuration" -" with\n" +"When you're done, copy the new key file for your new multihomed service to a\n" +"storage device. Now, you can re-produce your service/tunnel configuration with\n" "those same keys on any I2P router and increase your service's redundancy." msgstr "" @@ -9499,11 +8583,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304 msgid "" -"Since you're running an anonymously accessible instance of an existing " -"clear-net\n" +"Since you're running an anonymously accessible instance of an existing clear-net\n" "service, you'll probably want to leverage some existing form of trust to\n" -"distribute your eepSite URL, like a TLS Certificate signed by a " -"recognized and\n" +"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n" "reputable authority. What can I say we live in an imperfect world." msgstr "" @@ -9513,29 +8595,23 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316 msgid "" -"The simplest way to provide a link to your eepSite using an existing site" -" to\n" -"distribute the link is to distribute a so-called \"Base32\" address. The " -"Base32\n" -"address is the hash of the public key of your I2P destination, so it " -"cannot be\n" -"forged if it is provided by a reliable source. In the case of a clear-net" -" site\n" +"The simplest way to provide a link to your eepSite using an existing site to\n" +"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n" +"address is the hash of the public key of your I2P destination, so it cannot be\n" +"forged if it is provided by a reliable source. In the case of a clear-net site\n" "with a hidden service presence, one of those places is likely to be that\n" "clear-net site." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325 msgid "" -"Your base32 address is visible on the main i2ptunnel configuration page " -"and it\n" +"Your base32 address is visible on the main i2ptunnel configuration page and it\n" "looks like this:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334 msgid "" -"Your users can copy-and-paste this link directly into their I2P browsers " -"and\n" +"Your users can copy-and-paste this link directly into their I2P browsers and\n" "it will just work, no additional configuration required." msgstr "" @@ -9545,17 +8621,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342 msgid "" -"You can also distribute a human-readable link to suggest to your " -"potential users\n" -"by taking advantage of I2P's \"Address Book\" feature, which allows the " -"users to\n" +"You can also distribute a human-readable link to suggest to your potential users\n" +"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n" "decide to assign a human-readable domain name to your cryptographically\n" -"assured identity. You can do this by distributing a specially crafted " -"link\n" -"containing the domain name that you want to suggest, followed by a slash," -"\n" -"followed by ?i2paddresshelper=, followed by the Local Destination of the " -"tunnel\n" +"assured identity. You can do this by distributing a specially crafted link\n" +"containing the domain name that you want to suggest, followed by a slash,\n" +"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n" "you just created, which you can see here:" msgstr "" @@ -9565,14 +8636,10 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364 msgid "" -"I keep saying suggest because when the such a link is visited, I2P asks " -"for the\n" -"user's consent to add this human-readable name to the user's local " -"address book.\n" -"That means there is no expectation that this domain be universally agreed" -" upon\n" -"by all visitors on the I2P network, whereas in the case of base32 " -"addresses,\n" +"I keep saying suggest because when the such a link is visited, I2P asks for the\n" +"user's consent to add this human-readable name to the user's local address book.\n" +"That means there is no expectation that this domain be universally agreed upon\n" +"by all visitors on the I2P network, whereas in the case of base32 addresses,\n" "the opposite is true." msgstr "" @@ -9582,16 +8649,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375 msgid "" -"Nonetheless, there do exist publicly available address subscription " -"feeds, and\n" -"special services for discovering new human-readable addresses, such as " -"no.i2p,\n" -"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or " -"Jump\n" -"Services, and can also be subscribed to automatically. This may be " -"espescially\n" -"helpful to users of your service who wish to acquire the address without " -"leaving\n" +"Nonetheless, there do exist publicly available address subscription feeds, and\n" +"special services for discovering new human-readable addresses, such as no.i2p,\n" +"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n" +"Services, and can also be subscribed to automatically. This may be espescially\n" +"helpful to users of your service who wish to acquire the address without leaving\n" "I2P or visiting your clearnet service." msgstr "" @@ -9609,10 +8671,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405 msgid "" -"Most of the security issues of hosting Tor hidden services also apply to " -"I2P. It\n" -"would be advisable to take advantage of their resources as well as this " -"one:" +"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n" +"would be advisable to take advantage of their resources as well as this one:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410 @@ -9665,27 +8725,19 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10 msgid "" -"This is a tutorial on how to set up and tweak an I2P tunnel in order to " -"use it\n" -"to access an SSH server remotely, using either I2P or i2pd. For now, it " -"assumes\n" -"you will install your SSH server from a package manager and that it's " -"running\n" +"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n" +"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n" +"you will install your SSH server from a package manager and that it's running\n" "as a service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17 msgid "" -"Considerations: In this guide, I'm assuming a few things. They will need " -"to be\n" -"adjusted depending on the complications that arise in your particular " -"setup,\n" -"especially if you use VM's or containers for isolation. This assumes that" -" the\n" -"I2P router and the ssh server are running on the same localhost. You " -"should be\n" -"using newly-generated SSH host keys, either by using a freshly installed " -"sshd,\n" +"Considerations: In this guide, I'm assuming a few things. They will need to be\n" +"adjusted depending on the complications that arise in your particular setup,\n" +"especially if you use VM's or containers for isolation. This assumes that the\n" +"I2P router and the ssh server are running on the same localhost. You should be\n" +"using newly-generated SSH host keys, either by using a freshly installed sshd,\n" "or by deleting old keys and forcing their re-generation. For example:" msgstr "" @@ -9700,9 +8752,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41 msgid "" -"Using java I2P's web interface, navigate to the (Links to your Router " -"Console)\\ `Hidden Services Manager " -"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n" +"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n" "and start the tunnel wizard." msgstr "" @@ -9713,15 +8763,13 @@ msgstr "Creazione guidata tunnel" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49 msgid "" -"Since you are setting up this tunnel for the SSH server, you need to " -"select the\n" +"Since you are setting up this tunnel for the SSH server, you need to select the\n" "\"Server\" tunnel type." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58 msgid "" -"You should fine-tune it later, but the Standard tunnel type is easiest to" -" start\n" +"You should fine-tune it later, but the Standard tunnel type is easiest to start\n" "with." msgstr "" @@ -9744,23 +8792,17 @@ msgstr "Impostazioni Avanzate" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92 msgid "" -"Now head back over the the Hidden Services Manager, and look over the " -"available\n" -"advanced settings. One thing you'll definitely want to change is to set " -"it up\n" +"Now head back over the the Hidden Services Manager, and look over the available\n" +"advanced settings. One thing you'll definitely want to change is to set it up\n" "for interactive connections intstead of bulk connections." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102 msgid "" -"Besides that, these other options can affect performance when accessing " -"your SSH\n" -"server. If you aren't that concerned about your anonymity, then you could" -" reduce\n" -"the number of hops you take. If you have trouble with speed, a higher " -"tunnel\n" -"count might help. A few backup tunnels are probably a good idea. You " -"might have\n" +"Besides that, these other options can affect performance when accessing your SSH\n" +"server. If you aren't that concerned about your anonymity, then you could reduce\n" +"the number of hops you take. If you have trouble with speed, a higher tunnel\n" +"count might help. A few backup tunnels are probably a good idea. You might have\n" "to dial-it-in a bit." msgstr "" @@ -9770,10 +8812,8 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118 msgid "" -"Another interesting setting, especially if you choose to run a high " -"number of\n" -"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels " -"that run\n" +"Another interesting setting, especially if you choose to run a high number of\n" +"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n" "when the serve has experienced extended inactivity." msgstr "" @@ -9784,12 +8824,9 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131 msgid "" -"With i2pd, all configuration is done with files instead of via a web " -"interface.\n" -"In order to configure an SSH Service tunnel for i2pd, tweak the following" -"\n" -"example settings to your anonymity and performance needs and copy them " -"into\n" +"With i2pd, all configuration is done with files instead of via a web interface.\n" +"In order to configure an SSH Service tunnel for i2pd, tweak the following\n" +"example settings to your anonymity and performance needs and copy them into\n" "tunnels.conf" msgstr "" @@ -9803,21 +8840,16 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158 msgid "" -"Depending on how you want to access your SSH Server, you may want to make" -" a few\n" -"changes to the settings. Besides the obvious SSH hardening stuff you " -"should do\n" -"on all SSH servers(Public-Key Authentication, no login as root, etc), if " -"you\n" -"don't want your SSH server to listen on any addresses except your server " -"tunnel,\n" +"Depending on how you want to access your SSH Server, you may want to make a few\n" +"changes to the settings. Besides the obvious SSH hardening stuff you should do\n" +"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n" +"don't want your SSH server to listen on any addresses except your server tunnel,\n" "you should change AddressFamily to inet and ListenAddress to 127.0.0.1." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171 msgid "" -"If you choose to use a port other than 22 for your SSH server, you will " -"need to\n" +"If you choose to use a port other than 22 for your SSH server, you will need to\n" "change the port in your I2P tunnel configuration." msgstr "" @@ -9827,27 +8859,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179 msgid "" -"You will need to be able to see the I2P router console of the SSH server " -"in\n" -"order to configure your client connection. One neat thing about this " -"setup is\n" +"You will need to be able to see the I2P router console of the SSH server in\n" +"order to configure your client connection. One neat thing about this setup is\n" "that the initial connection to the I2P tunnel is authenticated, somewhat\n" -"reducing the risk of your initial connection to the SSH server being " -"MITM'ed,\n" +"reducing the risk of your initial connection to the SSH server being MITM'ed,\n" "as is a risk in Trust-On-First-Use scenarios." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197 msgid "" -"First, start the tunnel configuration wizard from the hidden services " -"manager\n" +"First, start the tunnel configuration wizard from the hidden services manager\n" "and select a client tunnel." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206 msgid "" -"Next, select the standard tunnel type. You will fine-tune this " -"configuration\n" +"Next, select the standard tunnel type. You will fine-tune this configuration\n" "later." msgstr "" @@ -9857,27 +8884,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223 msgid "" -"This is the only slightly tricky part. Go to the hidden services manager " -"of the\n" -"I2P router console and find the base64 \"local destination\" of the SSH " -"server\n" -"tunnel. You'll need to find a way to copy this information into the next " -"step.\n" +"This is the only slightly tricky part. Go to the hidden services manager of the\n" +"I2P router console and find the base64 \"local destination\" of the SSH server\n" +"tunnel. You'll need to find a way to copy this information into the next step.\n" "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n" "should be sufficient for most people." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235 msgid "" -"Once you've found the base64 destination you want to connect to " -"transmitted to\n" +"Once you've found the base64 destination you want to connect to transmitted to\n" "your client device, then paste it into the client destination field." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244 msgid "" -"Lastly, set a local port to connect your ssh client to. This will local " -"port\n" +"Lastly, set a local port to connect your ssh client to. This will local port\n" "will be connected to the base64 destination and thus the SSH server." msgstr "" @@ -9887,19 +8909,15 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266 msgid "" -"Like before, you'll want to change the settings to be optimized for " -"interactive\n" -"connections. Additionally, if you want to set up client whiteliting on " -"the\n" -"server, you should check the \"Generate key to enable persistent client " -"tunnel\n" +"Like before, you'll want to change the settings to be optimized for interactive\n" +"connections. Additionally, if you want to set up client whiteliting on the\n" +"server, you should check the \"Generate key to enable persistent client tunnel\n" "identity\" radial button." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282 msgid "" -"You can set this up by adding the following lines to your tunnels.conf " -"and\n" +"You can set this up by adding the following lines to your tunnels.conf and\n" "adjust it for your performance/anonymity needs." msgstr "" @@ -9913,14 +8931,10 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309 msgid "" -"There are lots of ways to set up an SSH client to connect to your server " -"on I2P,\n" -"but there are a few things you should do to secure your SSH client for " -"anonymous\n" -"use. First, you should configure it to only identify itself to SSH server" -" with\n" -"a single, specific key so that you don't risk contaminating your " -"anonymous and\n" +"There are lots of ways to set up an SSH client to connect to your server on I2P,\n" +"but there are a few things you should do to secure your SSH client for anonymous\n" +"use. First, you should configure it to only identify itself to SSH server with\n" +"a single, specific key so that you don't risk contaminating your anonymous and\n" "non-anonymous SSH connections." msgstr "" @@ -9930,8 +8944,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328 msgid "" -"Alternatively, you could make a .bash_alias entry to enforce your options" -" and\n" +"Alternatively, you could make a .bash_alias entry to enforce your options and\n" "automatically connect to I2P. You get the idea, you need to enforce\n" "IdentitiesOnly and provide an identity file." msgstr "" @@ -9942,26 +8955,21 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343 msgid "" -"This is more-or-less optional, but it's pretty cool and will prevent " -"anyone who\n" -"happens to come across your destination from being able to tell you are " -"hosting\n" +"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n" +"happens to come across your destination from being able to tell you are hosting\n" "an SSH service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349 msgid "" -"First, retrieve the persistent client tunnel destination and transmit it " -"to the\n" +"First, retrieve the persistent client tunnel destination and transmit it to the\n" "server." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358 msgid "" -"Add the client's base64 destination to the server's destination " -"whitelist. Now\n" -"you'll only be able to connect to the server tunnel from that specific " -"client\n" +"Add the client's base64 destination to the server's destination whitelist. Now\n" +"you'll only be able to connect to the server tunnel from that specific client\n" "tunnel and no one else will be able to connect to that destination." msgstr "" @@ -9979,28 +8987,19 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12 msgid "" -"One of the best features of I2P, in my opinion, is it's SAM API, which " -"can be\n" -"used to build a bridge between I2P and your application or language of " -"choice.\n" -"Currently, dozens of SAM libraries exist for a variety of languages, " -"including:" +"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n" +"used to build a bridge between I2P and your application or language of choice.\n" +"Currently, dozens of SAM libraries exist for a variety of languages, including:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32 msgid "" -"If you're using any of these languages, you may be able to port your " -"application\n" -"to I2P already, using an existing library. That's not what this tutorial " -"is\n" -"about, though. This tutorial is about what to do if you want to create a " -"SAM\n" -"library in a new language. In this tutorial, I will implement a new SAM " -"library\n" -"in Java. I chose Java because there isn't a Java library that connects " -"you to\n" -"SAM yet, because of Java's use in Android, and because it's a language " -"almost\n" +"If you're using any of these languages, you may be able to port your application\n" +"to I2P already, using an existing library. That's not what this tutorial is\n" +"about, though. This tutorial is about what to do if you want to create a SAM\n" +"library in a new language. In this tutorial, I will implement a new SAM library\n" +"in Java. I chose Java because there isn't a Java library that connects you to\n" +"SAM yet, because of Java's use in Android, and because it's a language almost\n" "everybody has at least a *little* experience with, so hopefully you can\n" "translate it into a language of your choice." msgstr "" @@ -10011,10 +9010,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46 msgid "" -"How you set up your own library will vary depending on the language you " -"wish\n" -"to use. For this example library, we'll be using java so we can create a " -"library\n" +"How you set up your own library will vary depending on the language you wish\n" +"to use. For this example library, we'll be using java so we can create a library\n" "like this:" msgstr "" @@ -10028,10 +9025,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69 msgid "" -"There are a few pieces of data that almost any SAM library should " -"probably\n" -"manage. It will at least need to store the address of the SAM Bridge you " -"intend\n" +"There are a few pieces of data that almost any SAM library should probably\n" +"manage. It will at least need to store the address of the SAM Bridge you intend\n" "to use and the signature type you wish to use." msgstr "" @@ -10041,8 +9036,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78 msgid "" -"I prefer to store the SAM address as a String and an Integer, and re-" -"combine\n" +"I prefer to store the SAM address as a String and an Integer, and re-combine\n" "them in a function at runtime." msgstr "" @@ -10052,15 +9046,11 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94 msgid "" -"The valid signature types for an I2P Tunnel are DSA_SHA1, " -"ECDSA_SHA256_P256,\n" +"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n" "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n" -"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if " -"you\n" -"implement at least SAM 3.1. In java, the 'enum' datastructure lends " -"itself to\n" -"this task, as it is intended to contain a group of constants. Add the " -"enum, and\n" +"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n" +"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n" +"this task, as it is intended to contain a group of constants. Add the enum, and\n" "an instance of the enum, to your java class definition." msgstr "" @@ -10071,8 +9061,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117 msgid "" "That takes care of reliably storing the signature type in use by the SAM\n" -"connection, but you've still got to retrieve it as a string to " -"communicate it\n" +"connection, but you've still got to retrieve it as a string to communicate it\n" "to the bridge." msgstr "" @@ -10082,10 +9071,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156 msgid "" -"Once that's done, begin creating your constructor. Note that we've given " -"our\n" -"library defaults which will be useful in default situations on all " -"existing I2P\n" +"Once that's done, begin creating your constructor. Note that we've given our\n" +"library defaults which will be useful in default situations on all existing I2P\n" "routers so far." msgstr "" @@ -10095,14 +9082,10 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173 msgid "" -"Finally, the good part. Interaction with the SAM bridge is done by " -"sending a\n" -"\"command\" to the address of the SAM bridge, and you can parse the " -"result of the\n" -"command as a set of string-based key-value pairs. So bearing that in " -"mind, let's\n" -"estabish a read-write connection to the SAM Address we defined before, " -"then\n" +"Finally, the good part. Interaction with the SAM bridge is done by sending a\n" +"\"command\" to the address of the SAM bridge, and you can parse the result of the\n" +"command as a set of string-based key-value pairs. So bearing that in mind, let's\n" +"estabish a read-write connection to the SAM Address we defined before, then\n" "write a \"CommandSAM\" Function and a reply parser." msgstr "" @@ -10112,17 +9095,14 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184 msgid "" -"We're communicating with SAM via a Socket, so in order to connect to, " -"read from,\n" -"and write to the socket, you'll need to create the following private " -"variables\n" +"We're communicating with SAM via a Socket, so in order to connect to, read from,\n" +"and write to the socket, you'll need to create the following private variables\n" "in the Jsam class:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196 msgid "" -"You will also want to instantiate those variables in your Constructors by" -"\n" +"You will also want to instantiate those variables in your Constructors by\n" "creating a function to do so." msgstr "" @@ -10132,23 +9112,17 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222 msgid "" -"Now you're all set up to finally start talking to SAM. In order to keep " -"things\n" -"nicely organized, let's create a function which sends a single command to" -" SAM,\n" -"terminated by a newline, and which returns a Reply object, which we will " -"create\n" +"Now you're all set up to finally start talking to SAM. In order to keep things\n" +"nicely organized, let's create a function which sends a single command to SAM,\n" +"terminated by a newline, and which returns a Reply object, which we will create\n" "in the next step:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241 msgid "" -"Note that we are using the writer and reader we created from the socket " -"in the\n" -"previous step as our inputs and outputs to the socket. When we get a " -"reply from\n" -"the reader, we pass the string to the Reply constructor, which parses it " -"and\n" +"Note that we are using the writer and reader we created from the socket in the\n" +"previous step as our inputs and outputs to the socket. When we get a reply from\n" +"the reader, we pass the string to the Reply constructor, which parses it and\n" "returns the Reply object." msgstr "" @@ -10159,37 +9133,29 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253 msgid "" "In order to more easily handle replies, we'll use a Reply object to\n" -"automatically parse the results we get from the SAM bridge. A reply has " -"at least\n" -"a topic, a type, and a result, as well as an arbitrary number of key-" -"value\n" +"automatically parse the results we get from the SAM bridge. A reply has at least\n" +"a topic, a type, and a result, as well as an arbitrary number of key-value\n" "pairs." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268 msgid "" -"As you can see, we will be storing the \"result\" as an enum, " -"REPLY_TYPES. This\n" -"enum contains all the possible reply results which the SAM bridge might " -"respond\n" +"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n" +"enum contains all the possible reply results which the SAM bridge might respond\n" "with." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335 msgid "" -"Now let's create our constructor, which takes the reply string recieved " -"from the\n" -"socket as a parameter, parses it, and uses the information to set up the " -"reply\n" -"object. The reply is space-delimited, with key-value pairs joined by an " -"equal\n" +"Now let's create our constructor, which takes the reply string recieved from the\n" +"socket as a parameter, parses it, and uses the information to set up the reply\n" +"object. The reply is space-delimited, with key-value pairs joined by an equal\n" "sign and terminated by a newline." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364 msgid "" -"Lastly, for the sake of convenience, let's give the reply object a " -"toString()\n" +"Lastly, for the sake of convenience, let's give the reply object a toString()\n" "function which returns a string representation of the Reply object." msgstr "" @@ -10199,30 +9165,21 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379 msgid "" -"Now we're ready to establish communication with SAM by sending a " -"\"Hello\"\n" -"message. If you're writing a new SAM library, you should probably target " -"at\n" -"least SAM 3.1, since it's available in both I2P and i2pd and introduces " -"support\n" +"Now we're ready to establish communication with SAM by sending a \"Hello\"\n" +"message. If you're writing a new SAM library, you should probably target at\n" +"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n" "for the SIGNATURE_TYPE parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397 msgid "" -"As you can see, we use the CommandSAM function we created before to send " -"the\n" -"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This " -"tells\n" -"SAM that you want to start communicating with the API, and that you know " -"how\n" +"As you can see, we use the CommandSAM function we created before to send the\n" +"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n" +"SAM that you want to start communicating with the API, and that you know how\n" "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n" -"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass" -" to\n" -"the Reply constructor to get a valid Reply object. From now on, we can " -"use our\n" -"CommandSAM function and Reply object to deal with all our communication " -"across\n" +"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n" +"the Reply constructor to get a valid Reply object. From now on, we can use our\n" +"CommandSAM function and Reply object to deal with all our communication across\n" "the SAM bridge." msgstr "" @@ -10232,66 +9189,46 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423 msgid "" -"Now that you've negotiated your connection to SAM and agreed on a SAM " -"version\n" -"you both speak, you can set up peer-to-peer connections for your " -"application\n" -"to connect to other i2p applications. You do this by sending a \"SESSION " -"CREATE\"\n" -"command to the SAM Bridge. To do that, we'll use a CreateSession function" -" that\n" +"Now that you've negotiated your connection to SAM and agreed on a SAM version\n" +"you both speak, you can set up peer-to-peer connections for your application\n" +"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n" +"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n" "accepts a session ID and a destination type parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444 msgid "" -"That was easy, right? All we had to do was adapt the pattern we used in " -"our\n" -"HelloSAM function to the ``SESSION CREATE`` command. A good reply from " -"the\n" -"bridge will still return OK, and in that case we return the ID of the " -"newly\n" -"created SAM connection. Otherwise, we return an empty string because " -"that's an\n" -"invalid ID anyway and it failed, so it's easy to check. Let's see if this" -"\n" +"That was easy, right? All we had to do was adapt the pattern we used in our\n" +"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n" +"bridge will still return OK, and in that case we return the ID of the newly\n" +"created SAM connection. Otherwise, we return an empty string because that's an\n" +"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n" "function works by writing a test for it:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461 msgid "" -"Note that in this test, we *must* call HelloSAM first to establish " -"communication\n" -"with SAM before starting our session. If not, the bridge will reply with " -"an\n" +"Note that in this test, we *must* call HelloSAM first to establish communication\n" +"with SAM before starting our session. If not, the bridge will reply with an\n" "error and the test will fail." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472 msgid "" -"Now you have your session established and your local destination, and " -"need to\n" -"decide what you want to do with them. Your session can now be commanded " -"to\n" -"connect to a remote service over I2P, or to wait for incoming connections" -" to\n" -"respond to. However, before you can connect to a remote destination, you " -"may\n" -"need to obtain the base64 of the destination, which is what the API " -"expects. In\n" -"order to do this, we'll create a LookupName function, which will return " -"the\n" +"Now you have your session established and your local destination, and need to\n" +"decide what you want to do with them. Your session can now be commanded to\n" +"connect to a remote service over I2P, or to wait for incoming connections to\n" +"respond to. However, before you can connect to a remote destination, you may\n" +"need to obtain the base64 of the destination, which is what the API expects. In\n" +"order to do this, we'll create a LookupName function, which will return the\n" "base64 in a usable form." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494 msgid "" -"Again, this is almost the same as our HelloSAM and CreateSession " -"functions,\n" -"with one difference. Since we're looking for the VALUE specifically and " -"the NAME\n" -"field will be the same as the ``name`` argument, it simply returns the " -"base64\n" +"Again, this is almost the same as our HelloSAM and CreateSession functions,\n" +"with one difference. Since we're looking for the VALUE specifically and the NAME\n" +"field will be the same as the ``name`` argument, it simply returns the base64\n" "string of the destination requested." msgstr "" @@ -10301,50 +9238,39 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516 msgid "" -"At last, we are going to establish a connection to another service with " -"our new\n" +"At last, we are going to establish a connection to another service with our new\n" "library. This part confused me a bit at first, but the most astute Java\n" "developers were probably wondering why we didn't extend the socket class\n" -"instead of creating a Socket variable inside of the Jsam class. That's " -"because\n" -"until now, we've been communicating with the \"Control Socket\" and we " -"need to\n" -"create a new socket to do the actual communication. So we've waited to " -"extend\n" +"instead of creating a Socket variable inside of the Jsam class. That's because\n" +"until now, we've been communicating with the \"Control Socket\" and we need to\n" +"create a new socket to do the actual communication. So we've waited to extend\n" "the the Socket class with the Jsam class until now:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530 msgid "" -"Also, let's alter our startConnection function so that we can use it to " -"switch\n" -"over from the control socket to the socket we'll be using in our " -"application. It\n" +"Also, let's alter our startConnection function so that we can use it to switch\n" +"over from the control socket to the socket we'll be using in our application. It\n" "will now take a Socket argument." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556 msgid "" -"This allows us to quickly and easily open a new socket to communicate " -"over,\n" +"This allows us to quickly and easily open a new socket to communicate over,\n" "perform the \"Hello SAM\" handshake over again, and connect the stream." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579 msgid "" -"And now you have a new Socket for communicating over SAM! Let's do the " -"same\n" +"And now you have a new Socket for communicating over SAM! Let's do the same\n" "thing for Accepting remote connections:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599 msgid "" -"There you have it. That's how you build a SAM library, step-by-step. In " -"the\n" -"future, I will cross-reference this with the working version of the " -"library,\n" -"Jsam, and the SAM v3 specification but for now I've got to get some other" -" stuff\n" +"There you have it. That's how you build a SAM library, step-by-step. In the\n" +"future, I will cross-reference this with the working version of the library,\n" +"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n" "done." msgstr "" @@ -10367,8 +9293,7 @@ msgstr "" #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23 msgid "" "Startup should be faster on platforms such as Raspberry Pi.\n" -"We've fixed several bugs, including some serious ones affecting low-level" -" network messages." +"We've fixed several bugs, including some serious ones affecting low-level network messages." msgstr "" #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38 @@ -10462,58 +9387,39 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11 msgid "" -"*This post is adapted directly from material originally created for " -"mhatta's*\n" -"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-" -"c08ec9de225d>`__\\ *.*\n" -"*He deserves the credit for the OP. It has been updated in certain places" -" where*\n" -"*it refers to old versions of I2P as current and has undergone some " -"light*\n" +"*This post is adapted directly from material originally created for mhatta's*\n" +"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n" +"*He deserves the credit for the OP. It has been updated in certain places where*\n" +"*it refers to old versions of I2P as current and has undergone some light*\n" "*editing. -idk*" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17 msgid "" -"Right after it starts up, I2P is often seen as a little bit slow. It's " -"true, and\n" -"we all know why, by nature, `garlic routing " -"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n" -"adds overhead to the familiar experience of using the internet so that " -"you can\n" -"have privacy, but this means that for many or most I2P services, your " -"data will\n" +"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n" +"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n" +"adds overhead to the familiar experience of using the internet so that you can\n" +"have privacy, but this means that for many or most I2P services, your data will\n" "need to go through 12 hops by default." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28 msgid "" -"Also, unlike Tor, I2P was primarily designed as a closed network. You can" -"\n" -"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-" -"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources " -"inside I2P, but you are not supposed\n" -"to access `clearnet " -"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" +"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n" +"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n" +"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" "websites through I2P. There exist a few I2P “outproxies†similar to\n" -"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit" -" nodes to\n" -"access clearnet, but most of them are very slow to use as going to the " -"clearnet\n" -"is effectively *another* hop in the already 6 hops in, six hops out " -"connection." +"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n" +"access clearnet, but most of them are very slow to use as going to the clearnet\n" +"is effectively *another* hop in the already 6 hops in, six hops out connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36 msgid "" -"Until a few versions ago, this problem was even harder to deal with " -"because many\n" -"I2P router users were having difficulties configuring the bandwidth " -"settings for\n" -"their routers. If everyone who can takes the time to adjust their " -"bandwidth\n" -"settings properly, they will improve not only your connection but also " -"the I2P\n" +"Until a few versions ago, this problem was even harder to deal with because many\n" +"I2P router users were having difficulties configuring the bandwidth settings for\n" +"their routers. If everyone who can takes the time to adjust their bandwidth\n" +"settings properly, they will improve not only your connection but also the I2P\n" "network as a whole." msgstr "" @@ -10523,8 +9429,7 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45 msgid "" -"Since I2P is a peer-to-peer network, you have to share some of your " -"network\n" +"Since I2P is a peer-to-peer network, you have to share some of your network\n" "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n" "Configuration†(“Configure Bandwidth†button in the “Applications and\n" "Configuration†section of I2P Router Console, or\n" @@ -10533,47 +9438,34 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55 msgid "" -"If you see a shared bandwidth limit of 48 KBps, which is very low, then " -"you\n" -"may not have adjusted your shared bandwidth from the default. As the " -"original\n" -"author of the material this blog post is adapted from noted, I2P has a " -"default\n" -"shared bandwidth limit that is very low until the user adjusts it to " -"avoid\n" +"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n" +"may not have adjusted your shared bandwidth from the default. As the original\n" +"author of the material this blog post is adapted from noted, I2P has a default\n" +"shared bandwidth limit that is very low until the user adjusts it to avoid\n" "causing issues with the user's connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61 msgid "" -"However, since many users may not know exactly which bandwidth settings " -"to\n" -"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ " -"introduced a\n" -"New Install Wizard. It contains a Bandwidth Test, which automatically " -"detects\n" -"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) " -"and adjusts\n" +"However, since many users may not know exactly which bandwidth settings to\n" +"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n" +"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n" +"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n" "I2P’s bandwidth settings accordingly." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67 msgid "" -"If you want to re-run the wizard, for instance following a change in your" -"\n" -"service provider or bcause you installed I2P before version 0.9.38, you " -"can\n" -"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply " -"access\n" +"If you want to re-run the wizard, for instance following a change in your\n" +"service provider or bcause you installed I2P before version 0.9.38, you can\n" +"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n" "the wizard directly at http://localhost:7657/welcome" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76 msgid "" -"Using the Wizard is straightforward, simply keep clicking “Nextâ€. " -"Sometimes\n" -"M-Lab’s chosen measurement servers are down and the test fails. In such " -"case,\n" +"Using the Wizard is straightforward, simply keep clicking “Nextâ€. Sometimes\n" +"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n" "click “Previous†(do not use your web browser’s “back†button), then\n" "try it again." msgstr "" @@ -10584,27 +9476,19 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88 msgid "" -"Even after adjusted the bandwidth, your connection might still be slow As" -" I\n" -"said, I2P is a P2P network. It will take some time for your I2P router to" -" be\n" -"discovered by other peers and integrated into the I2P network. If your " -"router\n" -"not up long enough to become well integrated, or if you shut down un-" -"gracefully\n" -"too often, the network will remain fairly slow. On the other hand, the " -"longer\n" -"you run your I2P router continuously, the faster and more stable your " -"connection\n" +"Even after adjusted the bandwidth, your connection might still be slow As I\n" +"said, I2P is a P2P network. It will take some time for your I2P router to be\n" +"discovered by other peers and integrated into the I2P network. If your router\n" +"not up long enough to become well integrated, or if you shut down un-gracefully\n" +"too often, the network will remain fairly slow. On the other hand, the longer\n" +"you run your I2P router continuously, the faster and more stable your connection\n" "becomes, and more of your bandwidth share will be used in the network." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96 msgid "" -"However, many people might not be able to stay your I2P router up. In " -"such\n" -"case, you can still run the I2P router on a remote server such as VPS, " -"then use\n" +"However, many people might not be able to stay your I2P router up. In such\n" +"case, you can still run the I2P router on a remote server such as VPS, then use\n" "SSH port forwarding." msgstr "" @@ -10620,10 +9504,8 @@ msgstr "" msgid "" "0.9.42 continues the work to make I2P faster and more reliable.\n" "It includes several changes to speed up our UDP transport.\n" -"We have split up the configuration files to enable future work for more " -"modular packaging.\n" -"We continue work to implement new proposals for faster and more secure " -"encryption.\n" +"We have split up the configuration files to enable future work for more modular packaging.\n" +"We continue work to implement new proposals for faster and more secure encryption.\n" "There are, of course, a lot of bug fixes also." msgstr "" @@ -10652,7 +9534,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40 -msgid "NetDB: Choose alternate gateway for store replies to reduce connections" +msgid "" +"NetDB: Choose alternate gateway for store replies to reduce connections" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41 @@ -10699,134 +9582,91 @@ msgstr "" msgid "Def Con Trip Report- zzz" msgstr "" -#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11 +#: i2p2www/blog/2019/08/30/defcon.rst:11 +#: i2p2www/blog/2019/08/30/defcon2.rst:11 msgid "Def Con Trip Report" msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:14 msgid "" -"idk and I attended DEFCON 27 and presented two workshops on I2P for " -"application\n" -"developers, with support from mhatta and Alex. I gave the workshop at " -"Monero\n" -"Village and idk gave the one at Crypto/Privacy Village. Here, I will " -"summarize\n" -"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will" -" post a\n" +"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n" +"developers, with support from mhatta and Alex. I gave the workshop at Monero\n" +"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n" +"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n" "trip report covering his workshop." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:22 msgid "" -"We had about 8 attendees for the Monero Village workshop, entitled \"I2P " -"for\n" -"Cryptocurrency Developers\". We planned to discuss the particular " -"networking\n" -"needs for each application and work through the various i2ptunnel and SAM" -"\n" -"options available. However, all attendees were relatively unfamiliar with" -" I2P,\n" -"so we pivoted and gave an overview of I2P. As none of the attendees had a" -" laptop\n" -"with them, we helped several of them install I2P on their Android phone " -"and\n" -"walked through some of the features of the app. For all users, the app " -"appeared\n" +"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n" +"Cryptocurrency Developers\". We planned to discuss the particular networking\n" +"needs for each application and work through the various i2ptunnel and SAM\n" +"options available. However, all attendees were relatively unfamiliar with I2P,\n" +"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n" +"with them, we helped several of them install I2P on their Android phone and\n" +"walked through some of the features of the app. For all users, the app appeared\n" "to reseed and build tunnels fairly quickly." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:33 msgid "" -"One common question after installing the app was \"what do I do now?\". " -"The app\n" -"doesn't have a 'hidden services of interest' section or first-run wizard " -"like\n" -"our desktop application does, and most of the default addressbook entries" -" are\n" -"long-dead. There's improvements we could make to the first-run " -"experience.\n" +"One common question after installing the app was \"what do I do now?\". The app\n" +"doesn't have a 'hidden services of interest' section or first-run wizard like\n" +"our desktop application does, and most of the default addressbook entries are\n" +"long-dead. There's improvements we could make to the first-run experience.\n" "Also, some of the more interesting parts of the app are hidden behind an\n" -"advanced setting; we should review those items and consider un-hiding " -"some of\n" +"advanced setting; we should review those items and consider un-hiding some of\n" "them." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:43 msgid "" -"It's always useful to go to Tor talks, not so much to find out what " -"they're\n" -"doing, but to hear how they explain things to people, and what " -"terminology they\n" -"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large " -"room\n" -"attended by about two thousand people. He gave a very brief overview of " -"Tor\n" -"with only three or four slides. He says they now have \"two to eight " -"million\n" -"users a day\". Most of the talk was a review of national blocking " -"attempts over\n" -"the years, starting with Thailand and Iran in '06-'07 through Tunisia, " -"china,\n" -"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He " -"showed a\n" -"new form to be showed to new users, with a checkbox \"Tor is censored in " -"my\n" +"It's always useful to go to Tor talks, not so much to find out what they're\n" +"doing, but to hear how they explain things to people, and what terminology they\n" +"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n" +"attended by about two thousand people. He gave a very brief overview of Tor\n" +"with only three or four slides. He says they now have \"two to eight million\n" +"users a day\". Most of the talk was a review of national blocking attempts over\n" +"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n" +"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n" +"new form to be showed to new users, with a checkbox \"Tor is censored in my\n" "country\"." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:56 msgid "" "Their new pluggable transport \"snowflake\" uses a combination of domain\n" -"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. " -"Roger\n" -"only had one slide on it, and I wasn't familiar with it, so we should do " -"more\n" -"research on what it's all about. He briefly mentioned some things they " -"may be\n" -"working on next, including \"salmon\" distribution of bridges, " -"FTE/Marionette,\n" -"decoy routing, and \"cupcake\" which is an extension of snowflake. While " -"I don't\n" -"have any further information about them, they may be good buzzwords to " -"keep an\n" +"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n" +"only had one slide on it, and I wasn't familiar with it, so we should do more\n" +"research on what it's all about. He briefly mentioned some things they may be\n" +"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n" +"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n" +"have any further information about them, they may be good buzzwords to keep an\n" "eye out for on their mailing lists." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:67 msgid "" "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n" -"handshake is a particular issue and it's been the focus of much of the " -"\"arms\n" -"race\" over the years. In some ways we're in better shape, as we've taken" -"\n" -"several features of their current-best obfs4 pluggable transport and " -"build them\n" -"into NTCP2. However, we do have issues with our website and reseeds being" -"\n" +"handshake is a particular issue and it's been the focus of much of the \"arms\n" +"race\" over the years. In some ways we're in better shape, as we've taken\n" +"several features of their current-best obfs4 pluggable transport and build them\n" +"into NTCP2. However, we do have issues with our website and reseeds being\n" "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:76 msgid "" -"Notes for next time: I do recommend DEFCON, as long as we find a village " -"to\n" -"call our home. It's an enormous conference and the limited general " -"hangout\n" +"Notes for next time: I do recommend DEFCON, as long as we find a village to\n" +"call our home. It's an enormous conference and the limited general hangout\n" "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n" -"Village were fantastic hosts and we had several hours at each spot to " -"meet with\n" -"people. We should find more opportunities to work with both " -"organizations.\n" -"There were also ZCash people at the Monero Village and we should work " -"with them\n" -"also. Any future workshop should be targeted at a more general audience. " -"We do\n" -"need a standard \"Intro to I2P\" slide deck; it would have been helpful " -"at the\n" -"workshops. Don't expect attendees to have laptops with them, focus on " -"Android\n" -"for any hands-on exercises. There's several improvements to be made in " -"our\n" +"Village were fantastic hosts and we had several hours at each spot to meet with\n" +"people. We should find more opportunities to work with both organizations.\n" +"There were also ZCash people at the Monero Village and we should work with them\n" +"also. Any future workshop should be targeted at a more general audience. We do\n" +"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n" +"workshops. Don't expect attendees to have laptops with them, focus on Android\n" +"for any hands-on exercises. There's several improvements to be made in our\n" "Android app. Drink lots of water in Vegas... and stay away from the slot\n" "machines." msgstr "" @@ -10843,95 +9683,67 @@ msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:19 msgid "" -"My workshop went well, we even had a few application developers attend! " -"In\n" -"particular I had a pretty lengthy conversation with a person named Mary " -"about\n" +"My workshop went well, we even had a few application developers attend! In\n" +"particular I had a pretty lengthy conversation with a person named Mary about\n" "how I2P could be used to eliminate centralization and enhance privacy in\n" -"a \"Magic Wormhole\" type of application. While I wasn't totally familiar" -" with\n" -"Magic Wormhole at the time, I think most of my advice was usable. I think" -" Mary\n" -"had some very interesting and workable ideas about sharing information in" -" more\n" -"human-centric ways that could be interesting in I2P applications, and am " -"looking\n" +"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n" +"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n" +"had some very interesting and workable ideas about sharing information in more\n" +"human-centric ways that could be interesting in I2P applications, and am looking\n" "forward to experimenting with some of those." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:30 msgid "" -"The materials I made for the application development workshop are " -"available on\n" -"Github! https://github.com/eyedeekay/defcon Please consider it a living " -"document,\n" -"your input is desired! As it is licensed permissively, you are free to " -"fork it\n" -"and make it your own as well. Share your examples, your hacks, or correct" -" my\n" -"comma use, complain about my document preparation style, or just print " -"off your\n" +"The materials I made for the application development workshop are available on\n" +"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n" +"your input is desired! As it is licensed permissively, you are free to fork it\n" +"and make it your own as well. Share your examples, your hacks, or correct my\n" +"comma use, complain about my document preparation style, or just print off your\n" "own copy in booklet form!" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:39 msgid "" -"I also talked to a guy who gives advice to the government about the " -"differences\n" -"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in " -"which\n" -"peers in a P2P application might want to have enhanced privacy from each-" -"other,\n" +"I also talked to a guy who gives advice to the government about the differences\n" +"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n" +"peers in a P2P application might want to have enhanced privacy from each-other,\n" "and why I2P is perhaps uniquely suited to accomplish that." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:46 msgid "" -"In general, both the application development workshops went well, even " -"though\n" -"they didn't go entirely according to plan in that only a small proportion" -" of the\n" -"audience were application developers. The impression I got was that many " -"people\n" -"are very interested in I2P, but also many people are confused by how " -"interacting\n" -"with I2P works. By re-focusing on their questions and by teaming off with" -" zzz,\n" -"mhatta, and Alex we were fairly successful at dealing with our audience, " -"which\n" +"In general, both the application development workshops went well, even though\n" +"they didn't go entirely according to plan in that only a small proportion of the\n" +"audience were application developers. The impression I got was that many people\n" +"are very interested in I2P, but also many people are confused by how interacting\n" +"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n" +"mhatta, and Alex we were fairly successful at dealing with our audience, which\n" "was more varied in terms of occupation, interest, and I2P knowledge than\n" "expected." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:57 msgid "" -"Besides that, I also talked to Alex about my experimental contextual-" -"identity\n" -"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to" -" talk\n" -"a little about bundling, but not too much, as it was a very busy " -"convention. I'm\n" +"Besides that, I also talked to Alex about my experimental contextual-identity\n" +"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n" +"a little about bundling, but not too much, as it was a very busy convention. I'm\n" "looking forward to following up with him on that soon." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:64 msgid "" "mhatta and I almost won a lobster from a claw machine, but it was a real\n" -"fighter and got away at the last second. Really thought I had it for a " -"moment\n" +"fighter and got away at the last second. Really thought I had it for a moment\n" "though. :)" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:70 msgid "" -"To add to zzz's notes for next time, aside from being more general I " -"believe our\n" -"workshops would not have been as able to adapt to the needs of the " -"audience\n" -"without the support of mhatta and Alex. Having people who can help " -"particpants\n" -"individually or in small groups was immensely helpful, many, many thanks " -"to both\n" +"To add to zzz's notes for next time, aside from being more general I believe our\n" +"workshops would not have been as able to adapt to the needs of the audience\n" +"without the support of mhatta and Alex. Having people who can help particpants\n" +"individually or in small groups was immensely helpful, many, many thanks to both\n" "of them for helping us out." msgstr "" @@ -10942,95 +9754,71 @@ msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:14 msgid "" -"Over the past year I have had the good fortune to participate in the " -"research\n" -"Nguyen Phong Hoang from Stony Brook University has been doing regarding " -"I2P\n" -"censorship. The infrastructure used for this research provided numerous " -"and\n" -"geographically diverse vantage points, and also the ability to conduct " -"in-depth\n" -"measurements across all levels of the network stack. I2P services which " -"were\n" -"measured for availability included official homepage, mirror site, reseed" -"\n" +"Over the past year I have had the good fortune to participate in the research\n" +"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n" +"censorship. The infrastructure used for this research provided numerous and\n" +"geographically diverse vantage points, and also the ability to conduct in-depth\n" +"measurements across all levels of the network stack. I2P services which were\n" +"measured for availability included official homepage, mirror site, reseed\n" "servers and active relays." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:24 msgid "" -"The presentation on Tuesday went very well, and Phong was very busy " -"afterwards\n" -"answering questions about his work. I was busy too answering questions " -"about\n" -"I2P and what it does. The new stickers featuring the updated logo by Ura " -"Design\n" -"got rave reviews! It was a very positive experience and I will be looking" -"\n" -"forward to continuing to work with Phong and monitoring I2P censorship. I" -" would\n" -"encourage anyone who has encountered blocking, or has had success using " -"I2P to\n" +"The presentation on Tuesday went very well, and Phong was very busy afterwards\n" +"answering questions about his work. I was busy too answering questions about\n" +"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n" +"got rave reviews! It was a very positive experience and I will be looking\n" +"forward to continuing to work with Phong and monitoring I2P censorship. I would\n" +"encourage anyone who has encountered blocking, or has had success using I2P to\n" "communicate in restricted environments to reach out if you can. I2P is\n" -"currently working on new solutions to circumvent internet blocking. " -"Having met\n" +"currently working on new solutions to circumvent internet blocking. Having met\n" "people this year who have given me first hand accounts of the effects of\n" -"censorship and the need to stay connected, makes the need for I2P to be " -"more\n" -"resilient where it needs to be and for the team to be creating guides for" -" using\n" +"censorship and the need to stay connected, makes the need for I2P to be more\n" +"resilient where it needs to be and for the team to be creating guides for using\n" "I2P in these situations." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:39 msgid "" -"I will be putting together better resources for researchers interested in" -" I2P,\n" +"I will be putting together better resources for researchers interested in I2P,\n" "as well." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:44 msgid "" "I also had the good fortune to spend time with Mhatta, who is an I2P\n" -"contributor, and to make connections for future funding. A huge thank you" -" to\n" -"the community builders I met in Tunis who I met again and who are " -"offering so\n" -"much support to the project. This has been an exciting year so far, and " -"I2P has\n" -"so much work to do. Please consider donating your time or funding the " -"project\n" +"contributor, and to make connections for future funding. A huge thank you to\n" +"the community builders I met in Tunis who I met again and who are offering so\n" +"much support to the project. This has been an exciting year so far, and I2P has\n" +"so much work to do. Please consider donating your time or funding the project\n" "as it needs to scale quickly to new challenges." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:53 msgid "" -"If you have an opportunity to, you can read the full report Measuring I2P" -"\n" +"If you have an opportunity to, you can read the full report Measuring I2P\n" "Censorship at a Global Scale here\n" "https://www.usenix.org/conference/foci19/presentation/hoang" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:59 msgid "" -"Another great workshop in the measurements workshop was On the Importance" -" of\n" +"Another great workshop in the measurements workshop was On the Importance of\n" "Encrypted-SNI (ESNI) to Censorship Circumvention\n" "https://www.usenix.org/conference/foci19/presentation/chai" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:65 msgid "" -"There are so many great workshops that I attended - anyone who would like" -" too\n" +"There are so many great workshops that I attended - anyone who would like too\n" "can access the program and related materials here:\n" "https://www.usenix.org/conference/foci19/workshop-program" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:71 msgid "" -"I will be attending Our Networks in Toronto next month " -"https://ournetworks.ca/\n" +"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n" "- and so should you! The program can be viewed here\n" "https://ournetworks.ca/program/" msgstr "" @@ -11042,63 +9830,43 @@ msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:14 msgid "" -"This was my first time attending IFF, and what a great experience for I2P" -" this\n" -"was! I met with human rights defenders, people who work on censorship " -"metrics,\n" +"This was my first time attending IFF, and what a great experience for I2P this\n" +"was! I met with human rights defenders, people who work on censorship metrics,\n" "and of course UX and security professionals." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:20 msgid "" "My goal was to connect with people to further support I2P’s UX overhaul,\n" -"keeping in mind security and UX considerations for frontline workers. As " -"it was\n" -"pointed out to me, people see I2P as a very important and powerful " -"resource to\n" -"circumvent censorship and support safe communication, however the " -"interface\n" -"suffers from some usability concerns. People were happy with our initial " -"steps\n" -"to make first time users have a better experience, such as our set up " -"wizard\n" -"and bandwidth detection tool. I also received positive reviews on our " -"changes\n" -"to the website and /home icons. It was very encouraging to hear directly " -"from\n" +"keeping in mind security and UX considerations for frontline workers. As it was\n" +"pointed out to me, people see I2P as a very important and powerful resource to\n" +"circumvent censorship and support safe communication, however the interface\n" +"suffers from some usability concerns. People were happy with our initial steps\n" +"to make first time users have a better experience, such as our set up wizard\n" +"and bandwidth detection tool. I also received positive reviews on our changes\n" +"to the website and /home icons. It was very encouraging to hear directly from\n" "the community that small changes we have made are in the right direction." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:32 msgid "" -"Things like having configuration happen out of the box and not having to " -"put\n" -"people in the position where they need to rely on reading so much " -"documentation\n" -"or chasing documentation were discussed. Also, improved documentation for" -"\n" -"setting up outproxies and and site mirroring were requested and " -"suggested.\n" -"Please see Mikal’s very good instructions on setting up an I2P outproxy " -"that\n" +"Things like having configuration happen out of the box and not having to put\n" +"people in the position where they need to rely on reading so much documentation\n" +"or chasing documentation were discussed. Also, improved documentation for\n" +"setting up outproxies and and site mirroring were requested and suggested.\n" +"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n" "came out of the suggestions this week —\n" -"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to " -"make\n" +"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n" "bug reporting easier." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:43 msgid "" -"To this point, I truly hope that the project will secure resources to " -"continue\n" -"the improvements to its usability that it requires to meet the growing " -"demand\n" -"for I2P services. It is humbling to to be working with such talented " -"people and\n" -"to be able to work together with our community during a time when people " -"all\n" -"over the globe need all of the privacy protecting resources we as people " -"who\n" +"To this point, I truly hope that the project will secure resources to continue\n" +"the improvements to its usability that it requires to meet the growing demand\n" +"for I2P services. It is humbling to to be working with such talented people and\n" +"to be able to work together with our community during a time when people all\n" +"over the globe need all of the privacy protecting resources we as people who\n" "develop, design and educate can offer." msgstr "" @@ -11109,58 +9877,40 @@ msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:14 msgid "" -"The messages from activists in Syria during the Access No\\_! session on " -"the\n" +"The messages from activists in Syria during the Access No\\_! session on the\n" "first day were deeply moving and really drove home why I work in digital\n" -"rights. We listened to the experiences of activists who are unable to " -"travel\n" -"due to lack of status, documentation and active conflict. For these " -"people\n" +"rights. We listened to the experiences of activists who are unable to travel\n" +"due to lack of status, documentation and active conflict. For these people\n" "“the internet is the only passport (they) carry.†Human rights defenders\n" -"spoke of the importance of digital training to keep people protected " -"when they\n" -"are communicating with family inside of the country, as well as with " -"family and\n" -"friends who have left. They had created digital clinics to show people " -"how to\n" +"spoke of the importance of digital training to keep people protected when they\n" +"are communicating with family inside of the country, as well as with family and\n" +"friends who have left. They had created digital clinics to show people how to\n" "use services securely, for instance, how to use features like Signal’s\n" -"disappearing messages so that those messages could not be used against " -"them\n" +"disappearing messages so that those messages could not be used against them\n" "when devices are searched at security check points. Continuing to pursue\n" -"education was also very important, the internet being relied on to access" -"\n" +"education was also very important, the internet being relied on to access\n" "resources." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:30 msgid "" -"The following days we met with people who had both questions about I2P " -"and\n" -"suggestions for potential use cases. We also discussed overhauling the " -"project\n" +"The following days we met with people who had both questions about I2P and\n" +"suggestions for potential use cases. We also discussed overhauling the project\n" "documentation for threat models, improving guides for users with little\n" -"technical background, and ensuring that these guides are easily " -"translatable. I\n" -"made a note that I should go through the proposals and connect then to " -"human\n" -"use cases and solutions. This will be part of the projects’ continued " -"effort\n" +"technical background, and ensuring that these guides are easily translatable. I\n" +"made a note that I should go through the proposals and connect then to human\n" +"use cases and solutions. This will be part of the projects’ continued effort\n" "to improve its user guides and onboarding." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:40 msgid "" -"The opportunity to meet face to face with people who are using I2P and " -"have\n" -"successfully used it to circumvent internet blockages was inspiring. As " -"the\n" +"The opportunity to meet face to face with people who are using I2P and have\n" +"successfully used it to circumvent internet blockages was inspiring. As the\n" "project has began working on its own browser and is examining outproxy\n" -"packaging, it needs as much feedback and testing as possible to create " -"secure\n" -"and frictionless experiences for people. Also, the I2P network needs more" -"\n" -"hosted content and mirrored sites in order to expand resources for its " -"users." +"packaging, it needs as much feedback and testing as possible to create secure\n" +"and frictionless experiences for people. Also, the I2P network needs more\n" +"hosted content and mirrored sites in order to expand resources for its users." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2 @@ -11174,47 +9924,35 @@ msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14 msgid "" -"The weekend of September 20th I traveled to Toronto to meet with Sadie to" -" take\n" -"part in the Our Networks conference. The Our Networks conference " -"encompasses a\n" -"wide variety of topic including many peer-to-peer technologies with an " -"eye\n" +"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n" +"part in the Our Networks conference. The Our Networks conference encompasses a\n" +"wide variety of topic including many peer-to-peer technologies with an eye\n" "toward their potential to make the world a better place." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21 msgid "" -"The conference was fascinating, full of very smart people working on " -"everything\n" -"from physical mesh networks to the distributed web to, of course, " -"anonymity. We\n" -"got to talk to some great people from Tor, Protocol Labs, Parity Labs, " -"the Dat\n" -"Project, as well as a variety of artists and social scientists. Lots of " -"fun too,\n" +"The conference was fascinating, full of very smart people working on everything\n" +"from physical mesh networks to the distributed web to, of course, anonymity. We\n" +"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n" +"Project, as well as a variety of artists and social scientists. Lots of fun too,\n" "and a great environment. Dat in particular presents some pretty cool\n" "opportunities for future co-operation I think." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30 msgid "" -"I hadn't planned on giving a talk, but we were having so much fun that " -"when\n" -"we were asked, Sadie and I put something together and I gave a quick " -"lightning\n" +"I hadn't planned on giving a talk, but we were having so much fun that when\n" +"we were asked, Sadie and I put something together and I gave a quick lightning\n" "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n" -"application development. The talk was recorded and when the video becomes" -"\n" -"available, I'll make sure to add it to this blog. Next year, I'll have " -"some\n" +"application development. The talk was recorded and when the video becomes\n" +"available, I'll make sure to add it to this blog. Next year, I'll have some\n" "submissions for their Zine Library about I2P." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39 msgid "" -"Besides that, I really enjoyed my time visiting Toronto, it was a great " -"place\n" +"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n" "to visit." msgstr "" @@ -11228,14 +9966,10 @@ msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16 msgid "" -"In the 0.9.43 release, we continue work on stronger security and privacy " -"features and performance improvements.\n" -"Our implementation of the new leaseset specification (LS2) is now " -"complete.\n" -"We are beginning our implementation of stronger and faster end-to-end " -"encryption (proposal 144) for a future release.\n" -"Several IPv6 address detection issues have been fixed, and there of " -"course are several other bug fixes." +"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n" +"Our implementation of the new leaseset specification (LS2) is now complete.\n" +"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n" +"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes." msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33 @@ -11279,7 +10013,8 @@ msgid "i2ptunnel support for quoted custom options" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51 -msgid "i2psnark now starts with reduced tunnel count then increases as necessary" +msgid "" +"i2psnark now starts with reduced tunnel count then increases as necessary" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52 @@ -11310,47 +10045,33 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:11 msgid "" -"Highlighting Research - An Empirical Study of the I2P Anonymity Network " -"and its Censorship Resistance" +"Highlighting Research - An Empirical Study of the I2P Anonymity Network and " +"its Censorship Resistance" msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:16 msgid "" -"The following blog post is authored by Information Controls Fellow Hoà ng " -"Nguyên\n" -"Phong. As an ICFP fellow, Phong's research focused on analyzing different" -"\n" -"aspects of the I2P network, a privacy-enhancing Internet tool that can be" -" used\n" +"The following blog post is authored by Information Controls Fellow Hoà ng Nguyên\n" +"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n" +"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n" "to access online content over an anonymity-enhancing network helpful in\n" -"circumventing state-imposed censorship. Working with his host " -"organization, the\n" -"University of Massachusetts Amherst, Phong studied the I2P network's " -"censorship\n" -"resilience, including identifying what blocking methods a state censor " -"might use\n" -"to inhibit access to I2P and investigating potential solutions to make " -"I2P more\n" +"circumventing state-imposed censorship. Working with his host organization, the\n" +"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n" +"resilience, including identifying what blocking methods a state censor might use\n" +"to inhibit access to I2P and investigating potential solutions to make I2P more\n" "resistant to such blockage." msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:28 msgid "" "Phong found blocking attempts on the I2P network (specifically via DNS\n" -"poisoning, SNI-based blocking, TCP packet injection, and page-specific " -"blocks)\n" -"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. " -"Phong\n" -"posits that because the blocks are usually imposed on the I2P download " -"page and\n" -"reseed servers, such blocking could be mitigated by hosting download " -"links to\n" -"this content on large cloud service providers - raising the collateral " -"cost of\n" -"blocking. Phong also built a metrics portal for the platform so that " -"researchers\n" -"and others can better understand who is using I2P, finding that there are" -" about\n" +"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n" +"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n" +"posits that because the blocks are usually imposed on the I2P download page and\n" +"reseed servers, such blocking could be mitigated by hosting download links to\n" +"this content on large cloud service providers - raising the collateral cost of\n" +"blocking. Phong also built a metrics portal for the platform so that researchers\n" +"and others can better understand who is using I2P, finding that there are about\n" "20,000 relays in the network on a daily basis." msgstr "" @@ -11364,10 +10085,8 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:55 msgid "" -"We thank Phong and his collaborators for their excellent study as we move" -" to\n" -"address the issues that were identified. It's exciting to see more " -"academic\n" +"We thank Phong and his collaborators for their excellent study as we move to\n" +"address the issues that were identified. It's exciting to see more academic\n" "study of I2P and are excited to keep working with him." msgstr "" @@ -11381,34 +10100,18 @@ msgstr "Versione 0.9.44 con correzioni di bug" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16 msgid "" -"0.9.44 contains an important fix for a denial of service issue in hidden " -"services handling of new encryption types.\n" +"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n" "All users should update as soon as possible." -msgstr "" -"La versione 0.9.44 contiene una correzione per un problema di denial of " -"service riguardante i servizi nascosti che utilizzano i nuovi tipi di " -"cifratura.\n" -"Tutti gli utenti dovrebbero aggiornare il prima possibile." +msgstr "La versione 0.9.44 contiene una correzione per un problema di denial of service riguardante i servizi nascosti che utilizzano i nuovi tipi di cifratura.\nTutti gli utenti dovrebbero aggiornare il prima possibile." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21 msgid "" -"The release includes initial support for new end-to-end encryption " -"(proposal 144).\n" +"The release includes initial support for new end-to-end encryption (proposal 144).\n" "Work continues on this project, and it is not yet ready for use.\n" -"There are changes to the console home page, and new embedded HTML5 media " -"players in i2psnark.\n" +"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n" "Additional fixes for firewalled IPv6 networks are included.\n" "Tunnel build fixes should result in faster startup for some users." -msgstr "" -"Il rilascio include il supporto iniziale per la nuova cifratura end-to-" -"end (proposta 144).\n" -"I lavori continuano su questo progetto e non è ancora pronto per " -"l'utilizzo.\n" -"Ci sono modifiche alla pagina principale della console e ai riproduttori " -"multimediali HTML5 integrati in i2psnark.\n" -"Sono incluse correzioni aggiuntive per le reti IPv6 dietro firewall.\n" -"Le correzioni riguardo la creazione dei tunnel dovrebbero risultare in " -"una maggiore velocità di avvio per alcuni utenti." +msgstr "Il rilascio include il supporto iniziale per la nuova cifratura end-to-end (proposta 144).\nI lavori continuano su questo progetto e non è ancora pronto per l'utilizzo.\nCi sono modifiche alla pagina principale della console e ai riproduttori multimediali HTML5 integrati in i2psnark.\nSono incluse correzioni aggiuntive per le reti IPv6 dietro firewall.\nLe correzioni riguardo la creazione dei tunnel dovrebbero risultare in una maggiore velocità di avvio per alcuni utenti." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39 msgid "Console home page changes" @@ -11488,17 +10191,10 @@ msgstr "Versione 0.9.45 con correzioni di bug" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16 msgid "" -"0.9.45 contains important fixes for hidden mode and the bandwidth tester." -"\n" +"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n" "There's an update to the console dark theme.\n" -"We continue work on improving performance and the development of new end-" -"to-end encryption (proposal 144)." -msgstr "" -"La versione 0.9.45 contiene importanti correzioni per la modalità hidden " -"e per il tester di larghezza di banda.\n" -"C'è un aggiornamento per il tema scuro della console.\n" -"Continuiamo a lavorare sull'aumento delle prestazioni e a sviluppare la " -"nuova cifratura end-to-end (proposta 144)." +"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)." +msgstr "La versione 0.9.45 contiene importanti correzioni per la modalità hidden e per il tester di larghezza di banda.\nC'è un aggiornamento per il tema scuro della console.\nContinuiamo a lavorare sull'aumento delle prestazioni e a sviluppare la nuova cifratura end-to-end (proposta 144)." #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32 msgid "Dark theme improvements" @@ -11509,7 +10205,8 @@ msgid "Console icon changes" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34 -msgid "Move some translations from console to router and core for embedded uses" +msgid "" +"Move some translations from console to router and core for embedded uses" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37 @@ -11563,24 +10260,20 @@ msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10 msgid "" "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n" -"will act as your access point to a single git service on I2P. It is part " -"of the\n" +"will act as your access point to a single git service on I2P. It is part of the\n" "overall effort to transition I2P from monotone to Git." msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16 msgid "" -"Before anything else: Know the capabilities the service offers to the " -"public" +"Before anything else: Know the capabilities the service offers to the public" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19 msgid "" "Depending on how the git service is configured, it may or may not offer\n" "all services on the same address. In the case of git.idk.i2p, there is a\n" -"public HTTP URL, and an SSH " -"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to " -"configure for your Git SSH client. Either\n" +"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n" "can be used to push or pull, but SSH is recommended." msgstr "" @@ -11631,10 +10324,8 @@ msgid "" "Then, add the address you will be pushing and pulling from. Note that\n" "this example address is for Read-Only HTTP-over-I2P clones, if your\n" "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n" -"need to get the SSH clone base32 from them. Use this Base32 to connect " -"the\n" -"client tunnel to the Git SSH service: " -"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" +"need to get the SSH clone base32 from them. Use this Base32 to connect the\n" +"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109 @@ -11762,7 +10453,8 @@ msgid "Gitlab over I2P Setup" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7 -msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others." +msgid "" +"Mirror I2P Git repositories and Bridge Clearnet repositories for others." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9 @@ -11817,14 +10509,13 @@ msgid "" "images. Since there are no third-party images involved here, updates\n" "should come as soon as they are available in the host images. To review\n" "the Dockerfile for yourself, visit the `Gitlab source\n" -"code <https://gitlab.com/gitlab-org/omnibus-" -"gitlab/-/blob/master/docker/Dockerfile>`__." +"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73 @@ -12053,21 +10744,10 @@ msgid "" "generated for you. A recent, correctly-generated bundle of the mainline\n" "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n" "of I2P at my pastebin\n" -"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also " -"use a\n" -"`magnet link " -"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__," -"\n" +"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n" +"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n" "and if you're a BiglyBT user who wants to bridge the torrent, use \n" -"`this magnet link instead " -"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker" -".leechers-" -"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker" -".lanta-" -"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker" -".tiny-" -"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__" -"\n" +"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n" "to announce to clearnet trackers as well." msgstr "" @@ -12161,41 +10841,29 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16 msgid "" -"0.9.46 contains significant performance improvements in the streaming " -"library.\n" -"We have completed development of ECIES encryption (proposal 144) and " -"there is now an option to enable it for testing." -msgstr "" -"La versione 0.9.46 contiene miglioramenti significanti delle prestazioni " -"nella libreria streaming.\n" -"Abbiamo completato lo sviluppo della cifratura ECIES (proposta 144) ed è " -"ora disponibile un'opzione per abilitarla per il testing." +"0.9.46 contains significant performance improvements in the streaming library.\n" +"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing." +msgstr "La versione 0.9.46 contiene miglioramenti significanti delle prestazioni nella libreria streaming.\nAbbiamo completato lo sviluppo della cifratura ECIES (proposta 144) ed è ora disponibile un'opzione per abilitarla per il testing." #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21 msgid "" "Windows users only:\n" "This release fixes a local privilege escalation vulnerability\n" -"which could be exploited by a local user that has the ability to run " -"programs.\n" +"which could be exploited by a local user that has the ability to run programs.\n" "Please apply the update as soon as possible.\n" "Thanks to Blaze Infosec for their responsible disclosure of the issue." msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29 msgid "" -"This is the last release to support Java 7, Debian packages Wheezy and " -"Stretch, and Ubuntu packages Precise and Trusty.\n" +"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n" "Users on those platforms must upgrade to receive future I2P updates." -msgstr "" -"Questo è l'ultimo rilascio che supporta Java 7, i pacchetti Debian Wheezy" -" e Stretch, e i pacchetti Ubuntu Precise e Trusty.\n" -"Gli utenti di quelle piattaforme dovrebbero eseguire l'aggiornamento per " -"continuare a ricevere gli aggiornamenti I2P." +msgstr "Questo è l'ultimo rilascio che supporta Java 7, i pacchetti Debian Wheezy e Stretch, e i pacchetti Ubuntu Precise e Trusty.\nGli utenti di quelle piattaforme dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P." #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing " -"(proposal 144)" +"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal " +"144)" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45 @@ -12220,8 +10888,8 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54 msgid "" -"Hidden Services Manager: Fixes for changing shared client options, " -"prevent changing certain options while tunnel is running" +"Hidden Services Manager: Fixes for changing shared client options, prevent " +"changing certain options while tunnel is running" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55 @@ -12382,27 +11050,16 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16 msgid "" -"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by " -"default for some services.\n" +"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n" "The Sybil analysis and blocking tool is now enabled by default." -msgstr "" -"La versione 0.9.47 abilita di default il nostro nuovo protocollo di " -"cifratura end-to-end (proposta 144) per alcuni servizi.\n" -"Lo strumento per il blocco e l'analisi Sybil è ora abilitato di default." +msgstr "La versione 0.9.47 abilita di default il nostro nuovo protocollo di cifratura end-to-end (proposta 144) per alcuni servizi.\nLo strumento per il blocco e l'analisi Sybil è ora abilitato di default." #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21 msgid "" "Java 8 or higher is now required.\n" -"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and " -"Precise, are no longer supported.\n" -"Users on those platforms should upgrade so you may continue to receive " -"I2P updates." -msgstr "" -"È ora necessario Java 8 o superiori.\n" -"I pacchetti Debian per Wheezy e Stretch, e per Ubuntu Trusty e Precise, " -"non sono più supportati.\n" -"Gli utenti di queste piattaforme dovrebbero eseguire l'aggiornamento per " -"continuare a ricevere gli aggiornamenti I2P." +"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n" +"Users on those platforms should upgrade so you may continue to receive I2P updates." +msgstr "È ora necessario Java 8 o superiori.\nI pacchetti Debian per Wheezy e Stretch, e per Ubuntu Trusty e Precise, non sono più supportati.\nGli utenti di queste piattaforme dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P." #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37 msgid "Java 8 now required" @@ -12410,8 +11067,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared " -"clients, HTTP proxy, and new tunnels" +"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, " +"HTTP proxy, and new tunnels" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43 @@ -12423,7 +11080,8 @@ msgid "Enable Sybil analysis and blocking tool by default" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51 -msgid "Hidden Services Manager: Fix missing server tunnel length configuration" +msgid "" +"Hidden Services Manager: Fix missing server tunnel length configuration" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52 @@ -12472,27 +11130,16 @@ msgstr "Versione 0.9.48 con miglioramenti delle prestazioni" #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16 msgid "" -"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for " -"most services.\n" -"We have added preliminary support for new tunnel build message encryption" -" (proposal 152).\n" +"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n" +"We have added preliminary support for new tunnel build message encryption (proposal 152).\n" "There are significant performance improvements throughout the router." -msgstr "" -"La versione 0.9.48 abilita il nostro nuovo protocollo di crittografia " -"end-to-end (proposta 144) per la maggior parte dei servizi.\n" -"Abbiamo aggiunto un supporto preliminare per la nuova cifratura dei " -"tunnel build message.\n" -"Ci sono miglioramenti significativi delle prestazioni in tutto il router." +msgstr "La versione 0.9.48 abilita il nostro nuovo protocollo di crittografia end-to-end (proposta 144) per la maggior parte dei servizi.\nAbbiamo aggiunto un supporto preliminare per la nuova cifratura dei tunnel build message.\nCi sono miglioramenti significativi delle prestazioni in tutto il router." #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22 msgid "" "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n" -"Users on that platform should upgrade so you may continue to receive I2P " -"updates." -msgstr "" -"I pacchetti per Ubuntu Xenial (16.04 LTS) non sono più supportati.\n" -"Gli utenti di quella piattaforma dovrebbero eseguire l'aggiornamento per " -"continuare a ricevere gli aggiornamenti I2P." +"Users on that platform should upgrade so you may continue to receive I2P updates." +msgstr "I pacchetti per Ubuntu Xenial (16.04 LTS) non sono più supportati.\nGli utenti di quella piattaforma dovrebbero eseguire l'aggiornamento per continuare a ricevere gli aggiornamenti I2P." #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37 msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers" @@ -12641,33 +11288,25 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21 msgid "" -"For over a decade, I2P has relied on the venerable Monotone service to " -"support\n" -"its version control needs, but during the past few years, most of the " -"world has\n" +"For over a decade, I2P has relied on the venerable Monotone service to support\n" +"its version control needs, but during the past few years, most of the world has\n" "moved on to the now-universal Git version control system. In that same\n" -"time, the I2P Network has become faster and more reliable, and accessible" -"\n" +"time, the I2P Network has become faster and more reliable, and accessible\n" "workarounds to Git's non-resumability have been developed." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29 msgid "" -"Today marks a significant occasion for I2P, as we switched off the old " -"mtn\n" -"i2p.i2p branch, and moved the development of the core Java I2P libraries " -"from\n" +"Today marks a significant occasion for I2P, as we switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n" "Monotone to Git officially." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35 msgid "" -"While our use of mtn has been questioned in the past, and it's not always" -" been a\n" -"popular choice, I'd like to take this moment, as perhaps the very last " -"project to use\n" -"Monotone to thank the Monotone developers, current and former, wherever " -"they are,\n" +"While our use of mtn has been questioned in the past, and it's not always been a\n" +"popular choice, I'd like to take this moment, as perhaps the very last project to use\n" +"Monotone to thank the Monotone developers, current and former, wherever they are,\n" "for the software they created." msgstr "" @@ -12677,12 +11316,9 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49 msgid "" -"Checkins to the I2P Project repositories require you to configure GPG " -"signing for\n" -"your git commits, including Merge Requests and Pull Requests. Please " -"configure\n" -"your git client for GPG signing before you fork i2p.i2p and check " -"anything in." +"Checkins to the I2P Project repositories require you to configure GPG signing for\n" +"your git commits, including Merge Requests and Pull Requests. Please configure\n" +"your git client for GPG signing before you fork i2p.i2p and check anything in." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55 @@ -12691,32 +11327,24 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60 msgid "" -"The official repository is the one hosted at https://i2pgit.org/i2p-" -"hackers/i2p.i2p\n" -"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\"" -" available\n" +"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n" +"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n" "at Github at https://github.com/i2p/i2p.i2p." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66 msgid "" -"Now that we're on git, we can synchronize repositories from our own self-" -"hosted Gitlab\n" -"instance, to Github, and back again. This means that it is possible to " -"create and submit\n" -"a merge request on Gitlab and when it is merged, the result will be " -"synced with Github,\n" +"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n" +"instance, to Github, and back again. This means that it is possible to create and submit\n" +"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n" "and a Pull Request on Github, when merged, will appear on Gitlab." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73 msgid "" -"This means that it's possible to submit code to us through our Gitlab " -"instance or through\n" -"Github depending on what you prefer, however, more of the I2P developers " -"are regularly\n" -"monitoring Gitlab than Github. MR's to Gitlab are more likely to be " -"merged sooner\n" +"This means that it's possible to submit code to us through our Gitlab instance or through\n" +"Github depending on what you prefer, however, more of the I2P developers are regularly\n" +"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n" "than PR's to Github." msgstr "" @@ -12726,14 +11354,10 @@ msgstr "Grazie" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85 msgid "" -"Congratulations and thanks to everyone who helped in the git migration, " -"especially\n" -"zzz, eche|on, nextloop, and our site mirror operators! While some of us " -"will miss\n" -"Monotone, it has become a barrier for new and existing participants in " -"I2P development\n" -"and we're excited to join the world of developers using Git to manage " -"their distributed\n" +"Congratulations and thanks to everyone who helped in the git migration, especially\n" +"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n" +"Monotone, it has become a barrier for new and existing participants in I2P development\n" +"and we're excited to join the world of developers using Git to manage their distributed\n" "projects." msgstr "" @@ -12748,62 +11372,28 @@ msgstr "Versione 0.9.49 con correzioni SSU e crittografia velocizzata" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16 msgid "" "0.9.49 continues the work to make I2P faster and more secure.\n" -"We have several improvements and fixes for the SSU (UDP) transport that " -"should result in faster speeds.\n" -"This release also starts the migration to new, faster ECIES-X25519 " -"encryption for routers.\n" +"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n" +"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n" "(Destinations have been using this encryption for a few releases now)\n" -"We've been working on the specifications and protocols for new encryption" -" for several years,\n" -"and we are getting close to the end of it! The migration will take " -"several releases to complete." -msgstr "" -"La versione 0.9.49 continua il lavoro per rendere I2P più veloce e " -"sicuro.\n" -"Abbiamo diversi miglioramenti e correzioni per il trasporto SSU (UDP), il" -" che dovrebbe risultare in una maggiore velocità .\n" -"Con questo rilascio inizia inoltre la migrazione per i router verso la " -"nuova e performante cifratura X25519.\n" -"(Le destinazioni utilizzano questa cifratura già da qualche rilascio " -"oramai)\n" -"Per anni abbiamo lavorato sulle specifiche e sui protocolli per la nuova " -"cifratura e oramai siamo vicinissimi alla fine! La migrazione richiederà " -"diversi rilasci per essere completata." +"We've been working on the specifications and protocols for new encryption for several years,\n" +"and we are getting close to the end of it! The migration will take several releases to complete." +msgstr "La versione 0.9.49 continua il lavoro per rendere I2P più veloce e sicuro.\nAbbiamo diversi miglioramenti e correzioni per il trasporto SSU (UDP), il che dovrebbe risultare in una maggiore velocità .\nCon questo rilascio inizia inoltre la migrazione per i router verso la nuova e performante cifratura X25519.\n(Le destinazioni utilizzano questa cifratura già da qualche rilascio oramai)\nPer anni abbiamo lavorato sulle specifiche e sui protocolli per la nuova cifratura e oramai siamo vicinissimi alla fine! La migrazione richiederà diversi rilasci per essere completata." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25 msgid "" -"For this release, to minimize disruption, only new installs and a very " -"small percentage of existing installs\n" +"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n" "(randomly selected at restart) will be using the new encryption.\n" -"If your router does \"rekey\" to use the new encryption, it may have " -"lower traffic or less reliability than usual for several days after you " -"restart.\n" +"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n" "This is normal, because your router has generated a new identity.\n" "Your performance should recover after a while." -msgstr "" -"Per questo rilascio, al fine di minimizzare le interruzioni, solo le " -"nuove installazioni e una piccola percentuale di quelle esistenti " -"(selezionate randomicamente al riavvio) utilizzeranno la nuova cifratura." -"\n" -"Se il tuo router si \"riconfigura\" per utilizzare la nuova cifratura, " -"potrebbe avere meno traffico o meno affidabilità del normale per diversi " -"giorni dopo il riavvio.\n" -"Questa è una situazione normale poichè il tuo router ha generato una " -"nuova identità .\n" -"Le tue prestazioni dovrebbero ristabilirsi dopo un certo periodo." +msgstr "Per questo rilascio, al fine di minimizzare le interruzioni, solo le nuove installazioni e una piccola percentuale di quelle esistenti (selezionate randomicamente al riavvio) utilizzeranno la nuova cifratura.\nSe il tuo router si \"riconfigura\" per utilizzare la nuova cifratura, potrebbe avere meno traffico o meno affidabilità del normale per diversi giorni dopo il riavvio.\nQuesta è una situazione normale poichè il tuo router ha generato una nuova identità .\nLe tue prestazioni dovrebbero ristabilirsi dopo un certo periodo." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33 msgid "" -"We have \"rekeyed\" the network twice before, when changing the default " -"signature type,\n" +"We have \"rekeyed\" the network twice before, when changing the default signature type,\n" "but this is the first time we've changed the default encryption type.\n" "Hopefully it will all go smoothly, but we're starting slowly to be sure." -msgstr "" -"In passato abbiamo già \"riconfigurato\" due volte la rete per cambiare " -"il tipo di firma di default, ma questa è la prima volta che modifichiamo " -"il tipo di cifratura di default.\n" -"Fortunatamente tutto andrà bene, ma stiamo iniziando lentamente per " -"esserne sicuri." +msgstr "In passato abbiamo già \"riconfigurato\" due volte la rete per cambiare il tipo di firma di default, ma questa è la prima volta che modifichiamo il tipo di cifratura di default.\nFortunatamente tutto andrà bene, ma stiamo iniziando lentamente per esserne sicuri." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49 msgid "Build: Git migration" @@ -12866,7 +11456,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68 -msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" +msgid "" +"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69 @@ -12925,3 +11516,1442 @@ msgstr "" msgid "Util: New unit tests" msgstr "" +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2 +msgid "0.9.50 Release" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9 +msgid "0.9.50 with IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16 +msgid "" +"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n" +"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n" +"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22 +msgid "" +"We have finally fixed some longstanding SusiMail corruption bugs.\n" +"Changes to the bandwidth limiter should improve network tunnel performance.\n" +"There are several improvements in our Docker containers.\n" +"We have improved our defenses for possible malicious and buggy routers in the network." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39 +msgid "Docker improvements" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40 +msgid "NTCP: Remove support for version 1" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41 +msgid "Reseed: Use DNSOverHTTPS" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42 +msgid "Router: Increase ECIES rekey probability" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43 +msgid "Router: Persist Sybil blocklist" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44 +msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46 +msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47 +msgid "UPnP: Add support for IPv6" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53 +msgid "Debian: Fix link to compiler jar" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54 +msgid "i2psnark: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55 +msgid "Jetty: Fix detection of SSL connector" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56 +msgid "NetDB: Fix NPE when validating expired blinded leaseset" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57 +msgid "NTP: Year 2036 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58 +msgid "Router: Fix rekeying every restart on ARM" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59 +msgid "Router: Fix decryption of encrypted leasesets" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60 +msgid "SAM: Fix removal of subsessions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61 +msgid "SSU: Fix excessive dropping by the bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62 +msgid "SSU: Fix publishing 'C' capability when not an introducer" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63 +msgid "SSU: Fixes for firewalled/not firewalled state transitions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64 +msgid "SSU: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65 +msgid "SSU: Peer test fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66 +msgid "SusiMail: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67 +msgid "SusiMail: Fix stream closed errors" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68 +msgid "SusiMail: Fix corruption in display of large, new messages" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69 +msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70 +msgid "UPnP: Fix leases not being renewed before expiration" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76 +msgid "Build: Remove empty jars and wars from installers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77 +msgid "Build: Prep for different release and API versions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78 +msgid "Build: Remove launcher code" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79 +msgid "Gradle build fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80 +msgid "Profiles: Disable tunnel peer test" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81 +msgid "Profiles: Remove unused tunnel test response time stat" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82 +msgid "SSU: Avoid outbound connections to buggy routers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83 +msgid "Transports: Increase connection limits for some platforms" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2 +msgid "1.5.0 Release" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9 +msgid "1.5.0 with new tunnel build messages" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16 +msgid "" +"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n" +"This does not signify a major API change, or a claim that development is now complete.\n" +"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22 +msgid "" +"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n" +"We continue the transition of the network's routers to X25519 encryption.\n" +"Of course there are also numerous bug fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39 +msgid "Tunnels: Finish support for new build messages (proposal 157)" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40 +msgid "Updates: Support for .dmg and .exe updates" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45 +msgid "Console: Fix generation of SSL keys on Java 17" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46 +msgid "i2psnark: Fix autostart for magnets" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47 +msgid "Router: Fix rare deadlock in publishing our RI" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48 +msgid "SSU: Fix handling of bad peer test responses" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49 +msgid "UPnP: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54 +msgid "Jetty: Improve sort in directory listings" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55 +msgid "Jetty: Add X-I2P-Location header" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56 +msgid "Router: Increase probability to rekey to ECIES" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57 +msgid "Streaming: Performance improvements for low-latency connections" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2 +msgid "I2P Celebrates its 20th Year" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9 +msgid "I2P has been around for 20 years, let's take a look back" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11 +msgid "20 Years of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16 +msgid "" +"It's hard to believe, but I2P has been around for nearly 20 years! From its\n" +"beginning as a C project which provided anonymous access to IRC, we've had\n" +"hundreds of contributors, accepted checkins from dozens of coders, used 2\n" +"main languages, 3 version control systems, experienced a migration of its\n" +"crypography, and multiple soft-forks. There have been around 500 registered\n" +"sites on the Invisible Web, and countless unregistered I2P sites that were only\n" +"accessible via their cryptographic hostnames." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26 +msgid "" +"Thanks to the participation of users like you, the network has grown from a tiny\n" +"group of power users to over 75,000 nodes operated from all over the world,\n" +"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n" +"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n" +"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n" +"independent C++ implementation of the protocol, i2pd)." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35 +msgid "A Routing Protocol with Flagship Applications" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40 +msgid "" +"Even before other anonymity projects were providing their own application\n" +"bundles, I2P was a tool for building applications that were configured for\n" +"anonymity. Over the years, we've leaned on this strength, by expanding our\n" +"APIs to support more and more versatile applications. Today, we're still\n" +"developing new ways of building I2P into applications." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48 +msgid "" +"Using the power of the Hidden Services Manager or the SAM API, developers of all\n" +"kinds of applications can empower their users with anonymity using I2P. Exciting\n" +"downstream projects like Monero's I2P-Zero have made it very easy for developers\n" +"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n" +"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n" +"protocols." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57 +msgid "An Anonymous Network By Everyone, For Everyone" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62 +msgid "" +"I2P has always been a decentralized network, because its obvious that providing\n" +"an anonymity network is an intrinsically collaborative process. To illustrate\n" +"with the most extreme example, a single computer cannot provide itself\n" +"with anonymity, nor can it be a useful network, by definiton. However, building\n" +"I2P in this fully-decentralized manner hasn't always been easy." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70 +msgid "" +"From the beginning, I2P would need to be scalable, and be able to balance itself\n" +"so that high-bandwidth nodes wouldn't be able to easily take over the network.\n" +"Sybil attacks would leave the realm of academia and we would need to develop\n" +"new defenses against them." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77 +msgid "" +"We've worked very hard to never compromise on this stance, and today every I2P\n" +"router helps participate in providing the network with bandwidth resources and\n" +"providing the users with anonymity. In doing so, we've learned incredible things\n" +"and produced a network which at times has seemed inconceivable." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84 +msgid "Celebrating I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89 +msgid "" +"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n" +"present, and future of I2P, highlight applications and tools that build on\n" +"and enhance I2P, and showcase the best of our community. Check back here for\n" +"more in the coming days!" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96 +msgid "" +"`The History of I2P\n" +" </en/blog/post/2021/08/28/History-of-I2P>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98 +msgid "" +"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n" +" </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100 +msgid "" +"`Level-Up your I2P use with Encrypted LeaseSets\n" +" </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102 +msgid "" +"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for " +"End-Users" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103 +msgid "I2P's Usability Journey" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104 +msgid "Building Bridges - Making Connections with Other Privacy Projects" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2 +msgid "20 Years of Privacy: A brief History of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9 +msgid "A history of I2P As We Know It" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11 +msgid "" +"Invisibility is the best defense: building an internet within an internet" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16 +msgid "" +"I believe most people want this technology so they can express\n" +" themselves freely. It’s a comfortable feeling when you know you can\n" +" do that. At the same time we can conquer some of the problems seen\n" +" within the Internet by changing the way security and privacy is\n" +" viewed, as well as the extent to what it is valued." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23 +msgid "" +"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n" +"“desire for instant communication with other Freenet users to talk about\n" +"Freenet issues, and exchange Freenet keys while still maintaining\n" +"anonymity, privacy and security.†It was called IIP — the Invisible IRC\n" +"Project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35 +msgid "" +"The Invisible IRC Project was based on an ideal and framework behind The\n" +"InvisibleNet:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38 +msgid "In an interview from 2002, 0x90 described the project:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40 +msgid "" +"“InvisibleNet is a research & development driven organization whose main\n" +" focus is the innovation of intelligent network technology. Our goal is\n" +" to provide the highest standards in security and privacy on the widely\n" +" used, yet notoriously insecure Internet.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45 +msgid "" +"\"The InvisibleNet team is comprised of a talented group of developers and\n" +" architects entirely dedicated to providing its users with both\n" +" convenience and the very best in secure communication.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49 +msgid "" +"\"Our technological ideals are reflected in the implementation of a\n" +" framework that is solid in design, and transparent in its application.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52 +msgid "" +"\"Here at InvisibleNet we strive towards the greatest level of quality\n" +" possible by keeping all areas of our research & development open and\n" +" available to the public for peer review, feedback, suggestions and new\n" +" ideas.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57 +msgid "" +"\"The Invisible Internet Project: Defined as the “New Internetâ€.\n" +" Peer 2 Peer Internet. Using your peers to protect you. It is a\n" +" similar concept to the Invisible IRC Project, with its design as our\n" +" test model. We plan to re-design the Internet by taking it a step\n" +" further and having security and privacy be first priority.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63 +msgid "" +"\"The Invisible Internet Project or Protocol will be utilizing the\n" +" tests and research/development concepts of the Invisible IRC Project\n" +" to give us the scalability that we need and leverage this to take it\n" +" to the next level.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68 +msgid "" +"\"This, in essence will be an impenetrable neural-network, that is\n" +" self-driven, self-defensed, and completely seamless to already\n" +" applied protocols, specifically client to server (or agents as I call\n" +" them). It will be THE next transport layer, a layer on top of the\n" +" notoriously insecure Internet, to deliver full anonymity, privacy,\n" +" and security at the highest level possible. Decentralized and peer to\n" +" peer Internet, by the way, means no more worrying about your ISP\n" +" controlling your traffic. This will allow you to do seamless\n" +" activities and change the way we look at security and even the\n" +" Internet, utilizing public key cryptography, IP steganography, and\n" +" message authentication. The Internet that should have been, will be\n" +" soon.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85 +msgid "All citations and quotes are from the interviews found here:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90 +msgid "" +"By 2003, several other similar projects had started, the largest being\n" +"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n" +"encrypt and anonymize a variety of traffic. For IIP, it became clear\n" +"that IRC alone was not a big-enough target. What was needed was an\n" +"anonymizing layer for all protocols. IIP by now was also being called\n" +"“InvisibleNetâ€." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97 +msgid "" +"In early 2003, a new anonymous developer, “jrandom†joined the project.\n" +"His explicit goal was to broaden the charter of IIP." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100 +msgid "" +"jrandom wished to rewrite the IIP code base in Java, a language he was\n" +"familiar with, and the same language Freenet was using. He also wished\n" +"to redesign the IIP protocols based on recent papers and the early\n" +"design decisions that Tor and Freenet were making. Some of these\n" +"concepts and naming conventions, such as “onion routingâ€, were modified\n" +"to become “garlic routingâ€. For several of the design decisions, jrandom\n" +"made different choices than Tor did, including selecting different\n" +"cryptographic primitives in a number of places. Many (but not all) of\n" +"these choices turned out quite well. For some others, such as using\n" +"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n" +"benefits and trade-offs are still not well-studied." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112 +msgid "" +"jrandom also set out a clear vision for the architecture of the code. It\n" +"would be a client/server model, with the server (i.e. the router)\n" +"isolated from any “client†protocols. Clients such as web browsers, web\n" +"servers, IRC clients and servers, and others, would communicate through\n" +"the router using I2CP, the I2P Client Protocol." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118 +msgid "" +"jrandom also had strong opinions on the direction of the project and its\n" +"philosophy. He was strongly committed to open source and free software.\n" +"He explicitly set a goal of protection from organizations with\n" +"“unlimited financial and political resources.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123 +msgid "" +"By late summer 2003, jrandom had taken control of the project, and\n" +"renamed it the Invisible Internet Project or “I2Pâ€. He published a\n" +"document outlining the philosophy of the project, and placed its\n" +"technical goals and design in the context of mixnets and anonymizing\n" +"layers. He also published the specification of two protocols (I2CP and\n" +"I2NP) and their underlying data structures, that formed the basis of the\n" +"network I2P uses today. Lance (“nopâ€) was last seen in a project meeting\n" +"on November 11, 2003." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138 +msgid "" +"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n" +"Week published an article on “The Underground Internet†which referenced\n" +"InvisibleNet and discussed “darknets†extensively. jrandom released I2P\n" +"version 0.2 on November 1, 2003, and continued rapid releases for the\n" +"next 3 years. He maintained regular weekly meetings and status notes\n" +"during this time. Several popular services and “respites†emerged during\n" +"this time. Auto updates via clearnet HTTP became available in 2004." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146 +msgid "" +"Through 2004 and 2005, router development continued, and several\n" +"“clients†or applications were added to the I2P package. “Mihi†wrote\n" +"the first streaming protocol implementation and the i2ptunnel interface\n" +"for configuring and starting client tunnels. “Susi†wrote the web mail\n" +"and address book applications SusiMail and SusiDNS. Many people worked\n" +"on the router console web interface. A bridge to make it easier for\n" +"non-I2P clients to communicate over I2P, called “SAM†(Simple Anonymous\n" +"Messaging) was added." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155 +msgid "In February 2005, zzz installed I2P for the first time." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156 +msgid "" +"Anonymity projects were in the news. After surveying the field, he\n" +" installed Freenet, and found it ambiguous, and difficult to explore.\n" +" Not only that, it was very resource heavy and it was difficult to get\n" +" anything to load. Tor and I2P were the other options, and he tried\n" +" I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162 +msgid "" +"zzz had no preconceived plans to contribute to the project, and had\n" +"never written a line of Java. He had maybe used IRC once. At this time,\n" +"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n" +"floodfills. Forum.i2p and postman’s tracker were up and running at the\n" +"time, and weekly meetings and status notes, and releases every couple of\n" +"week were happening." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169 +msgid "" +"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n" +"which over the years became a central resource for I2P development, and\n" +"still is. The second was stats.i2p, the first site to gather statistics\n" +"on I2P network performance and present graphs on both the network and\n" +"individual routers. While the individual router statistics eventually\n" +"had to be shut down due to the tremendous growth of the network, the\n" +"overall performance graphs remain. We are not sure that he ever planned\n" +"to become the release manger for almost 2 decades, but we are happy he\n" +"did. The project has not only stayed active, it has thrived and scaled\n" +"to the demands of its growth." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184 +msgid "" +"On July 27, 2005, jrandom released I2P version 0.6, including an\n" +"innovative new UDP transport protocol he designed called “SSUâ€, for\n" +"Secure Semi-reliable UDP. It contained features for IP discovery and\n" +"firewall traversal." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189 +msgid "" +"In September 2005, jrandom bundled “Syndieâ€, his new high-latency\n" +"anonymous messaging system. In October 2005, jrandom ported Snark, a\n" +"Java BitTorrent client, to become an I2P application and bundled it with\n" +"the I2P package. This completed the collection of client applications\n" +"that are still bundled with I2P today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195 +msgid "" +"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n" +"tunnels. This was a major effort that was done to increase the security\n" +"of the tunnel building, which is crucial to maintain anonymity and\n" +"resist attacks. He worked closely with the Freenet developers, including\n" +"“Toadâ€, on this design. The new build protocol required new I2NP\n" +"messages and a hard cut-over or “flag dayâ€. These changes were released\n" +"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n" +"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n" +"would not work well, if at all, in today’s network, we are, technically\n" +"speaking, backwards-compatible with this ten-year-old version today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206 +msgid "" +"By early 2006, the I2P software was at least feature-complete, but it\n" +"was still not widely-known. jrandom’s view was that it shouldn’t be\n" +"marketed publicly until it was near-perfect, and labeled as version 1.0.\n" +"The network had perhaps a thousand users at the time. Project members\n" +"were discouraged from talking about it online, and the website\n" +"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213 +msgid "" +"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n" +"innovative new TCP transport protocol he designed called “NTCPâ€, for\n" +"new-IO-based TCP. It used Java’s new IO library for efficient handling\n" +"of large numbers of TCP connections." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218 +msgid "" +"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n" +"his top priority, and the “killer application†for I2P. Highly secure\n" +"and almost unusable, it delayed messages for up to two days before\n" +"delivery to resist traffic analysis. Later in 2006, he stopped work on\n" +"the bundled Syndie application and started a new, incompatible,\n" +"standalone messaging application. This application was, confusingly,\n" +"also called “Syndieâ€. The new Syndie was a large and complex\n" +"development, and it was essentially a one-man project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227 +msgid "" +"From late 2006 into 2007, core I2P development and releases slowed\n" +"dramatically. From almost 30 releases in 2005 and 13 in the first half\n" +"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n" +"of 2007. During this time, zzz and a developer named Complication had\n" +"source code commit privileges and were making changes, but their\n" +"understanding of the code base was limited. zzz worked, for example, on\n" +"improving i2psnark, fixing bugs, and redesigning the strategy for\n" +"anticipatory tunnel building. But there was a lot more that needed to be\n" +"done. Complication and zzz did what they could, and they wrote the code\n" +"for almost all the changes in the four 2007 releases\n" +"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n" +"guidance, code review, or direction for the project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240 +msgid "It wasn’t apparent at the time, but the project was in trouble." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242 +msgid "" +"jrandom had almost stopped working on the core I2P router and\n" +"applications. Even the new Syndie, which he had declared as far more\n" +"important than I2P itself, languished. After regular releases through\n" +"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n" +"I2P releases were required to be signed by jrandom’s key, and he built\n" +"and signed his last release, 0.6.1.30, on October 7, 2007." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249 +msgid "" +"In November 2007, disaster struck. Complication and zzz received a\n" +"cryptic message from jrandom, that he would have to take time off from\n" +"both Syndie and I2P development for a year or more. He expected that he\n" +"would still be available to sign releases, but was willing to pass the\n" +"release signing key to somebody else. Complication and zzz immediately\n" +"replied with a request for the release key and other credentials, such\n" +"as access to the website, mailing list, CVS administration, and others.\n" +"Unfortunately, they never heard from jrandom again." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258 +msgid "" +"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n" +"what to do next. However, all of the project infrastructure remained\n" +"active, so it didn’t seem to be an immediate crisis. They knew, however,\n" +"that without the release key or website access, they would have to sign\n" +"with new keys, host the files on a new website, and require everybody to\n" +"manually update since their keys wouldn’t be recognized." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265 +msgid "" +"The second stage of the disaster happened on January 13, 2008. The\n" +"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n" +"suffered a power outage, and they did not fully return to service. Only\n" +"jrandom had the credentials required to restore service. In addition,\n" +"the centralized CVS source control appeared to be down, so five years of\n" +"source control history appeared to be lost. Luckily, the CVS server was\n" +"up, only the name server for it was down. The full contents of the CVS\n" +"archive was quickly downloaded." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274 +msgid "" +"Complication, welterde, and zzz quickly made a number of decisions to\n" +" get the project back up and running. Welterde started a new website at\n" +" `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n" +" source code control system. They tested bazaar and that did not work\n" +" well over I2P. Git was just getting started. jrandom had used monotone\n" +" for Syndie and liked its security properties, and it worked well over\n" +" I2P, so it was selected." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281 +msgid "" +"Several people set up new services. The next release, 0.6.1.31, was\n" +" signed by Complication and required a manual upgrade. It was released\n" +" on February 10, 2008." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285 +msgid "" +"The project realized that even though it claimed to be totally\n" +"decentralized, it actually depended on a number of centralized\n" +"resources, above all, on jrandom. Work was done throughout 2008 to\n" +"decentralize the project, and distribute roles to a number of people.\n" +"Additionally, it was realized that development had essentially stalled\n" +"in 2007, because jrandom had stopped working on it, but had not\n" +"delegated to other developers. Nobody had an overall understanding of\n" +"the code base." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294 +msgid "" +"Complication continued to sign the releases through mid-2009, but his\n" +"contributions declined as he focused on activism and other projects.\n" +"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n" +"releases." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299 +msgid "" +"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n" +"other I2P project team members for the first time, including hottuna and\n" +"welterde. The experience was overwhelming, and also humbling, as he\n" +"struggled to explain I2P to others or answer even basic questions about\n" +"its design and use of cryptography." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305 +msgid "" +"By mid-2009, zzz had come to understand the code base much better. Far\n" +"from being complete or perfect, it was filled with problems and\n" +"scalability issues. In 2009 the project experienced more network growth\n" +"due to its anonymizing properties as well as its circumvention\n" +"abilities. Participants appeared who were beginning to adopt the network\n" +"for reasons like censorship and clearnet issues like blocking of popular\n" +"services. For development gains, in-net auto updates became available\n" +"for the software." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316 +msgid "" +"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n" +"presentation at HOPE XXXX. Adrian talked about how tech has helped\n" +"expose human rights violations, and the need for defensive tools for\n" +"activists. He urged that we all be ambassadors for all tech, stay on top\n" +"of new tech, and keep the barrier low and educate people about how to\n" +"use the tool we create." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323 +msgid "" +"He also talked about how we need many options for people to use, and\n" +"asked how do we make it easier to support human rights, freedom of\n" +"expression?" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327 +msgid "" +"At the end of the talk, zzz was invited on stage to introduce I2P and\n" +"give an overview of what the project was about. The same weekend, it was\n" +"pointed out that the I2P documentation was not in great shape." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331 +msgid "" +"In Fall 2010, zzz declared a moratorium on I2P development until the\n" +"website documentation was complete and accurate. It took 3 months to get\n" +"it done." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335 +msgid "" +"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n" +"hottuna, and other I2P contributors have attended CCC ( Chaos\n" +"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n" +"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n" +"tables with other projects and celebrate the end of a year of releases.\n" +"The project looks forward to one day being able to meet up again and\n" +"have an in-person yearly roadmap meeting." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343 +msgid "" +"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n" +"for its users was created in 2013. It was the first coin that provided\n" +"built-in support for I2P, as well as Tor that makes it impossible to\n" +"determine the IP address of the user. The developers, including meeh,\n" +"also ran organizations like Privacy Solutions, and provided infrastructure\n" +"support to the I2P network by running services like outproxies and\n" +"reseed servers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351 +msgid "" +"I2PBote development started to take off again in 2014 when str4d began\n" +"contributing to the project. Bote is a server-less email client — it\n" +"stores email in a `distributed hash\n" +"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n" +"“automatically encrypted and digitally signed, which ensures no one but\n" +"the intended recipient can read the email, and third parties cannot\n" +"forge them.†( https://i2pbote.xyz/). The project has existed since\n" +"2009." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366 +msgid "" +"At Real World Crypto that year, zzz, psi and str4d began to talk about\n" +"and review the plan to update I2P’s cryptography. The same year, the\n" +"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n" +"SecureDrop, RiseUp and Mailpile also received donations for supporting\n" +"better trust and privacy online." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372 +msgid "" +"By late 2014 most new signing crypto was complete, including ECDSA and\n" +"EdDSA. New destination crypto was available; but new router info crypto\n" +"needed to wait a year for the network to upgrade sufficiently." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376 +msgid "" +"During the early part of 2015, zzz posted to Twitter that it would be\n" +"great to have a mini conference for I2P. In Spring, it was decided that\n" +"I2PCon would take place that August over the course of a weekend." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380 +msgid "" +"Hottuna and Sadie organized most of the details, getting graphic assets\n" +"created, posters printed and a banner made for the podium. Nick at\n" +"Hacklab, where the event would take place, helped with making sure the\n" +"space was ready for the event. Sadie reached out to the local infosec\n" +"community and helped secure guest speakers as well. The event happened\n" +"on one of the hottest weekends of the Summer, with attendees arriving\n" +"from America and Europe. The I2P community did an amazing job of\n" +"supporting the event by postering, giving talks, and spreading the word\n" +"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n" +"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395 +msgid "" +"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n" +"crypto migration progress and future plans for the project. zzz and\n" +"others would continue weekly meetings to plan the migration over the\n" +"next few years." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400 +msgid "" +"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n" +"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n" +"disabled in 0.9.40." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404 +msgid "" +"The new I2P transport protocol provides effective resistance against\n" +" DPI censorship. It also results in reduced CPU load because of the\n" +" faster, modern cryptography used. It makes I2P more likely to run on\n" +" low-end devices, such as smartphones and home routers. Both major I2P\n" +" implementations have full support for NTCP2 and it make NTCP2\n" +" available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n" +" C++)." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412 +msgid "" +"The complete implementation details can be read here\n" +"https://geti2p.net/en/blog/post/2018/08/20/NTCP2" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415 +msgid "" +"0.9.39 included extensive changes for new network database types\n" +"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n" +"development of RPC applications." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419 +msgid "" +"In 2019, the team decided to attend more conferences. That year IDK and\n" +"zzz attended DefCon, and IDK gave a workshop on I2P application\n" +"development. At Monero Village, zzz gave a talk called I2P for\n" +"Cryptocurrency Developers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424 +msgid "" +"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n" +"IDK gave a lightning talk about I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427 +msgid "" +"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n" +"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n" +"connections we made, the project received grants for usability and\n" +"accessibility support from Open Tech Fund, and most recently Internews.\n" +"This will ensure more user friendly onboarding, UX, and information\n" +"architecture improvements to support the growing interest in the\n" +"network. It will also support specific tooling to help in-need users\n" +"with specific risk surfaces through user research." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438 +msgid "" +"That Summer, Hoà ng Nguyên Phong had his research into I2P censorship\n" +"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n" +"research and they attended together. I2P Metrics was created during this\n" +"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n" +"resistant reseed servers for the I2P network\n" +"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n" +"You can read the research report here\n" +"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447 +msgid "" +"At CCC that year, the decision was made to migrate from Monotone too\n" +"GitLab. The project was one of the last to use Monotone, and it was time\n" +"to prepare to move on. IDK would spend 2020 ensuring the process was as\n" +"smooth as it could be. The pandemic would result in the team not being\n" +"able to see each other that year to celebrate the ( mostly) smooth move\n" +"to Gitlab. On December 10. 2020, the project switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries\n" +"from Monotone to Git officially." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456 +msgid "" +"Congratulations and thanks to everyone who helped in the git\n" +" migration, especially zzz, eche|on, nextloop, and our site mirror\n" +" operators! While some of us will miss Monotone, it has become a\n" +" barrier for new and existing participants in I2P development and\n" +" we’re excited to join the world of developers using Git to manage\n" +" their distributed projects." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465 +msgid "" +"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n" +"default for some services. A Sybil analysis and blocking tool was also\n" +"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n" +"protocol (proposal 144) for most services. Preliminary support was added\n" +"for new tunnel build message encryption (proposal 152). There were\n" +"significant performance improvements throughout the router." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472 +msgid "" +"0.9.49 was the release that brought faster crypto. The I2P network\n" +"became faster and more secure. Improvements and fixes for the SSU (UDP)\n" +"transport resulted in faster speeds. The release also started the\n" +"migration to new, faster ECIES-X25519 encryption for routers. The\n" +"project had been working on the specifications and protocols for new\n" +"encryption for several years, and was getting close to the end of it.\n" +"The migration would take several releases to complete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480 +msgid "" +"To minimize disruption, only new installs and a very small percentage of\n" +"existing installs (randomly selected at restart) would be using the new\n" +"encryption." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484 +msgid "" +"The project had “rekeyed†the network twice before, when changing the\n" +"default signature type, but this was the first time it had changed the\n" +"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n" +"protect users from passive DNS snooping. There were numerous fixes and\n" +"improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492 +msgid "1.5.0 — The early anniversary release because it is so good!" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495 +msgid "" +"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n" +" straight from 0.9.50 to 1.5.0. This does not signify a major API\n" +" change, or a claim that development is now complete. It is simply a\n" +" recognition of almost 20 years of work to provide anonymity and\n" +" security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501 +msgid "" +"This release finishes implementation of smaller tunnel build messages\n" +" to reduce bandwidth. We continue the transition of the network’s\n" +" routers to X25519 encryption. Of course there are also numerous bug\n" +" fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506 +msgid "" +"As usual, we recommend that you update to this release. The best way\n" +" to maintain security and help the network is to run the latest\n" +" release." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510 +msgid "Congratulations team. Let’s do another 20." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2 +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11 +msgid "Level up your I2P Skills with Encrypted LeaseSets" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9 +msgid "" +"It has been said that I2P emphasizes Hidden Services, we examine one " +"interpretation of this" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16 +msgid "" +"It has been said in the past that I2P emphasizes support for Hidden Services,\n" +"which is true in many ways. However, what this means to users, developers, and\n" +"hidden service administrators isn't always the same. Encrypted LeaseSets and\n" +"their use-cases provide a unique, practical window into how I2P makes hidden\n" +"services more versatile, easier to administer, and how I2P extends on the\n" +"Hidden Service concept to provide security benefits for potentially interesting\n" +"use-cases." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26 +msgid "" +"What is a LeaseSet?\n" +"-------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31 +msgid "" +"When you create a hidden service, you publish something called a \"LeaseSet\" to\n" +"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n" +"need to discover \"where\" your hidden service is on the I2P Network. It contains\n" +"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n" +"and the public key of your destination, which clients will encrypt messages to.\n" +"This type of hidden service is reachable by anyone who has the address, which\n" +"is probably the most common use case for now." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41 +msgid "" +"Sometimes, you might not want to allow your hidden services to be accessible by\n" +"anyone, though. Some people use hidden services as a way of accessing an SSH\n" +"server on a home PC, or to stitch together a network of IOT Devices. In these\n" +"cases it's not necessary, and may be counter-productive, to make your hidden\n" +"service accessible to everyone one the I2P Network. This is where \"Encrypted\n" +"LeaseSets\" come into play." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50 +msgid "" +"Encrypted LeaseSets: VERY Hidden Services\n" +"------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55 +msgid "" +"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n" +"encrypted form, where none of the Leases or public keys are visible unless\n" +"the client has the keys required to decrypt the LeaseSet inside of it. Only\n" +"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n" +"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n" +"and no one else." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64 +msgid "" +"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n" +"of each strategy are important to understand when deciding which one to use. If\n" +"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n" +"will generate a key(or keys) which the server operator then shares with each\n" +"client. Of course, this exchange must happen out-of-band, possibly via an\n" +"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n" +"like logging into Wi-Fi with a password. Except, what you're logging into is\n" +"a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75 +msgid "" +"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n" +"strategy, then they keys are generated on the client instead. When a\n" +"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n" +"must first share their keys with the server operator. The server operator then\n" +"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n" +"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n" +"into is a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85 +msgid "" +"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n" +"users to connect to your destination, you make it impossible for unauthorized\n" +"visitors to even discover the real destination of the I2P Hidden Service. Some\n" +"readers have probably already considered a use-case for their own Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93 +msgid "" +"Using Encrypted LeaseSets to Safely Access a Router Console\n" +"-----------------------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98 +msgid "" +"As a general rule, the more complex information a service has access to about\n" +"your device, the more dangerous it is to expose that service to the Internet or\n" +"indeed, to a Hidden Service network like I2P. If you want to expose such a\n" +"service, you need to protect it with something like a password, or, in the case\n" +"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106 +msgid "" +"**Before continuing, please read and understand that if you do the following**\n" +"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n" +"**your I2P router. Do not configure access to your router console over I2P without**\n" +"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n" +"**with any devices you do not control.**" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114 +msgid "" +"One such service which is useful to share over I2P, but ONLY with an Encrypted\n" +"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n" +"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n" +"browser to administer the remote I2P instance. I find this useful for remotely\n" +"monitoring my regular I2P Services. It could also be used to monitor a server\n" +"which is used to seed a torrent long-term as a way to access I2PSnark." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123 +msgid "" +"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n" +"straightforward to configure via the Hidden Services Manager UI." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128 +msgid "" +"On the \"Server\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137 +msgid "" +"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n" +"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n" +"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n" +"\"Tunnel Cryptography Options\" and save the hidden service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148 +msgid "" +"Then, select your new tunnel from the Hidden Services Manager main page. The\n" +"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n" +"this down for the next step, along with the Encrypted Base32 Address of your\n" +"tunnel." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159 +msgid "" +"On the \"Client\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164 +msgid "" +"Now switch computers to the client which will connect to the hidden service,\n" +"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n" +"add the keys from earlier. Start by pasting the Base32 from the Server into\n" +"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n" +"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n" +"and you're ready to securely visit the Hidden Service using an Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178 +msgid "" +"Now You're Ready to Remotely Administer I2P\n" +"-------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183 +msgid "" +"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n" +"which empower them to securely manage their I2P connections from anywhere in the\n" +"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n" +"point to the SSH server, the Portainer instance I user to manage my service\n" +"containers, and my personal NextCloud instance. With I2P, truly private, always\n" +"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n" +"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n" +"could become the key to securing self-hosted home automation or simply become\n" +"the backbone of a new more private peer-to-peer web." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2 +msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9 +msgid "" +"Versatile and emerging ways of installing and embedding I2P in your " +"application" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11 +msgid "" +"For the majority of I2P's existence, it's been an application that runs with the\n" +"help of a Java Virtual Machine that is already installed on the platform. This\n" +"has always been the normal way to distribute Java applications, but it leads to\n" +"a complicated installation procedure for many people. To make things even more\n" +"complicated, the \"right answer\" to making I2P easy to install on any given\n" +"platform might not be the same as any other platform. For example, I2P is quite\n" +"simple to install with standard tools on Debian and Ubuntu based operating\n" +"systems, because we can simply list the required Java components as \"Required\"\n" +"by our package, however on Windows or OSX, there is no such system allowing us to make\n" +"sure that a compatible Java is installed." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24 +msgid "" +"The obvious solution would be to manage the Java installation ourselves, but\n" +"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n" +"in recent Java versions, a new set of options has emerged which has the\n" +"potential to solve this problem for many Java software. This exciting tool is\n" +"called **\"Jpackage.\"**" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32 +msgid "I2P-Zero and Dependency-Free I2P Installation" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37 +msgid "" +"The first very successful effort at building a dependency-free I2P Package was\n" +"I2P-Zero, which was created by the Monero project originally for use with the\n" +"Monero cryptocurrency. This project got us very excited because of it's success\n" +"in creating a general-purpose I2P router which could easily packaged with an\n" +"I2P application. Especially on Reddit, many people express their preference for\n" +"the simplicity of setting up an I2P-Zero router." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46 +msgid "" +"This really proved to us that a dependency-free I2P Package which was easy to\n" +"install was possible using modern Java tools, but I2P-Zero's use case was a\n" +"little bit different than ours. It is best for embedded apps that need an I2P\n" +"router that they can easily control using it's convenient control port on port\n" +"\"8051\". Our next step would be to adapt the technology to the general-purpose\n" +"I2P Application." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55 +msgid "OSX Application Security Changes affect I2P IzPack Installer" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60 +msgid "" +"The issue became more pressing in recent versions of Mac OSX, where it is no\n" +"longer straightforward to use the \"Classic\" installer which comes in the .jar\n" +"format. This is because the application is not \"Notarized\" by Apple authorities\n" +"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n" +"which can be notarized by Apple authorities, conveniently solving our problem." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68 +msgid "" +"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n" +"OSX than ever, no longer requiring users to install Java themselves and using\n" +"standard OSX installation tools in their prescribed ways. The new .dmg installer\n" +"makes setting up I2P on Mac OSX easier than it's ever been." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79 +msgid "The I2P of the future is Easy to Install" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84 +msgid "" +"One of the things I hear from users the most is that if I2P wants adoption, it\n" +"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n" +"experience, to quote or paraphrase many familiar Redditors. Installation should\n" +"not require complicated and error-prone \"post-installation\" steps. Many new\n" +"users are not prepared to deal with their browser configuration in a thorough\n" +"and complete way. To address this problem, we created the I2P Profile Bundle\n" +"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n" +"As it's developed, it's added security features and improved integration with\n" +"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n" +"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n" +"of I2P for Windows, with the only remaining dependency being Firefox itself.\n" +"This should provide an unprecedented level of convenience for I2P users on\n" +"Windows." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2 +msgid "Bitcoin Core adds support for I2P!" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9 +msgid "A new use case and a signal of growing acceptance" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11 +msgid "" +"An event months in the making, Bitcoin Core has added official support for I2P!\n" +"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n" +"using the help of nodes that operate within both I2P and the clearnet, making\n" +"them first-class participants in the Bitcoin network. It's exciting to see\n" +"large communities like Bitcoin taking notice of the advantages I2P can bring\n" +"to them providing privacy and reachability to people all over the world." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20 +msgid "How it Works" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25 +msgid "" +"I2P support is automatic, via the SAM API. This is also exciting news, because\n" +"it highlights some of the things I2P is singularly good at, like empowering \n" +"application developers to build I2P connections programmatically and\n" +"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n" +"enabling the SAM API and running Bitcoin with I2P enabled." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33 +msgid "Configuring your I2P Router" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38 +msgid "" +"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n" +"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n" +"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n" +"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n" +"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n" +"Configuration.\"" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47 +msgid "" +"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n" +"set::\n" +"\n" +" sam.enabled=true\n" +"\n" +"in your i2pd.conf file." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56 +msgid "Configuring your Bitcoin Node for Anonymity and Connectivity" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61 +msgid "" +"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n" +"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n" +"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n" +"OSX. It also requires at least version 22.0.0 for I2P support to be present." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68 +msgid "" +"After following these instructions, you should have a private Bitcoin\n" +"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n" +"connections, so that all your connections are anonymous. For convenience,\n" +"Windows users should open their Bitcoin Data Directory by opening the start menu\n" +"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n" +"press enter." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77 +msgid "" +"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n" +"sure that you've add quotes around the file when you save it, in order to\n" +"prevent Windows from adding a default file extension to the file. The file\n" +"should contain the following I2P-Related Bitcoin configuration options::\n" +"\n" +" i2psam=127.0.0.1:7656\n" +" i2pacceptincoming=true\n" +" onlynet=i2p\n" +"\n" +"Next, you should create another file called \"tor.conf.\" The file should contain\n" +"the following Tor related configuration options::\n" +"\n" +" proxy=127.0.0.1:9050\n" +" onion=127.0.0.1:9050\n" +" onlynet=tor\n" +"\n" +"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n" +"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n" +"lines to your bitcoin.conf file::\n" +"\n" +" includeconf=i2p.conf\n" +" includeconf=tor.conf\n" +"\n" +"Now your Bitcoin node is configured to only use anonymous connections. In order\n" +"to enable direct connections to remote nodes, remove the lines beginning in::\n" +"\n" +" onlynet=\n" +"\n" +"You can do this if you do not require your Bitcoin node to be anonymous, and\n" +"it helps anonymous users connect to the rest of the Bitcoin network." +msgstr "" diff --git a/i2p2www/translations/it/LC_MESSAGES/comparison.po b/i2p2www/translations/it/LC_MESSAGES/comparison.po index dafee516d60934e3724cdb968f166dfc4baaa4cb..cc2b41f6533225a201c89dc86e46624faaec9b7d 100644 --- a/i2p2www/translations/it/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/it/LC_MESSAGES/comparison.po @@ -1,24 +1,27 @@ -# Italian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # alamir <christianm@libero.it>, 2014,2016 -# Giuseppe Pignataro (Fastbyte01) <rogepix@gmail.com>, 2014 -# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2016-2017 +# alamir <christianm@libero.it>, 2014,2016 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-08-24 11:51+0000\n" -"Last-Translator: zzzi2p\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Giuseppe Pignataro <rogepix@gmail.com>, 2014\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -26,34 +29,23 @@ msgstr "Confronto tra I2P e Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." msgstr "" #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." @@ -61,20 +53,13 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -84,15 +69,11 @@ msgstr "Confronto tra I2P e gli altri progetti" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -102,17 +83,13 @@ msgstr "" msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina" -" della rete:</a>" +msgstr "I seguenti sono discussi in un'<a href=\"%(othernetworks)s\">altra pagina della rete:</a>" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -130,52 +107,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -183,19 +146,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -207,32 +166,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -241,36 +188,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -278,10 +212,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -295,7 +227,7 @@ msgstr "Servizi VPN a pagamento" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -357,9 +289,7 @@ msgstr "Confronto tra la la terminologia di I2P e quella di Tor" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Anche se Tor e I2P sono simili sotto molti aspetti, molta della " -"terminologia usata è diversa." +msgstr "Anche se Tor e I2P sono simili sotto molti aspetti, molta della terminologia usata è diversa." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -432,8 +362,8 @@ msgstr "Servizio nascosto" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite o destinazione" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -503,8 +433,7 @@ msgstr "Benefici ottenuti usando Tor su rete I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -523,10 +452,8 @@ msgstr "Ha più sviluppatori, includendone diversi che sono sovvenzionati" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -534,18 +461,15 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Concepito e ottimizzato per il traffico in uscita, con un alto numero di " -"nodi d'uscita" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Concepito e ottimizzato per il traffico in uscita, con un alto numero di nodi d'uscita" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Ha una migliore documentazione, specifiche formali e paper,\n" -"un migliore sito web, e molte più traduzioni dell'interfaccia." +msgstr "Ha una migliore documentazione, specifiche formali e paper,\nun migliore sito web, e molte più traduzioni dell'interfaccia." #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -559,9 +483,7 @@ msgstr "I nodi del client Tor hanno un richiesta di banda accessoria molto bassa msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"Un controllo centrale riduce la complessità di ogni\n" -"nodo e più resistere efficacemente ad attacchi di tipo Sybil" +msgstr "Un controllo centrale riduce la complessità di ogni\nnodo e più resistere efficacemente ad attacchi di tipo Sybil" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" @@ -579,11 +501,9 @@ msgstr "Benefici ottenuti usando I2P sopra a Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Progettato e ottimizzato per servizi nascosti, che sono molto più veloci " -"che in Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Progettato e ottimizzato per servizi nascosti, che sono molto più veloci che in Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -593,10 +513,7 @@ msgstr "Completamente distribuito e auto-organizzante" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"I peer sono selezionati registrando e classificando continuamente le " -"prestazioni,\n" -"invece che confidando nella capacità dichiarata." +msgstr "I peer sono selezionati registrando e classificando continuamente le prestazioni,\ninvece che confidando nella capacità dichiarata." #: i2p2www/pages/site/comparison/tor.html:129 msgid "" @@ -722,4 +639,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/it/LC_MESSAGES/docs.po b/i2p2www/translations/it/LC_MESSAGES/docs.po index d87505d26a4115408770624945eaf1c911166a7b..0559457e4b443fbfce0fe06b1e829cfe3e3ac61b 100644 --- a/i2p2www/translations/it/LC_MESSAGES/docs.po +++ b/i2p2www/translations/it/LC_MESSAGES/docs.po @@ -1,27 +1,31 @@ -# Italian translations for I2P. -# Copyright (C) 2020 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # alamir <christianm@libero.it>, 2014 +# alamir <christianm@libero.it>, 2014 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 # Giuseppe Pignataro <rogepix@gmail.com>, 2014 # Jacopo Tumminello <tummarellox@gmail.com>, 2014 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020 # Tristano Ajmone <tajmone@gmail.com>, 2015 +# Jacopo Tumminello <tummarellox@gmail.com>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2020-11-16 17:04+0000\n" -"PO-Revision-Date: 2020-11-16 17:09+0000\n" -"Last-Translator: Valentina <valentina.stagnaro@hotmail.it>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24 msgid "Index to Technical Documentation" @@ -36,16 +40,14 @@ msgid "" "This index is ordered from the highest to lowest layers.\n" "The higher layers are for \"clients\" or applications;\n" "the lower layers are inside the router itself.\n" -"The interface between applications and the router is the I2CP (I2P " -"Control\n" +"The interface between applications and the router is the I2CP (I2P Control\n" "Protocol) API." msgstr "" #: i2p2www/pages/site/docs/index.html:18 #, python-format msgid "" -"The I2P Project is committed to maintaining accurate, current " -"documentation.\n" +"The I2P Project is committed to maintaining accurate, current documentation.\n" "If you find any inaccuracies in the documents linked below, please\n" "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>." msgstr "" @@ -102,22 +104,20 @@ msgstr "Presentazioni, articoli, guide, filmati ed interviste" #: i2p2www/pages/site/docs/index.html:36 #, python-format msgid "" -"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>" -" August 28, 2003 (pdf)" -msgstr "" -"<a href=\"%(pdf)s\">Panoramica del progetto Invisible Internet Project " -"(I2P)</a> 28 Agosto 2003 (pdf)" +"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> " +"August 28, 2003 (pdf)" +msgstr "<a href=\"%(pdf)s\">Panoramica del progetto Invisible Internet Project (I2P)</a> 28 Agosto 2003 (pdf)" #: i2p2www/pages/site/docs/index.html:39 msgid "Application-Layer Topics" msgstr "Topic sul Livello applicazione" #: i2p2www/pages/site/docs/index.html:42 i2p2www/pages/site/docs/naming.html:2 -msgid "Naming and Addressbook" -msgstr "Nominativi e rubrica" +msgid "Naming and Address Book" +msgstr "" #: i2p2www/pages/site/docs/index.html:43 -msgid "Addressbook Subscription Feed Commands" +msgid "Address Book Subscription Feed Commands" msgstr "" #: i2p2www/pages/site/docs/index.html:44 @@ -134,7 +134,8 @@ msgstr "Specifiche del Plugin" msgid "Managed Clients" msgstr "Client gestiti" -#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:239 +#: i2p2www/pages/site/docs/index.html:47 +#: i2p2www/pages/site/docs/index.html:240 msgid "Embedding the router in your application" msgstr "Incorporare il router in un programma" @@ -151,7 +152,8 @@ msgstr "API del Plugin I2PControl" msgid "hostsdb.blockfile Format" msgstr "formato di hostsdb.blockfile" -#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:205 +#: i2p2www/pages/site/docs/index.html:51 +#: i2p2www/pages/site/docs/index.html:206 msgid "Configuration File Format" msgstr "Formato del File di Configurazione" @@ -228,8 +230,7 @@ msgstr "API e protocollo di interfaccia Client-Router" #: i2p2www/pages/site/docs/index.html:101 msgid "" -"The lowest-level API used for clients (applications) to send and receive " -"traffic to a router.\n" +"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n" "Traditionally used only by Java applications and higher-level APIs." msgstr "" @@ -246,12 +247,12 @@ msgid "I2CP API Javadoc" msgstr "" #: i2p2www/pages/site/docs/index.html:112 -#: i2p2www/pages/site/docs/index.html:145 +#: i2p2www/pages/site/docs/index.html:146 msgid "Common data structures specification" msgstr "" #: i2p2www/pages/site/docs/index.html:114 -#: i2p2www/pages/site/docs/index.html:149 +#: i2p2www/pages/site/docs/index.html:150 msgid "Data Structures Javadoc" msgstr "" @@ -264,308 +265,308 @@ msgid "How client messages are end-to-end encrypted by the router." msgstr "" #: i2p2www/pages/site/docs/index.html:120 -msgid "ECIES-X25519-AEAD-Ratchet encryption" +msgid "ECIES-X25519-AEAD-Ratchet encryption for destinations" msgstr "" #: i2p2www/pages/site/docs/index.html:121 -msgid "ElGamal/AES+SessionTag encryption" +msgid "ECIES-X25519 encryption for routers" msgstr "" #: i2p2www/pages/site/docs/index.html:122 -#: i2p2www/pages/site/docs/index.html:160 +msgid "ElGamal/AES+SessionTag encryption" +msgstr "" + +#: i2p2www/pages/site/docs/index.html:123 +#: i2p2www/pages/site/docs/index.html:161 msgid "ElGamal and AES cryptography details" msgstr "Dettagli sulla crittografia AES ed ElGamal" -#: i2p2www/pages/site/docs/index.html:125 +#: i2p2www/pages/site/docs/index.html:126 #: i2p2www/pages/site/docs/how/tech-intro.html:11 #: i2p2www/pages/site/docs/how/tech-intro.html:325 msgid "Network Database" msgstr "Database della Rete" -#: i2p2www/pages/site/docs/index.html:126 +#: i2p2www/pages/site/docs/index.html:127 msgid "" -"Distributed storage and retrieval of information about routers and " -"clients." +"Distributed storage and retrieval of information about routers and clients." msgstr "" -#: i2p2www/pages/site/docs/index.html:128 +#: i2p2www/pages/site/docs/index.html:129 msgid "Network database overview, details, and threat analysis" msgstr "" -#: i2p2www/pages/site/docs/index.html:129 +#: i2p2www/pages/site/docs/index.html:130 msgid "Cryptographic hashes" msgstr "Hash crittografici" -#: i2p2www/pages/site/docs/index.html:130 +#: i2p2www/pages/site/docs/index.html:131 msgid "Cryptographic signatures" msgstr "Firme crittografiche" -#: i2p2www/pages/site/docs/index.html:131 +#: i2p2www/pages/site/docs/index.html:132 msgid "Red25519 signatures" msgstr "" -#: i2p2www/pages/site/docs/index.html:132 -#: i2p2www/pages/site/docs/index.html:197 +#: i2p2www/pages/site/docs/index.html:133 +#: i2p2www/pages/site/docs/index.html:198 msgid "Router reseed specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:133 +#: i2p2www/pages/site/docs/index.html:134 msgid "Base32 Addresses for Encrypted Leasesets" msgstr "" -#: i2p2www/pages/site/docs/index.html:136 +#: i2p2www/pages/site/docs/index.html:137 msgid "Router Message Protocol" msgstr "Protocollo Messaggi dei Router" -#: i2p2www/pages/site/docs/index.html:137 +#: i2p2www/pages/site/docs/index.html:138 msgid "" "I2P is a message-oriented router. The messages sent between routers are " "defined by the I2NP protocol." msgstr "" -#: i2p2www/pages/site/docs/index.html:139 +#: i2p2www/pages/site/docs/index.html:140 msgid "I2NP - I2P Network Protocol Overview" msgstr "" -#: i2p2www/pages/site/docs/index.html:141 +#: i2p2www/pages/site/docs/index.html:142 msgid "I2NP Specification" msgstr "Specifiche I2NP" -#: i2p2www/pages/site/docs/index.html:143 +#: i2p2www/pages/site/docs/index.html:144 msgid "I2NP Javadoc" msgstr "" -#: i2p2www/pages/site/docs/index.html:147 +#: i2p2www/pages/site/docs/index.html:148 msgid "Encrypted Leaseset specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:152 +#: i2p2www/pages/site/docs/index.html:153 #: i2p2www/pages/site/docs/how/tech-intro.html:10 #: i2p2www/pages/site/docs/how/tech-intro.html:224 msgid "Tunnels" msgstr "Tunnel" -#: i2p2www/pages/site/docs/index.html:153 +#: i2p2www/pages/site/docs/index.html:154 msgid "" -"Selecting peers, requesting tunnels through those peers, and encrypting " -"and routing messages through these tunnels." +"Selecting peers, requesting tunnels through those peers, and encrypting and " +"routing messages through these tunnels." msgstr "" -#: i2p2www/pages/site/docs/index.html:155 +#: i2p2www/pages/site/docs/index.html:156 msgid "Peer profiling and selection" msgstr "" -#: i2p2www/pages/site/docs/index.html:156 +#: i2p2www/pages/site/docs/index.html:157 msgid "Tunnel routing overview" msgstr "" -#: i2p2www/pages/site/docs/index.html:157 +#: i2p2www/pages/site/docs/index.html:158 msgid "Garlic routing and \"garlic\" terminology" msgstr "" -#: i2p2www/pages/site/docs/index.html:158 +#: i2p2www/pages/site/docs/index.html:159 msgid "Tunnel building and encryption" msgstr "" -#: i2p2www/pages/site/docs/index.html:159 +#: i2p2www/pages/site/docs/index.html:160 msgid "ElGamal/AES" msgstr "ElGamal/AES" -#: i2p2www/pages/site/docs/index.html:159 +#: i2p2www/pages/site/docs/index.html:160 msgid "for build request encryption" msgstr "" -#: i2p2www/pages/site/docs/index.html:161 #: i2p2www/pages/site/docs/index.html:162 +#: i2p2www/pages/site/docs/index.html:163 msgid "Tunnel building specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:163 +#: i2p2www/pages/site/docs/index.html:164 msgid "Low-level tunnel message specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:164 +#: i2p2www/pages/site/docs/index.html:165 #: i2p2www/pages/site/docs/tunnels/unidirectional.html:2 msgid "Unidirectional Tunnels" msgstr "Tunnel unidirezionali" -#: i2p2www/pages/site/docs/index.html:165 +#: i2p2www/pages/site/docs/index.html:166 #: i2p2www/pages/site/docs/how/peer-selection.html:299 msgid "Peer Profiling and Selection in the I2P Anonymous Network" msgstr "" -#: i2p2www/pages/site/docs/index.html:166 +#: i2p2www/pages/site/docs/index.html:167 msgid "2009 paper (pdf), not current but still generally accurate" msgstr "" -#: i2p2www/pages/site/docs/index.html:169 +#: i2p2www/pages/site/docs/index.html:170 msgid "Transport Layer" msgstr "Livello di trasporto" -#: i2p2www/pages/site/docs/index.html:170 -msgid "The protocols for direct (point-to-point) router to router communication." +#: i2p2www/pages/site/docs/index.html:171 +msgid "" +"The protocols for direct (point-to-point) router to router communication." msgstr "" -#: i2p2www/pages/site/docs/index.html:172 +#: i2p2www/pages/site/docs/index.html:173 msgid "Transport layer overview" msgstr "Panoramica sul livello di trasporto" -#: i2p2www/pages/site/docs/index.html:174 +#: i2p2www/pages/site/docs/index.html:175 msgid "TCP-based transport overview and specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:176 +#: i2p2www/pages/site/docs/index.html:177 msgid "NTCP2 specification" msgstr "" -#: i2p2www/pages/site/docs/index.html:178 +#: i2p2www/pages/site/docs/index.html:179 msgid "UDP-based transport overview" msgstr "" -#: i2p2www/pages/site/docs/index.html:180 +#: i2p2www/pages/site/docs/index.html:181 msgid "SSU specification" msgstr "Specificge di SSU" -#: i2p2www/pages/site/docs/index.html:182 +#: i2p2www/pages/site/docs/index.html:183 msgid "NTCP transport encryption" msgstr "" -#: i2p2www/pages/site/docs/index.html:184 +#: i2p2www/pages/site/docs/index.html:185 msgid "SSU transport encryption" msgstr "" -#: i2p2www/pages/site/docs/index.html:186 +#: i2p2www/pages/site/docs/index.html:187 msgid "Transport Javadoc" msgstr "" -#: i2p2www/pages/site/docs/index.html:188 +#: i2p2www/pages/site/docs/index.html:189 msgid "NTCP Javadoc" msgstr "" -#: i2p2www/pages/site/docs/index.html:190 +#: i2p2www/pages/site/docs/index.html:191 msgid "SSU Javadoc" msgstr "" -#: i2p2www/pages/site/docs/index.html:193 +#: i2p2www/pages/site/docs/index.html:194 msgid "Other Router Topics" msgstr "" -#: i2p2www/pages/site/docs/index.html:195 +#: i2p2www/pages/site/docs/index.html:196 msgid "Router software updates" msgstr "Aggiornamenti software del router" -#: i2p2www/pages/site/docs/index.html:199 +#: i2p2www/pages/site/docs/index.html:200 msgid "Native BigInteger Library" msgstr "Libreria nativa BigInteger" -#: i2p2www/pages/site/docs/index.html:201 +#: i2p2www/pages/site/docs/index.html:202 msgid "Time synchronization and NTP" msgstr "Sincronizzazione ora di sistema e NTP" -#: i2p2www/pages/site/docs/index.html:203 +#: i2p2www/pages/site/docs/index.html:204 msgid "Performance" msgstr "Prestazioni" -#: i2p2www/pages/site/docs/index.html:210 +#: i2p2www/pages/site/docs/index.html:211 msgid "Developer's Guides and Resources" msgstr "Guida dello sviluppatore ed altre risorse" -#: i2p2www/pages/site/docs/index.html:212 +#: i2p2www/pages/site/docs/index.html:213 msgid "New Developer's Guide" msgstr "Nuova guida per gli sviluppatori" -#: i2p2www/pages/site/docs/index.html:214 +#: i2p2www/pages/site/docs/index.html:215 msgid "New Translator's Guide" msgstr "Nuova guida per i traduttori" -#: i2p2www/pages/site/docs/index.html:216 +#: i2p2www/pages/site/docs/index.html:217 msgid "Monotone Guide" msgstr "Guida di Monotone" -#: i2p2www/pages/site/docs/index.html:218 +#: i2p2www/pages/site/docs/index.html:219 msgid "Developer Guidelines" msgstr "Linee guide per gli sviluppatori" -#: i2p2www/pages/site/docs/index.html:220 +#: i2p2www/pages/site/docs/index.html:221 msgid "Javadocs on the standard internet:" msgstr "" -#: i2p2www/pages/site/docs/index.html:221 -#: i2p2www/pages/site/docs/index.html:227 -#: i2p2www/pages/site/docs/index.html:229 -#: i2p2www/pages/site/docs/index.html:231 +#: i2p2www/pages/site/docs/index.html:222 +#: i2p2www/pages/site/docs/index.html:228 +#: i2p2www/pages/site/docs/index.html:230 +#: i2p2www/pages/site/docs/index.html:232 #, python-format msgid "Server %(num)s" msgstr "Server %(num)s" -#: i2p2www/pages/site/docs/index.html:222 -#: i2p2www/pages/site/docs/index.html:235 +#: i2p2www/pages/site/docs/index.html:223 +#: i2p2www/pages/site/docs/index.html:236 msgid "" "Note: always verify that javadocs are current by checking the release " "number." msgstr "" -#: i2p2www/pages/site/docs/index.html:224 +#: i2p2www/pages/site/docs/index.html:225 msgid "Javadocs inside I2P:" msgstr "" -#: i2p2www/pages/site/docs/index.html:237 +#: i2p2www/pages/site/docs/index.html:238 msgid "Proposals" msgstr "Proposte" -#: i2p2www/pages/site/docs/index.html:241 +#: i2p2www/pages/site/docs/index.html:242 msgid "How to Set up a Reseed Server" msgstr "" -#: i2p2www/pages/site/docs/index.html:243 +#: i2p2www/pages/site/docs/index.html:244 msgid "Ports used by I2P" msgstr "Porte usate da I2P" -#: i2p2www/pages/site/docs/index.html:245 +#: i2p2www/pages/site/docs/index.html:246 msgid "Automatic updates to development builds inside I2P" msgstr "" -#: i2p2www/pages/site/docs/index.html:247 +#: i2p2www/pages/site/docs/index.html:248 msgid "Updating the wrapper manually" msgstr "Aggiornare il wrapper manualmente" -#: i2p2www/pages/site/docs/index.html:249 +#: i2p2www/pages/site/docs/index.html:250 msgid "User forum" msgstr "Forum degli utenti" -#: i2p2www/pages/site/docs/index.html:251 +#: i2p2www/pages/site/docs/index.html:252 msgid "Developer forum inside I2P" msgstr "Forum di sviluppo interno a I2P" -#: i2p2www/pages/site/docs/index.html:253 +#: i2p2www/pages/site/docs/index.html:254 msgid "Bug tracker" msgstr "Bug tracker" #: i2p2www/pages/site/docs/index.html:256 -msgid "Viewmtn inside I2P" -msgstr "" - -#: i2p2www/pages/site/docs/index.html:259 msgid "I2P Source exported to GitHub" msgstr "Sorgenti I2P esportati in GitHub" -#: i2p2www/pages/site/docs/index.html:261 +#: i2p2www/pages/site/docs/index.html:258 msgid "I2P Source Git Repo inside I2P" msgstr "" -#: i2p2www/pages/site/docs/index.html:263 +#: i2p2www/pages/site/docs/index.html:260 msgid "Source translation at Transifex" msgstr "Traduzione linguistica via Transifex" -#: i2p2www/pages/site/docs/index.html:265 +#: i2p2www/pages/site/docs/index.html:262 msgid "Roadmap" msgstr "Roadmap" -#: i2p2www/pages/site/docs/index.html:267 +#: i2p2www/pages/site/docs/index.html:264 msgid "To Do List" msgstr "Cose da fare" -#: i2p2www/pages/site/docs/index.html:267 +#: i2p2www/pages/site/docs/index.html:264 msgid "not current" msgstr "non attuale" @@ -573,42 +574,30 @@ msgstr "non attuale" msgid "" "I2P ships with a generic naming library and a base implementation \n" "designed to work off a local name to destination mapping, as well as an\n" -"add-on application called the <a href=\"#addressbook\">addressbook</a>. \n" -"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to " -"Tor's .onion addresses." +"add-on application called the <a href=\"#addressbook\">address book</a>. \n" +"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses." msgstr "" #: i2p2www/pages/site/docs/naming.html:15 msgid "" -"The addressbook is a web-of-trust\n" -"driven secure, distributed, and human readable naming system, sacrificing" -" only\n" -"the call for all human readable names to be globally unique by mandating " -"only\n" -"local uniqueness. While all messages in I2P are cryptographically " -"addressed\n" -"by their destination, different people can have local addressbook entries" -" for\n" -"\"Alice\" which refer to different destinations. People can still " -"discover new\n" -"names by importing published addressbooks of peers specified in their web" -" of trust,\n" -"by adding in the entries provided through a third party, or (if some " -"people organize\n" -"a series of published addressbooks using a first come first serve " -"registration\n" -"system) people can choose to treat these addressbooks as name servers, " -"emulating\n" +"The address book is a web-of-trust\n" +"driven secure, distributed, and human readable naming system, sacrificing only\n" +"the call for all human readable names to be globally unique by mandating only\n" +"local uniqueness. While all messages in I2P are cryptographically addressed\n" +"by their destination, different people can have local address book entries for\n" +"\"Alice\" which refer to different destinations. People can still discover new\n" +"names by importing published address books of peers specified in their web of trust,\n" +"by adding in the entries provided through a third party, or (if some people organize\n" +"a series of published address books using a first come first serve registration\n" +"system) people can choose to treat these address books as name servers, emulating\n" "traditional DNS." msgstr "" #: i2p2www/pages/site/docs/naming.html:29 #, python-format msgid "" -"NOTE: For the reasoning behind the I2P naming system, common arguments " -"against it\n" -"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming" -" discussion</a>\n" +"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n" +"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n" "page." msgstr "" @@ -638,35 +627,32 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:55 msgid "" -"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for " -"lookups and points\n" +"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n" "the user to remote jump services to assist with failed lookups." msgstr "" #: i2p2www/pages/site/docs/naming.html:59 msgid "" -"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to " -"add hosts to their local hosts.txt" +"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add " +"hosts to their local hosts.txt" msgstr "" #: i2p2www/pages/site/docs/naming.html:62 msgid "" -"HTTP <a href=\"#jump-services\">jump services</a> which provide their own" -" lookups and redirection." +"HTTP <a href=\"#jump-services\">jump services</a> which provide their own " +"lookups and redirection." msgstr "" #: i2p2www/pages/site/docs/naming.html:65 msgid "" -"The <a href=\"#addressbook\">addressbook</a> application which merges " -"external\n" +"The <a href=\"#addressbook\">address book</a> application which merges external\n" "host lists, retrieved via HTTP, with the local list." msgstr "" #: i2p2www/pages/site/docs/naming.html:69 msgid "" -"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web " -"front-end\n" -"for addressbook configuration and viewing of the local host lists." +"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n" +"for address book configuration and viewing of the local host lists." msgstr "" #: i2p2www/pages/site/docs/naming.html:76 @@ -677,15 +663,11 @@ msgstr "" #, python-format msgid "" "All destinations in I2P are 516-byte (or longer) keys.\n" -"(To be more precise, it is a 256-byte public key plus a 128-byte signing " -"key\n" -"plus a 3-or-more byte certificate, which in Base64 representation is 516 " -"or more bytes.\n" -"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> " -"are in use now\n" +"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n" +"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n" +"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n" "for signature type indication.\n" -"Therefore, certificates in recently-generated destinations are more than " -"3 bytes." +"Therefore, certificates in recently-generated destinations are more than 3 bytes." msgstr "" #: i2p2www/pages/site/docs/naming.html:87 @@ -704,8 +686,7 @@ msgid "" "The hosts.txt Naming Service does a simple linear search through\n" "text files. This naming service was the default until\n" "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n" -"The hosts.txt format had become too slow after the file grew to thousands" -" of entries." +"The hosts.txt format had become too slow after the file grew to thousands of entries." msgstr "" #: i2p2www/pages/site/docs/naming.html:102 @@ -713,8 +694,7 @@ msgstr "" msgid "" "It does a linear search through three local files, in order, to\n" "look up host names and convert them to a 516-byte destination key.\n" -"Each file is in a simple <a href=\"%(configuration)s\">configuration file" -" format</a>, with hostname=base64, one per line.\n" +"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n" "The files are:" msgstr "" @@ -724,8 +704,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:116 msgid "" -"The Blockfile Naming Service stores multiple \"addressbooks\" in a single" -"\n" +"The Blockfile Naming Service stores multiple \"address books\" in a single\n" "database file named hostsdb.blockfile.\n" "This Naming Service is the default since release 0.8.8." msgstr "" @@ -733,32 +712,22 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:122 #, python-format msgid "" -"A blockfile is simply on-disk storage of multiple sorted maps (key-value " -"pairs),\n" +"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n" "implemented as skiplists.\n" -"The blockfile format is specified on the <a " -"href=\"%(blockfile)s\">Blockfile page</a>.\n" -"It provides fast Destination lookup in a compact format. While the " -"blockfile overhead is substantial,\n" -"the destinations are stored in binary rather than in Base 64 as in the " -"hosts.txt format.\n" -"In addition, the blockfile provides the capability of arbitrary metadata " -"storage\n" -"(such as added date, source, and comments) for each entry to implement " -"advanced addressbook features.\n" -"The blockfile storage requirement is a modest increase over the hosts.txt" -" format, and the blockfile provides\n" +"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n" +"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n" +"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n" +"In addition, the blockfile provides the capability of arbitrary metadata storage\n" +"(such as added date, source, and comments) for each entry to implement advanced address book features.\n" +"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n" "approximately 10x reduction in lookup times." msgstr "" #: i2p2www/pages/site/docs/naming.html:134 msgid "" -"On creation, the naming service imports entries from the three files used" -" by the hosts.txt Naming Service.\n" -"The blockfile mimics the previous implementation by maintaining three " -"maps that\n" -"are searched in-order, named privatehosts.txt, userhosts.txt, and " -"hosts.txt.\n" +"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n" +"The blockfile mimics the previous implementation by maintaining three maps that\n" +"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n" "It also maintains a reverse-lookup map to implement rapid reverse lookups." msgstr "" @@ -788,31 +757,24 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:158 #, python-format msgid "" -"The naming service is specified with the configuration property " -"<tt>i2p.naming.impl=class</tt>.\n" +"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n" "Other implementations are possible. For example,\n" -"there is an experimental facility for real-time lookups (a la DNS) over " -"the network within the router.\n" -"For more information see the <a " -"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion" -" page</a>." +"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n" +"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:165 msgid "" -"The HTTP proxy does a lookup via the router for all hostnames ending in " -"'.i2p'.\n" +"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n" "Otherwise, it forwards the request to a configured HTTP outproxy.\n" -"Thus, in practice, all HTTP (eepsite) hostnames must end in the pseudo-" -"Top Level Domain '.i2p'." +"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'." msgstr "" #: i2p2www/pages/site/docs/naming.html:171 #, python-format msgid "" "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n" -"following the procedures specified in <a href=\"%(rfc6761)s\">RFC " -"6761</a>." +"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:177 @@ -823,7 +785,7 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/naming.html:183 -msgid "Addressbook" +msgid "Address Book" msgstr "Rubrica" #: i2p2www/pages/site/docs/naming.html:184 @@ -832,7 +794,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:186 msgid "" -"The addressbook application periodically\n" +"The address book application periodically\n" "retrieves other users' hosts.txt files and merges\n" "them with the local hosts.txt, after several checks.\n" "Naming conflicts are resolved on a first-come first-served\n" @@ -851,24 +813,20 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:202 msgid "" "For this reason, the only subscription configured by\n" -"default is <code>http://i2p-projekt.i2p/hosts.txt " -"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>," -" \n" +"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n" "which contains a copy of the hosts.txt included\n" "in the I2P release.\n" "Users must configure additional subscriptions in their\n" -"local addressbook application (via subscriptions.txt or <a " -"href=\"#susidns\">SusiDNS</a>)." +"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)." msgstr "" #: i2p2www/pages/site/docs/naming.html:211 -msgid "Some other public addressbook subscription links:" +msgid "Some other public address book subscription links:" msgstr "" #: i2p2www/pages/site/docs/naming.html:218 msgid "" -"The operators of these services may have various policies for listing " -"hosts.\n" +"The operators of these services may have various policies for listing hosts.\n" "Presence on this list does not imply endorsement." msgstr "" @@ -879,12 +837,10 @@ msgstr "Convenzioni sui nomi" #: i2p2www/pages/site/docs/naming.html:224 msgid "" -"While there are hopefully not any technical limitations within I2P on " -"host names,\n" -"the addressbook enforces several restrictions on host names\n" +"While there are hopefully not any technical limitations within I2P on host names,\n" +"the address book enforces several restrictions on host names\n" "imported from subscriptions.\n" -"It does this for basic typographical sanity and compatibility with " -"browsers,\n" +"It does this for basic typographical sanity and compatibility with browsers,\n" "and for security.\n" "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n" "Any hostnames violating these rules may not be propagated\n" @@ -897,13 +853,13 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:243 msgid "" -"Names are checked for conflict with existing names in the existing " -"userhosts.txt and hosts.txt\n" +"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n" "(but not privatehosts.txt) after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:248 -msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." +msgid "" +"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:252 @@ -939,8 +895,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:280 msgid "" "Certain hostnames reserved for project use are not allowed\n" -"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, " -"*.console.i2p, and others)" +"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)" msgstr "" #: i2p2www/pages/site/docs/naming.html:285 @@ -959,14 +914,12 @@ msgstr "Lunghezza minima della chiave: 516 byte." #: i2p2www/pages/site/docs/naming.html:297 msgid "Maximum key length 616 bytes (to account for certs up to 100 bytes)." -msgstr "" -"Lunghezza massima della chiave: 616 byte (tenendo conto di certificati " -"fino a 100 byte)." +msgstr "Lunghezza massima della chiave: 616 byte (tenendo conto di certificati fino a 100 byte)." #: i2p2www/pages/site/docs/naming.html:302 msgid "" -"Any name received via subscription that passes all the checks is added " -"via the local naming service." +"Any name received via subscription that passes all the checks is added via " +"the local naming service." msgstr "" #: i2p2www/pages/site/docs/naming.html:306 @@ -975,7 +928,7 @@ msgid "" "and do not denote any actual naming or trust hierarchy.\n" "If the name 'host.i2p' already exists, there is nothing\n" "to prevent anybody from adding a name 'a.host.i2p' to their hosts.txt,\n" -"and this name can be imported by others' addressbook.\n" +"and this name can be imported by others' address book.\n" "Methods to deny subdomains to non-domain 'owners' (certificates?),\n" "and the desirability and feasibility of these methods,\n" "are topics for future discussion." @@ -983,19 +936,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:317 msgid "" -"International Domain Names (IDN) also work in i2p (using punycode 'xn--' " -"form).\n" -"To see IDN .i2p domain names rendered correctly in Firefox's location " -"bar,\n" +"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n" +"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n" "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config." msgstr "" #: i2p2www/pages/site/docs/naming.html:323 msgid "" -"As the addressbook application does not use privatehosts.txt at all, in " -"practice\n" -"this file is the only place where it is appropriate to place private " -"aliases or\n" +"As the address book application does not use privatehosts.txt at all, in practice\n" +"this file is the only place where it is appropriate to place private aliases or\n" "\"pet names\" for sites already in hosts.txt." msgstr "" @@ -1009,17 +958,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:338 msgid "" -"Addressbook will publish the merged hosts.txt to a location\n" -"(traditionally hosts.txt in the local eepsite's home directory) to be " -"accessed by others\n" +"Address Book will publish the merged hosts.txt to a location\n" +"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n" "for their subscriptions.\n" "This step is optional and is disabled by default." msgstr "" #: i2p2www/pages/site/docs/naming.html:346 msgid "" -"The addressbook application, together with eepget, saves the Etag and/or " -"Last-Modified\n" +"The address book application, together with eepget, saves the Etag and/or Last-Modified\n" "information returned by the web server of the subscription.\n" "This greatly reduces the bandwidth required, as the web server will\n" "return a '304 Not Modified' on the next fetch if nothing has changed." @@ -1036,8 +983,7 @@ msgid "" "Hosts serving a static hosts.txt or an equivalent CGI application\n" "are strongly encouraged to deliver\n" "a Content-Length header, and either an Etag or Last-Modified header.\n" -"Also ensure that the server delivers a '304 Not Modified' when " -"appropriate.\n" +"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n" "This will dramatically reduce the network bandwidth, and\n" "reduce chances of corruption." msgstr "" @@ -1048,8 +994,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:368 msgid "" -"A host add service is a simple CGI application that takes a hostname and " -"a Base64 key as parameters\n" +"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n" "and adds that to its local hosts.txt.\n" "If other routers subscribe to that hosts.txt, the new hostname/key\n" "will be propagated through the network." @@ -1057,10 +1002,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:375 msgid "" -"It is recommended that host add services impose, at a minimum, the " -"restrictions imposed by the addressbook application listed above.\n" -"Host add services may impose additional restrictions on hostnames and " -"keys, for example:" +"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n" +"Host add services may impose additional restrictions on hostnames and keys, for example:" msgstr "" #: i2p2www/pages/site/docs/naming.html:380 @@ -1113,10 +1056,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:426 msgid "" -"A jump service is a simple CGI application that takes a hostname as a " -"parameter\n" -"and returns a 301 redirect to the proper URL with a " -"<code>?i2paddresshelper=key</code>\n" +"A jump service is a simple CGI application that takes a hostname as a parameter\n" +"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n" "string appended.\n" "The HTTP proxy will interpret the appended string and\n" "use that key as the actual destination.\n" @@ -1139,18 +1080,16 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:448 msgid "" -"SusiDNS is simply a web interface front-end to configuring addressbook " -"subscriptions\n" -"and accessing the four addressbook files.\n" -"All the real work is done by the 'addressbook' application." +"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n" +"and accessing the four address book files.\n" +"All the real work is done by the 'address book' application." msgstr "" #: i2p2www/pages/site/docs/naming.html:454 msgid "" -"Currently, there is little enforcement of addressbook naming rules within" -" SusiDNS,\n" +"Currently, there is little enforcement of address book naming rules within SusiDNS,\n" "so a user may enter hostnames locally that would be rejected by\n" -"the addressbook subscription rules." +"the address book subscription rules." msgstr "" #: i2p2www/pages/site/docs/naming.html:460 @@ -1162,36 +1101,29 @@ msgid "" "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n" "Base32 addresses are much shorter and easier to handle than the\n" "full 516-character Base64 Destinations or addresshelpers.\n" -"Example: " -"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" +"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" msgstr "" #: i2p2www/pages/site/docs/naming.html:468 #, python-format msgid "" -"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 " -"hash.\n" +"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n" "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n" "The form is {52 chars}.b32.i2p.\n" "Tor has a\n" -"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94" -"-december-4th-2013\">proposal</a>\n" -"to convert to an identical format of {52 chars}.onion for their hidden " -"services.\n" +"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n" +"to convert to an identical format of {52 chars}.onion for their hidden services.\n" "Base32 is implemented in the naming service, which queries the\n" "router over I2CP to lookup the LeaseSet to get the full Destination.\n" -"Base32 lookups will only be successful when the Destination is up and " -"publishing\n" +"Base32 lookups will only be successful when the Destination is up and publishing\n" "a LeaseSet.\n" -"Because resolution may require a network database lookup, it may take " -"significantly\n" +"Because resolution may require a network database lookup, it may take significantly\n" "longer than a local address book lookup." msgstr "" #: i2p2www/pages/site/docs/naming.html:483 msgid "" -"Base32 addresses can be used in most places where hostnames or full " -"destinations\n" +"Base32 addresses can be used in most places where hostnames or full destinations\n" "are used, however there are some exceptions where they may fail if the\n" "name does not immediately resolve. I2PTunnel will fail, for example, if\n" "the name does not resolve to a destination." @@ -1217,8 +1149,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:12 msgid "" -"There are now plugins available that support distributed email, blogs, " -"IRC\n" +"There are now plugins available that support distributed email, blogs, IRC\n" "clients, distributed file storage, wikis, and more." msgstr "" @@ -1238,8 +1169,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:31 msgid "" -"Support large or special-purpose applications that would never be bundled" -"\n" +"Support large or special-purpose applications that would never be bundled\n" "with the I2P installation" msgstr "" @@ -1253,8 +1183,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:44 msgid "" -"Separate initial install and update packages, if desired, for smaller " -"update downloads" +"Separate initial install and update packages, if desired, for smaller update" +" downloads" msgstr "" #: i2p2www/pages/site/docs/plugins.html:48 @@ -1284,7 +1214,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/plugins.html:70 -msgid "Automatic integration and startup of webapps into console Jetty instance" +msgid "" +"Automatic integration and startup of webapps into console Jetty instance" msgstr "" #: i2p2www/pages/site/docs/plugins.html:74 @@ -1324,32 +1255,21 @@ msgstr "Installazione" #: i2p2www/pages/site/docs/plugins.html:101 msgid "" -"To install and start a plugin, copy the <code>.xpi2p</code> install link " -"to\n" +"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n" "the form at the bottom of\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp" -" in\n" -"your router console</a> and click the \"install plugin\" button. After a" -"\n" -"plugin is installed and started, a link to the plugin will usually appear" -" at\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n" +"your router console</a> and click the \"install plugin\" button. After a\n" +"plugin is installed and started, a link to the plugin will usually appear at\n" "the top of your summary bar." msgstr "" #: i2p2www/pages/site/docs/plugins.html:110 msgid "" -"To update a plugin to the latest version, just click the update button on" -"\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>." -"\n" -"There is also a button to check if the plugin has a more recent version, " -"as\n" -"well as a button to check for updates for all plugins. Plugins will be " -"checked\n" -"for updates automatically when updating to a new I2P release (not " -"including dev\n" +"To update a plugin to the latest version, just click the update button on\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n" +"There is also a button to check if the plugin has a more recent version, as\n" +"well as a button to check for updates for all plugins. Plugins will be checked\n" +"for updates automatically when updating to a new I2P release (not including dev\n" "builds)." msgstr "" @@ -1360,25 +1280,21 @@ msgstr "Sviluppo" #: i2p2www/pages/site/docs/plugins.html:121 #, python-format msgid "" -"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and " -"the\n" +"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n" "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s." msgstr "" #: i2p2www/pages/site/docs/plugins.html:126 #, python-format msgid "" -"See also the sources for plugins developed by various people. Some " -"plugins, such\n" -"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were " -"developed\n" +"See also the sources for plugins developed by various people. Some plugins, such\n" +"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n" "specifically as examples." msgstr "" #: i2p2www/pages/site/docs/plugins.html:132 msgid "" -"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P" -"\n" +"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n" "or easily add some feature." msgstr "" @@ -1390,8 +1306,7 @@ msgstr "Come Iniziare" #, python-format msgid "" "To create a plugin from an existing binary package you will need to get\n" -"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in " -"monotone</a>." +"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:144 @@ -1407,8 +1322,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:151 msgid "" "Updates of a plugin with included jars (not wars) won't be recognized if\n" -"the plugin was already run, as it requires class loader trickery to flush" -" the\n" +"the plugin was already run, as it requires class loader trickery to flush the\n" "class cache; a full router restart is required." msgstr "" @@ -1418,32 +1332,27 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:161 msgid "" -"Plugins running in a separate JVM create a <code>logs/</code> directory " -"in\n" +"Plugins running in a separate JVM create a <code>logs/</code> directory in\n" "<code>$CWD</code>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:166 msgid "" -"No initial keys are present, except for those of jrandom and zzz (using " -"the\n" +"No initial keys are present, except for those of jrandom and zzz (using the\n" "same keys as for router update), so the first key seen for a signer is\n" "automatically accepted—there is no signing key authority." msgstr "" #: i2p2www/pages/site/docs/plugins.html:172 msgid "" -"When deleting a plugin, the directory is not always deleted, especially " -"on\n" +"When deleting a plugin, the directory is not always deleted, especially on\n" "Windows." msgstr "" #: i2p2www/pages/site/docs/plugins.html:177 msgid "" -"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result " -"in a\n" -"\"plugin is corrupt\" message if pack200 compression of the plugin file " -"is used." +"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n" +"\"plugin is corrupt\" message if pack200 compression of the plugin file is used." msgstr "" #: i2p2www/pages/site/docs/plugins.html:182 @@ -1460,8 +1369,7 @@ msgstr "Porte usate da I2P" #: i2p2www/pages/site/docs/ports.html:7 msgid "" -"These are the ports used or reserved by I2P, including those for known " -"plugins,\n" +"These are the ports used or reserved by I2P, including those for known plugins,\n" "common alternates,\n" "and some typical related applications." msgstr "" @@ -1486,8 +1394,8 @@ msgid "Reseed Hosts" msgstr "" #: i2p2www/pages/site/docs/reseed.html:3 -msgid "January 2016" -msgstr "Gennaio 2016" +msgid "September 2021" +msgstr "" #: i2p2www/pages/site/docs/reseed.html:8 msgid "About Reseed hosts" @@ -1495,49 +1403,57 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:10 msgid "" -"Reseed hosts are needed to for bootstrapping, that is, providing the " -"initial set of I2P nodes for your I2P node to talk to. Depending on the " -"status of your node it may need to bootstrap every now and then if many " -"of the nodes it knows of aren't contactable." +"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n" +"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n" +"it may need to bootstrap every now and then if many of the nodes it knows of\n" +"aren't contactable." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:14 +#: i2p2www/pages/site/docs/reseed.html:17 msgid "" -"Reseeding is done over an encrypted connection and all of the bootstrap " -"information is signed by the reseed host you connect to, making it " -"impossible for an unauthenticated source to provide you with false " -"information." +"Reseeding is done over an encrypted connection and all of the bootstrap\n" +"information is signed by the reseed host you connect to, making it impossible\n" +"for an unauthenticated source to provide you with false information." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:19 +#: i2p2www/pages/site/docs/reseed.html:24 msgid "Running a Reseed host" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:21 +#: i2p2www/pages/site/docs/reseed.html:26 msgid "" -"The more reseed hosts that are run, the more resilient the I2P network " -"becomes, and the harder it is to prevent users of I2P from connecting to " -"the network." +"Operating a reseed server can be accessible to any sysadmin familiar\n" +"with I2P, and we encourage new reseed operators to get in contact with us at\n" +"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n" +"are run, the more resilient the I2P network becomes, and the harder it is to\n" +"prevent users of I2P from connecting to the network." +msgstr "" + +#: i2p2www/pages/site/docs/reseed.html:39 +msgid "Other ways of Reseeding" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:25 +#: i2p2www/pages/site/docs/reseed.html:42 msgid "" -"There have also been cases where the reseed hosts we had, have been under" -" heavy load due to botnet activities." +"In order to make I2P more reslient, other kinds of reseeding are possible. One\n" +"important way of carrying out a reseed is the file-based reseed, where a user\n" +"with a running I2P router generates a reseed file for a friend and transfers it\n" +"to them as a .zip file. Others use cloud-based infrastructure to resist\n" +"censorship. These reseed methods provide functionality which aids people in\n" +"situations where reseeds are restricted." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:33 -msgid "Thank you" -msgstr "Grazie" +#: i2p2www/pages/site/docs/reseed.html:58 +msgid "Thank you Reseed Operators" +msgstr "" -#: i2p2www/pages/site/docs/reseed.html:35 +#: i2p2www/pages/site/docs/reseed.html:60 msgid "" -"If you are running a reseed server, We would like to thank you for " -"helping to\n" +"If you are running a reseed server, We would like to thank you for helping to\n" "make the I2P network stronger and more resilient than ever." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:41 +#: i2p2www/pages/site/docs/reseed.html:66 msgid "Thank you." msgstr "Grazie." @@ -1547,12 +1463,9 @@ msgstr "BOB - Basic Open Bridge" #: i2p2www/pages/site/docs/api/bob.html:12 msgid "" -"At this point, most of the good ideas from BOB have been incorporated " -"into\n" -"SAMv3, which has more features and more real-world use. BOB still works, " -"but it\n" -"is not gaining the advanced features available to SAMv3 and is " -"essentially\n" +"At this point, most of the good ideas from BOB have been incorporated into\n" +"SAMv3, which has more features and more real-world use. BOB still works, but it\n" +"is not gaining the advanced features available to SAMv3 and is essentially\n" "unsupported at this time." msgstr "" @@ -1567,27 +1480,25 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:35 msgid "" "<code>ERROR</code> as is implied returns the message <code>\"ERROR " -"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what" -" went wrong." +"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what " +"went wrong." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:38 msgid "" -"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be " -"returned, it is on the same line. <code>OK</code> means the command is " -"finished." +"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, " +"it is on the same line. <code>OK</code> means the command is finished." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:41 msgid "" -"<code>DATA</code> lines contain information that you requested. There may" -" be multiple <code>DATA</code> lines per request." +"<code>DATA</code> lines contain information that you requested. There may be" +" multiple <code>DATA</code> lines per request." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:45 msgid "" -"<b>NOTE:</b> The help command is the ONLY command that has an exception " -"to\n" +"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n" "the rules... it can actually return nothing! This is intentional, since\n" "help is a HUMAN and not an APPLICATION command." msgstr "" @@ -1598,8 +1509,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:53 msgid "" -"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated," -" depending on the system.\n" +"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n" "On connection, BOB outputs two lines:" msgstr "" @@ -1609,8 +1519,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:67 msgid "" -"Note that previous versions used upper-case hex digits and did not " -"conform to I2P versioning standards.\n" +"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n" "It is recommended that subsequent versions use digits 0-9 only." msgstr "" @@ -1619,7 +1528,7 @@ msgid "Version history" msgstr "Cronologia versione" #: i2p2www/pages/site/docs/api/bob.html:77 -#: i2p2www/pages/site/docs/api/samv3.html:32 +#: i2p2www/pages/site/docs/api/samv3.html:41 msgid "Version" msgstr "Versione" @@ -1646,16 +1555,14 @@ msgstr "Comandi" #: i2p2www/pages/site/docs/api/bob.html:91 msgid "" "<b>PLEASE NOTE:</b>\n" -"For CURRENT details on the commands PLEASE use the built-in help command." -"\n" -"Just telnet to localhost 2827 and type help and you can get full " -"documentation on each command." +"For CURRENT details on the commands PLEASE use the built-in help command.\n" +"Just telnet to localhost 2827 and type help and you can get full documentation on each command." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:97 msgid "" -"Commands never get obsoleted or changed, however new commands do get " -"added from time to time." +"Commands never get obsoleted or changed, however new commands do get added " +"from time to time." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:102 @@ -1672,36 +1579,23 @@ msgstr "RESTITUISCE" #: i2p2www/pages/site/docs/api/bob.html:130 msgid "" -"Once set up, all TCP sockets can and will block as needed, and there is " -"no need for any\n" -"additional messages to/from the command channel. This allows the router " -"to pace the\n" -"stream without exploding with OOM like SAM does as it chokes on " -"attempting to shove\n" -"many streams in or out one socket -- that can't scale when you have alot " -"of connections!" +"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n" +"additional messages to/from the command channel. This allows the router to pace the\n" +"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n" +"many streams in or out one socket -- that can't scale when you have alot of connections!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:137 msgid "" -"What is also nice about this particular interface is that writing " -"anything to interface\n" -"to it, is much much easier than SAM. There is no other processing to do " -"after the set up.\n" -"It's configuration is so simple, that very simple tools, such as nc " -"(netcat) can be used\n" -"to point to some application. The value there is that one could schedule " -"up and down times\n" -"for an application, and not have to change the application to do that, or" -" to even have\n" -"to stop that application. Instead, you can literally \"unplug\" the " -"destination, and\n" -"\"plug it in\" again. As long as the same IP/port addresses and " -"destination keys are used\n" -"when bringing the bridge up, the normal TCP application won't care, and " -"won't notice.\n" -"It will simply be fooled -- the destinations are not reachable, and that " -"nothing is coming in." +"What is also nice about this particular interface is that writing anything to interface\n" +"to it, is much much easier than SAM. There is no other processing to do after the set up.\n" +"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n" +"to point to some application. The value there is that one could schedule up and down times\n" +"for an application, and not have to change the application to do that, or to even have\n" +"to stop that application. Instead, you can literally \"unplug\" the destination, and\n" +"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n" +"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n" +"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:149 @@ -1710,12 +1604,9 @@ msgstr "Esempi" #: i2p2www/pages/site/docs/api/bob.html:151 msgid "" -"For the following example, we'll setup a very simple local loopback " -"connection,\n" -"with two destinations. Destination \"mouth\" will be the CHARGEN service " -"from\n" -"the INET superserver daemon. Destination \"ear\" will be a local port " -"that you\n" +"For the following example, we'll setup a very simple local loopback connection,\n" +"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n" +"the INET superserver daemon. Destination \"ear\" will be a local port that you\n" "can telnet into, and watch the pretty ASCII test puke forth." msgstr "" @@ -1764,30 +1655,28 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:186 msgid "" -"At this point, there was no error, a destination with a nickname of " -"\"mouth\"\n" -"is set up. When you contact the destination provided, you actually " -"connect\n" +"At this point, there was no error, a destination with a nickname of \"mouth\"\n" +"is set up. When you contact the destination provided, you actually connect\n" "to the <code>CHARGEN</code> service on <code>19/TCP</code>." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:192 -msgid "Now for the other half, so that we can actually contact this destination." +msgid "" +"Now for the other half, so that we can actually contact this destination." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:214 msgid "" "Now all we need to do is telnet into 127.0.0.1, port 37337,\n" -"send the destination key or host address from addressbook we want to " -"contact.\n" +"send the destination key or host address from address book we want to contact.\n" "In this case, we want to contact \"mouth\", all we do is paste in the\n" "key and it goes." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:221 msgid "" -"<b>NOTE:</b> The \"quit\" command in the command channel does NOT " -"disconnect the tunnels like SAM." +"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect" +" the tunnels like SAM." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:238 @@ -1799,19 +1688,15 @@ msgid "Here is what happened..." msgstr "Ecco cosa è successo..." #: i2p2www/pages/site/docs/api/bob.html:258 -msgid "You can connect to EEPSITES too!" +msgid "You can connect to I2P SITES too!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:291 msgid "" -"Pretty cool isn't it? Try some other well known EEPSITES if you like, " -"nonexistent ones,\n" -"etc, to get a feel for what kind of output to expect in different " -"situations.\n" -"For the most part, it is suggested that you ignore any of the error " -"messages.\n" -"They would be meaningless to the application, and are only presented for " -"human debugging." +"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n" +"etc, to get a feel for what kind of output to expect in different situations.\n" +"For the most part, it is suggested that you ignore any of the error messages.\n" +"They would be meaningless to the application, and are only presented for human debugging." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:298 @@ -1828,8 +1713,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:328 msgid "" -"Now to remove \"ear\", note that this is what happens when you type too " -"fast,\n" +"Now to remove \"ear\", note that this is what happens when you type too fast,\n" "and shows you what typical ERROR messages looks like." msgstr "" @@ -1884,16 +1768,11 @@ msgstr "Panoramica dei Datagrammi" #: i2p2www/pages/site/docs/api/datagrams.html:7 #, python-format msgid "" -"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide " -"authenticated\n" -"and repliable messages in a standard format. This lets applications " -"reliably read\n" -"the \"from\" address out of a datagram and know that the address really " -"sent the\n" -"message. This is necessary for some applications since the base I2P " -"message is\n" -"completely raw - it has no \"from\" address (unlike IP packets). In " -"addition, the\n" +"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n" +"and repliable messages in a standard format. This lets applications reliably read\n" +"the \"from\" address out of a datagram and know that the address really sent the\n" +"message. This is necessary for some applications since the base I2P message is\n" +"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n" "message and sender are authenticated by signing the payload." msgstr "" @@ -1902,8 +1781,7 @@ msgstr "" msgid "" "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n" "are an application-level construct.\n" -"These protocols are independent of the low-level <a " -"href=\"%(transports)s\">transports</a>;\n" +"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n" "the protocols are converted to I2NP messages by the router, and\n" "either protocol may be carried by either transport." msgstr "" @@ -1919,8 +1797,7 @@ msgid "" "<a href=\"%(url)s\">datagram API</a>,\n" "while applications in other languages \n" "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n" -"There is also limited support in i2ptunnel in the <a " -"href=\"%(socks)s\">SOCKS proxy</a>,\n" +"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n" "the 'streamr' tunnel types, and udpTunnel classes." msgstr "" @@ -1930,34 +1807,23 @@ msgstr "Lunghezza del datagramma" #: i2p2www/pages/site/docs/api/datagrams.html:38 msgid "" -"The application designer should carefully consider the tradeoff of " -"repliable vs. non-repliable\n" -"datagrams. Also, the datagram size will affect reliability, due to tunnel" -" fragmentation into 1KB\n" -"tunnel messages. The more message fragments, the more likely that one of " -"them will be dropped\n" -"by an intermediate hop. Messages larger than a few KB are not " -"recommended.\n" +"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n" +"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n" +"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n" +"by an intermediate hop. Messages larger than a few KB are not recommended.\n" "Over about 10 KB, the delivery probablility drops dramatically.\n" -"Messages over 16 KB cannot be delivered over NTCP, dropping delivery " -"chances even more." +"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:47 #, python-format msgid "" -"Also note that the various overheads added by lower layers, in particular" -" asymmetric\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on " -"intermittent messages\n" -"such as used by a Kademlia-over-UDP application. The implementations are " -"currently tuned\n" -"for frequent traffic using the streaming library. There are a high number" -"\n" -"of session tags delivered, and a short session tag lifetime, for example." -"\n" -"There are currently no configuration parameters available within I2CP to " -"tune\n" +"Also note that the various overheads added by lower layers, in particular asymmetric\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n" +"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n" +"for frequent traffic using the streaming library. There are a high number\n" +"of session tags delivered, and a short session tag lifetime, for example.\n" +"There are currently no configuration parameters available within I2CP to tune\n" "the ElGamal Session Tag parameters." msgstr "" @@ -1970,38 +1836,30 @@ msgid "" "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n" "Applications may or may not choose to set the\n" "protocol in the I2CP header. It is not set by default.\n" -"It must be set to demultiplex datagram and streaming traffic received on " -"the same Destination." +"It must be set to demultiplex datagram and streaming traffic received on the same Destination." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:65 #, python-format msgid "" "As datagrams are not connection-oriented, the application may require\n" -"port numbers to correlate datagrams with particular peers or " -"communications sessions,\n" +"port numbers to correlate datagrams with particular peers or communications sessions,\n" "as is traditional with UDP over IP.\n" -"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as " -"described in\n" +"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n" "the <a href=\"%(i2cp)s#format\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:73 #, python-format msgid "" -"There is no method within the datagram API to specify whether it is non-" -"repliable (raw)\n" -"or repliable. The application should be designed to expect the " -"appropriate type.\n" +"There is no method within the datagram API to specify whether it is non-repliable (raw)\n" +"or repliable. The application should be designed to expect the appropriate type.\n" "The I2CP protocol number or port should be used by the application to\n" "indicate datagram type.\n" -"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW " -"are defined in the\n" +"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n" "<a href=\"%(i2psession)s\">I2PSession API</a>\n" -"for this purpose. A common design pattern in client/server datagram " -"applications is to\n" -"use signed datagrams for a request which includes a nonce, and use a raw " -"datagram\n" +"for this purpose. A common design pattern in client/server datagram applications is to\n" +"use signed datagrams for a request which includes a nonce, and use a raw datagram\n" "for the reply, returning the nonce from the request." msgstr "" @@ -2035,19 +1893,17 @@ msgstr "Incapsulamento dei pacchetti" #: i2p2www/pages/site/docs/api/datagrams.html:107 #, python-format msgid "" -"Each datagram is sent through I2P as a single message (or as an " -"individual clove in a\n" +"Each datagram is sent through I2P as a single message (or as an individual clove in a\n" "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n" "Message encapsulation is implemented in the underlying\n" "<a href=\"%(i2cp)s\">I2CP</a>,\n" "<a href=\"%(i2np)s\">I2NP</a>, and\n" "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n" -"There is no packet delimiter mechanism or length field in the datagram " -"protocol." +"There is no packet delimiter mechanism or length field in the datagram protocol." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:120 -#: i2p2www/pages/site/docs/transport/ssu.html:652 +#: i2p2www/pages/site/docs/transport/ssu.html:680 msgid "Specification" msgstr "Specifiche" @@ -2062,17 +1918,10 @@ msgstr "I2PControl - Servizio di controllo remoto" #: i2p2www/pages/site/docs/api/i2pcontrol.html:5 #, python-format msgid "" -"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-" -"RPC\">JSONRPC2</a> interface via the plugin <a " -"href=\"%(itoopie)s\">I2PControl</a>.\n" -"The aim of the interface is to provide simple way to interface with a " -"running I2P node. A client, itoopie, has been developed in parallel.\n" -"The JSONRPC2 implementation for the client as well as the plugin is " -"provided by the java libraries <a href=\"http://software.dzhuvinov.com" -"/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" -"A list of implementations of JSON-RPC for various languages can be found " -"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC " -"wiki</a>." +"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n" +"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n" +"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" +"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:12 @@ -2127,8 +1976,8 @@ msgstr "Descrizione" #: i2p2www/pages/site/docs/api/i2pcontrol.html:48 msgid "" -"Token used for authenticating every request (excluding the 'Authenticate'" -" RPC method)" +"Token used for authenticating every request (excluding the 'Authenticate' " +"RPC method)" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:56 @@ -2137,8 +1986,7 @@ msgstr "Metodi implementati" #: i2p2www/pages/site/docs/api/i2pcontrol.html:57 msgid "" -"Creates and returns an authentication token used for further " -"communication." +"Creates and returns an authentication token used for further communication." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:59 @@ -2171,8 +2019,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:117 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:73 @@ -2234,7 +2082,8 @@ msgid "Returns true if any changes were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:98 -msgid "Returns true if any changes requiring a restart to take effect were made." +msgid "" +"Returns true if any changes requiring a restart to take effect were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:101 @@ -2307,8 +2156,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:157 msgid "" -"Initiates a router reseed, fetching peers into our NetDB from a remote " -"host." +"Initiates a router reseed, fetching peers into our NetDB from a remote host." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:158 @@ -2317,8 +2165,7 @@ msgstr "Riavvia il router." #: i2p2www/pages/site/docs/api/i2pcontrol.html:159 msgid "" -"Restarts the router gracefully (waits for participating tunnels to " -"expire)." +"Restarts the router gracefully (waits for participating tunnels to expire)." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:160 @@ -2364,7 +2211,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:175 -msgid "Fetches or sets various network related settings. Ports, addresses etc." +msgid "" +"Fetches or sets various network related settings. Ports, addresses etc." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:177 @@ -2375,8 +2223,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:178 msgid "" -"What hostname is used for the TCP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the TCP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:179 @@ -2393,8 +2241,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:181 msgid "" -"What hostname is used for the UDP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the UDP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:182 @@ -2408,19 +2256,20 @@ msgid "What ip has been detected by the UDP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:184 -msgid "Is UPnP enabled. If null is submitted, current setting will be returned." +msgid "" +"Is UPnP enabled. If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:185 msgid "" -"How many percent of bandwidth is usable for participating tunnels. If " -"null is submitted, current setting will be returned." +"How many percent of bandwidth is usable for participating tunnels. If null " +"is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:186 msgid "" -"How many KB/s of inbound bandwidth is allowed. If null is submitted, " -"current setting will be returned." +"How many KB/s of inbound bandwidth is allowed. If null is submitted, current" +" setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:187 @@ -2431,15 +2280,15 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:188 msgid "" -"Is laptop mode enabled (change router identity and UDP port when IP " -"changes ). If null is submitted, current setting will be returned." +"Is laptop mode enabled (change router identity and UDP port when IP changes " +"). If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:189 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method. If null is submitted, current setting will" -" be returned." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method. If null is submitted, current setting will be " +"returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:192 @@ -2452,8 +2301,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:194 msgid "" -"If requested, returns the method used for automatically detecting ip for " -"the TCP transport." +"If requested, returns the method used for automatically detecting ip for the" +" TCP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:195 @@ -2466,8 +2315,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:197 msgid "" -"If requested, returns methods used for detecting the ip address of the " -"UDP transport." +"If requested, returns methods used for detecting the ip address of the UDP " +"transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:198 @@ -2598,34 +2447,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:237 msgid "" -"The version of the I2PControl API used wasn't specified, but is required " -"to be specified." +"The version of the I2PControl API used wasn't specified, but is required to " +"be specified." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:238 msgid "" -"The version of the I2PControl API specified is not supported by " -"I2PControl." +"The version of the I2PControl API specified is not supported by I2PControl." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:8 #, python-format msgid "" "I2PTunnel is a tool for interfacing with and providing services on I2P.\n" -"Destination of an I2PTunnel can be defined using a <a " -"href=\"%(naming)s\">hostname</a>,\n" -"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination " -"key.\n" -"An established I2PTunnel will be available on your client machine as " -"localhost:port.\n" -"If you wish to provide a service on I2P network, you simply create " -"I2PTunnel to the\n" -"appropriate ip_address:port. A corresponding 516-byte destination key " -"will be generated\n" +"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n" +"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n" +"An established I2PTunnel will be available on your client machine as localhost:port.\n" +"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n" +"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n" "for the service and it will become avaliable throughout I2P.\n" "A web interface for I2PTunnel management is avaliable on\n" -"<a " -"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." +"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:20 @@ -2639,8 +2481,7 @@ msgstr "I tunnel del server" #: i2p2www/pages/site/docs/api/i2ptunnel.html:23 msgid "" "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n" -"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient " -"and quick hosting on I2P.\n" +"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n" "<br>The document root is:" msgstr "" @@ -2650,10 +2491,8 @@ msgstr "I tunnel del client" #: i2p2www/pages/site/docs/api/i2ptunnel.html:33 msgid "" -"A HTTP proxy used for browsing I2P and the regular internet anonymously " -"through I2P. \n" -"Browsing internet through I2P uses a random proxy specified by the " -"\"Outproxies:\" option." +"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n" +"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:37 @@ -2696,31 +2535,26 @@ msgstr "Standard" #: i2p2www/pages/site/docs/api/i2ptunnel.html:56 msgid "" -"Opens a local TCP port that connects to a service (like HTTP, FTP or " -"SMTP) on a destination inside of I2P.\n" -"The tunnel is directed to a random host from the comma seperated (\", \")" -" list of destinations." +"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n" +"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:62 msgid "" -"A HTTP-client tunnel. The tunnel connects to the destination specified by" -" the URL\n" -"in a HTTP request. Supports proxying onto internet if an outproxy is " -"provided. Strips HTTP connections of the following headers:" +"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n" +"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:67 msgid "" "<b>Accept, Accept-Charset, Accept-Language\n" -" and Accept-Ranges</b> as they vary greatly between browsers and can be " -"used as an identifier." +" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:90 msgid "" -"Depending on if the tunnel is using an outproxy or not it will append the" -" following User-Agent:" +"Depending on if the tunnel is using an outproxy or not it will append the " +"following User-Agent:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:94 @@ -2733,10 +2567,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:100 msgid "" -"Creates a connection to a random IRC server specified by the comma " -"seprated (\", \") \n" -"list of destinations. Only a whitelisted subset of IRC commands are " -"allowed due to anonymity concerns." +"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n" +"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:105 @@ -2749,8 +2581,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:144 msgid "" -"Enables using the I2P router as a SOCKS proxy with the command whitelist " -"specified by\n" +"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n" "<a href=\"#client-mode-irc\">IRC</a> client mode." msgstr "" @@ -2762,8 +2593,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:156 msgid "" -"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr " -"client tunnel will \n" +"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n" "subscribe to a streamr server tunnel." msgstr "" @@ -2777,32 +2607,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:171 msgid "" -"Creates a destination to a local HTTP server ip:port. Supports gzip for " -"requests with \n" -"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in" -" such a request." +"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n" +"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:177 msgid "" -"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client " -"with no outproxying\n" -"capabilities. An example application would be a web application that does" -" client-type\n" -"requests, or loopback-testing an eepsite as a diagnostic tool." +"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n" +"capabilities. An example application would be a web application that does client-type\n" +"requests, or loopback-testing an I2P Site as a diagnostic tool." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:184 msgid "" -"Creates a destination that filters the reqistration sequence of a client " -"and passes \n" +"Creates a destination that filters the reqistration sequence of a client and passes \n" "the clients destination key as a hostname to the IRC-server." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:190 msgid "" -"A UDP-client that connects to a media server is created. The UDP-Client " -"is coupled with a Streamr server I2PTunnel." +"A UDP-client that connects to a media server is created. The UDP-Client is " +"coupled with a Streamr server I2PTunnel." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:2 @@ -2819,14 +2644,11 @@ msgstr "Nota" msgid "" "The ministreaming library has been enhanced and extended by the\n" "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n" -"Ministreaming is deprecated and is incompatible with today's " -"applications.\n" +"Ministreaming is deprecated and is incompatible with today's applications.\n" "The following documentation is old.\n" -"Also note that streaming extends ministreaming in the same Java package " -"(net.i2p.client.streaming),\n" +"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n" "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n" -"Obsolete ministreaming classes and methods are clearly marked as " -"deprecated in the Javadocs." +"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:19 @@ -2834,17 +2656,12 @@ msgstr "" msgid "" "\n" "The ministreaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" @@ -2852,70 +2669,57 @@ msgstr "" #, python-format msgid "" "The ministreaming library was written by mihi as a part of his \n" -"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out" -" and released\n" -"under the BSD license. It is called the \"mini\"streaming library " -"because it makes\n" -"some simplifications in the implementation, while a more robust streaming" -" library\n" -"could be further optimized for operation over I2P. The two main issues " -"with \n" +"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n" +"under the BSD license. It is called the \"mini\"streaming library because it makes\n" +"some simplifications in the implementation, while a more robust streaming library\n" +"could be further optimized for operation over I2P. The two main issues with \n" "the ministreaming library are its use of the traditional TCP two phase \n" -"establishment protocol and the current fixed window size of 1. The " -"establishment\n" -"issue is minor for long lived streams, but for short ones, such as quick " -"HTTP\n" -"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As " -"for the window\n" -"size, the ministreaming library doesn't maintain any ID or ordering " -"within the \n" -"messages sent (or include any application level ACK or SACK), so it must " -"wait \n" -"on average twice the time it takes to send a message before sending " -"another." +"establishment protocol and the current fixed window size of 1. The establishment\n" +"issue is minor for long lived streams, but for short ones, such as quick HTTP\n" +"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As for the window\n" +"size, the ministreaming library doesn't maintain any ID or ordering within the \n" +"messages sent (or include any application level ACK or SACK), so it must wait \n" +"on average twice the time it takes to send a message before sending another." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:45 #, python-format msgid "" -"Even with those issues, the ministreaming library performs quite well in " -"many\n" +"Even with those issues, the ministreaming library performs quite well in many\n" "situations, and its <a href=\"%(api)s\">API</a>\n" -"is both quite simple and capable of remaining unchanged as different " -"streaming\n" +"is both quite simple and capable of remaining unchanged as different streaming\n" "implementations are introduced. The library is deployed in its own \n" "ministreaming.jar.\n" "Developers in Java who would like to use it can\n" -"access the API directly, while developers in other languages can use it " -"through\n" +"access the API directly, while developers in other languages can use it through\n" "<a href=\"%(samv3)s\">SAM</a>'s streaming support." msgstr "" -#: i2p2www/pages/site/docs/api/samv3.html:30 +#: i2p2www/pages/site/docs/api/samv3.html:39 msgid "Library Name" msgstr "" -#: i2p2www/pages/site/docs/api/samv3.html:31 +#: i2p2www/pages/site/docs/api/samv3.html:40 msgid "Language" msgstr "Lingua" -#: i2p2www/pages/site/docs/api/samv3.html:33 +#: i2p2www/pages/site/docs/api/samv3.html:42 msgid "STREAM" msgstr "" -#: i2p2www/pages/site/docs/api/samv3.html:34 +#: i2p2www/pages/site/docs/api/samv3.html:43 msgid "DGRAM" msgstr "" -#: i2p2www/pages/site/docs/api/samv3.html:35 +#: i2p2www/pages/site/docs/api/samv3.html:44 msgid "RAW" msgstr "" -#: i2p2www/pages/site/docs/api/samv3.html:36 +#: i2p2www/pages/site/docs/api/samv3.html:45 msgid "Site" msgstr "Sito" -#: i2p2www/pages/site/docs/api/samv3.html:42 +#: i2p2www/pages/site/docs/api/samv3.html:51 msgid "wrapper" msgstr "wrapper" @@ -2926,8 +2730,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:5 msgid "" "\n" -"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are " -"supported.\n" +"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n" "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n" "Both shared-clients and non-shared are supported.\n" "There is no SOCKS outproxy so it is of limited use." @@ -2948,8 +2751,7 @@ msgid "" "information as content, I2P has no way to protect your anonymity. For\n" "example, some mail applications will send the IP address of the machine\n" "they are running on to a mail server. There is no way for I2P to filter\n" -"this, thus using I2P to 'socksify' existing applications is possible, but" -"\n" +"this, thus using I2P to 'socksify' existing applications is possible, but\n" "extremely dangerous." msgstr "" @@ -2982,7 +2784,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:48 msgid "" "The SOCKS proxy\n" -"supports standard addressbook names, but not Base64 destinations.\n" +"supports standard address book names, but not Base64 destinations.\n" "Base32 hashes should work as of release 0.7.\n" "It supports outgoing connections only, i.e. an I2PTunnel Client.\n" "UDP support is stubbed out but not working yet.\n" @@ -3028,47 +2830,34 @@ msgstr "" #, python-format msgid "" "The streaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:29 msgid "" "In consideration of the relatively high cost of messages, \n" -"the streaming library's protocol for scheduling and delivering those " -"messages has been optimized to\n" -"allow individual messages passed to contain as much information as is " -"available.\n" -"For instance, a small HTTP transaction proxied through the streaming " -"library can\n" -"be completed in a single round trip - the first messages bundle a SYN, " -"FIN, and\n" +"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n" +"allow individual messages passed to contain as much information as is available.\n" +"For instance, a small HTTP transaction proxied through the streaming library can\n" +"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n" "the small HTTP request payload, and the reply bundles the SYN,\n" "FIN, ACK, and the HTTP response payload. While an additional\n" -"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has " -"been\n" -"received, the local HTTP proxy can often deliver the full response to the" -" browser \n" +"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n" +"received, the local HTTP proxy can often deliver the full response to the browser \n" "immediately." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:42 msgid "" "The streaming library bears much resemblance to an \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms\n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK,\n" +"abstraction of TCP, with its sliding windows, congestion control algorithms\n" +"(both slow start and congestion avoidance), and general packet behavior (ACK,\n" "SYN, FIN, RST, rto calculation, etc)." msgstr "" @@ -3088,29 +2877,21 @@ msgstr "API" #: i2p2www/pages/site/docs/api/streaming.html:60 #, python-format msgid "" -"The streaming library API provides a standard socket paradigm to Java " -"applications.\n" -"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, " -"except that\n" -"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> " -"through the\n" +"The streaming library API provides a standard socket paradigm to Java applications.\n" +"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n" +"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n" "streaming library, to be interpreted by I2CP." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:67 #, python-format msgid "" -"The standard interface to the streaming lib is for the application to use" -" the\n" +"The standard interface to the streaming lib is for the application to use the\n" "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n" -"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks " -"the\n" -"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will " -"cause\n" -"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The " -"application\n" -"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> " -"or\n" +"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n" +"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n" +"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n" +"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n" "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>." msgstr "" @@ -3131,17 +2912,12 @@ msgstr "" #, python-format msgid "" "The options and current default values are listed below.\n" -"Options are case-sensitive and may be set for the whole router, for a " -"particular client, or for an individual socket on a\n" +"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n" "per-connection basis.\n" -"Many values are tuned for HTTP performance over typical I2P conditions. " -"Other applications such\n" +"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n" "as peer-to-peer services are strongly encouraged to\n" -"modify as necessary, by setting the options and passing them via the call" -" to\n" -"<a " -"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost," -" _i2cpPort, opts).\n" +"modify as necessary, by setting the options and passing them via the call to\n" +"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n" "Time values are in ms." msgstr "" @@ -3149,17 +2925,14 @@ msgstr "" #, python-format msgid "" "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n" -"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>," -"\n" +"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" "may override these defaults with their own defaults.\n" -"Also note that many options only apply to servers listening for incoming " -"connections." +"Also note that many options only apply to servers listening for incoming connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:110 msgid "" -"As of release 0.9.1, most, but not all, options may be changed on an " -"active socket manager or session.\n" +"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n" "See the javadocs for details." msgstr "" @@ -3183,8 +2956,8 @@ msgstr "Note" #: i2p2www/pages/site/docs/api/streaming.html:119 msgid "" -"Comma- or space-separated list of Base64 peer Hashes used for either " -"access list or blacklist." +"Comma- or space-separated list of Base64 peer Hashes used for either access " +"list or blacklist." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:121 @@ -3234,24 +3007,21 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes to be\n" "blacklisted for incoming connections to ALL destinations in the context.\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:175 msgid "" -"How much transmit data (in bytes) will be accepted that hasn't been " -"written out yet." +"How much transmit data (in bytes) will be accepted that hasn't been written " +"out yet." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:179 msgid "" "When we're in congestion avoidance, we grow the window size at the rate\n" -"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are" -" in bytes,\n" +"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are in bytes,\n" "while in I2P, window sizes are in messages.\n" "A higher number means slower growth." msgstr "" @@ -3260,16 +3030,15 @@ msgstr "" msgid "" "How long to wait after instantiating a new con \n" "before actually attempting to connect. If this is\n" -"<= 0, connect immediately with no initial data. If greater than 0, " -"wait\n" +"<= 0, connect immediately with no initial data. If greater than 0, wait\n" "until the output stream is flushed, the buffer fills, \n" "or that many milliseconds pass, and include any initial data with the SYN." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:194 msgid "" -"How long to block on connect, in milliseconds. Negative means " -"indefinitely. Default is 5 minutes." +"How long to block on connect, in milliseconds. Negative means indefinitely. " +"Default is 5 minutes." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:198 @@ -3282,30 +3051,24 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes or host names to be\n" "contacted using an alternate DSA destination.\n" -"Only applies if multisession is enabled and the primary session is non-" -"DSA\n" +"Only applies if multisession is enabled and the primary session is non-DSA\n" "(generally for shared clients only).\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:216 msgid "" "Whether to listen only for the streaming protocol.\n" -"Setting to true will prohibit communication with Destinations earlier " -"than release 0.7.1\n" -"(released March 2009). Set to true if running multiple protocols on this " -"Destination." +"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n" +"(released March 2009). Set to true if running multiple protocols on this Destination." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:226 msgid "" "(0=noop, 1=disconnect)\n" -"What to do on an inactivity timeout - do nothing, disconnect, or send a " -"duplicate ack." +"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:232 @@ -3318,8 +3081,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:237 msgid "" -"The initial value of the resend delay field in the packet header, times " -"1000.\n" +"The initial value of the resend delay field in the packet header, times 1000.\n" "Not fully implemented; see below." msgstr "" @@ -3342,8 +3104,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:255 msgid "" -"In standard TCP, window sizes are in bytes, while in I2P, window sizes " -"are in messages." +"In standard TCP, window sizes are in bytes, while in I2P, window sizes are " +"in messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:279 @@ -3385,12 +3147,12 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:333 msgid "" "(2=interactive not supported)\n" -"This doesn't currently do anything, but setting it to a value other than " -"1 will cause an error." +"This doesn't currently do anything, but setting it to a value other than 1 will cause an error." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:338 -msgid "How long to block on read, in milliseconds. Negative means indefinitely." +msgid "" +"How long to block on read, in milliseconds. Negative means indefinitely." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:342 @@ -3433,19 +3195,15 @@ msgstr "Impostazioni" #: i2p2www/pages/site/docs/api/streaming.html:387 msgid "" -"The initiator sends a packet with the SYNCHRONIZE flag set. This packet " -"may contain the initial data as well.\n" -"The peer replies with a packet with the SYNCHRONIZE flag set. This packet" -" may contain the initial response data as well." +"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n" +"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:392 msgid "" -"The initiator may send additional data packets, up to the initial window " -"size, before receiving the SYNCHRONIZE response.\n" +"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n" "These packets will also have the send Stream ID field set to 0.\n" -"Recipients must buffer packets received on unknown streams for a short " -"period of time, as they may\n" +"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n" "arrive out of order, in advance of the SYNCHRONIZE packet." msgstr "" @@ -3455,33 +3213,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:400 msgid "" -"The maximum message size (also called the MTU / MRU) is negotiated to the" -" lower value supported by\n" -"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection" -" will lead to\n" +"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n" +"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n" "a large amount of overhead.\n" "The MTU is specified by the option i2p.streaming.maxMessageSize.\n" -"The current default MTU of 1730 was chosen to fit precisely into two 1K " -"I2NP tunnel messages,\n" +"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n" "including overhead for the typical case." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:417 msgid "" -"The first message in a connection includes a 387 byte (typical) " -"Destination added by the streaming layer,\n" -"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in " -"the Garlic message by the router.\n" -"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session " -"was previously established).\n" -"Therefore, the goal of fitting a complete HTTP request in a single 1KB " -"I2NP message is not always attainable.\n" -"However, the selection of the MTU, together with careful implementation " -"of fragmentation\n" -"and batching strategies in the tunnel gateway processor, are important " -"factors in network bandwidth,\n" -"latency, reliability, and efficiency, especially for long-lived " -"connections." +"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n" +"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n" +"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n" +"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n" +"However, the selection of the MTU, together with careful implementation of fragmentation\n" +"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n" +"latency, reliability, and efficiency, especially for long-lived connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:428 @@ -3495,14 +3243,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:436 #, python-format msgid "" -"Each packet is sent through I2P as a single message (or as an individual " -"clove in a\n" -"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation " -"is implemented\n" -"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a " -"href=\"%(i2np)s\">I2NP</a>, and\n" -"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no " -"packet delimiter\n" +"Each packet is sent through I2P as a single message (or as an individual clove in a\n" +"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n" +"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n" +"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n" "mechanism or payload length field in the streaming protocol." msgstr "" @@ -3512,17 +3256,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:447 msgid "" -"Data packets may include an optional delay field specifying the requested" -" delay,\n" +"Data packets may include an optional delay field specifying the requested delay,\n" "in ms, before the receiver should ack the packet.\n" "Valid values are 0 to 60000 inclusive.\n" "A value of 0 requests an immediate ack.\n" "This is advisory only, and receivers should delay slightly so that\n" "additional packets may be acknowledged with a single ack.\n" -"Some implementations may include an advisory value of (measured RTT / 2) " -"in this field.\n" -"For nonzero optional delay values, receivers should limit the maximum " -"delay\n" +"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n" +"For nonzero optional delay values, receivers should limit the maximum delay\n" "before sending an ack to a few seconds at most.\n" "Optional delay values greater than 60000 indicate choking, see below." msgstr "" @@ -3534,46 +3275,33 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:462 msgid "" "TCP headers include the receive window in bytes.\n" -"The streaming protocol does not contain a receive window, it uses only a " -"simple choke/unchoke indication.\n" -"Each endpoint must maintain its own estimate of the far-end receive " -"window, in either bytes or packets.\n" -"The recommended minimum buffer size for receiver implementations is 128 " -"packets or 217 KB (approximately 128x1730).\n" -"Because of I2P netowrk latency, packet drops, and the resulting " -"congestion control,\n" +"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n" +"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n" +"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n" +"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n" "a buffer of this size is rarely filled.\n" -"Overflow is, however, likely to occur on high-bandwidth \"local " -"loopback\" (same-router) connections." +"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:471 msgid "" "To quickly indicate and smoothly recover from overflow conditions,\n" "there is a simple mechanism for pushback in the streaming protocol.\n" -"If a packet is received with an optional delay field of value of 60001 or" -" higher,\n" +"If a packet is received with an optional delay field of value of 60001 or higher,\n" "that indicates \"choking\" or a receive window of zero.\n" -"A packet with an optional delay field of value of 60000 or less indicates" -" \"unchoking\".\n" -"Packets without an optional delay field do not affect the choke/unchoke " -"state." +"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n" +"Packets without an optional delay field do not affect the choke/unchoke state." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:479 msgid "" -"After being choked, no more packets with data should be sent until the " -"transmitter is unchoked,\n" -"except for occasional \"probe\" data packets to compensate for possible " -"lost unchoke packets.\n" -"The choked endpoint should start a \"persist timer\" to control the " -"probing, as in TCP.\n" +"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n" +"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n" +"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n" "The unchoking endpoint should send several packets with this field set,\n" -"or continue sending them periodically until data packets are received " -"again.\n" +"or continue sending them periodically until data packets are received again.\n" "Maximum time to wait for unchoking is implementation-dependent.\n" -"Transmitter window size and congestion control strategy after being " -"unchoked is implementation-dependent." +"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:490 @@ -3582,8 +3310,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:491 msgid "" -"The streaming lib uses standard slow-start (exponential window growth) " -"and congestion avoidance (linear window growth)\n" +"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n" "phases, with exponential backoff.\n" "Windowing and acknowledgments use packet count, not byte count." msgstr "" @@ -3594,53 +3321,44 @@ msgstr "Chiudi" #: i2p2www/pages/site/docs/api/streaming.html:499 msgid "" -"Any packet, including one with the SYNCHRONIZE flag set, may have the " -"CLOSE flag sent as well.\n" -"The connection is not closed until the peer responds with the CLOSE flag." -"\n" +"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n" +"The connection is not closed until the peer responds with the CLOSE flag.\n" "CLOSE packets may contain data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:507 msgid "" -"There is no ping function at the I2CP layer (equivalent to ICMP echo) or " -"in datagrams.\n" +"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n" "This function is provided in streaming.\n" "Pings and pongs may not be combined with a standard streaming packet;\n" "if the ECHO option is set, then\n" -"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are " -"ignored." +"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:515 msgid "" -"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED " -"flags set.\n" -"The sendStreamId must be greater than zero, and the receiveStreamId is " -"ignored.\n" +"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n" +"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n" "The sendStreamId may or may not correspond to an existing connection." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:521 msgid "" "A pong packet must have the ECHO flag set.\n" -"The sendStreamId must be zero, and the receiveStreamId is the " -"sendStreamId from the ping.\n" -"Prior to release 0.9.18, the pong packet does not include any payload " -"that was contained in the ping." +"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n" +"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:527 msgid "" "As of release 0.9.18, pings and pongs may contain a payload.\n" -"The payload in the ping, up to a maximum of 32 bytes, is returned in the " -"pong." +"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:532 msgid "" -"Streaming may be configured to disable sending pongs with the " -"configuration i2p.streaming.answerPings=false." +"Streaming may be configured to disable sending pongs with the configuration " +"i2p.streaming.answerPings=false." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:537 @@ -3656,8 +3374,7 @@ msgid "" "This is used for \"temporal\" sharing at connection open/close time,\n" "not \"ensemble\" sharing during a connection (See\n" "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n" -"There is a separate share per ConnectionManager (i.e. per local " -"Destination)\n" +"There is a separate share per ConnectionManager (i.e. per local Destination)\n" "so that there is no information leakage to other Destinations on the\n" "same router.\n" "The share data for a given peer expires after a few minutes.\n" @@ -3670,8 +3387,7 @@ msgstr "Altri Parametri" #: i2p2www/pages/site/docs/api/streaming.html:560 msgid "" -"The following parameters are hardcoded, but may be of interest for " -"analysis:" +"The following parameters are hardcoded, but may be of interest for analysis:" msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:579 @@ -3681,25 +3397,16 @@ msgstr "Cronologia" #: i2p2www/pages/site/docs/api/streaming.html:580 msgid "" -"The streaming library has grown organically for I2P - first mihi " -"implemented the\n" -"\"mini streaming library\" as part of I2PTunnel, which was limited to a " -"window\n" -"size of 1 message (requiring an ACK before sending the next one), and " -"then it was\n" -"refactored out into a generic streaming interface (mirroring TCP sockets)" -" and the\n" -"full streaming implementation was deployed with a sliding window protocol" -" and \n" -"optimizations to take into account the high bandwidth x delay product. " -"Individual\n" -"streams may adjust the maximum packet size and other options. The default" -"\n" -"message size is selected to fit precisely in two 1K I2NP tunnel messages," -"\n" +"The streaming library has grown organically for I2P - first mihi implemented the\n" +"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n" +"size of 1 message (requiring an ACK before sending the next one), and then it was\n" +"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n" +"full streaming implementation was deployed with a sliding window protocol and \n" +"optimizations to take into account the high bandwidth x delay product. Individual\n" +"streams may adjust the maximum packet size and other options. The default\n" +"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n" "and is a reasonable tradeoff between the bandwidth costs of \n" -"retransmitting lost messages, and the latency and overhead of multiple " -"messages." +"retransmitting lost messages, and the latency and overhead of multiple messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:594 @@ -3711,7 +3418,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:975 #: i2p2www/pages/site/docs/protocol/i2np.html:233 #: i2p2www/pages/site/docs/transport/ntcp.html:544 -#: i2p2www/pages/site/docs/transport/ssu.html:587 +#: i2p2www/pages/site/docs/transport/ssu.html:615 #: i2p2www/pages/site/docs/tunnels/implementation.html:506 msgid "Future Work" msgstr "" @@ -3730,20 +3437,16 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:604 #, python-format msgid "" -"Another area for research is the interaction of the streaming lib with " -"the\n" +"Another area for research is the interaction of the streaming lib with the\n" "NTCP and SSU transport layers.\n" "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:609 msgid "" -"The interaction of the routing algorithms with the streaming lib strongly" -" affects performance.\n" -"In particular, random distribution of messages to multiple tunnels in a " -"pool\n" -"leads to a high degree of out-of-order delivery which results in smaller " -"window\n" +"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n" +"In particular, random distribution of messages to multiple tunnels in a pool\n" +"leads to a high degree of out-of-order delivery which results in smaller window\n" "sizes than would otherwise be the case. The router currently routes \n" "messages for a single from/to destination pair through a consistent set \n" "of tunnels, until tunnel expiration or delivery failure. The router's \n" @@ -3778,11 +3481,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:636 msgid "" -"zzz has added debug code to the streaming library to log packets in a " -"wireshark-compatible\n" +"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n" "(pcap) format; Use this to further analyze performance.\n" -"The format may require enhancement to map more streaming lib parameters " -"to TCP fields." +"The format may require enhancement to map more streaming lib parameters to TCP fields." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:641 @@ -3801,18 +3502,15 @@ msgstr "Gennaio 2017" msgid "" "There are several bittorrent clients and trackers on I2P.\n" "As I2P addressing uses a Destination instead of an IP and port, minor\n" -"changes are required to tracker and client software for operation on I2P." -"\n" +"changes are required to tracker and client software for operation on I2P.\n" "These changes are specified below.\n" -"Note carefully the guidelines for compatibility with older I2P clients " -"and trackers." +"Note carefully the guidelines for compatibility with older I2P clients and trackers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:15 msgid "" "This page specifies protocol details common to all clients and trackers.\n" -"Specific clients and trackers may implement other unique features or " -"protocols." +"Specific clients and trackers may implement other unique features or protocols." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:20 @@ -3825,8 +3523,7 @@ msgstr "Annunci" #: i2p2www/pages/site/docs/applications/bittorrent.html:27 msgid "" -"Clients generally include a fake port=6881 parameter in the announce, for" -" compatibility with older trackers.\n" +"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n" "Trackers may ignore the port parameter, and should not require it." msgstr "" @@ -3838,8 +3535,7 @@ msgid "" "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "are 387+ bytes, so the Base 64 is 516+ bytes.\n" -"Clients generally append \".i2p\" to the Base 64 Destination for " -"compatibility with older trackers.\n" +"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n" "Trackers should not require an appended \".i2p\"." msgstr "" @@ -3849,18 +3545,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:46 msgid "" -"Current Destinations for clients are 387 or more bytes (516 or more in " -"Base 64 encoding).\n" +"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n" "A reasonable maximum to assume, for now, is 475 bytes.\n" -"As the tracker must decode the Base64 to deliver compact responses (see " -"below),\n" +"As the tracker must decode the Base64 to deliver compact responses (see below),\n" "the tracker should probably decode and reject bad Base64 when announced." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:53 msgid "" -"The default response type is non-compact. Clients may request a compact " -"response with\n" +"The default response type is non-compact. Clients may request a compact response with\n" "the parameter compact=1. A tracker may, but is not required to, return\n" "a compact response when requested." msgstr "" @@ -3868,10 +3561,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:59 msgid "" "Developers of new I2P clients\n" -"are strongly encouraged to implemenent announces over their own tunnel " -"rather than\n" -"the HTTP client proxy at port 4444. Doing so is both more efficient and " -"it allows\n" +"are strongly encouraged to implemenent announces over their own tunnel rather than\n" +"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n" "destination enforcement by the tracker (see below)." msgstr "" @@ -3893,8 +3584,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:76 msgid "" -"Trackers generally include a fake port key, or use the port from the " -"announce, for compatibility with older clients.\n" +"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n" "Clients must ignore the port parameter, and should not require it." msgstr "" @@ -3902,10 +3592,8 @@ msgstr "" #, python-format msgid "" "The value of the ip key is the base 64 of the client's\n" -"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as " -"described above.\n" -"Trackers generally append \".i2p\" to the Base 64 Destination if it " -"wasn't in the announce ip, for compatibility with older clients.\n" +"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n" +"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n" "Clients should not require an appended \".i2p\" in the responses." msgstr "" @@ -3920,26 +3608,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:95 #, python-format msgid "" -"In the compact response, the value of the \"peers\" dictionary key is a " -"single byte string,\n" +"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n" "whose length is a multiple of 32 bytes.\n" "This string contains the concatenated\n" "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n" "of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This hash must be computed by the tracker, unless destination enforcement" -"\n" -"(see below) is used, in which case the hash delivered in the X-I2P-" -"DestHash\n" +"This hash must be computed by the tracker, unless destination enforcement\n" +"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n" "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n" "The peers key may be absent, or the peers value may be zero-length." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:109 msgid "" -"While compact response support is optional for both clients and trackers," -" it is highly\n" +"While compact response support is optional for both clients and trackers, it is highly\n" "recommended as it reduces the nominal response size by over 90%." msgstr "" @@ -3950,34 +3634,27 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:117 #, python-format msgid "" -"Some, but not all, I2P bittorrent clients announce over their own " -"tunnels.\n" -"Trackers may choose to prevent spoofing by requiring this, and verifying " -"the\n" +"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n" +"Trackers may choose to prevent spoofing by requiring this, and verifying the\n" "client's\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n" -"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which " -"are\n" +"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n" "different formats for the same information.\n" "These headers cannot be spoofed by the client.\n" -"A tracker enforcing destinations need not require the ip announce " -"parameter at all." +"A tracker enforcing destinations need not require the ip announce parameter at all." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:129 msgid "" -"As several clients use the HTTP proxy instead of their own tunnel for " -"announces,\n" -"destination enforcement will prevent usage by those clients unless or " -"until\n" +"As several clients use the HTTP proxy instead of their own tunnel for announces,\n" +"destination enforcement will prevent usage by those clients unless or until\n" "those clients are converted to announcing over their own tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:135 msgid "" -"Unfortunately, as the network grows, so will the amount of maliciousness," -"\n" +"Unfortunately, as the network grows, so will the amount of maliciousness,\n" "so we expect that all trackers will eventually enforce destinations.\n" "Both tracker and client developers should anticipate it." msgstr "" @@ -3991,12 +3668,9 @@ msgstr "" msgid "" "Announce URL host names in torrent files generally follow the\n" "<a href=\"%(naming)s\">I2P naming standards</a>.\n" -"In addition to host names from address books and \".b32.i2p\" Base 32 " -"hostnames,\n" -"the full Base 64 Destination (with [or without?] \".i2p\" appended) " -"should be supported.\n" -"Non-open trackers should recognize their own host name in any of these " -"formats." +"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n" +"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n" +"Non-open trackers should recognize their own host name in any of these formats." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:152 @@ -4018,27 +3692,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:165 #, python-format msgid "" -"I2P uses 387+ byte <a " -"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" +"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "for addresses, as explained above." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:170 msgid "" -"If the client has only the hash of the destination (such as from a " -"compact response or PEX), it must perform a lookup\n" -"by encoding it with Base 32, appending \".b32.i2p\", and querying the " -"Naming Service,\n" +"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n" +"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n" "which will return the full Destination if available." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:176 msgid "" -"If the client has a peer's full Destination it received in a non-compact " -"response, it should use it\n" +"If the client has a peer's full Destination it received in a non-compact response, it should use it\n" "directly in the connection setup.\n" -"Do not convert a Destination back to a Base 32 hash for lookup, this is " -"quite inefficient." +"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:183 @@ -4048,40 +3717,32 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:184 msgid "" "To preserve anonymity,\n" -"I2P bittorrent clients generally do not support non-I2P announces or peer" -" connections.\n" +"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n" "I2P HTTP outproxies often block announces.\n" "There are no known SOCKS outproxies supporting bittorrent traffic." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:191 msgid "" -"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers " -"often\n" +"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n" "block accesses or announces that contain an X-Forwarded-For HTTP header.\n" -"Trackers should reject standard network announces with IPv4 or IPv6 IPs, " -"and not deliver them in responses." +"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:200 #, python-format msgid "" "I2P PEX is based on ut_pex.\n" -"As there does not appear to be a formal specification of ut_pex " -"available,\n" +"As there does not appear to be a formal specification of ut_pex available,\n" "it may be necessary to review the libtorrent source for assistance.\n" "It is an extension message, identified as \"i2p_pex\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with up to 3 keys, \"added\", " -"\"added.f\", and \"dropped\".\n" -"The added and dropped values are each a single byte string, whose length " -"is a multiple of 32 bytes.\n" +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n" +"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n" "These byte strings are the concatenated SHA-256 Hashes of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This is the same format as the peers dictionary value in the i2p compact " -"response format specified above.\n" +"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n" "The added.f value, if present, is the same as in ut_pex." msgstr "" @@ -4096,13 +3757,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:226 msgid "" -"Unlike standard DHT, I2P DHT does not use a bit in the options handshake," -" or the PORT message.\n" +"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n" "It is advertised with an extension message, identified as \"i2p_dht\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", " -"both integers." +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:235 @@ -4136,14 +3794,12 @@ msgstr "" msgid "" "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n" "instead of 4 byte IP + 2 byte port. There is no peer port.\n" -"In a response, the \"values\" key is a list of strings, each containing a" -" single compact peer info." +"In a response, the \"values\" key is a list of strings, each containing a single compact peer info." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:264 msgid "" -"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + " -"2 byte port)\n" +"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n" "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n" "In a response, the \"nodes\" key is a\n" "single byte string with concatenated compact node info." @@ -4152,10 +3808,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:271 msgid "" "Secure node ID requirement: To make various DHT attacks more difficult,\n" -"the first 4 bytes of the Node ID must match the first 4 bytes of the " -"destination Hash,\n" -"and the next two bytes of the Node ID must match the next two bytes of " -"the\n" +"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n" +"and the next two bytes of the Node ID must match the next two bytes of the\n" "destination hash exclusive-ORed with the port." msgstr "" @@ -4180,51 +3834,38 @@ msgid "" "Preliminary differences from\n" "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n" "are described below, and are subject to change.\n" -"Contact the I2P developers if you wish to develop a client or tracker " -"supporting datagram announces." +"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:299 msgid "" "A UDP tracker listens on two ports.\n" -"The \"query port\" is the advertised port, and is used to receive " -"repliable (signed) datagrams, for the connect request only.\n" -"The \"response port\" is used to receive unsigned (raw) datagrams, and is" -" the source port for all replies.\n" +"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n" +"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n" "The response port is arbitrary.\n" "A client sends and receives on a single port only.\n" "It receives only unsigned (raw) datagrams.\n" -"Raw datagrams provides increased efficiency for replies since they " -"contain tokens sent in the query, and need not be signed." +"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:309 msgid "" -"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and" -" the port is still present,\n" +"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n" "although it may be ignored by the tracker.\n" -"In the announce response, each 4-byte IP and 2-byte port is replaced by a" -" 32-byte hash (compact peer info), and no port is present.\n" -"The client sends the announce request and scrape request to the source " -"port in the announce response packet.\n" -"The connect request, connect response, scrape request, scrape response, " -"and error response are the same as in BEP 15." +"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n" +"The client sends the announce request and scrape request to the source port in the announce response packet.\n" +"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:317 msgid "" -"Source addresses in I2P cannot be spoofed, so it is possible to use a " -"simplified protocol\n" +"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n" "with 2 packets instead of 4, omitting the connect request and response.\n" -"In this case, the announce request would be a repliable datagram sent to " -"the tracker's query port,\n" +"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n" "and the tracker would not require a response port.\n" -"While this is more efficient, it would be more difficult to modify an " -"existing tracker to support this mode.\n" -"The URL for the 4-packet-mode tracker would use standard \"udp://\" " -"prefix.\n" -"The URL for a modified 2-packet-mode tracker would require a different " -"prefix if both modes are supported in I2P." +"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n" +"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n" +"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:330 @@ -4264,23 +3905,15 @@ msgstr "Incorporare I2P nella vostra Applicazione" #: i2p2www/pages/site/docs/applications/embedding.html:8 msgid "" -"This page is about bundling the entire I2P router binary with your " -"application.\n" -"It is not about writing an application to work with I2P (either bundled " -"or external)." -msgstr "" -"Questa pagina tratta dell'inclusione dell'intero router I2P, in binario, " -"assieme alla vostra applicazione.\n" -"Non riguarda la realizzazione di un applicazione che interagisca con I2P " -"(sia essa abbinata a I2P o esterna)." +"This page is about bundling the entire I2P router binary with your application.\n" +"It is not about writing an application to work with I2P (either bundled or external)." +msgstr "Questa pagina tratta dell'inclusione dell'intero router I2P, in binario, assieme alla vostra applicazione.\nNon riguarda la realizzazione di un applicazione che interagisca con I2P (sia essa abbinata a I2P o esterna)." #: i2p2www/pages/site/docs/applications/embedding.html:13 msgid "" -"Lots of projects are bundling, or talking about bundling, I2P. That's " -"great if done right.\n" +"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n" "If done wrong, it could cause real harm to our network.\n" -"The I2P router is complex, and it can be a challenge to hide all the " -"complexity from your users.\n" +"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n" "This page discusses some general guidelines." msgstr "" @@ -4290,10 +3923,8 @@ msgstr "Parlaci" #: i2p2www/pages/site/docs/applications/embedding.html:24 msgid "" -"Start a dialog. We're here to help. Applications that embed I2P are the " -"most promising - and exciting -\n" -"opportunities for us to grow the network and improve anonymity for " -"everyone." +"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n" +"opportunities for us to grow the network and improve anonymity for everyone." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:30 @@ -4302,11 +3933,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:31 msgid "" -"If your application is in Java or Scala, it's an easy choice - use the " -"Java router.\n" +"If your application is in Java or Scala, it's an easy choice - use the Java router.\n" "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n" -"For apps in other languages, best to use SAM or BOB or SOCKS and bundle " -"the Java router as a separate process.\n" +"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n" "Some of the following only applies to the Java router." msgstr "" @@ -4315,7 +3944,8 @@ msgid "Licensing" msgstr "Licenze" #: i2p2www/pages/site/docs/applications/embedding.html:40 -msgid "Ensure you meet the license requirements of the software you are bundling." +msgid "" +"Ensure you meet the license requirements of the software you are bundling." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:45 @@ -4324,29 +3954,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:46 msgid "" -"A correct default configuration is crucial. Most users will not change " -"the defaults.\n" -"The defaults for your application may need to be different than the " -"defaults for the router you are bundling.\n" +"A correct default configuration is crucial. Most users will not change the defaults.\n" +"The defaults for your application may need to be different than the defaults for the router you are bundling.\n" "Override the router defaults if necessary." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:51 msgid "" -"Some important defaults to review: Max bandwidth, tunnel quantity and " -"length, max participating tunnels.\n" -"A lot of this depends on the expected bandwidth and usage patterns of " -"your app." +"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n" +"A lot of this depends on the expected bandwidth and usage patterns of your app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:55 msgid "" -"Configure enough bandwidth and tunnels to allow your users to contribute " -"to the network.\n" -"Consider disabling external I2CP, as you probably don't need it and it " -"would conflict with any other running I2P instance.\n" -"Also look at the configs for disabling killing of the JVM on exit, for " -"example." +"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n" +"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n" +"Also look at the configs for disabling killing of the JVM on exit, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:62 @@ -4356,32 +3979,25 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:63 msgid "" "It may be tempting for you to disable participating traffic.\n" -"There's several ways to do this (hidden mode, setting max tunnels to 0, " -"setting shared bandwidth below 12 KBytes/sec).\n" -"Without participating traffic, you don't have to worry about graceful " -"shutdown,\n" +"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n" +"Without participating traffic, you don't have to worry about graceful shutdown,\n" "your users don't see bandwidth usage not generated by them, etc.\n" -"However, there's lots of reasons why you should allow participating " -"tunnels." +"However, there's lots of reasons why you should allow participating tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:70 msgid "" -"First of all, the router doesn't work that well if it doesn't have a " -"chance to \"integrate\" with the network,\n" +"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n" "which is helped tremendously by others building tunnels through you." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:74 msgid "" -"Secondly, over 90% of the routers in the current network allow " -"participating traffic.\n" +"Secondly, over 90% of the routers in the current network allow participating traffic.\n" "It's the default in the Java router.\n" -"If your application doesn't route for others and it gets really popular, " -"then it's a leech on the network,\n" +"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n" "and it upsets the balance we have now.\n" -"If it gets really big, then we become Tor, and spend our time begging for" -" people to enable relaying." +"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:81 @@ -4392,10 +4008,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:84 msgid "" -"We strongly discourage you from disabling participating traffic by " -"default.\n" -"If you do this and your application gets hugely popular, it could break " -"the network." +"We strongly discourage you from disabling participating traffic by default.\n" +"If you do this and your application gets hugely popular, it could break the network." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:90 @@ -4404,12 +4018,9 @@ msgstr "Persistenza" #: i2p2www/pages/site/docs/applications/embedding.html:91 msgid "" -"You must save the router's data (netdb, configuration, etc.) between runs" -" of the router.\n" -"I2P does not work well if you must reseed each startup, and that's a huge" -" load on our reseed servers, and not very good for anonymity either.\n" -"Even if you bundle router infos, I2P needs saved profile data for best " -"performance." +"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n" +"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n" +"Even if you bundle router infos, I2P needs saved profile data for best performance." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:99 @@ -4418,12 +4029,9 @@ msgstr "Configurabilità " #: i2p2www/pages/site/docs/applications/embedding.html:100 msgid "" -"Give your users a way to change the configuration of the important " -"settings.\n" -"We understand that you will probably want to hide most of I2P's " -"complexity, but it's important to show some basic settings.\n" -"In addition to the defaults above, some network settings such as UPnP, " -"IP/port may be helpful." +"Give your users a way to change the configuration of the important settings.\n" +"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n" +"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:108 @@ -4432,12 +4040,9 @@ msgstr "Considerazioni sul Floodfill" #: i2p2www/pages/site/docs/applications/embedding.html:109 msgid "" -"Above a certain bandwidth setting, and meeting other health criteria, " -"your router will become floodfill,\n" -"which may cause a large increase in connections and memory usage (at " -"least with the Java router).\n" -"Think about whether that's OK. You can disable floodfill, but then your " -"fastest users aren't contributing what they could.\n" +"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n" +"which may cause a large increase in connections and memory usage (at least with the Java router).\n" +"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n" "It also depends on the typical uptime for your application." msgstr "" @@ -4448,8 +4053,7 @@ msgstr "Reseeding" #: i2p2www/pages/site/docs/applications/embedding.html:120 msgid "" "Decide if you are bundling router infos or using our reseed hosts.\n" -"The Java reseed host list is in the source code, so if you keep your " -"source up to date, the host list will be also.\n" +"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n" "Be aware of possible blocking by hostile governments." msgstr "" @@ -4459,12 +4063,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:130 msgid "" -"Consider setting your application tunnels to delay-open, reduce-on-idle " -"and/or close-on-idle.\n" -"This is straightforward if using i2ptunnel but you'll have to implement " -"some of it yourself if using I2CP directly.\n" -"See i2psnark for code that reduces tunnel count and then closes the " -"tunnel, even in the presence of some background DHT activity." +"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n" +"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n" +"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:138 @@ -4473,16 +4074,11 @@ msgstr "Aggiornabilità " #: i2p2www/pages/site/docs/applications/embedding.html:139 msgid "" -"Have an auto-update feature if at all possible, or at least auto-" -"notification of a new version.\n" -"Our biggest fear is a huge number of routers out there that can't be " -"updated.\n" -"We have about 6-8 releases a year of the Java router, and it's critical " -"to the health of the network that the users keep up.\n" -"We usually have over 80% of the network on the latest release within " -"6 weeks after the release, and we'd like to keep it that way.\n" -"You don't need to worry about disabling the router's built-in auto-update" -" function, as that code is in the router console,\n" +"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n" +"Our biggest fear is a huge number of routers out there that can't be updated.\n" +"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n" +"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n" +"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n" "which you presumably are not bundling." msgstr "" @@ -4493,17 +4089,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:151 msgid "" "Have a gradual rollout plan. Don't overwhelm the network all at once.\n" -"We currently have approximately 25K unique users per day and 40K uniques " -"per month.\n" -"We are probably able to handle growth of 2-3X per year without too much " -"issue.\n" -"If you anticipate a faster rampup than that, OR the bandwidth " -"distribution (or uptime distribution,\n" -"or any other significant characteristic) of your userbase is " -"significantly different from our current userbase,\n" +"We currently have approximately 25K unique users per day and 40K uniques per month.\n" +"We are probably able to handle growth of 2-3X per year without too much issue.\n" +"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n" +"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n" "we really need to have a discussion.\n" -"The bigger your growth plans, the more important everthing else in this " -"checklist is." +"The bigger your growth plans, the more important everthing else in this checklist is." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:163 @@ -4513,10 +4104,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:164 msgid "" "Tell your users that I2P works best if it keeps running.\n" -"It may be several minutes after startup before it works well, and even " -"more after first install.\n" -"If your average uptime is less than an hour, I2P is probably the wrong " -"solution." +"It may be several minutes after startup before it works well, and even more after first install.\n" +"If your average uptime is less than an hour, I2P is probably the wrong solution." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:172 @@ -4525,8 +4114,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:173 msgid "" -"Provide some indication to the user that the application tunnels are " -"ready. Encourage patience." +"Provide some indication to the user that the application tunnels are ready. " +"Encourage patience." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:178 @@ -4536,8 +4125,7 @@ msgstr "Spegnimento Elegante" #: i2p2www/pages/site/docs/applications/embedding.html:179 msgid "" "If possible, delay the shutdown until your participating tunnels expire.\n" -"Don't let your users break tunnels easily, or at least ask them to " -"confirm." +"Don't let your users break tunnels easily, or at least ask them to confirm." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:185 @@ -4546,8 +4134,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:186 msgid "" -"It would be nice if you give your users links to learn more about I2P and" -" to donate." +"It would be nice if you give your users links to learn more about I2P and to" +" donate." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:192 @@ -4557,8 +4145,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:193 msgid "" "Depending on your user base and application,\n" -"it may be helpful to provide an option or a separate package to use an " -"external router." +"it may be helpful to provide an option or a separate package to use an external router." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:200 @@ -4567,8 +4154,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:201 msgid "" -"If you plan to use or link to other common I2P services (news feeds, " -"hosts.txt subscriptions, trackers, outproxies, etc.),\n" +"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n" "make sure you aren't overloading them,\n" "and talk to the people who are running them to make sure it's ok." msgstr "" @@ -4580,10 +4166,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:210 msgid "" "I2P includes an SNTP client. I2P requires correct time to operate.\n" -"It will compensate for a skewed system clock but this may delay startup. " -"You may disable I2P's SNTP queries,\n" -"but this isn't advised unless your application makes sure the system " -"clock is correct." +"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n" +"but this isn't advised unless your application makes sure the system clock is correct." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:218 @@ -4592,41 +4176,30 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:219 msgid "" -"At a minimum you will need i2p.jar, router.jar, streaming.jar, and " -"mstreaming.jar.\n" +"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n" "You may omit the two streaming jars for a datagram-only app.\n" "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n" -"Don't forget jbigi.jar, or a subset of it for the platforms you support, " -"to make the crypto much faster.\n" +"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n" "Java 7 or higher is required to build.\n" -"If you're building Debian / Ubuntu packages, you should require the I2P " -"package from our PPA instead of bundling it.\n" -"You almost certainly do not need susimail, susidns, the router console, " -"and i2psnark, for example." +"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n" +"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:228 msgid "" -"The following files should be included in the I2P installation directory," -" specified with the \"i2p.dir.base\" property.\n" -"Don't forget the certificates/ directory, which is required for " -"reseeding, and blocklist.txt for IP validation.\n" -"The geoip directory is optional, but recommended so the router can make " -"decisions based on location.\n" -"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that" -" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)." -"\n" -"The hosts.txt file may be necessary, you may modify it to include any " -"hosts your application uses.\n" -"You may add a router.config file to the base directory to override " -"initial defaults.\n" +"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n" +"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n" +"The geoip directory is optional, but recommended so the router can make decisions based on location.\n" +"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n" +"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n" +"You may add a router.config file to the base directory to override initial defaults.\n" "Review and edit or remove the clients.config and i2ptunnel.config files." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:237 msgid "" -"License requirements may require you to include the LICENSES.txt file and" -" the licenses directory." +"License requirements may require you to include the LICENSES.txt file and " +"the licenses directory." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:243 @@ -4644,17 +4217,14 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:255 msgid "" "Our Android router app may be shared by multiple clients.\n" -"If it is not installed, the user will be prompted when he starts a client" -" app." +"If it is not installed, the user will be prompted when he starts a client app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:259 msgid "" -"Some developers have expressed concern that this is a poor user " -"experience,\n" +"Some developers have expressed concern that this is a poor user experience,\n" "and they wish to embed the router in their app.\n" -"We do have an Android router service library on our roadmap, which could " -"make embedding easier.\n" +"We do have an Android router service library on our roadmap, which could make embedding easier.\n" "More information needed." msgstr "" @@ -4669,11 +4239,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:272 msgid "" -"We have a limited number of our jars on <a " -"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven" -" Central</a>.\n" -"There are numerous trac tickets for us to address that will improve and " -"expand the released jars on Maven Central." +"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n" +"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:282 @@ -4683,17 +4250,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:283 msgid "" "If your application is using I2P datagrams, e.g. for a DHT,\n" -"there's lots of advanced options available to reduce overhead and " -"increase reliability.\n" +"there's lots of advanced options available to reduce overhead and increase reliability.\n" "This may take some time and experimentation to get working well.\n" "Be aware of size/reliability tradeoffs. Talk to us for help.\n" -"It is possible - and recommended - to use Datagrams and Streaming on the " -"same Destination.\n" +"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n" "Don't create separate Destinations for this.\n" -"Don't try to store your unrelated data in the existing network DHTs " -"(iMule, bote, bittorrent, and router).\n" -"Build your own. If you are hardcoding seed nodes, we recommend that you " -"have several." +"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n" +"Build your own. If you are hardcoding seed nodes, we recommend that you have several." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:296 @@ -4703,8 +4266,7 @@ msgstr "Comarketing" #: i2p2www/pages/site/docs/applications/embedding.html:297 msgid "" "Let's work together. Don't wait until it's done.\n" -"Give us your Twitter handle and start tweeting about it, we will return " -"the favor." +"Give us your Twitter handle and start tweeting about it, we will return the favor." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:303 @@ -4723,8 +4285,7 @@ msgstr "Unisciti a Noi" #: i2p2www/pages/site/docs/applications/embedding.html:311 msgid "" -"This may be obvious, but join the community. Run I2P 24/7. Start an " -"eepsite about your project.\n" +"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n" "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n" "We can help get you users, testers, translators, or even coders." msgstr "" @@ -4735,12 +4296,10 @@ msgstr "Esempi d'uso" #: i2p2www/pages/site/docs/applications/embedding.html:320 msgid "" -"You may wish to install and play with the I2P Android app, and look at " -"its code, for an example of an application that bundles the router.\n" +"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n" "See what we expose to the user and what we hide.\n" "Look at the state machine we use to start and stop the router.\n" -"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak," -" and Monero." +"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:328 @@ -4755,10 +4314,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:359 msgid "" -"This code is for the case where your application starts the router, as in" -" our Android app.\n" -"You could also have the router start the application via the " -"clients.config and i2ptunnel.config files,\n" +"This code is for the case where your application starts the router, as in our Android app.\n" +"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n" "together with Jetty webapps,\n" "as is done in our Java packages.\n" "As always, state management is the difficult part." @@ -4776,13 +4333,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:7 msgid "" -"Cloning large software repositories over I2P can be difficult, and using " -"git can sometimes make this harder. Fortunately, it can also sometimes " -"make it easier. Git has a <code>git bundle</code> command which can be " -"used to turn a git repository into a file which git can then clone, " -"fetch, or import from a location on your local disk. By combining this " -"capability with bittorrent downloads, we can solve our remaining problems" -" with <code>git clone</code>." +"Cloning large software repositories over I2P can be difficult, and using git" +" can sometimes make this harder. Fortunately, it can also sometimes make it " +"easier. Git has a <code>git bundle</code> command which can be used to turn " +"a git repository into a file which git can then clone, fetch, or import from" +" a location on your local disk. By combining this capability with bittorrent" +" downloads, we can solve our remaining problems with <code>git clone</code>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:8 @@ -4791,13 +4347,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:9 msgid "" -"If you intend to generate a git bundle, you <strong>must</strong> already" -" possess a full copy of the <strong>git</strong> repository, not the mtn " -"repository. You can get it from github or from git.idk.i2p, but a shallow" -" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will" -" fail silently, creating what looks like a bundle, but when you try to " -"clone it it will fail. If you are just retrieving a pre-generated git " -"bundle, then this section does not apply to you." +"If you intend to generate a git bundle, you <strong>must</strong> already " +"possess a full copy of the <strong>git</strong> repository, not the mtn " +"repository. You can get it from github or from git.idk.i2p, but a shallow " +"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will " +"fail silently, creating what looks like a bundle, but when you try to clone " +"it it will fail. If you are just retrieving a pre-generated git bundle, then" +" this section does not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:10 @@ -4807,23 +4363,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:11 msgid "" "Someone will need to supply you with a torrent file or a magnet link " -"corresponding to an existing <code>git bundle</code> that they have " -"already generated for you. A recent, correctly-generated bundle of the " -"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be " -"found inside of I2P at my pastebin <a " +"corresponding to an existing <code>git bundle</code> that they have already " +"generated for you. A recent, correctly-generated bundle of the mainline " +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of " +"I2P at my pastebin <a " "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:12 msgid "" "Once you have a bundle, you will need to use git to create a working " -"repository from it. If you’re using GNU/Linux and i2psnark, the git " -"bundle should be located in $HOME/.i2p/i2psnark or, as a service on " -"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on " -"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/†instead. The " -"examples here assume I2PSnark on GNU/Linux, if you use something else, " -"replace the path to the bundle with the download directory preferred by " -"your client and platform." +"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle " +"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, " +"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it " +"is probably at “$HOME/BiglyBT Downloads/†instead. The examples here assume " +"I2PSnark on GNU/Linux, if you use something else, replace the path to the " +"bundle with the download directory preferred by your client and platform." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:13 @@ -4836,8 +4391,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:16 msgid "" -"If you get the following error, try using git init and git fetch manually" -" instead." +"If you get the following error, try using git init and git fetch manually " +"instead." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:18 @@ -4872,10 +4427,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:29 msgid "" -"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you " -"have a successfully <code>--unshallow</code>ed clone of clone of the " -"i2p.i2p repository. If you already have a clone, make sure you run " -"<code>git fetch --unshallow</code> before you generate a torrent bundle." +"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have " +"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p " +"repository. If you already have a clone, make sure you run <code>git fetch " +"--unshallow</code> before you generate a torrent bundle." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:30 @@ -4884,8 +4439,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:32 msgid "" -"and copy the resulting bundle into your I2PSnark downloads directory. For" -" instance:" +"and copy the resulting bundle into your I2PSnark downloads directory. For " +"instance:" msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:34 @@ -4894,117 +4449,152 @@ msgid "" "“Start†button to begin seeding the torrent." msgstr "" +#: i2p2www/pages/site/docs/applications/git.html:7 +msgid "" +"Tutorial for setting up git access through an I2P Tunnel. This tunnel will " +"act as your access point to a single git service on I2P." +msgstr "" + #: i2p2www/pages/site/docs/applications/git.html:8 msgid "" -"Tutorial for setting up git access through an I2P Tunnel. This tunnel " -"will act as your access point to a single git service on I2P." +"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n" +"tutorial will not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:10 +msgid "First: Set up an account at a Git service" +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:11 msgid "" -"Depending on how the git service is configured, it may or may not offer " -"all services on the same address. In the case of gittest.i2p, there is a " -"public HTTP URL, but this URL is read-only and cannot be used to make " -"changes. To do that, you must also know the SSH base32, which isn’t " -"public at this time. Unless I’ve told you the SSH base32 to gittest.i2p, " -"head over to the <a href=\"GITLAB.md\">Server</a> tutorial to set up your" -" own." +"To create your repositories on a remote git service, sign up for a user " +"account at that service. Of course it’s also possible to create repositories" +" locally and push them to a remote git service, but most will require an " +"account and for you to create a space for the repository on the server. " +"Gitlab has a very simple sign-up form:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:12 msgid "" -"To create your repositories on a remote git service, sign up for a user " -"account at that service. Of course it’s also possible to create " -"repositories locally and push them to a remote git service, but most will" -" require an account and for you to create a space for the repository on " -"the server. Gitlab has a very simple sign-up form:" +"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n" +"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n" +"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n" +"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n" +"using the instructions on the home page." +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:18 +msgid "Inside I2P - (http://git.idk.i2p)" +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:20 +msgid "Outside I2P - (https://i2pgit.org)" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:17 +#: i2p2www/pages/site/docs/applications/git.html:27 msgid "" -"To make sure the setup process works, it helps to make a repository to " -"test with from the server, and for the sake of this tutorial, we’re going" -" to use a fork of the I2P router. First, browse to the i2p-" -"hackers/i2p.i2p repository:" +"To make sure the setup process works, it helps to make a repository to test " +"with from the server, and for the sake of this tutorial, we’re going to use " +"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p " +"repository:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:24 +#: i2p2www/pages/site/docs/applications/git.html:34 msgid "Then, fork it to your account." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:32 +#: i2p2www/pages/site/docs/applications/git.html:42 msgid "" -"To have read-write access to my server, you’ll need to set up a tunnel " -"for your SSH client. As an example, we’re going to use the HTTP tunnel " -"instead, but if all you need is read-only, HTTP/S cloning, then you can " -"skip all this and just use the http_proxy environment variable to " -"configure git to use the pre-configured I2P HTTP Proxy. For example:" +"To have read-write access to my server, you’ll need to set up a tunnel for " +"your SSH client. As an example, we’re going to use the HTTP tunnel instead, " +"but if all you need is read-only, HTTP/S cloning, then you can skip all this" +" and just use the http_proxy environment variable to configure git to use " +"the pre-configured I2P HTTP Proxy. For example:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:40 +#: i2p2www/pages/site/docs/applications/git.html:50 msgid "" -"Then, add the address you will be pushing and pulling from. Note that " -"this example address is for Read-Only HTTP-over-I2P clones, if your admin" -" does not allow the git HTTP(Smart HTTP) protocol, then you will need to " -"get the SSH clone base32 from them. If you have an SSH clone base32, " -"substitute it for the base32 in this step, which will fail." +"Then, add the address you will be pushing and pulling from. Note that this " +"example address is for Read-Only HTTP-over-I2P clones, if your admin does " +"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the " +"SSH clone base32 from them. If you have an SSH clone base32, substitute it " +"for the base32 in this step, which will fail." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:44 +#: i2p2www/pages/site/docs/applications/git.html:54 msgid "Pick a port to forward the I2P service to locally." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:48 +#: i2p2www/pages/site/docs/applications/git.html:58 msgid "" "I use it alot, so I start my client tunnel automatically, but it’s up to " "you." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:52 +#: i2p2www/pages/site/docs/applications/git.html:62 msgid "When you’re all done, it should look alot like this." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:56 +#: i2p2www/pages/site/docs/applications/git.html:66 msgid "Fourth: Attempt a clone" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:57 +#: i2p2www/pages/site/docs/applications/git.html:67 msgid "Now your tunnel is all set up, you can attempt a clone over SSH." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:60 +#: i2p2www/pages/site/docs/applications/git.html:68 +msgid "" +"Git Privacy: Committing to git adds a timestamp to git commit messages, " +"which may be configured to reflect your local time zone. To enforce the use " +"of UTC for all commits, you are advised to use a git alias, such as:" +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:70 +msgid "which will allow you to substitute" +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:72 +msgid "for" +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:74 +msgid "in order to obscure your local time zone." +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:78 msgid "" "You might get an error where the remote end hangs up unexpectedly. " -"Unfortunately git still doesn’t support resumable cloning. Until it does," -" there are a couple fairly easy ways to handle this. The first and " -"easiest is to try and clone to a shallow depth:" +"Unfortunately git still doesn’t support resumable cloning. Until it does, " +"there are a couple fairly easy ways to handle this. The first and easiest is" +" to try and clone to a shallow depth:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:63 +#: i2p2www/pages/site/docs/applications/git.html:81 msgid "" -"Once you’ve performed a shallow clone, you can fetch the rest resumably " -"by changing to the repo directory and running:" +"Once you’ve performed a shallow clone, you can fetch the rest resumably by " +"changing to the repo directory and running:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:65 +#: i2p2www/pages/site/docs/applications/git.html:83 msgid "" -"At this point, you still don’t have all your branches yet. You can get " -"them by running the following commands:" +"At this point, you still don’t have all your branches yet. You can get them " +"by running the following commands:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:68 +#: i2p2www/pages/site/docs/applications/git.html:86 msgid "" -"Which tells git to alter the repository configuration so that fetching " -"from origin fetches all branches." +"Which tells git to alter the repository configuration so that fetching from " +"origin fetches all branches." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:69 +#: i2p2www/pages/site/docs/applications/git.html:87 msgid "" -"If that doesn’t work, you can try opening the tunnel configuration menu " -"and adding some backup tunnels." +"If that doesn’t work, you can try opening the tunnel configuration menu and " +"adding some backup tunnels." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:73 +#: i2p2www/pages/site/docs/applications/git.html:91 msgid "" "If that doesn’t work, then the next easy thing to try is to decrease the " "tunnel length. Don’t do this if you believe you are at risk of your code-" @@ -5013,61 +4603,65 @@ msgid "" "sounds unlikely to you then you can probably do it safely." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:77 +#: i2p2www/pages/site/docs/applications/git.html:95 msgid "<em>Suggested Workflow for Developers!</em>" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:78 +#: i2p2www/pages/site/docs/applications/git.html:96 msgid "" -"Revision control can make your life easier, but it works best if you use " -"it well! In light of this, we strongly suggest a fork-first, feature-" -"branch workflow as many are familiar with from Github. In such a " -"workflow, the master branch is used as a sort of “Trunk†for updates and " -"is never touched by the programmmer, instead, all changes to the master " -"are merged from branches. In order to do set up your workspace for this, " -"take the following steps:" +"Revision control can make your life easier, but it works best if you use it " +"well! In light of this, we strongly suggest a fork-first, feature-branch " +"workflow as many are familiar with from Github. In such a workflow, the " +"master branch is used as a sort of “Trunk†for updates and is never touched " +"by the programmmer, instead, all changes to the master are merged from " +"branches. In order to do set up your workspace for this, take the following " +"steps:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:80 +#: i2p2www/pages/site/docs/applications/git.html:98 msgid "" -"<strong>Never make changes to the Master Branch</strong>. You will be " -"using the master branch to periodially obtain updates to the official " -"source code. All changes should be made in feature branches." +"<strong>Never make changes to the Master Branch</strong>. You will be using " +"the master branch to periodially obtain updates to the official source code." +" All changes should be made in feature branches." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:83 +#: i2p2www/pages/site/docs/applications/git.html:101 msgid "" -"Set up a second remote in your local repository using the upstream source" -" code." +"Set up a second remote in your local repository using the upstream source " +"code." msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:85 +#: i2p2www/pages/site/docs/applications/git.html:103 msgid "Pull in any upstream changes on your current master:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:87 +#: i2p2www/pages/site/docs/applications/git.html:105 msgid "" -"Before making any changes to the source code, check out a new feature " -"branch to develop on:" +"Before making any changes to the source code, check out a new feature branch" +" to develop on:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:89 +#: i2p2www/pages/site/docs/applications/git.html:107 msgid "" -"When you’re done with your changes, commit them and push them to your " -"branch" +"When you’re done with your changes, commit them and push them to your branch" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:92 +#: i2p2www/pages/site/docs/applications/git.html:110 msgid "" -"Submit a merge request. When the merge request is approved and brought " -"into the upstream master, check out the master locally and pull in the " -"changes:" +"Submit a merge request. When the merge request is approved and brought into " +"the upstream master, check out the master locally and pull in the changes:" msgstr "" -#: i2p2www/pages/site/docs/applications/git.html:95 +#: i2p2www/pages/site/docs/applications/git.html:113 msgid "" -"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, " -"you can update your master code using this procedure as well." +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you " +"can update your master code using this procedure as well." +msgstr "" + +#: i2p2www/pages/site/docs/applications/git.html:117 +msgid "" +"The git utccommit alias solution to git timestamp issue was arrived at from " +"the information first published here" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:6 @@ -5075,21 +4669,22 @@ msgid "Gitlab over I2P Setup" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:7 -msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others." +msgid "" +"Mirror I2P Git repositories and Bridge Non-private internet.repositories for" +" others." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:10 msgid "" -"This is the setup process I use for configuring Gitlab and I2P, with " -"Docker in place to manage the service itself. Gitlab is very easy to host" -" on I2P in this fashion, it can be administered by one person without " -"much difficulty. In my configuration, I use a Debian VM to host docker " -"containers and an I2P router, on a Debian Host system, however, this may " -"be more than necessary for some people. These instructions should work on" -" any Debian-based system, regardless of whether it is in a VM or not, and" -" should easily translate to any system where Docker and an I2P router are" -" available. This guide starts at Docker and does not assume any VM " -"underneath." +"This is the setup process I use for configuring Gitlab and I2P, with Docker " +"in place to manage the service itself. Gitlab is very easy to host on I2P in" +" this fashion, it can be administered by one person without much difficulty." +" In my configuration, I use a Debian VM to host docker containers and an I2P" +" router, on a Debian Host system, however, this may be more than necessary " +"for some people. These instructions should work on any Debian-based system, " +"regardless of whether it is in a VM or not, and should easily translate to " +"any system where Docker and an I2P router are available. This guide starts " +"at Docker and does not assume any VM underneath." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:11 @@ -5098,15 +4693,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:12 msgid "" -"Because Gitlab runs in a container, we only need to install the " -"dependencies required for the container on our main system. Conveniently," -" you can install everything you need with:" +"Because Gitlab runs in a container, we only need to install the dependencies" +" required for the container on our main system. Conveniently, you can " +"install everything you need with:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:14 msgid "" -"on an otherwise unmodified Debian system, or if you have added Docker’s " -"own “Community†Debian repository, you may use:" +"on an otherwise unmodified Debian system, or if you have added Docker’s own " +"“Community†Debian repository, you may use:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:16 @@ -5119,62 +4714,61 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:18 msgid "" -"Once you have docker installed, you can fetch the docker containers " -"required for gitlab. <em>Don’t run them yet.</em>" +"Once you have docker installed, you can fetch the docker containers required" +" for gitlab. <em>Don’t run them yet.</em>" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:20 msgid "" -"For those who are concerned, the gitlab-ce Docker image is built using " -"only Ubuntu Docker images as a parent, which are built from scratch " -"images. Since there are no third-party images involved here, updates " -"should come as soon as they are available in the host images. To review " -"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com" -"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab " -"source code</a>." +"For those who are concerned, the gitlab-ce Docker image is built using only " +"Ubuntu Docker images as a parent, which are built from scratch images. Since" +" there are no third-party images involved here, updates should come as soon " +"as they are available in the host images. To review the Dockerfile for " +"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-" +"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:21 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:22 msgid "" "Gitlab servers inside of I2P can be run with or without the ability to " -"interact with servers on the internet outside of I2P. In the case where " -"the Gitlab server is <em>not allowed</em> to interact with servers " -"outside of I2P, they cannot be de-anonymized by cloning a git repository " -"from a git server on the internet outside of I2P. They can, however, " -"export and mirror repositories from other git services inside of I2P." +"interact with servers on the internet outside of I2P. In the case where the " +"Gitlab server is <em>not allowed</em> to interact with servers outside of " +"I2P, they cannot be de-anonymized by cloning a git repository from a git " +"server on the internet outside of I2P. They can, however, export and mirror " +"repositories from other git services inside of I2P." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:23 msgid "" "In the case where the Gitlab server is <em>allowed</em> to interact with " -"servers outside of I2P, it can act as a “Bridge†for the users, who can " -"use it to mirror content outside I2P to an I2P-accessible source, however" -" it <em>is not anonymous</em> in this case. Git services on the non-" -"anonymous internet will be connected to directly." +"servers outside of I2P, it can act as a “Bridge†for the users, who can use " +"it to mirror content outside I2P to an I2P-accessible source, however it " +"<em>is not anonymous</em> in this case. Git services on the non-anonymous " +"internet will be connected to directly." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:24 msgid "" -"<strong>If you want to have a bridged, non-anonymous Gitlab instance with" -" access to</strong> <strong>web repositories,</strong> no further " +"<strong>If you want to have a bridged, non-anonymous Gitlab instance with " +"access to</strong> <strong>web repositories,</strong> no further " "modification is necessary." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:25 msgid "" -"<strong>If you want to have an I2P-Only Gitlab instance with no access to" -" Web-Only</strong> <strong>Repositories</strong>, you will need to " -"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP " -"proxy only listens on <code>127.0.0.1</code>, you will need to set up a " -"new one for Docker that listens on the Host/Gateway address of the Docker" -" network, which is usually <code>172.17.0.1</code>. I configure mine on " -"port <code>4446</code>." +"<strong>If you want to have an I2P-Only Gitlab instance with no access to " +"Web-Only</strong> <strong>Repositories</strong>, you will need to configure " +"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only " +"listens on <code>127.0.0.1</code>, you will need to set up a new one for " +"Docker that listens on the Host/Gateway address of the Docker network, which" +" is usually <code>172.17.0.1</code>. I configure mine on port " +"<code>4446</code>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:26 @@ -5190,8 +4784,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:37 msgid "" "Visit your Local Gitlab instance and set up your admin account. Choose a " -"strong password, and configure user account limits to match your " -"resources." +"strong password, and configure user account limits to match your resources." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:38 @@ -5202,21 +4795,19 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:39 msgid "" -"It’s also possible to apply your HTTP Proxy settings in a more granular " -"way, so that you can only allow users to mirror repositories from the " -"domains that you choose. Since the domain is presumably operated by an " -"organization, you can use this to ensure that repositories that are " -"mirrorable follow a reasonable set of policies. After all, there is far " -"more abusive content on the non-anonymous internet than there is on I2P, " -"we wouldn’t want to make it too easy to introduce abusive content from " -"such a nefarious place." +"It’s also possible to apply your HTTP Proxy settings in a more granular way," +" so that you can only allow users to mirror repositories from the domains " +"that you choose. Since the domain is presumably operated by an organization," +" you can use this to ensure that repositories that are mirrorable follow a " +"reasonable set of policies. After all, there is far more abusive content on " +"the non-anonymous internet than there is on I2P, we wouldn’t want to make it" +" too easy to introduce abusive content from such a nefarious place." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:40 msgid "" -"Add the following lines to your gitlab.rb file inside the " -"/src/gitlab/config container. These settings will take effect when you " -"restart in a moment." +"Add the following lines to your gitlab.rb file inside the /src/gitlab/config" +" container. These settings will take effect when you restart in a moment." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:56 @@ -5225,10 +4816,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:57 msgid "" -"Once you have Gitlab set up locally, go to the I2P Router console. You " -"will need to set up two server tunnels, one leading to the Gitlab " -"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface" -" on TCP Port 8022." +"Once you have Gitlab set up locally, go to the I2P Router console. You will " +"need to set up two server tunnels, one leading to the Gitlab web(HTTP) " +"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port " +"8022." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:58 @@ -5239,8 +4830,7 @@ msgstr "" msgid "" "For the Web interface, use an “HTTP†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:61 @@ -5258,8 +4848,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:64 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:65 @@ -5278,19 +4868,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:69 msgid "" -"Web services on I2P can register hostnames for themselves by providing an" -" authentication string to a jump service provider like <a " +"Web services on I2P can register hostnames for themselves by providing an " +"authentication string to a jump service provider like <a " "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" again and click on the “Gitlab Web Service†item you just set up. Scroll" -" to the bottom of the “Edit Server Settings†section and click " -"Registration Authentication. Copy the field that says “Authentication for" -" adding Hostname†and visit <a " +" again and click on the “Gitlab Web Service†item you just set up. Scroll to" +" the bottom of the “Edit Server Settings†section and click Registration " +"Authentication. Copy the field that says “Authentication for adding " +"Hostname†and visit <a " "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your " -"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then" -" you will have to use the correct authentication string for your " -"subdomain, which is a little bit more complicated and merits it’s own " -"instructions." +"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then " +"you will have to use the correct authentication string for your subdomain, " +"which is a little bit more complicated and merits it’s own instructions." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:70 @@ -5301,8 +4890,7 @@ msgstr "" msgid "" "For the SSH interface, use a “Standard†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:74 @@ -5315,8 +4903,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:76 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:80 @@ -5325,9 +4913,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:81 msgid "" -"Finally, if you either modified <code>gitlab.rb</code> or you registered " -"a hostname, you will need to re-start the gitlab service for the settings" -" to take effect." +"Finally, if you either modified <code>gitlab.rb</code> or you registered a " +"hostname, you will need to re-start the gitlab service for the settings to " +"take effect." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:2 @@ -5345,20 +4933,16 @@ msgstr "Client" #: i2p2www/pages/site/docs/applications/irc.html:15 msgid "" " There are many IRC clients that can be used with I2P. In\n" -"fact, all IRC clients can be connected to the Irc2P Service by connecting" -"\n" +"fact, all IRC clients can be connected to the Irc2P Service by connecting\n" "them to the IRC Tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:28 msgid "" "To configure any IRC client to chat on Irc2P, first, make sure that\n" -"your IRC tunnel is available. Visit the <a " -"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" -"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" " -"indicator on\n" -"the right-hand side is yellow or green, your Irc2P tunnel is ready and " -"you should \n" +"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" +"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n" +"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n" "proceed to the next step." msgstr "" @@ -5375,12 +4959,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:42 msgid "" "Pidgin is a very popular Instant Messaging client with built-in IRC\n" -"support. It is also possible to use it with many other kinds of chat " -"service, and\n" -"it supports using multiple accounts at once and has a variety of plugin-" -"ins. There\n" -"is a similar application for OSX called \"Adium.\" The instructions for " -"Pidgin are\n" +"support. It is also possible to use it with many other kinds of chat service, and\n" +"it supports using multiple accounts at once and has a variety of plugin-ins. There\n" +"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n" "similar in Adium.\n" msgstr "" @@ -5396,8 +4977,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:52 msgid "" "After launching Pidgin, you should see a \"Buddy List\" window. From\n" -"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage" -" Accounts\" to\n" +"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n" "begin configuring your I2P account." msgstr "" @@ -5412,10 +4992,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:59 msgid "" "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n" -"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and" -" password. IRC\n" -"does not require you to register a nickname to join, but you may if you " -"wish, after\n" +"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n" +"does not require you to register a nickname to join, but you may if you wish, after\n" "you connect to Irc2P." msgstr "" @@ -5430,8 +5008,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:67 msgid "" "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n" -"make sure that SSL is <em>disabled</em>, since your tunnel has encryption" -" provided\n" +"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n" "by I2P." msgstr "" @@ -5475,8 +5052,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:87 msgid "" "Change the value in \"Servers\" from the default to `localhost/6669`,\n" -"and configure the default channels you want to join. I suggest #i2p and " -"#i2p-dev\n" +"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n" msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:92 @@ -5576,8 +5152,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:143 msgid "" "Revolution IRC is an easy to use IRC client for Android. It's able to\n" -"handle multiple accounts on multiple services, so you can use it for " -"Irc2P and for\n" +"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n" "your non-I2P IRC networks as well." msgstr "" @@ -5638,15 +5213,13 @@ msgstr "Servers" #: i2p2www/pages/site/docs/applications/irc.html:196 msgid "" "Eris is an easy-to-configure IRC server with self-configuring support\n" -"for I2P. If you want to run a private IRC server it's one of the easiest " -"ways." +"for I2P. If you want to run a private IRC server it's one of the easiest ways." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:199 msgid "" " This is a valid configuration of the Eris IRC server, but it uses a\n" -"default password for the admin account(admin). You should change the " -"operator.admin.password\n" +"default password for the admin account(admin). You should change the operator.admin.password\n" "and account.admin.password before deploying to a real service." msgstr "" @@ -5671,24 +5244,18 @@ msgstr "" msgid "" "As of release 0.9.4, the router supports managed clients.\n" "Managed clients are instantiated and started by the ClientAppManager.\n" -"The ClientAppManager maintains a reference to the client and receives " -"updates on the client's state.\n" -"Managed clients are preferred, as it is much easier to implement state " -"tracking\n" -"and to start and stop a client. It also is much easier to avoid static " -"references in the client code\n" +"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n" +"Managed clients are preferred, as it is much easier to implement state tracking\n" +"and to start and stop a client. It also is much easier to avoid static references in the client code\n" "which could lead to excessive memory usage after a client is stopped.\n" -"Managed clients may be started and stopped by the user in the router " -"console,\n" +"Managed clients may be started and stopped by the user in the router console,\n" "and are stopped at router shutdown." msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:31 msgid "" -"Managed clients implement either the net.i2p.app.ClientApp or " -"net.i2p.router.app.RouterApp interface.\n" -"Clients implementing the ClientApp interface must provide the following " -"constructor:" +"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n" +"Clients implementing the ClientApp interface must provide the following constructor:" msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:38 @@ -5707,12 +5274,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:49 msgid "" -"If the main class specified in the clients.config file does not implement" -" a managed interface,\n" +"If the main class specified in the clients.config file does not implement a managed interface,\n" "it will be started with main() with the arguments specified,\n" "and stopped with main() with the arguments specified.\n" -"The router does not maintain a reference, since all interactions are via " -"the static main() method.\n" +"The router does not maintain a reference, since all interactions are via the static main() method.\n" "The console cannot provide accurate state information to the user." msgstr "" @@ -5722,8 +5287,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:58 msgid "" -"Clients, whether managed or unmanaged, may register with the " -"ClientAppManager\n" +"Clients, whether managed or unmanaged, may register with the ClientAppManager\n" "so that other clients may retrieve a reference to them.\n" "Registration is by name.\n" "Known registered clients are:" @@ -5735,675 +5299,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:69 msgid "" -"The router also provides a simple mechanism for clients to find an " -"internal socket service,\n" +"The router also provides a simple mechanism for clients to find an internal socket service,\n" "such as the HTTP proxy. This is provided by the Port Mapper.\n" "Registration is by name.\n" -"Clients that register generally provide an internal emulated socket on " -"that port." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:2 -msgid "Supported Applications" -msgstr "Applicazioni Supportate" - -#: i2p2www/pages/site/docs/applications/supported.html:5 -#: i2p2www/pages/site/docs/applications/supported.html:188 -msgid "Blogging, Forums, and Wikis" -msgstr "Blog, Forum e Wiki" - -#: i2p2www/pages/site/docs/applications/supported.html:7 -#: i2p2www/pages/site/docs/applications/supported.html:234 -msgid "Decentralized File Storage" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:10 -#: i2p2www/pages/site/docs/applications/supported.html:246 -msgid "Development Tools" -msgstr "Strumenti di Sviluppo" - -#: i2p2www/pages/site/docs/applications/supported.html:13 -#: i2p2www/pages/site/docs/applications/supported.html:248 -msgid "Version control" -msgstr "Controllo versione" - -#: i2p2www/pages/site/docs/applications/supported.html:17 -#: i2p2www/pages/site/docs/applications/supported.html:267 -msgid "Domain Naming" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:19 -#: i2p2www/pages/site/docs/applications/supported.html:285 -msgid "Email" -msgstr "Email" - -#: i2p2www/pages/site/docs/applications/supported.html:22 -#: i2p2www/pages/site/docs/applications/supported.html:330 -msgid "File Sharing" -msgstr "File sharing" - -#: i2p2www/pages/site/docs/applications/supported.html:25 -#: i2p2www/pages/site/docs/applications/supported.html:332 -msgid "BitTorrent clients" -msgstr "Client BitTorrent" - -#: i2p2www/pages/site/docs/applications/supported.html:27 -#: i2p2www/pages/site/docs/applications/supported.html:375 -msgid "BitTorrent trackers and indexers" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:36 -#: i2p2www/pages/site/docs/applications/supported.html:442 -msgid "Network Administration" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:39 -#: i2p2www/pages/site/docs/applications/supported.html:444 -msgid "General-purpose socket utilities" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:46 -#: i2p2www/pages/site/docs/applications/supported.html:485 -msgid "Real-time Chat" -msgstr "Chat in tempo reale" - -#: i2p2www/pages/site/docs/applications/supported.html:49 -#: i2p2www/pages/site/docs/applications/supported.html:487 -msgid "Instant messaging clients" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:51 -#: i2p2www/pages/site/docs/applications/supported.html:497 -msgid "IRC clients" -msgstr "Client IRC" - -#: i2p2www/pages/site/docs/applications/supported.html:53 -#: i2p2www/pages/site/docs/applications/supported.html:548 -msgid "IRC servers" -msgstr "Server IRC" - -#: i2p2www/pages/site/docs/applications/supported.html:58 -#: i2p2www/pages/site/docs/applications/supported.html:564 -msgid "Web Browsing" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:61 -#: i2p2www/pages/site/docs/applications/supported.html:566 -msgid "Anonymous websites" -msgstr "Siti anonimi" - -#: i2p2www/pages/site/docs/applications/supported.html:63 -#: i2p2www/pages/site/docs/applications/supported.html:615 -msgid "Proxy software" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:65 -#: i2p2www/pages/site/docs/applications/supported.html:640 -msgid "Inproxies" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:67 -#: i2p2www/pages/site/docs/applications/supported.html:681 -msgid "Outproxies" -msgstr "Outproxy" - -#: i2p2www/pages/site/docs/applications/supported.html:72 -#: i2p2www/pages/site/docs/applications/supported.html:695 -msgid "Website Hosting" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:75 -#: i2p2www/pages/site/docs/applications/supported.html:710 -msgid "Web servers" -msgstr "Web server" - -#: i2p2www/pages/site/docs/applications/supported.html:82 -#, python-format -msgid "" -"This is intended to be a comprehensive listing of applications used with\n" -"I2P. If you know of something that's missing please submit a ticket on\n" -"<a href=\"%(trac)s\">Trac</a>, and be sure to select the\n" -"“www†component in the submission form." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:89 -msgid "" -"\n" -"Supported applications are tagged with one or more of the following:" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:94 -#: i2p2www/pages/site/docs/applications/supported.html:281 -#: i2p2www/pages/site/docs/applications/supported.html:313 -#: i2p2www/pages/site/docs/applications/supported.html:338 -#: i2p2www/pages/site/docs/applications/supported.html:707 -msgid "bundled" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:97 -msgid "" -"<em>Bundled application</em> — I2P ships with a few officially\n" -"supported applications that let new users take immediate advantage of\n" -"some of I2P's more useful capabilities." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:105 -#: i2p2www/pages/site/docs/applications/supported.html:197 -#: i2p2www/pages/site/docs/applications/supported.html:210 -#: i2p2www/pages/site/docs/applications/supported.html:222 -#: i2p2www/pages/site/docs/applications/supported.html:230 -#: i2p2www/pages/site/docs/applications/supported.html:243 -#: i2p2www/pages/site/docs/applications/supported.html:294 -#: i2p2www/pages/site/docs/applications/supported.html:407 -#: i2p2www/pages/site/docs/applications/supported.html:429 -#: i2p2www/pages/site/docs/applications/supported.html:438 -#: i2p2www/pages/site/docs/applications/supported.html:526 -msgid "plugin" -msgstr "plugin" - -#: i2p2www/pages/site/docs/applications/supported.html:108 -#, python-format -msgid "" -"<em>Third-party plugin</em> — I2P's plugin system provides convenient\n" -"deployment of I2P-enabled applications and allows tighter integration\n" -"with the router. Plugins are [reviewed by the community](<a href=\n" -"\"http://%(plugins)s\">http://%(plugins)s</a>) to identify security and\n" -"anonymity issues." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:119 -#: i2p2www/pages/site/docs/applications/supported.html:222 -#: i2p2www/pages/site/docs/applications/supported.html:230 -#: i2p2www/pages/site/docs/applications/supported.html:243 -#: i2p2www/pages/site/docs/applications/supported.html:254 -#: i2p2www/pages/site/docs/applications/supported.html:263 -#: i2p2www/pages/site/docs/applications/supported.html:326 -#: i2p2www/pages/site/docs/applications/supported.html:345 -#: i2p2www/pages/site/docs/applications/supported.html:356 -#: i2p2www/pages/site/docs/applications/supported.html:371 -#: i2p2www/pages/site/docs/applications/supported.html:417 -#: i2p2www/pages/site/docs/applications/supported.html:429 -#: i2p2www/pages/site/docs/applications/supported.html:438 -#: i2p2www/pages/site/docs/applications/supported.html:453 -#: i2p2www/pages/site/docs/applications/supported.html:459 -#: i2p2www/pages/site/docs/applications/supported.html:465 -#: i2p2www/pages/site/docs/applications/supported.html:475 -#: i2p2www/pages/site/docs/applications/supported.html:481 -#: i2p2www/pages/site/docs/applications/supported.html:493 -#: i2p2www/pages/site/docs/applications/supported.html:526 -#: i2p2www/pages/site/docs/applications/supported.html:532 -#: i2p2www/pages/site/docs/applications/supported.html:538 -#: i2p2www/pages/site/docs/applications/supported.html:544 -#: i2p2www/pages/site/docs/applications/supported.html:621 -#: i2p2www/pages/site/docs/applications/supported.html:630 -#: i2p2www/pages/site/docs/applications/supported.html:636 -#: i2p2www/pages/site/docs/applications/supported.html:707 -#: i2p2www/pages/site/docs/applications/supported.html:722 -#: i2p2www/pages/site/docs/applications/supported.html:728 -#: i2p2www/pages/site/docs/applications/supported.html:734 -#: i2p2www/pages/site/docs/applications/supported.html:740 -msgid "standalone" -msgstr "standalone" - -#: i2p2www/pages/site/docs/applications/supported.html:119 -#: i2p2www/pages/site/docs/applications/supported.html:197 -#: i2p2www/pages/site/docs/applications/supported.html:204 -#: i2p2www/pages/site/docs/applications/supported.html:210 -#: i2p2www/pages/site/docs/applications/supported.html:216 -#: i2p2www/pages/site/docs/applications/supported.html:365 -#: i2p2www/pages/site/docs/applications/supported.html:389 -#: i2p2www/pages/site/docs/applications/supported.html:398 -#: i2p2www/pages/site/docs/applications/supported.html:554 -#: i2p2www/pages/site/docs/applications/supported.html:560 -msgid "standalone/mod" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:122 -msgid "" -"<em>Third-party standalone application</em> — Many standard network\n" -"applications only require careful setup and configuration to communicate\n" -"anonymously over I2P. These are tagged with <em>standalone</em>. Some\n" -"applications, tagged with <em>standalone/mod</em>, require patching to\n" -"function properly over I2P or to prevent inadvertent disclosure of\n" -"identifying information such as the user's hostname or external IP\n" -"address." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:135 -#: i2p2www/pages/site/docs/applications/supported.html:304 -#: i2p2www/pages/site/docs/applications/supported.html:574 -#: i2p2www/pages/site/docs/applications/supported.html:584 -#: i2p2www/pages/site/docs/applications/supported.html:593 -#: i2p2www/pages/site/docs/applications/supported.html:599 -#: i2p2www/pages/site/docs/applications/supported.html:605 -#: i2p2www/pages/site/docs/applications/supported.html:611 -#: i2p2www/pages/site/docs/applications/supported.html:653 -#: i2p2www/pages/site/docs/applications/supported.html:661 -#: i2p2www/pages/site/docs/applications/supported.html:670 -#: i2p2www/pages/site/docs/applications/supported.html:677 -#: i2p2www/pages/site/docs/applications/supported.html:691 -msgid "service" -msgstr "servizio" - -#: i2p2www/pages/site/docs/applications/supported.html:138 -msgid "" -"<em>Third-party essential network service</em> — Services which on\n" -"the I2P network are analogous to those provided on the public Internet\n" -"by hosting providers, ISPs, and Google: eepsite indexes and jump\n" -"services, search engines, email, DNS-style name services, hosting,\n" -"proxies, etc. These services focus on boosting the usefulness of the\n" -"network as a whole, and making network content more discoverable." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:150 -#: i2p2www/pages/site/docs/applications/supported.html:222 -msgid "unmaintained" -msgstr "non mantenuto" - -#: i2p2www/pages/site/docs/applications/supported.html:153 -msgid "" -"<em>Unmaintained</em> — This is used to tag plugins, applications,\n" -"and services which appear to be unmaintained and may be removed from\n" -"this listing in the future." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:161 -#, python-format -msgid "" -"Warning: Using an application, plugin, or service with I2P\n" -"doesn't automatically protect your anonymity. I2P is merely a set of " -"tools\n" -"which can help you mitigate certain <a " -"href=\"%(threatmodel)s\">identified\n" -"threats to anonymity</a>. We do not and cannot make any guarantees about " -"the\n" -"safety of the applications, plugins, and services listed below. Most\n" -"applications and plugins must be properly configured, and some will need " -"to\n" -"be patched — and even then your anonymity might not be assured. " -"Similarly,\n" -"services could put your anonymity at risk, either by design or through\n" -"carelessness on their part or your own." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:173 -msgid "" -"If you have doubts about the suitability of an application,\n" -"plugin, or service for use with I2P, you are urged to inquire about " -"privacy\n" -"issues with its maintainers, to search its mailing lists and bug tracker " -"if\n" -"one exists, and consult trusted, knowledgeable members of the I2P\n" -"community." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:181 -msgid "" -"Take responsibility for your own anonymity and safety — always\n" -"seek expert advice, educate yourself, practice good judgment, be mindful " -"of\n" -"disclosing personally identifying information, and don't take\n" -"shortcuts." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:203 -msgid "Lightweight forum software." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:209 -msgid "Another lightweight blogging platform." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:215 -msgid "Most popular open source forum software." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:221 -msgid "Distributed forums software, originally developed by jrandom." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:226 -#, python-format -msgid "" -"A Java-based MediaWiki clone. No external database needed.\n" -"Plugin available <a href=\"http://%(plugins)s/plugins/jamwiki\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:238 -#, python-format -msgid "" -"Port of the <a href=\"http://tahoe-lafs.org/\"><strong>Tahoe-" -"LAFS</strong></a>\n" -"distributed file system to the I2P network. Controller plugin <a href=\n" -"\"http://%(stats)s/i2p/plugins/\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:253 -msgid "Most popular distributed version control system." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:259 -#, python-format -msgid "" -"Another distributed version control system. Currently\n" -"<a href=\"%(monotone)s\">used in I2P development</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:271 -#, python-format -msgid "" -"Provides management of addressbooks, which are part of a simple,\n" -"user-controlled <a href=\"%(naming)s\">I2P naming system</a> somewhat\n" -"analogous to the Internet's Domain Name System (DNS). Addressbooks map\n" -"Base64 destinations to short, usually human-readable “domain†names " -"ending\n" -"with a .i2p suffix which the I2P router's HTTP client can resolve back to" -"\n" -"Base64 addresses. (<em>Note:</em> While Base64 destinations are globally\n" -"unique, addressbook “domain†names only resolve to unique destinations\n" -"locally.)" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:290 -msgid "" -"Serverless peer-to-peer email application using a distributed hash table\n" -"(DHT) for secure mail storage." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:299 -msgid "" -"Provides email service within the I2P network via @mail.i2p addresses,\n" -"and email gateway service between the I2P network and the public Internet" -"\n" -"via @i2pmail.org addresses. One of the oldest continuous services on I2P." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:309 -msgid "" -"Simple web browser-based email interface. Configured to use Postman's\n" -"email service by default." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:318 -#, python-format -msgid "" -"Can be configured to use Postman's email service. See\n" -"<a href=\"%(reviews)s\">this comparison of MUAs</a>,\n" -"and configuration settings for\n" -"<a href=\"%(smtp)s\">SMTP</a> and <a href=\"%(pop3)s\">POP3</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:337 -msgid "I2P's integrated BitTorrent client." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:343 -msgid "" -"Modified version of I2PSnark, no more supported neither\n" -" functional." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:350 -msgid "" -"\n" -"A fork of rufus that uses the Basic Open Bridge (BOB) and has many\n" -"improvements, including using the latest wxwidgets and python. It also\n" -"supports use of seedless if installed for trackerless torrents and\n" -"magnet-link like fetching of torrents within I2P.\n" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:361 -msgid "" -"Clean, full-featured cross-platform BitTorrent client with official\n" -"ports for several GUI toolkits." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:370 -msgid "Has a plugin providing I2P support." -msgstr "Supporta I2P tramite un plugin." - -#: i2p2www/pages/site/docs/applications/supported.html:377 -#, python-format -msgid "" -"For a detailed feature comparison of I2P-enabled trackers/indexers, see\n" -"<a href=\"http://%(zzz)s/files/trackers.html\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:385 -msgid "" -"The code that powered one of the first major tracker/indexer sites on the" -"\n" -"Internet. Patched for I2P." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:394 -#, python-format -msgid "" -"Lightweight tracker/indexer. I2P mod available in the i2p.opentracker\n" -"branch of the <a href=\"%(newdevs)s\">I2P Monotone repository</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:403 -#, python-format -msgid "" -"<a href=\"http://%(zzz)s/\">zzz's</a> Java-based open tracker. More info\n" -"<a href=\"http://%(zzz)s/topics/598?page=1#p2085\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:416 -msgid "I2P port of the aMule ED2K client." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:425 -#, python-format -msgid "" -"Port of the <a href=\"http://www.phex.org/mambo/\">Phex</a> Gnutella " -"client. Website\n" -"for plugin version <a href=\"http://%(stats)s/i2p/plugins/\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:434 -#, python-format -msgid "" -"Cache for Gnutella peers on I2P. Website for plugin version\n" -"<a href=\"http://%(stats)s/i2p/plugins/\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:449 -msgid "" -"OpenBSD's rewrite of the Unix standard tool, netcat, for socket relaying." -"\n" -"Several clones, ports, and forks have appeared over the years." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:458 -msgid "Like netcat but more powerful." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:464 -msgid "" -"Proxy providing simple, transparent SOCKS-ification of network " -"applications." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:474 -msgid "" -"Most popular implementation of the Secure Shell (SSH) protocol and " -"related tools." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:480 -msgid "Open source Secure Shell (SSH) client for Windows." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:492 -msgid "IM client with multiple incarnations, unsuported." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:499 -msgid "" -"Many IRC clients leak identifying information to servers or other\n" -"clients, so I2P's IRC and SOCKS IRC client tunnels filter certain inbound" -"\n" -"and outbound messages to scrub data such as LAN IP addresses, external IP" -"\n" -"addresses, local hostnames, and the name and version of the IRC client. " -"Two\n" -"message types in particular, DCC and CTCP, can't be sufficiently " -"anonymized\n" -"without changes to the protocols or to IRC client/server code, so they " -"are\n" -"completely blocked, except for CTCP ACTION (the message emitted by the\n" -"<code>/me</code> command) which isn't inherently dangerous." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:510 -msgid "" -"I2P's IRC filtering may not cover every possible leak — users should also" -"\n" -"check if their client is sending their real name or local username. " -"Packet\n" -"sniffers such as <a href=\"http://www.wireshark.org/\">Wireshark</a> are\n" -"useful here. Eliminating remaining leaks may be as simple as changing the" -"\n" -"client's default configuration. If that doesn't help, inform the I2P\n" -"developers; they may be able to solve it via additional filtering." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:522 -#, python-format -msgid "" -"Small Java-based IRC client. Plugin available <a href=\n" -"\"http://%(stats)s/i2p/plugins/\">here</a>." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:531 -msgid "Cross-platform graphical IRC client based on XChat." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:537 -msgid "Unixy terminal-based IRC client." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:543 -msgid "Another Unixy terminal-based IRC client." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:553 -msgid "IRC server developed from scratch." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:559 -msgid "Most popular IRC server." -msgstr "Un server IRC molto diffuso." - -#: i2p2www/pages/site/docs/applications/supported.html:571 -msgid "" -"Any website hosted anonymously on I2P, reachable through the I2P router's" -" HTTP proxy." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:579 -msgid "" -"Distributed anonymous websites hosted\n" -"using Tahoe-LAFS-I2P, currently only reachable with Tahoe-LAFS-I2P\n" -"clients or through the Tahoe-LAFS-I2P HTTP proxy." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:589 -#, python-format -msgid "" -"Website for <a href=\"http://%(sponge)s/\">sponge's</a> jump service.\n" -"Source code available." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:598 -msgid "Another jump service." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:604 -msgid "Dynamically updated eepsite index." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:610 -#, python-format -msgid "Website for <a href=\"http://%(zzz)s/\">zzz's</a> jump service." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:620 -msgid "SOCKS-enabled caching web proxy with basic filtering capabilities." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:626 -msgid "" -"Privacy-focused non-caching web proxy with advanced filtering\n" -"capabilities. Excels at removing ads and other junk." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:635 -msgid "Venerable caching web proxy." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:642 -msgid "Gateways allowing users on the public Internet to access eepsites." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:649 -#, python-format -msgid "" -"<a href=\"http://%(tino)s/\">tino's</a> inproxy on the public Internet,\n" -"currently out of service," -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:658 -#: i2p2www/pages/site/docs/applications/supported.html:667 -#: i2p2www/pages/site/docs/applications/supported.html:674 -msgid "Another inproxy on the public Internet." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:683 -msgid "" -"Gateways allowing I2P users to access content hosted on the public " -"Internet." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:690 -msgid "Publicly advertised outproxy running Squid, located in Europe." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:700 -msgid "" -"Lightweight web server and Java servlet container. I2P is tightly\n" -"integrated with a bundled copy of Jetty which by default is configured to" -"\n" -"host the <a href=\"http://127.0.0.1:7658/\">user's eepsite</a>. The " -"bundled\n" -"Jetty also serves the I2P router console and web applications bundled " -"with\n" -"I2P." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:712 -msgid "" -"In addition to Jetty, any web server should function over I2P without\n" -"modification so long as it's HTTP-compliant. Some web servers known to\n" -"currently serve content on the I2P network are:" -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:721 -msgid "Most popular web server on the public WWW." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:727 -msgid "Web server and Java servlet container. More features than Jetty." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:733 -msgid "Fast lightweight web server." -msgstr "" - -#: i2p2www/pages/site/docs/applications/supported.html:739 -msgid "High-performance lightweight web server." +"Clients that register generally provide an internal emulated socket on that port." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:2 @@ -6413,8 +5312,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:4 #, python-format msgid "" -"NOTE: The following is a discussion of the reasons behind the I2P naming " -"system,\n" +"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n" "common arguments and possible alternatives.\n" "See <a href=\"%(naming)s\">the naming page</a> for current documentation." msgstr "" @@ -6425,72 +5323,49 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:12 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning " -"with\n" -"advocates across the spectrum of possibilities. However, given I2P's " -"inherent\n" -"demand for secure communication and decentralized operation, the " -"traditional\n" -"DNS-style naming system is clearly out, as are \"majority rules\" voting " -"systems." +"Naming within I2P has been an oft-debated topic since the very beginning with\n" +"advocates across the spectrum of possibilities. However, given I2P's inherent\n" +"demand for secure communication and decentralized operation, the traditional\n" +"DNS-style naming system is clearly out, as are \"majority rules\" voting systems." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:19 msgid "" -"I2P does not promote the use of DNS-like services though, as the damage " -"done\n" -"by hijacking a site can be tremendous - and insecure destinations have no" -"\n" -"value. DNSsec itself still falls back on registrars and certificate " -"authorities,\n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the reply\n" -"spoofed, as they are encrypted to the destination's public keys, and a " -"destination\n" -"itself is just a pair of public keys and a certificate. DNS-style " -"systems on the\n" -"other hand allow any of the name servers on the lookup path to mount " -"simple denial\n" -"of service and spoofing attacks. Adding on a certificate authenticating " -"the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"I2P does not promote the use of DNS-like services though, as the damage done\n" +"by hijacking a site can be tremendous - and insecure destinations have no\n" +"value. DNSsec itself still falls back on registrars and certificate authorities,\n" +"while with I2P, requests sent to a destination cannot be intercepted or the reply\n" +"spoofed, as they are encrypted to the destination's public keys, and a destination\n" +"itself is just a pair of public keys and a certificate. DNS-style systems on the\n" +"other hand allow any of the name servers on the lookup path to mount simple denial\n" +"of service and spoofing attacks. Adding on a certificate authenticating the\n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:33 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness of\n" -"Sybil attacks in anonymous systems - the attacker can simply create an " -"arbitrarily\n" -"high number of peers and \"vote\" with each to take over a given name. " -"Proof-of-work\n" -"methods can be used to make identity non-free, but as the network grows " -"the load\n" -"required to contact everyone to conduct online voting is implausible, or " -"if the\n" +"Voting style naming is dangerous as well, especially given the effectiveness of\n" +"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n" +"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n" +"methods can be used to make identity non-free, but as the network grows the load\n" +"required to contact everyone to conduct online voting is implausible, or if the\n" "full network is not queried, different sets of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:42 msgid "" -"As with the Internet however, I2P is keeping the design and operation of " -"a \n" -"naming system out of the (IP-like) communication layer. The bundled " -"naming library\n" -"includes a simple service provider interface which <a " -"href=\"#alternatives\">alternate naming systems</a> can\n" -"plug into, allowing end users to drive what sort of naming tradeoffs they" -" prefer." +"As with the Internet however, I2P is keeping the design and operation of a \n" +"naming system out of the (IP-like) communication layer. The bundled naming library\n" +"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n" +"plug into, allowing end users to drive what sort of naming tradeoffs they prefer." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:50 msgid "" -"See also <a href=\"https://zooko.com/distnames.html\">Names: " -"Decentralized, Secure, Human-Meaningful: Choose Two</a>." +"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, " +"Secure, Human-Meaningful: Choose Two</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:55 @@ -6501,36 +5376,26 @@ msgstr "" msgid "" "Q:\n" "What to do if some hosts \n" -"do not agree on one address and if some addresses are working, others are" -" not? \n" +"do not agree on one address and if some addresses are working, others are not? \n" "Who is the right source of a name?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:64 msgid "" "A:\n" -"You don't. This is actually a critical difference between names on I2P " -"and how \n" -"DNS works - names in I2P are human readable, secure, but <b>not globally" -" \n" -"unique</b>. This is by design, and an inherent part of our need for " -"security." +"You don't. This is actually a critical difference between names on I2P and how \n" +"DNS works - names in I2P are human readable, secure, but <b>not globally \n" +"unique</b>. This is by design, and an inherent part of our need for security." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:70 msgid "" -"If I could somehow convince you to change the destination associated with" -" some \n" -"name, I'd successfully \"take over\" the site, and under no circumstances" -" is that \n" -"acceptable. Instead, what we do is make names <b>locally unique</b>: " -"they are \n" -"what <i>you</i> use to call a site, just as how you can call things " -"whatever \n" -"you want when you add them to your browser's bookmarks, or your IM " -"client's \n" -"buddy list. Who you call \"Boss\" may be who someone else calls " -"\"Sally\"." +"If I could somehow convince you to change the destination associated with some \n" +"name, I'd successfully \"take over\" the site, and under no circumstances is that \n" +"acceptable. Instead, what we do is make names <b>locally unique</b>: they are \n" +"what <i>you</i> use to call a site, just as how you can call things whatever \n" +"you want when you add them to your browser's bookmarks, or your IM client's \n" +"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:78 @@ -6546,44 +5411,33 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:89 msgid "" "<b>Inefficiency:</b>\n" -"The whole hosts.txt is downloaded (if it has changed, since eepget uses " -"the etag and last-modified headers).\n" +"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n" "It's about 400K right now for almost 800 hosts." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:94 msgid "" -"True, but this isn't a lot of traffic in the context of i2p, which is " -"itself wildly inefficient\n" -"(floodfill databases, huge encryption overhead and padding, garlic " -"routing, etc.).\n" -"If you downloaded a hosts.txt file from someone every 12 hours it " -"averages out to about 10 bytes/sec." +"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n" +"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n" +"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:99 msgid "" -"As is usually the case in i2p, there is a fundamental tradeoff here " -"between anonymity and efficiency.\n" -"Some would say that using the etag and last-modified headers is hazardous" -" because it exposes when you\n" +"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n" +"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n" "last requested the data.\n" -"Others have suggested asking for specific keys only (similar to what jump" -" services do, but\n" +"Others have suggested asking for specific keys only (similar to what jump services do, but\n" "in a more automated fashion), possibly at a further cost in anonymity." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:106 #, python-format msgid "" -"Possible improvements would be a replacement or supplement to addressbook" -" (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" -"or something simple like subscribing to http://example.i2p/cgi-" -"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" -"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 " -"hours, for example,\n" -"that could be both more efficient and more anonymous than the current " -"hosts.txt with last-modified and etag." +"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" +"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" +"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n" +"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:112 @@ -6593,17 +5447,14 @@ msgid "" "<a href=\"%(url)s\">%(url)s</a>.\n" "This script returns an Etag with a timestamp.\n" "When a request comes in with the If-None-Match etag,\n" -"the script ONLY returns new hosts since that timestamp, or 304 Not " -"Modified if there are none.\n" -"In this way, the script efficiently returns only the hosts the subscriber" -"\n" -"does not know about, in an addressbook-compatible manner." +"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n" +"In this way, the script efficiently returns only the hosts the subscriber\n" +"does not know about, in an address book-compatible manner." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:121 msgid "" -"So the inefficiency is not a big issue and there are several ways to " -"improve things without\n" +"So the inefficiency is not a big issue and there are several ways to improve things without\n" "radical change." msgstr "" @@ -6617,37 +5468,30 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:132 msgid "" "As far as network traffic see above.\n" -"But unless you're going to do a slow real-time query over the network for" -"\n" -"a key, you need to have the whole set of keys stored locally, at a cost " -"of about 500 bytes per key." +"But unless you're going to do a slow real-time query over the network for\n" +"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:139 msgid "" "<b>Requires configuration and \"trust\":</b>\n" -"Out-of-the-box addressbook is only subscribed to " -"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" +"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" "leading to poor new-user experience." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:144 msgid "" -"This is very much intentional. jrandom wants a user to \"trust\" a " -"hosts.txt\n" +"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n" "provider, and as he likes to say, \"trust is not a boolean\".\n" -"The configuration step attempts to force users to think about issues of " -"trust in an anonymous network." +"The configuration step attempts to force users to think about issues of trust in an anonymous network." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:149 msgid "" -"As another example, the \"Eepsite Unknown\" error page in the HTTP Proxy\n" -"lists some jump services, but doesn't \"recommend\" any one in " -"particular,\n" +"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n" +"lists some jump services, but doesn't \"recommend\" any one in particular,\n" "and it's up to the user to pick one (or not).\n" -"jrandom would say we trust the listed providers enough to list them but " -"not enough to\n" +"jrandom would say we trust the listed providers enough to list them but not enough to\n" "automatically go fetch the key from them." msgstr "" @@ -6664,14 +5508,13 @@ msgstr "<b>Non è DNS</b>" #: i2p2www/pages/site/docs/discussions/naming.html:166 msgid "" -"Unfortunately real-time lookups over i2p would significantly slow down " -"web browsing." +"Unfortunately real-time lookups over i2p would significantly slow down web " +"browsing." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:169 msgid "" -"Also, DNS is based on lookups with limited caching and time-to-live, " -"while i2p\n" +"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n" "keys are permanent." msgstr "" @@ -6682,7 +5525,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:178 msgid "" "<b>Not reliable:</b>\n" -"It depends on specific servers for addressbook subscriptions." +"It depends on specific servers for address book subscriptions." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:182 @@ -6690,27 +5533,22 @@ msgid "" "Yes it depends on a few servers that you have configured.\n" "Within i2p, servers and services come and go.\n" "Any other centralized system (for example DNS root servers) would\n" -"have the same problem. A completely decentralized system (everybody is " -"authoritative)\n" -"is possible by implementing an \"everybody is a root DNS server\" " -"solution, or by\n" -"something even simpler, like a script that adds everybody in your " -"hosts.txt to your addressbook." +"have the same problem. A completely decentralized system (everybody is authoritative)\n" +"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n" +"something even simpler, like a script that adds everybody in your hosts.txt to your address book." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:190 msgid "" -"People advocating all-authoritative solutions generally haven't thought " -"through\n" +"People advocating all-authoritative solutions generally haven't thought through\n" "the issues of conflicts and hijacking, however." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:196 msgid "" "<b>Awkward, not real-time:</b>\n" -"It's a patchwork of hosts.txt providers, key-add web form providers, jump" -" service providers,\n" -"eepsite status reporters.\n" +"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n" +"I2P Site status reporters.\n" "Jump servers and subscriptions are a pain, it should just work like DNS." msgstr "" @@ -6720,8 +5558,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:207 msgid "" -"So, in summary, the current system is not horribly broken, inefficient, " -"or un-scalable,\n" +"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n" "and proposals to \"just use DNS\" aren't well thought-through." msgstr "" @@ -6731,8 +5568,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:213 msgid "" -"The I2P source contains several pluggable naming systems and supports " -"configuration options\n" +"The I2P source contains several pluggable naming systems and supports configuration options\n" "to enable experimentation with naming systems." msgstr "" @@ -6754,8 +5590,8 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:234 msgid "" -"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/" -" directory." +"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ " +"directory." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:237 @@ -6780,8 +5616,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:253 msgid "" -"The current naming system can be changed with the advanced config option " -"'i2p.naming.impl'\n" +"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n" "(restart required).\n" "See core/java/src/net/i2p/client/naming for details." msgstr "" @@ -6789,8 +5624,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:258 msgid "" "Any new system should be stacked with HostsTxt, or should\n" -"implement local storage and/or the addressbook subscription functions, " -"since addressbook\n" +"implement local storage and/or the address book subscription functions, since address book\n" "only knows about the hosts.txt files and format." msgstr "" @@ -6800,50 +5634,40 @@ msgstr "Certificati" #: i2p2www/pages/site/docs/discussions/naming.html:265 msgid "" -"I2P destinations contain a certificate, however at the moment that " -"certificate\n" +"I2P destinations contain a certificate, however at the moment that certificate\n" "is always null.\n" -"With a null certificate, base64 destinations are always 516 bytes ending " -"in \"AAAA\",\n" -"and this is checked in the addressbook merge mechanism, and possibly " -"other places.\n" -"Also, there is no method available to generate a certificate or add it to" -" a\n" +"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n" +"and this is checked in the address book merge mechanism, and possibly other places.\n" +"Also, there is no method available to generate a certificate or add it to a\n" "destination. So these will have to be updated to implement certificates." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:273 #, python-format msgid "" -"One possible use of certificates is for <a " -"href=\"%(todo)s#hashcash\">proof of work</a>." +"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof " +"of work</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:276 msgid "" -"Another is for \"subdomains\" (in quotes because there is really no such " -"thing,\n" -"i2p uses a flat naming system) to be signed by the 2nd level domain's " -"keys." +"Another is for \"subdomains\" (in quotes because there is really no such thing,\n" +"i2p uses a flat naming system) to be signed by the 2nd level domain's keys." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:280 msgid "" -"With any certificate implementation must come the method for verifying " -"the\n" +"With any certificate implementation must come the method for verifying the\n" "certificates.\n" -"Presumably this would happen in the addressbook merge code.\n" -"Is there a method for multiple types of certificates, or multiple " -"certificates?" +"Presumably this would happen in the address book merge code.\n" +"Is there a method for multiple types of certificates, or multiple certificates?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:286 msgid "" "Adding on a certificate authenticating the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" @@ -6862,91 +5686,58 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:11 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:19 #: i2p2www/pages/site/docs/how/tech-intro.html:508 msgid "" -"The first time a router wants to encrypt a garlic message to another " -"router, \n" -"they encrypt the keying material for an AES256 session key with ElGamal " -"and \n" -"append the AES256/CBC encrypted payload after that encrypted ElGamal " -"block. \n" -"In addition to the encrypted payload, the AES encrypted section contains " -"the \n" -"payload length, the SHA256 hash of the unencrypted payload, as well as a " -"number \n" -"of \"session tags\" - random 32 byte nonces. The next time the sender " -"wants \n" -"to encrypt a garlic message to another router, rather than ElGamal " -"encrypt \n" -"a new session key they simply pick one of the previously delivered " -"session \n" -"tags and AES encrypt the payload like before, using the session key used " -"with \n" -"that session tag, prepended with the session tag itself. When a router " -"receives \n" -"a garlic encrypted message, they check the first 32 bytes to see if it " -"matches \n" -"an available session tag - if it does, they simply AES decrypt the " -"message, \n" +"The first time a router wants to encrypt a garlic message to another router, \n" +"they encrypt the keying material for an AES256 session key with ElGamal and \n" +"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n" +"In addition to the encrypted payload, the AES encrypted section contains the \n" +"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n" +"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n" +"to encrypt a garlic message to another router, rather than ElGamal encrypt \n" +"a new session key they simply pick one of the previously delivered session \n" +"tags and AES encrypt the payload like before, using the session key used with \n" +"that session tag, prepended with the session tag itself. When a router receives \n" +"a garlic encrypted message, they check the first 32 bytes to see if it matches \n" +"an available session tag - if it does, they simply AES decrypt the message, \n" "but if it does not, they ElGamal decrypt the first block." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:35 #: i2p2www/pages/site/docs/how/tech-intro.html:524 msgid "" -"Each session tag can be used only once so as to prevent internal " -"adversaries \n" -"from unnecessarily correlating different messages as being between the " -"same \n" -"routers. The sender of an ElGamal/AES+SessionTag encrypted message " -"chooses \n" -"when and how many tags to deliver, prestocking the recipient with enough " -"tags \n" -"to cover a volley of messages. Garlic messages may detect the successful " -"tag \n" -"delivery by bundling a small additional message as a clove (a \"delivery " -"status \n" -"message\") - when the garlic message arrives at the intended recipient " -"and \n" -"is decrypted successfully, this small delivery status message is one of " -"the \n" -"cloves exposed and has instructions for the recipient to send the clove " -"back \n" -"to the original sender (through an inbound tunnel, of course). When the " -"original \n" -"sender receives this delivery status message, they know that the session " -"tags \n" +"Each session tag can be used only once so as to prevent internal adversaries \n" +"from unnecessarily correlating different messages as being between the same \n" +"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n" +"when and how many tags to deliver, prestocking the recipient with enough tags \n" +"to cover a volley of messages. Garlic messages may detect the successful tag \n" +"delivery by bundling a small additional message as a clove (a \"delivery status \n" +"message\") - when the garlic message arrives at the intended recipient and \n" +"is decrypted successfully, this small delivery status message is one of the \n" +"cloves exposed and has instructions for the recipient to send the clove back \n" +"to the original sender (through an inbound tunnel, of course). When the original \n" +"sender receives this delivery status message, they know that the session tags \n" "bundled in the garlic message were successfully delivered." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:50 msgid "" "Session tags themselves have a short lifetime, after which they are \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption.\n" -"A session will continue to exist until all its tags are exhausted or " -"expire." +"A session will continue to exist until all its tags are exhausted or expire." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:61 @@ -6961,8 +5752,7 @@ msgid "" "between a Router and a Destination.\n" "Each Router and Destination maintains its own Session Key Manager to\n" "keep track of Session Keys and Session Tags.\n" -"Separate Session Key Managers prevents correlation of multiple " -"Destinations\n" +"Separate Session Key Managers prevents correlation of multiple Destinations\n" "to each other or a Router by adversaries." msgstr "" @@ -6983,14 +5773,14 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:85 -msgid "It is for a new session and contains both ElGamal and AES encrypted blocks" +msgid "" +"It is for a new session and contains both ElGamal and AES encrypted blocks" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:88 msgid "" "When a router receives a message, it will first assume it is from\n" -"an existing session and attempt to look up the Session Tag and decrypt " -"the following data using AES.\n" +"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n" "If that fails, it will assume it is for a new session and attempt to\n" "decrypt it using ElGamal." msgstr "" @@ -7001,8 +5791,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:98 msgid "" -"A New Session ElGamal Message contains two parts, an encrypted ElGamal " -"block\n" +"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n" "and an encrypted AES block." msgstr "" @@ -7028,8 +5817,7 @@ msgid "" "The 32-byte\n" "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n" "is the identifier for the session.\n" -"The 32-byte Pre-IV will be used to generate the IV for the AES block that" -" follows;\n" +"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n" "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV." msgstr "" @@ -7058,18 +5846,16 @@ msgstr "" #, python-format msgid "" "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n" -"using the session key and IV (calculated from the pre-IV) from the " -"ElGamal section.\n" -"The encrypted AES Block length is variable but is always a multiple of 16" -" bytes.\n" +"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n" +"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n" "</p>" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:266 #, python-format msgid "" -"Actual max payload length, and max block length, is less than 64 KB; see " -"the <a href=\"%(i2np)s\">I2NP Overview</a>." +"Actual max payload length, and max block length, is less than 64 KB; see the" +" <a href=\"%(i2np)s\">I2NP Overview</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:269 @@ -7098,18 +5884,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:318 msgid "" "The session tag also serves as\n" -"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the " -"sessionTag." +"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:323 msgid "" -"To decode a message from an existing session, a router looks up the " -"Session Tag to find an\n" -"associated Session Key. If the Session Tag is found, the AES block is " -"decrypted using the associated Session Key.\n" -"If the tag is not found, the message is assumed to be a <a " -"href=\"#new\">New Session Message</a>." +"To decode a message from an existing session, a router looks up the Session Tag to find an\n" +"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n" +"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:331 @@ -7119,38 +5901,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:332 #, python-format msgid "" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"For brief streaming connections or datagrams, these options may be used " -"to significantly reduce bandwidth.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:353 msgid "" -"There are many possible areas to tune the Session Key Manager's " -"algorithms;\n" -"some may interact with the streaming library behavior, or have " -"significant\n" +"There are many possible areas to tune the Session Key Manager's algorithms;\n" +"some may interact with the streaming library behavior, or have significant\n" "impact on overall performance." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:360 msgid "" -"The number of tags delivered could depend on message size, keeping in " -"mind\n" +"The number of tags delivered could depend on message size, keeping in mind\n" "the eventual padding to 1KB at the tunnel message layer." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:365 msgid "" -"Clients could send an estimate of session lifetime to the router, as an " -"advisory\n" +"Clients could send an estimate of session lifetime to the router, as an advisory\n" "on the number of tags required." msgstr "" @@ -7162,15 +5936,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:374 msgid "" -"The router may assume delivery of Session Tags, or await acknowledgement " -"before using them;\n" +"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n" "there are tradeoffs for each strategy." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:379 msgid "" -"For very brief messages, almost the full 222 bytes of the pre-IV and " -"padding fields in the ElGamal block\n" +"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n" "could be used for the entire message, instead of establishing a session." msgstr "" @@ -7182,10 +5954,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:389 msgid "" -"Perhaps things could be more efficient if the Session Tag system was " -"bidirectional,\n" -"so tags delivered in the 'forward' path could be used in the 'reverse' " -"path,\n" +"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n" +"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n" "thus avoiding ElGamal in the initial response.\n" "The router currently plays some tricks like this when sending\n" "tunnel test messages to itself." @@ -7203,12 +5973,9 @@ msgstr "" msgid "" "Several of these ideas may require a new I2NP message type, or\n" "set a flag in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery" -" Instructions</a>,\n" +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n" "or set a magic number in the first few bytes of the Session Key field\n" -"and accept a small risk of the random Session Key matching the magic " -"number." +"and accept a small risk of the random Session Key matching the magic number." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:2 @@ -7225,8 +5992,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:7 msgid "" -"The terms \"garlic routing\" and \"garlic encryption\" are often used " -"rather loosely when referring to I2P's technology.\n" +"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n" "Here, we explain the history of the terms, the various meanings, and\n" "the usage of \"garlic\" methods in I2P." msgstr "" @@ -7236,20 +6002,16 @@ msgid "" "\"Garlic routing\" was first coined by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n" "in Roger Dingledine's Free Haven \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"Section 8.1.1 (June 2000), as derived from \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n" "<a href=\"http://www.onion-router.net/\">Onion Routing</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:21 msgid "" -"\"Garlic\" may have been used originally by I2P developers because I2P " -"implements a form of\n" -"bundling as Freedman describes, or simply to emphasize general " -"differences from Tor.\n" +"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n" +"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n" "The specific reasoning may be lost to history.\n" -"Generally, when referring to I2P, the term \"garlic\" may mean one of " -"three things:" +"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:28 @@ -7268,54 +6030,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:33 msgid "" -"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven " -"years has not always been precise; therefore the reader is\n" +"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n" "cautioned when encountering the term.\n" "Hopefully, the explanation below will make things clear." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:40 msgid "" -"Onion routing is a technique for building paths, or tunnels, through a " -"series of peers,\n" +"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n" "and then using that tunnel.\n" -"Messages are repeatedly encrypted by the originator, and then decrypted " -"by each hop.\n" -"During the building phase, only the routing instructions for the next hop" -" are exposed to each peer.\n" -"During the operating phase, messages are passed through the tunnel, and " -"the\n" -"message and its routing instructions are only exposed to the endpoint of " -"the tunnel." +"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n" +"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n" +"During the operating phase, messages are passed through the tunnel, and the\n" +"message and its routing instructions are only exposed to the endpoint of the tunnel." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:49 #, python-format msgid "" "This is similar to the way Mixmaster\n" -"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages " -"- taking a message, encrypting it\n" -"to the recipient's public key, taking that encrypted message and " -"encrypting\n" -"it (along with instructions specifying the next hop), and then taking " -"that\n" -"resulting encrypted message and so on, until it has one layer of " -"encryption\n" +"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n" +"to the recipient's public key, taking that encrypted message and encrypting\n" +"it (along with instructions specifying the next hop), and then taking that\n" +"resulting encrypted message and so on, until it has one layer of encryption\n" "per hop along the path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:58 msgid "" -"In this sense, \"garlic routing\" as a general concept is identical to " -"\"onion routing\".\n" -"As implemented in I2P, of course, there are several differences from the " -"implementation in Tor; see below.\n" -"Even so, there are substantial similarities such that I2P benefits from a" -"\n" -"<a href=\"http://www.onion-router.net/Publications.html\">large amount of" -" academic research on onion routing</a>,\n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar " -"mixnets</a>." +"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n" +"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n" +"Even so, there are substantial similarities such that I2P benefits from a\n" +"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:67 @@ -7324,15 +6071,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:68 msgid "" -"Michael Freedman defined \"garlic routing\" as an extension to onion " -"routing,\n" +"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n" "in which multiple messages are bundled together.\n" "He called each message a \"bulb\".\n" -"All the messages, each with its own delivery instructions, are exposed at" -" the\n" +"All the messages, each with its own delivery instructions, are exposed at the\n" "endpoint.\n" -"This allows the efficient bundling of an onion routing \"reply block\" " -"with the original message." +"This allows the efficient bundling of an onion routing \"reply block\" with the original message." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:77 @@ -7341,10 +6085,8 @@ msgid "" "Our term for garlic \"bulbs\" is \"cloves\".\n" "Any number of messages can be\n" "contained, instead of just a single message.\n" -"This is a significant distinction from the onion routing implemented in " -"Tor.\n" -"However, it is only one of many major architectural differences between " -"I2P and Tor;\n" +"This is a significant distinction from the onion routing implemented in Tor.\n" +"However, it is only one of many major architectural differences between I2P and Tor;\n" "perhaps it is not, by itself, enough to justify a change in terminology." msgstr "" @@ -7352,10 +6094,8 @@ msgstr "" msgid "" "Another difference\n" "from the method described by Freedman\n" -"is that the path is unidirectional - there is no \"turning point\" as " -"seen in onion routing\n" -"or mixmaster reply blocks, which greatly simplifies the algorithm and " -"allows for more flexible\n" +"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n" +"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n" "and reliable delivery." msgstr "" @@ -7389,16 +6129,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:113 msgid "" -"For publishing some network database entries (dampening the probability " -"of a successful traffic analysis attack) (ElGamal/AES)" +"For publishing some network database entries (dampening the probability of a" +" successful traffic analysis attack) (ElGamal/AES)" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:116 msgid "" -"There are also significant ways that this technique can be used to " -"improve the performance of the network, \n" -"exploiting transport latency/throughput tradeoffs, and branching data " -"through redundant paths to increase reliability." +"There are also significant ways that this technique can be used to improve the performance of the network, \n" +"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:122 @@ -7409,8 +6147,7 @@ msgstr "" msgid "" "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n" "one for outbound and one for inbound traffic.\n" -"Therefore, four tunnels are required for a single round-trip message and " -"reply." +"Therefore, four tunnels are required for a single round-trip message and reply." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:129 @@ -7430,12 +6167,10 @@ msgstr "" msgid "" "Tunnels are a general-purpose mechanism to transport all\n" "<a href=\"%(i2np)s\">I2NP messages</a>, and\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to " -"build tunnels.\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n" "We do not bundle multiple\n" "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at " -"the outbound tunnel endpoint;\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n" "the tunnel encryption is sufficient." msgstr "" @@ -7449,14 +6184,12 @@ msgid "" "At the layer above tunnels, I2P delivers end-to-end messages between\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n" "Just as within a single tunnel, we use\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption." -"\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n" "Each client message as delivered to the router through the\n" "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n" "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n" "with its own\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>,\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n" "inside a\n" "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n" "Delivery Instructions may specify a Destination, Router, or Tunnel." @@ -7479,18 +6212,13 @@ msgid "" "A\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n" "with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" -"specifying that it be sent back to the originating router as an " -"acknowledgment.\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" +"specifying that it be sent back to the originating router as an acknowledgment.\n" "This is similar to the \"reply block\" or \"reply onion\"\n" "described in the references.\n" -"It is used for determining the success or failure of end to end message " -"delivery.\n" -"The originating router may, upon failure to receive the Delivery Status " -"Message\n" -"within the expected time period, modify the routing to the far-end " -"Destination,\n" +"It is used for determining the success or failure of end to end message delivery.\n" +"The originating router may, upon failure to receive the Delivery Status Message\n" +"within the expected time period, modify the routing to the far-end Destination,\n" "or take other actions." msgstr "" @@ -7502,16 +6230,12 @@ msgid "" "containing a\n" "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n" "for the originating Destination, with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" "specifying the far-end destination's router.\n" -"By periodically bundling a LeaseSet, the router ensures that the far-end " -"will be able\n" +"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n" "to maintain communications.\n" -"Otherwise the far-end would have to query a floodfill router for the " -"network database entry,\n" -"and all LeaseSets would have to be published to the network database, as " -"explained on the\n" +"Otherwise the far-end would have to query a floodfill router for the network database entry,\n" +"and all LeaseSets would have to be published to the network database, as explained on the\n" "<a href=\"%(netdb)s\">network database page</a>." msgstr "" @@ -7521,31 +6245,24 @@ msgid "" "By default, the Delivery Status and Database Store Messages\n" "are bundled when the local LeaseSet changes, when additional\n" "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n" -"are delivered, or if the messages have not been bundled in the previous " -"minute.\n" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"are delivered, or if the messages have not been bundled in the previous minute.\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:224 msgid "" -"Obviously, the additional messages are currently bundled for specific " -"purposes,\n" +"Obviously, the additional messages are currently bundled for specific purposes,\n" "and not part of a general-purpose routing scheme." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:229 msgid "" -"As of release 0.9.12, the Delivery Status Message is wrapped in another " -"Garlic Message\n" -"by the originator so that the contents are encrypted and not visible to " -"routers on the return path." +"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n" +"by the originator so that the contents are encrypted and not visible to routers on the return path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:235 @@ -7569,35 +6286,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:252 #, python-format msgid "" -"The Garlic Message mechanism is very flexible and provides a structure " -"for\n" +"The Garlic Message mechanism is very flexible and provides a structure for\n" "implementing many types of mixnet delivery methods.\n" "Together with the unused delay option in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel" -" message Delivery Instructions</a>,\n" -"a wide spectrum of batching, delay, mixing, and routing strategies are " -"possible." +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n" +"a wide spectrum of batching, delay, mixing, and routing strategies are possible." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:260 msgid "" -"In particular, there is potential for much more flexibility at the " -"outbound tunnel endpoint.\n" +"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n" "Messages could possibly be routed from there to one of several tunnels\n" -"(thus minimizing point-to-point connections), or multicast to several " -"tunnels\n" +"(thus minimizing point-to-point connections), or multicast to several tunnels\n" "for redundancy, or streaming audio and video." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:267 msgid "" -"Such experiments may conflict with the need to ensure security and " -"anonymity, such\n" -"as limiting certain routing paths, restricting the types of I2NP messages" -" that may\n" -"be forwarded along various paths, and enforcing certain message " -"expiration times." +"Such experiments may conflict with the need to ensure security and anonymity, such\n" +"as limiting certain routing paths, restricting the types of I2NP messages that may\n" +"be forwarded along various paths, and enforcing certain message expiration times." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:273 @@ -7606,11 +6314,9 @@ msgid "" "As a part of\n" "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n" "a garlic message contains a sender\n" -"specified amount of padding data, allowing the sender to take active " -"countermeasures \n" +"specified amount of padding data, allowing the sender to take active countermeasures \n" "against traffic analysis.\n" -"This is not currently used, beyond the requirement to pad to a multiple " -"of 16 bytes." +"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:282 @@ -7627,10 +6333,8 @@ msgstr "Riferimenti" #: i2p2www/pages/site/docs/how/garlic-routing.html:292 msgid "" -"The term garlic routing was first coined in Roger Dingledine's Free Haven" -" \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"(June 2000),\n" +"The term garlic routing was first coined in Roger Dingledine's Free Haven \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n" "see Section 8.1.1 authored by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>." msgstr "" @@ -7660,8 +6364,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:313 msgid "" -"Onion routing was first described in <a href=\"http://www.onion-" -"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" +"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996." msgstr "" @@ -7671,79 +6374,51 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:4 msgid "" -"I2P is a project to build, deploy, and maintain a network supporting " -"secure and anonymous\n" -"communication. People using I2P are in control of the tradeoffs between " -"anonymity, reliability,\n" -"bandwidth usage, and latency. There is no central point in the network on" -" which pressure can be\n" -"exerted to compromise the integrity, security, or anonymity of the " -"system. The network supports\n" -"dynamic reconfiguration in response to various attacks, and has been " -"designed to make use of\n" -"additional resources as they become available. Of course, all aspects of " -"the network are open and\n" +"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n" +"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n" +"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n" +"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n" +"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n" +"additional resources as they become available. Of course, all aspects of the network are open and\n" "freely available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:14 msgid "" -"Unlike many other anonymizing networks, I2P doesn't try to provide " -"anonymity by hiding the\n" -"originator of some communication and not the recipient, or the other way " -"around. I2P is designed to\n" -"allow peers using I2P to communicate with each other anonymously — " -"both sender and recipient\n" -"are unidentifiable to each other as well as to third parties. For " -"example, today there are both\n" -"in-I2P web sites (allowing anonymous publishing / hosting) as well as " -"HTTP proxies to the normal web\n" -"(allowing anonymous web browsing). Having the ability to run servers " -"within I2P is essential, as it\n" -"is quite likely that any outbound proxies to the normal Internet will be " -"monitored, disabled, or\n" +"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n" +"originator of some communication and not the recipient, or the other way around. I2P is designed to\n" +"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n" +"are unidentifiable to each other as well as to third parties. For example, today there are both\n" +"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n" +"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n" +"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n" "even taken over to attempt more malicious attacks." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:25 #, python-format msgid "" -"The network itself is message oriented - it is essentially a secure and " -"anonymous IP layer, where\n" -"messages are addressed to cryptographic keys (Destinations) and can be " -"significantly larger than IP\n" -"packets. Some example uses of the network include \"eepsites\" " -"(webservers hosting normal web\n" -"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a " -"distributed data store. With the\n" -"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are " -"able to stream traditional\n" -"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even " -"streaming audio. Most people\n" -"will not use I2P directly, or even need to know they're using it. Instead" -" their view will be of one\n" -"of the I2P enabled applications, or perhaps as a little controller app to" -" turn on and off various\n" +"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n" +"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n" +"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n" +"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n" +"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n" +"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n" +"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n" +"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n" "proxies to enable the anonymizing functionality." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:37 #, python-format msgid "" -"An essential part of designing, developing, and testing an anonymizing " -"network is to define the <a\n" -"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing " -"as \"true\" anonymity, just\n" -"increasingly expensive costs to identify someone. Briefly, I2P's intent " -"is to allow people to\n" -"communicate in arbitrarily hostile environments by providing good " -"anonymity, mixed in with\n" -"sufficient cover traffic provided by the activity of people who require " -"less anonymity. This way,\n" -"some users can avoid detection by a very powerful adversary, while others" -" will try to evade a weaker\n" -"entity, <i>all on the same network</i>, where each one's messages are " -"essentially indistinguishable\n" +"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n" +"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n" +"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n" +"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n" +"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n" +"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n" +"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n" "from the others." msgstr "" @@ -7754,12 +6429,9 @@ msgstr "Perché?" #: i2p2www/pages/site/docs/how/intro.html:49 #, python-format msgid "" -"There are a multitude of reasons why we need a system to support " -"anonymous communication, and\n" -"everyone has their own personal rationale. There are many <a " -"href=\"%(comparisons)s\">other\n" -"efforts</a> working on finding ways to provide varying degrees of " -"anonymity to people through the\n" +"There are a multitude of reasons why we need a system to support anonymous communication, and\n" +"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n" +"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n" "Internet, but we could not find any that met our needs or threat model." msgstr "" @@ -7770,23 +6442,14 @@ msgstr "Come?" #: i2p2www/pages/site/docs/how/intro.html:58 #, python-format msgid "" -"The network at a glance is made up of a set of nodes (\"routers\") with a" -" number of unidirectional\n" -"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a " -"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is " -"identified by a cryptographic RouterIdentity which is\n" -"typically long lived. These routers communicate with each other through " -"existing transport\n" -"mechanisms (TCP, UDP, etc), passing various messages. Client applications" -" have their own\n" -"cryptographic identifier (\"Destination\") which enables it to send and " -"receive messages. These\n" -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels\n" -"that will be used for sending and receiving messages through the network." -" I2P has its own internal\n" -"<a href=\"%(netdb)s\">network database</a> (using a modification of the " -"Kademlia algorithm) for\n" +"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n" +"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n" +"typically long lived. These routers communicate with each other through existing transport\n" +"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n" +"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n" +"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n" +"that will be used for sending and receiving messages through the network. I2P has its own internal\n" +"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n" "distributing routing and contact information securely." msgstr "" @@ -7796,91 +6459,62 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:73 msgid "" -"In the above, Alice, Bob, Charlie, and Dave are all running routers with " -"a single Destination on\n" -"their local router. They each have a pair of 2-hop inbound tunnels per " -"destination (labeled 1, 2, 3,\n" -"4, 5 and 6), and a small subset of each of those router's outbound tunnel" -" pool is shown with 2-hop\n" -"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's " -"outbound tunnels are not\n" -"shown, nor are the rest of each router's outbound tunnel pool (typically " -"stocked with a few tunnels\n" -"at a time). When Alice and Bob talk to each other, Alice sends a message " -"out one of her (pink)\n" -"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3" -" or 4). She knows to send\n" -"to those tunnels on the correct router by querying the network database, " -"which is constantly updated\n" +"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n" +"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n" +"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n" +"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n" +"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n" +"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n" +"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n" +"to those tunnels on the correct router by querying the network database, which is constantly updated\n" "as new leases are authorized and old ones expire." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:85 #, python-format msgid "" -"If Bob wants to reply to Alice, he simply goes through the same process -" -" send a message out one of\n" -"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 " -"or 2). To make things\n" -"easier, most messages sent between Alice and Bob are <a " -"href=\"%(garlicrouting)s\">garlic</a>\n" -"wrapped, bundling the sender's own current lease information so that the " -"recipient can reply\n" -"immediately without having to look in the network database for the " -"current data." +"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n" +"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n" +"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n" +"wrapped, bundling the sender's own current lease information so that the recipient can reply\n" +"immediately without having to look in the network database for the current data." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:93 #, python-format msgid "" -"To deal with a wide range of attacks, I2P is fully distributed with no " -"centralized resources - and\n" -"hence there are no directory servers keeping statistics regarding the " -"performance and reliability of\n" -"routers within the network. As such, each router must keep and maintain " -"profiles of various routers\n" -"and is responsible for selecting appropriate peers to meet the anonymity," -" performance, and\n" -"reliability needs of the users, as described in the <a " -"href=\"%(peerselection)s\">peer selection</a>\n" +"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n" +"hence there are no directory servers keeping statistics regarding the performance and reliability of\n" +"routers within the network. As such, each router must keep and maintain profiles of various routers\n" +"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n" +"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n" "page." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:102 #, python-format msgid "" -"The network itself makes use of a significant number of <a " -"href=\"%(cryptography)s\">cryptographic\n" -"techniques and algorithms</a> - a full laundry list includes 2048bit " -"ElGamal encryption, 256bit AES\n" -"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, " -"2048bit Diffie-Hellman\n" -"negotiated connections with station to station authentication, and <a " -"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." +"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n" +"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n" +"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n" +"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:110 msgid "" -"Content sent over I2P is encrypted through three layers garlic encryption" -" (used to verify the\n" -"delivery of the message to the recipient), tunnel encryption (all " -"messages passing through a tunnel\n" -"is encrypted by the tunnel gateway to the tunnel endpoint), and inter " -"router transport layer\n" +"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n" +"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n" +"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n" "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:117 msgid "" "End-to-end (I2CP) encryption (client application to\n" -"server application) was disabled in I2P release 0.6; end-to-end (garlic) " -"encryption (I2P client router\n" -"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" " -"remains. Notice the different use of\n" -"terms! All data from a to h is end-to-end encrypted, but the I2CP " -"connection between the I2P router and\n" -"the applications is not end-to-end encrypted! A and h are the routers of " -"Alice and Bob, while Alice and\n" +"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n" +"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n" +"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n" +"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n" "Bob in following chart are the applications running atop of I2P." msgstr "" @@ -7897,32 +6531,22 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:132 msgid "" -"The two main mechanisms for allowing people who need strong anonymity to " -"use the network are\n" -"explicitly delayed garlic routed messages and more comprehensive tunnels " -"to include support for\n" -"pooling and mixing messages. These are currently planned for release 3.0," -" but garlic routed messages\n" -"with no delays and FIFO tunnels are currently in place. Additionally, the" -" 2.0 release will allow\n" -"people to set up and operate behind restricted routes (perhaps with " -"trusted peers), as well as the\n" +"The two main mechanisms for allowing people who need strong anonymity to use the network are\n" +"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n" +"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n" +"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n" +"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n" "deployment of more flexible and anonymous transports." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:141 #, python-format msgid "" -"Some questions have been raised with regards to the scalability of I2P, " -"and reasonably so. There\n" -"will certainly be more analysis over time, but peer lookup and " -"integration should be bounded by\n" -"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network " -"database</a>'s algorithm, while end\n" -"to end messages should be <code>O(1)</code> (scale free), since messages " -"go out K hops through the\n" -"outbound tunnel and another K hops through the inbound tunnel, with K no " -"longer than 3. The size of\n" +"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n" +"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n" +"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n" +"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n" +"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n" "the network (N) bears no impact." msgstr "" @@ -7934,13 +6558,10 @@ msgstr "Quando?" #, python-format msgid "" "I2P initially began in Feb 2003 as a proposed modification to <a\n" -"href=\"http://freenetproject.org\">Freenet</a> to allow it to use " -"alternate transports, such as <a\n" +"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n" "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n" -"'anonCommFramework' in April 2003, turning into I2P in July, with code " -"being written in earnest\n" -"starting in August '03. I2P is currently under development, following the" -" <a href=\"%(roadmap)s\">roadmap</a>." +"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n" +"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:161 @@ -7950,22 +6571,14 @@ msgstr "Chi?" #: i2p2www/pages/site/docs/how/intro.html:162 #, python-format msgid "" -"We have a small <a href=\"%(team)s\">team</a> spread around several " -"continents, working to advance\n" -"different aspects of the project. We are very open to other developers " -"who want to get involved and\n" -"anyone else who would like to contribute in other ways, such as " -"critiques, peer review, testing,\n" -"writing I2P enabled applications, or documentation. The entire system is " -"open source - the router\n" -"and most of the SDK are outright public domain with some BSD and Cryptix " -"licensed code, while some\n" -"applications like I2PTunnel and I2PSnark are GPL. Almost everything is " -"written in Java (1.5+),\n" -"though some third party applications are being written in Python and " -"other languages. The code works\n" -"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual" -" Machines." +"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n" +"different aspects of the project. We are very open to other developers who want to get involved and\n" +"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n" +"writing I2P enabled applications, or documentation. The entire system is open source - the router\n" +"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n" +"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n" +"though some third party applications are being written in Python and other languages. The code works\n" +"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:173 @@ -7975,12 +6588,9 @@ msgstr "Dove?" #: i2p2www/pages/site/docs/how/intro.html:174 #, python-format msgid "" -"Anyone interested should join us on the IRC channel #i2p-dev (hosted " -"concurrently on irc.freenode.net,\n" -"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are" -" currently no\n" -"scheduled development meetings, however <a href=\"%(meetings)s\">archives" -" are available</a>." +"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n" +"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n" +"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:180 @@ -8004,39 +6614,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:8 msgid "" "I2P's netDb is a specialized distributed database, containing \n" -"just two types of data - router contact information (<b>RouterInfos</b>) " -"and destination contact\n" -"information (<b>LeaseSets</b>). Each piece of data is signed by the " -"appropriate party and verified\n" -"by anyone who uses or stores it. In addition, the data has liveliness " -"information\n" -"within it, allowing irrelevant entries to be dropped, newer entries to " -"replace\n" +"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n" +"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n" +"by anyone who uses or stores it. In addition, the data has liveliness information\n" +"within it, allowing irrelevant entries to be dropped, newer entries to replace\n" "older ones, and protection against certain classes of attack." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:17 msgid "" "The netDb is distributed with a simple technique called \"floodfill\",\n" -"where a subset of all routers, called \"floodfill routers\", maintains " -"the distributed database." +"where a subset of all routers, called \"floodfill routers\", maintains the distributed database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:25 msgid "" -"When an I2P router wants to contact another router, they need to know " -"some \n" -"key pieces of data - all of which are bundled up and signed by the router" -" into\n" -"a structure called the \"RouterInfo\", which is distributed with the " -"SHA256 of the router's identity\n" +"When an I2P router wants to contact another router, they need to know some \n" +"key pieces of data - all of which are bundled up and signed by the router into\n" +"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n" "as the key. The structure itself contains:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:32 msgid "" -"The router's identity (an encryption key, a signing key, and a " -"certificate)" +"The router's identity (an encryption key, a signing key, and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:33 @@ -8067,8 +6668,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:47 msgid "" -"Capabilities flags - used to indicate floodfill participation, " -"approximate bandwidth, and perceived reachability" +"Capabilities flags - used to indicate floodfill participation, approximate " +"bandwidth, and perceived reachability" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:49 @@ -8127,23 +6728,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:76 msgid "" -"Always sent as 90m, for compatibility with an older scheme where routers " -"published their actual uptime,\n" +"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n" "and only sent tunnel requests to peers whose uptime was more than 60m" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:82 msgid "" "These values are used by other routers for basic decisions.\n" -"Should we connect to this router? Should we attempt to route a tunnel " -"through this router?\n" -"The bandwidth capability flag, in particular, is used only to determine " -"whether\n" +"Should we connect to this router? Should we attempt to route a tunnel through this router?\n" +"The bandwidth capability flag, in particular, is used only to determine whether\n" "the router meets a minimum threshold for routing tunnels.\n" -"Above the minimum threshold, the advertised bandwidth is not used or " -"trusted anywhere\n" -"in the router, except for display in the user interface and for debugging" -" and network analysis." +"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n" +"in the router, except for display in the user interface and for debugging and network analysis." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:102 @@ -8154,13 +6750,11 @@ msgstr "Opzioni Aggiuntive" #, python-format msgid "" "Additional text options include\n" -"a small number of statistics about the router's health, which are " -"aggregated by\n" +"a small number of statistics about the router's health, which are aggregated by\n" "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n" "for network performance analysis and debugging.\n" "These statistics were chosen to provide data crucial to the developers,\n" -"such as tunnel build success rates, while balancing the need for such " -"data\n" +"such as tunnel build success rates, while balancing the need for such data\n" "with the side-effects that could result from revealing this data.\n" "Current statistics are limited to:" msgstr "" @@ -8175,18 +6769,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:119 msgid "" -"Floodfill routers publish additional data on the number of entries in " -"their network database." +"Floodfill routers publish additional data on the number of entries in their " +"network database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:123 msgid "" "The data published can be seen in the router's user interface,\n" "but is not used or trusted within the router.\n" -"As the network has matured, we have gradually removed most of the " -"published\n" -"statistics to improve anonymity, and we plan to remove more in future " -"releases." +"As the network has matured, we have gradually removed most of the published\n" +"statistics to improve anonymity, and we plan to remove more in future releases." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:130 @@ -8195,8 +6787,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:132 msgid "" -"As of release 0.9.24, routers may declare that they are part of a " -"\"family\", operated by the same entity.\n" +"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n" "Multiple routers in the same family will not be used in a single tunnel." msgstr "" @@ -8215,16 +6806,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:159 msgid "" "RouterInfos have no set expiration time.\n" -"Each router is free to maintain its own local policy to trade off the " -"frequency of RouterInfo lookups\n" +"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n" "with memory or disk usage.\n" "In the current implementation, there are the following general policies:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:166 msgid "" -"There is no expiration during the first hour of uptime, as the persistent" -" stored data may be old." +"There is no expiration during the first hour of uptime, as the persistent " +"stored data may be old." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:169 @@ -8233,25 +6823,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:172 msgid "" -"As the number of local RouterInfos grows, the expiration time shrinks, in" -" an attempt to maintain\n" -"a reasonable number RouterInfos. The expiration time with less than 120 " -"routers is 72 hours,\n" +"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n" +"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n" "while expiration time with 300 routers is around 30 hours." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:177 #, python-format msgid "" -"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in " -"about an hour, as\n" +"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n" "the introducer list expires in about that time." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:181 msgid "" -"Floodfills use a short expiration time (1 hour) for all local " -"RouterInfos, as valid RouterInfos will\n" +"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n" "be frequently republished to them." msgstr "" @@ -8267,8 +6853,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:192 msgid "" -"It may be desirable to persistently store Meta LeaseSets with long " -"expirations.\n" +"It may be desirable to persistently store Meta LeaseSets with long expirations.\n" "This is implementation-dependent." msgstr "" @@ -8282,10 +6867,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:212 msgid "" -"The second piece of data distributed in the netDb is a \"LeaseSet\" - " -"documenting\n" -"a group of <b>tunnel entry points (leases)</b> for a particular client " -"destination.\n" +"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n" +"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n" "Each of these leases specify the following information:" msgstr "" @@ -8311,8 +6894,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:454 msgid "" "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n" -"The SHA256 of the type byte (3) followed by the blinded public key is " -"used for the DHT key,\n" +"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n" "and then rotated as usual." msgstr "" @@ -8326,14 +6908,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:239 msgid "" -"The destination itself (an encryption key, a signing key and a " -"certificate)" +"The destination itself (an encryption key, a signing key and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:240 msgid "" -"Additional encryption public key: used for end-to-end encryption of " -"garlic messages" +"Additional encryption public key: used for end-to-end encryption of garlic " +"messages" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:241 @@ -8344,8 +6925,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:242 msgid "" -"Signature of all the LeaseSet data, to make sure the Destination " -"published the LeaseSet." +"Signature of all the LeaseSet data, to make sure the Destination published " +"the LeaseSet." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:246 @@ -8376,13 +6957,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:263 msgid "" -"A LeaseSet for a destination used only for outgoing connections is " -"<i>unpublished</i>.\n" +"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n" "It is never sent for publication to a floodfill router.\n" -"\"Client\" tunnels, such as those for web browsing and IRC clients, are " -"unpublished.\n" -"Servers will still be able to send messages back to those unpublished " -"destinations,\n" +"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n" +"Servers will still be able to send messages back to those unpublished destinations,\n" "because of <a href=\"#lsp\">I2NP storage messages</a>." msgstr "" @@ -8392,24 +6970,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:274 msgid "" -"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero " -"leases.\n" -"Revocations must be signed by the additional signing key in the LeaseSet." -"\n" -"Revocations are not fully implemented, and it is unclear if they have any" -" practical use.\n" -"This is the only planned use for that signing key, so it is currently " -"unused." +"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n" +"Revocations must be signed by the additional signing key in the LeaseSet.\n" +"Revocations are not fully implemented, and it is unclear if they have any practical use.\n" +"This is the only planned use for that signing key, so it is currently unused." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:283 msgid "" "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n" -"This structure is very similar to the old LeaseSet structure, and serves " -"the same purpose.\n" +"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n" "The new structure provides the flexibility required to support new\n" -"encryption types, multiple encryption types, options, offline signing " -"keys,\n" +"encryption types, multiple encryption types, options, offline signing keys,\n" "and other features.\n" "See proposal 123 for details." msgstr "" @@ -8418,15 +6990,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:715 msgid "" "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n" -"This structure provides a tree-like structure in the DHT, to refer to " -"other LeaseSets.\n" -"Using Meta LeaseSets, a site may implement large multihomed services, " -"where several\n" +"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n" +"Using Meta LeaseSets, a site may implement large multihomed services, where several\n" "different Destinations are used to provide a common service.\n" "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n" "and may have long expirations, up to 18.2 hours.\n" -"Using this facility, it should be possible to run hundreds or thousands " -"of Destinations hosting a common service.\n" +"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n" "See proposal 123 for details." msgstr "" @@ -8444,29 +7013,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:313 msgid "" -"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate" -" key.\n" -"The leases may only be decoded, and thus the destination may only be " -"contacted,\n" +"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n" +"The leases may only be decoded, and thus the destination may only be contacted,\n" "by those with the key.\n" -"There is no flag or other direct indication that the LeaseSet is " -"encrypted.\n" -"Encrypted LeaseSets are not widely used, and it is a topic for future " -"work to\n" -"research whether the user interface and implementation of encrypted " -"LeaseSets could be improved." +"There is no flag or other direct indication that the LeaseSet is encrypted.\n" +"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n" +"research whether the user interface and implementation of encrypted LeaseSets could be improved." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:324 msgid "" -"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet " -"structure.\n" -"The Destination is hidden, and only a blinded public key and an " -"expiration\n" +"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n" +"The Destination is hidden, and only a blinded public key and an expiration\n" "are visible to the floodfill.\n" "Only those that have the full Destination may decrypt the structure.\n" -"The structure is stored at a DHT location based on the hash of the " -"blinded public key,\n" +"The structure is stored at a DHT location based on the hash of the blinded public key,\n" "not the hash of the Destination.\n" "See proposal 123 for details." msgstr "" @@ -8477,12 +7038,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:336 msgid "" -"For regular LeaseSets, the expiration is the time of the latest " -"expiration of its leases.\n" -"For the new LeaseSet2 data structures, the expiration is specified in the" -" header.\n" -"For LeaseSet2, the expiration should match the latest expiration of its " -"leases.\n" +"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n" +"For the new LeaseSet2 data structures, the expiration is specified in the header.\n" +"For LeaseSet2, the expiration should match the latest expiration of its leases.\n" "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n" "and maximum expiration may be enforced, to be determined." msgstr "" @@ -8493,8 +7051,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:346 msgid "" -"No persistent storage of LeaseSet data is required, since they expire so " -"quickly.\n" +"No persistent storage of LeaseSet data is required, since they expire so quickly.\n" "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n" "with long expirations may be advisable." msgstr "" @@ -8520,42 +7077,30 @@ msgstr "" msgid "" "The netDb is decentralized, however you do need at\n" "least one reference to a peer so that the integration process\n" -"ties you in. This is accomplished by \"reseeding\" your router with the " -"RouterInfo\n" -"of an active peer - specifically, by retrieving their " -"<code>routerInfo-$hash.dat</code>\n" -"file and storing it in your <code>netDb/</code> directory. Anyone can " -"provide\n" -"you with those files - you can even provide them to others by exposing " -"your own\n" +"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n" +"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n" +"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n" +"you with those files - you can even provide them to others by exposing your own\n" "netDb directory. To simplify the process,\n" -"volunteers publish their netDb directories (or a subset) on the regular " -"(non-i2p) network,\n" +"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n" "and the URLs of these directories are hardcoded in I2P.\n" -"When the router starts up for the first time, it automatically fetches " -"from\n" +"When the router starts up for the first time, it automatically fetches from\n" "one of these URLs, selected at random." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:379 msgid "" -"The floodfill netDb is a simple distributed storage mechanism. The " -"storage\n" -"algorithm is simple: send the data to the closest peer that has " -"advertised\n" -"itself as a floodfill router. When the peer in the floodfill netDb " -"receives a\n" -"netDb store from a peer not in the floodfill netDb, they send it to a " -"subset of\n" -"the floodfill netDb-peers. The peers selected are the ones closest " -"(according\n" +"The floodfill netDb is a simple distributed storage mechanism. The storage\n" +"algorithm is simple: send the data to the closest peer that has advertised\n" +"itself as a floodfill router. When the peer in the floodfill netDb receives a\n" +"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n" +"the floodfill netDb-peers. The peers selected are the ones closest (according\n" "to the <a href=\"#kad\">XOR-metric</a>) to a specific key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:388 msgid "" -"Determining who is part of the floodfill netDb is trivial - it is exposed" -" in each \n" +"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n" "router's published routerInfo as a capability." msgstr "" @@ -8585,15 +7130,13 @@ msgid "" "Routers with high bandwidth limits (which must be manually configured,\n" "as the default is much lower) are presumed to be on lower-latency\n" "connections, and are more likely to be available 24/7.\n" -"The current minimum share bandwidth for a floodfill router is 128 " -"KBytes/sec." +"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:419 msgid "" "In addition, a router must pass several additional tests for health\n" -"(outbound message queue time, job lag, etc.) before floodfill operation " -"is\n" +"(outbound message queue time, job lag, etc.) before floodfill operation is\n" "automatically enabled." msgstr "" @@ -8620,13 +7163,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:441 msgid "" -"A floodfill router's only services that are in addition to those of non-" -"floodfill routers\n" +"A floodfill router's only services that are in addition to those of non-floodfill routers\n" "are in accepting netDb stores and responding to netDb queries.\n" -"Since they are generally high-bandwidth, they are more likely to " -"participate in a high number of tunnels\n" -"(i.e. be a \"relay\" for others), but this is not directly related to " -"their distributed database services." +"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n" +"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:449 @@ -8635,33 +7175,24 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:450 msgid "" -"The netDb uses a simple Kademlia-style XOR metric to determine closeness." -"\n" -"To create a Kademlia key, the SHA256 hash of the RouterIdentity or " -"Destination is computed." +"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n" +"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:459 msgid "" -"A modification to this algorithm is done to increase the costs of <a href" -"=\"#sybil-partial\">Sybil attacks</a>.\n" -"Instead of the SHA256 hash of the key being looked up of stored, the " -"SHA256 hash is taken\n" -"of the 32-byte binary search key appended with the UTC date represented " -"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" -"This is called the \"routing key\", and it changes every day at midnight " -"UTC.\n" -"Only the search key is modified in this way, not the floodfill router " -"hashes.\n" -"The daily transformation of the DHT is sometimes called \"keyspace " -"rotation\",\n" +"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n" +"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n" +"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" +"This is called the \"routing key\", and it changes every day at midnight UTC.\n" +"Only the search key is modified in this way, not the floodfill router hashes.\n" +"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n" "although it isn't strictly a rotation." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:469 msgid "" -"Routing keys are never sent on-the-wire in any I2NP message, they are " -"only used locally for\n" +"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n" "determination of distance." msgstr "" @@ -8676,8 +7207,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:479 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"RouterInfo are exchanged with peers\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n" "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n" "or <a href=\"%(ssu)s\">SSU</a> transport connection." msgstr "" @@ -8689,46 +7219,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:487 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"LeaseSet are periodically exchanged with peers\n" -"by bundling them in a garlic message along with normal traffic from the " -"related Destination.\n" -"This allows an initial response, and later responses, to be sent to an " -"appropriate Lease,\n" -"without requiring any LeaseSet lookups, or requiring the communicating " -"Destinations to have published LeaseSets at all." +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n" +"by bundling them in a garlic message along with normal traffic from the related Destination.\n" +"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n" +"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:495 msgid "" "The DatabaseStoreMessage should be sent to the floodfill that is closest\n" "to the current routing key for the RouterInfo or LeaseSet being stored.\n" -"Currently, the closest floodfill is found by a search in the local " -"database.\n" -"Even if that floodfill is not actually closest, it will flood it " -"\"closer\" by\n" +"Currently, the closest floodfill is found by a search in the local database.\n" +"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n" "sending it to multiple other floodfills.\n" "This provides a high degree of fault-tolerance." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:504 msgid "" -"In traditional Kademlia, a peer would do a \"find-closest\" search before" -" inserting\n" -"an item in the DHT to the closest target. As the verify operation will " -"tend to\n" -"discover closer floodfills if they are present, a router will quickly " -"improve\n" -"its knowledge of the DHT \"neighborhood\" for the RouterInfo and " -"LeaseSets it regularly publishes.\n" -"While I2NP does not define a \"find-closest\" message, if it becomes " -"necessary,\n" -"a router may simply do an iterative search for a key with the least " -"significant bit flipped\n" -"(i.e. key ^ 0x01) until no closer peers are received in the " -"DatabaseSearchReplyMessages.\n" -"This ensures that the true closest peer will be found even if a more-" -"distant peer had\n" +"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n" +"an item in the DHT to the closest target. As the verify operation will tend to\n" +"discover closer floodfills if they are present, a router will quickly improve\n" +"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n" +"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n" +"a router may simply do an iterative search for a key with the least significant bit flipped\n" +"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n" +"This ensures that the true closest peer will be found even if a more-distant peer had\n" "the netdb item." msgstr "" @@ -8739,11 +7255,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:518 #, python-format msgid "" -"A router publishes its own RouterInfo by directly connecting to a " -"floodfill router\n" +"A router publishes its own RouterInfo by directly connecting to a floodfill router\n" "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token. The message is not end-to-end garlic " -"encrypted,\n" +"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n" "as this is a direct connection, so there are no intervening routers\n" "(and no need to hide this data anyway).\n" "The floodfill router replies with a\n" @@ -8757,8 +7271,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:533 msgid "" -"Storage of LeaseSets is much more sensitive than for RouterInfos, as a " -"router\n" +"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n" "must take care that the LeaseSet cannot be associated with the router." msgstr "" @@ -8767,10 +7280,8 @@ msgstr "" msgid "" "A router publishes a local LeaseSet by\n" "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token over an outbound client tunnel for that " -"Destination.\n" -"The message is end-to-end garlic encrypted using the Destination's " -"Session Key Manager,\n" +"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n" +"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n" "to hide the message from the tunnel's outbound endpoint.\n" "The floodfill router replies with a\n" "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n" @@ -8786,17 +7297,12 @@ msgstr "Flooding" #, python-format msgid "" "After a floodfill router receives a DatabaseStoreMessage containing a\n" -"valid RouterInfo or LeaseSet which is newer than that previously stored " -"in its\n" +"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n" "local NetDb, it \"floods\" it.\n" -"To flood a NetDb entry, it looks up several (currently %(floodsize)s) " -"floodfill routers closest to the routing key\n" -"of the NetDb entry. (The routing key is the SHA256 Hash of the " -"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" -"By flooding to those closest to the key, not closest to itself, the " -"floodfill ensures that the storage\n" -"gets to the right place, even if the storing router did not have good " -"knowledge of the\n" +"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n" +"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" +"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n" +"gets to the right place, even if the storing router did not have good knowledge of the\n" "DHT \"neighborhood\" for the routing key." msgstr "" @@ -8818,17 +7324,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:574 #, python-format msgid "" -"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to " -"request a netdb entry from a floodfill router.\n" +"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n" "Lookups are sent out one of the router's outbound exploratory tunnels.\n" -"The replies are specified to return via one of the router's inbound " -"exploratory tunnels." +"The replies are specified to return via one of the router's inbound exploratory tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:580 msgid "" -"Lookups are generally sent to the two \"good\" (the connection doesn't " -"fail) floodfill routers closest to the requested key, in parallel." +"Lookups are generally sent to the two \"good\" (the connection doesn't fail)" +" floodfill routers closest to the requested key, in parallel." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:584 @@ -8836,8 +7340,7 @@ msgstr "" msgid "" "If the key is found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n" -"If the key is not found locally by the floodfill router, it responds with" -" a\n" +"If the key is not found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "containing a list of other floodfill routers close to the key." msgstr "" @@ -8845,22 +7348,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:592 msgid "" "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n" -"RouterInfo lookups are not encrypted and thus are vulnerable to snooping " -"by the outbound endpoint\n" -"(OBEP) of the client tunnel. This is due to the expense of the ElGamal " -"encryption.\n" +"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n" +"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n" "RouterInfo lookup encryption may be enabled in a future release." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:599 msgid "" -"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage" -" or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted by including the session key and tag in the lookup.\n" -"This hides the reply from the inbound gateway (IBGW) of the reply tunnel." -"\n" -"Responses to RouterInfo lookups will be encrypted if we enable the lookup" -" encryption." +"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n" +"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:606 @@ -8874,41 +7372,31 @@ msgstr "" msgid "" "Due to the relatively small size of the network and flooding redundancy,\n" "lookups are usually O(1) rather than O(log n).\n" -"A router is highly likely to know a floodfill router close enough to the " -"key to get the answer on the first try.\n" +"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n" "In releases prior to 0.8.9, routers used a lookup redundancy of two\n" -"(that is, two lookups were performed in parallel to different peers), and" -"\n" -"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was " -"implemented.\n" +"(that is, two lookups were performed in parallel to different peers), and\n" +"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n" "Queries were sent through <i>multiple routes simultaneously</i>\n" "to <i>reduce the chance of query failure</i>." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:621 msgid "" -"As of release 0.8.9, <i>iterative lookups</i> are implemented with no " -"lookup redundancy.\n" +"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n" "This is a more efficient and reliable lookup that will work much better\n" "when not all floodfill peers are known, and it removes a serious\n" -"limitation to network growth. As the network grows and each router knows " -"only a small\n" +"limitation to network growth. As the network grows and each router knows only a small\n" "subset of the floodfill peers, lookups will become O(log n).\n" -"Even if the peer does not return references closer to the key, the lookup" -" continues with\n" -"the next-closest peer, for added robustness, and to prevent a malicious " -"floodfill from\n" -"black-holing a part of the key space. Lookups continue until a total " -"lookup timeout is reached,\n" +"Even if the peer does not return references closer to the key, the lookup continues with\n" +"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n" +"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n" "or the maximum number of peers is queried." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:633 msgid "" -"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash " -"directly as both the node ID and the Kademlia key.\n" -"Incorrect responses that are not closer to the search key are generally " -"ignored.\n" +"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n" +"Incorrect responses that are not closer to the search key are generally ignored.\n" "Given the current size of the network, a router has\n" "<i>detailed knowledge of the neighborhood of the destination ID space</i>." msgstr "" @@ -8920,8 +7408,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:643 #, python-format msgid "" -"Note: RouterInfo verification is disabled as of release 0.9.7.1 to " -"prevent\n" +"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n" "the attack described in the paper\n" "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n" "It is not clear if verification can be redesigned to be done safely." @@ -8929,13 +7416,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:650 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" "Lookups sent out one of the router's outbound exploratory tunnels.\n" -"Lookups are end-to-end garlic encrypted to prevent snooping by the " -"outbound endpoint(OBEP)." +"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:658 @@ -8944,22 +7429,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:659 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" -"Lookups sent out one of the outbound client tunnels for the destination " -"of the LeaseSet being verified.\n" +"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n" "To prevent snooping by the OBEP of the outbound tunnel,\n" "lookups are end-to-end garlic encrypted.\n" -"The replies are specified to return via one of the client's inbound " -"tunnels." +"The replies are specified to return via one of the client's inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:669 msgid "" -"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a " -"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted,\n" "to hide the reply from the inbound gateway (IBGW) of the reply tunnel." msgstr "" @@ -8971,23 +7452,16 @@ msgstr "Esplorazione" #: i2p2www/pages/site/docs/how/network-database.html:678 #, python-format msgid "" -"<i>Exploration</i> is a special form of netdb lookup, where a router " -"attempts to learn about\n" +"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n" "new routers.\n" -"It does this by sending a floodfill router a <a " -"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random " -"key.\n" +"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n" "As this lookup will fail, the floodfill would normally respond with a\n" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing " -"hashes of floodfill routers close to the key.\n" -"This would not be helpful, as the requesting router probably already " -"knows those floodfills,\n" -"and it would be impractical to add all floodfill routers to the \"don't " -"include\" field of the DatabaseLookup Message.\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n" +"This would not be helpful, as the requesting router probably already knows those floodfills,\n" +"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n" "For an exploration query, the requesting router sets a special flag in\n" "the DatabaseLookup Message.\n" -"The floodfill will then respond only with non-floodfill routers close to " -"the requested key." +"The floodfill will then respond only with non-floodfill routers close to the requested key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:692 @@ -8996,14 +7470,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:693 msgid "" -"The response to a lookup request is either a Database Store Message (on " -"success) or a\n" -"Database Search Reply Message (on failure). The DSRM contains a 'from' " -"router hash field\n" +"The response to a lookup request is either a Database Store Message (on success) or a\n" +"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n" "to indicate the source of the reply; the DSM does not.\n" "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n" -"There are no other response tags. Therefore, when making multiple " -"requests in parallel, it is\n" +"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n" "difficult to monitor the performance of the various floodfill routers." msgstr "" @@ -9013,19 +7484,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:705 msgid "" -"Destinations may be hosted on multiple routers simultaneously, by using " -"the same\n" +"Destinations may be hosted on multiple routers simultaneously, by using the same\n" "private and public keys (traditionally stored in eepPriv.dat files).\n" -"As both instances will periodically publish their signed LeaseSets to the" -" floodfill peers,\n" -"the most recently published LeaseSet will be returned to a peer " -"requesting a database lookup.\n" -"As LeaseSets have (at most) a 10 minute lifetime, should a particular " -"instance go down,\n" -"the outage will be 10 minutes at most, and generally much less than that." -"\n" -"The multihoming function has been verified and is in use by several " -"services on the network." +"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n" +"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n" +"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n" +"the outage will be 10 minutes at most, and generally much less than that.\n" +"The multihoming function has been verified and is in use by several services on the network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:727 @@ -9055,8 +7520,7 @@ msgstr "" #, python-format msgid "" "There are currently around %(ffcount)s floodfill routers in the network.\n" -"Most of the following attacks will become more difficult, or have less " -"impact,\n" +"Most of the following attacks will become more difficult, or have less impact,\n" "as the network size and number of floodfill routers increase." msgstr "" @@ -9067,8 +7531,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:748 #, python-format msgid "" -"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill" -" routers closest to the key." +"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill " +"routers closest to the key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:753 @@ -9089,8 +7553,7 @@ msgstr "" #, python-format msgid "" "Each router maintains an expanded set of statistics in the\n" -"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router," -"\n" +"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n" "covering various quality metrics for that peer.\n" "The set includes:" msgstr "" @@ -9121,14 +7584,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:775 msgid "" -"Each time a router needs to make a determination on which floodfill " -"router is closest to a key,\n" +"Each time a router needs to make a determination on which floodfill router is closest to a key,\n" "it uses these metrics to determine which floodfill routers are \"good\".\n" -"The methods, and thresholds, used to determine \"goodness\" are " -"relatively new, and\n" +"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n" "are subject to further analysis and improvement.\n" -"While a completely unresponsive router will quickly be identified and " -"avoided,\n" +"While a completely unresponsive router will quickly be identified and avoided,\n" "routers that are only sometimes malicious may be much harder to deal with." msgstr "" @@ -9140,8 +7600,7 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a large number of floodfill routers spread throughout the " -"keyspace." +"by creating a large number of floodfill routers spread throughout the keyspace." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:791 @@ -9149,35 +7608,29 @@ msgstr "" msgid "" "(In a related example, a researcher recently created a\n" "<a href=\"%(url)s\">large number of Tor relays</a>.)\n" -"If successful, this could be an effective DOS attack on the entire " -"network." +"If successful, this could be an effective DOS attack on the entire network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:797 msgid "" -"If the floodfills are not sufficiently misbehaving to be marked as " -"\"bad\" using the peer profile\n" +"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n" "metrics described above, this is a difficult scenario to handle.\n" -"Tor's response can be much more nimble in the relay case, as the " -"suspicious relays\n" +"Tor's response can be much more nimble in the relay case, as the suspicious relays\n" "can be manually removed from the consensus.\n" -"Some possible responses for the I2P network are listed below, however " -"none of them is completely satisfactory:" +"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:805 msgid "" -"Compile a list of bad router hashes or IPs, and announce the list through" -" various means\n" -"(console news, website, forum, etc.); users would have to manually " -"download the list and\n" +"Compile a list of bad router hashes or IPs, and announce the list through various means\n" +"(console news, website, forum, etc.); users would have to manually download the list and\n" "add it to their local \"blacklist\"." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:810 msgid "" -"Ask everyone in the network to enable floodfill manually (fight Sybil " -"with more Sybil)" +"Ask everyone in the network to enable floodfill manually (fight Sybil with " +"more Sybil)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:811 @@ -9186,8 +7639,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:812 msgid "" -"Release a new software version that improves the peer profile metrics and" -" thresholds,\n" +"Release a new software version that improves the peer profile metrics and thresholds,\n" "in an attempt to automatically identify the \"bad\" peers." msgstr "" @@ -9199,12 +7651,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:817 msgid "" -"Implement an automatic subscription-based blacklist controlled by a " -"single individual or group.\n" -"This would essentially implement a portion of the Tor \"consensus\" " -"model.\n" -"Unfortunately it would also give a single individual or group the power " -"to\n" +"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n" +"This would essentially implement a portion of the Tor \"consensus\" model.\n" +"Unfortunately it would also give a single individual or group the power to\n" "block participation of any particular router or IP in the network,\n" "or even to completely shutdown or destroy the entire network." msgstr "" @@ -9221,25 +7670,19 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a small number (8-15) of floodfill routers clustered closely " -"in the keyspace,\n" +"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n" "and distribute the RouterInfos for these routers widely.\n" -"Then, all lookups and stores for a key in that keyspace would be directed" -"\n" +"Then, all lookups and stores for a key in that keyspace would be directed\n" "to one of the attacker's routers.\n" -"If successful, this could be an effective DOS attack on a particular " -"eepsite, for example." +"If successful, this could be an effective DOS attack on a particular I2P Site, for example." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:842 msgid "" -"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key," -"\n" -"an attacker must use a brute-force method to repeatedly generate router " -"hashes\n" +"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n" +"an attacker must use a brute-force method to repeatedly generate router hashes\n" "until he has enough that are sufficiently close to the key.\n" -"The amount of computational power required for this, which is dependent " -"on network\n" +"The amount of computational power required for this, which is dependent on network\n" "size, is unknown." msgstr "" @@ -9247,14 +7690,10 @@ msgstr "" msgid "" "As a partial defense against this attack,\n" "the algorithm used to determine Kademlia \"closeness\" varies over time.\n" -"Rather than using the Hash of the key (i.e. H(k)) to determine closeness," -"\n" -"we use the Hash of the key appended with the current date string, i.e. " -"H(k + YYYYMMDD).\n" -"A function called the \"routing key generator\" does this, which " -"transforms the original key into a \"routing key\".\n" -"In other words, the entire netdb keyspace \"rotates\" every day at UTC " -"midnight.\n" +"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n" +"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n" +"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n" +"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n" "Any partial-keyspace attack would have to be regenerated every day, for\n" "after the rotation, the attacking routers would no longer be close\n" "to the target key, or to each other." @@ -9263,8 +7702,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:862 msgid "" "This attack becomes more difficult as the network size grows.\n" -"However, recent research demonstrates that the keyspace rotation is not " -"particularly effective.\n" +"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n" "An attacker can precompute numerous router hashes in advance,\n" "and only a few routers are sufficient to \"eclipse\" a portion\n" "of the keyspace within a half hour after rotation." @@ -9272,11 +7710,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:870 msgid "" -"One consequence of daily keyspace rotation is that the distributed " -"network database\n" +"One consequence of daily keyspace rotation is that the distributed network database\n" "may become unreliable for a few minutes after the rotation --\n" -"lookups will fail because the new \"closest\" router has not received a " -"store yet.\n" +"lookups will fail because the new \"closest\" router has not received a store yet.\n" "The extent of the issue, and methods for mitigation\n" "(for example netdb \"handoffs\" at midnight)\n" "are a topic for further study." @@ -9339,24 +7775,19 @@ msgstr "" #, python-format msgid "" "See also <a href=\"#lookup\">lookup</a>\n" -"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections " -"2.2-2.3 for terms below in italics)" +"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:926 msgid "" -"Similar to a bootstrap attack, an attacker using a floodfill router could" -" attempt to \"steer\"\n" -"peers to a subset of routers controlled by him by returning their " -"references." +"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n" +"peers to a subset of routers controlled by him by returning their references." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:931 msgid "" -"This is unlikely to work via exploration, because exploration is a low-" -"frequency task.\n" -"Routers acquire a majority of their peer references through normal tunnel" -" building activity.\n" +"This is unlikely to work via exploration, because exploration is a low-frequency task.\n" +"Routers acquire a majority of their peer references through normal tunnel building activity.\n" "Exploration results are generally limited to a few router hashes,\n" "and each exploration query is directed to a random floodfill router." msgstr "" @@ -9368,18 +7799,13 @@ msgid "" "For floodfill router references returned in a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "response to a lookup,\n" -"these references are followed if they are closer (or the next closest) to" -" the lookup key.\n" +"these references are followed if they are closer (or the next closest) to the lookup key.\n" "The requesting router does not trust that the references are\n" "closer to the key (i.e. they are <i>verifiably correct</i>.\n" -"The lookup also does not stop when no closer key is found, but continues " -"by querying the\n" -"next-closet node, until the timeout or maximum number of queries is " -"reached.\n" -"This prevents a malicious floodfill from black-holing a part of the key " -"space.\n" -"Also, the daily keyspace rotation requires an attacker to regenerate a " -"router info\n" +"The lookup also does not stop when no closer key is found, but continues by querying the\n" +"next-closet node, until the timeout or maximum number of queries is reached.\n" +"This prevents a malicious floodfill from black-holing a part of the key space.\n" +"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n" "within the desired key space region.\n" "This design ensures that the query capture attack described in\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n" @@ -9417,43 +7843,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:973 #, python-format msgid "" -"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used " -"by Torsk and NISAN.\n" -"At first glance, these do not appear to apply to I2P. First, the use of " -"DHT by Torsk and NISAN\n" -"is significantly different from that in I2P. Second, I2P's network " -"database lookups are only\n" -"loosely correlated to the <a href=\"%(peerselection)s\">peer " -"selection</a> and\n" -"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only " -"previously-known peers\n" +"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n" +"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n" +"is significantly different from that in I2P. Second, I2P's network database lookups are only\n" +"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n" +"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n" "are used for tunnels.\n" "Also, peer selection is unrelated to any notion of DHT key-closeness." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:984 msgid "" -"Some of this may actually be more interesting when the I2P network gets " -"much larger.\n" -"Right now, each router knows a large proportion of the network, so " -"looking up a particular\n" -"Router Info in the network database is not strongly indicative of a " -"future intent to use\n" -"that router in a tunnel. Perhaps when the network is 100 times larger, " -"the lookup may be\n" -"more correlative. Of course, a larger network makes a Sybil attack that " -"much harder." +"Some of this may actually be more interesting when the I2P network gets much larger.\n" +"Right now, each router knows a large proportion of the network, so looking up a particular\n" +"Router Info in the network database is not strongly indicative of a future intent to use\n" +"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n" +"more correlative. Of course, a larger network makes a Sybil attack that much harder." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:992 #, python-format msgid "" -"However, the general issue of DHT information leakage in I2P needs " -"further investigation.\n" -"The floodfill routers are in a position to observe queries and gather " -"information.\n" -"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as " -"specifed in the paper)\n" +"However, the general issue of DHT information leakage in I2P needs further investigation.\n" +"The floodfill routers are in a position to observe queries and gather information.\n" +"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as specifed in the paper)\n" "we expect that many of the Sybil threats we describe\n" "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n" "<a href=\"#sybil\">here</a> and\n" @@ -9488,11 +7901,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:10 #, python-format msgid "" -"<b>Peer profiling</b> is the process of collecting data based on the " -"<b>observed</b> performance\n" +"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n" "of other routers or peers, and classifying those peers into groups.\n" -"Profiling does <b>not</b> use any claimed performance data published by " -"the peer itself\n" +"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n" "in the <a href=\"%(netdb)s\">network database</a>." msgstr "" @@ -9507,8 +7918,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:20 #, python-format msgid "" -"Choosing peers from the set of floodfill routers to use for network " -"database storage and queries,\n" +"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n" "which is discussed on the <a href=\"%(netdb)s\">network database</a> page" msgstr "" @@ -9521,11 +7931,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:28 msgid "" "<b>Peer selection</b> is the process of choosing which routers\n" -"on the network we want to relay our messages to go through (which peers " -"will we \n" +"on the network we want to relay our messages to go through (which peers will we \n" "ask to join our tunnels). To accomplish this, we keep track of how each\n" -"peer performs (the peer's \"profile\") and use that data to estimate how" -" \n" +"peer performs (the peer's \"profile\") and use that data to estimate how \n" "fast they are, how often they will be able to accept our requests, and \n" "whether they seem to be overloaded or otherwise unable to perform what\n" "they agree to reliably." @@ -9535,8 +7943,7 @@ msgstr "" #, python-format msgid "" "Unlike some other anonymous networks, in I2P,\n" -"claimed bandwidth is untrusted and is <b>only</b> used to avoid those " -"peers\n" +"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n" "advertising very low bandwidth insufficient for routing tunnels.\n" "All peer selection is done through profiling.\n" "This prevents simple attacks based on peers claiming high bandwidth\n" @@ -9548,10 +7955,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:50 msgid "" -"Peer selection is done quite frequently, as a router may maintain a large" -" number\n" -"of client and exploratory tunnels, and a tunnel lifetime is only 10 " -"minutes." +"Peer selection is done quite frequently, as a router may maintain a large number\n" +"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:56 @@ -9562,11 +7967,9 @@ msgstr "" #, python-format msgid "" "For more information see the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>\n" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n" "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n" -"See <a href=\"#notes\">below</a> for notes on minor changes since the " -"paper was published." +"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:65 @@ -9576,30 +7979,21 @@ msgstr "Profili" #: i2p2www/pages/site/docs/how/peer-selection.html:66 #, python-format msgid "" -"Each peer has a set of data points collected about them, including " -"statistics \n" -"about how long it takes for them to reply to a network database query, " -"how \n" -"often their tunnels fail, and how many new peers they are able to " -"introduce \n" -"us to, as well as simple data points such as when we last heard from them" -" or\n" -"when the last communication error occurred. The specific data points " -"gathered\n" +"Each peer has a set of data points collected about them, including statistics \n" +"about how long it takes for them to reply to a network database query, how \n" +"often their tunnels fail, and how many new peers they are able to introduce \n" +"us to, as well as simple data points such as when we last heard from them or\n" +"when the last communication error occurred. The specific data points gathered\n" "can be found in the <a href=\"%(url)s\">code</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:75 msgid "" -"Profiles are fairly small, a few KB. To control memory usage, the profile" -" expiration time\n" +"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n" "lessens as the number of profiles grows.\n" -"Profiles are kept in memory until router shutdown, when they are written " -"to disk.\n" -"At startup, the profiles are read so the router need not reinitialize all" -" profiles,\n" -"thus allowing a router to quickly re-integrate into the network after " -"startup." +"Profiles are kept in memory until router shutdown, when they are written to disk.\n" +"At startup, the profiles are read so the router need not reinitialize all profiles,\n" +"thus allowing a router to quickly re-integrate into the network after startup." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:85 @@ -9609,10 +8003,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:86 msgid "" "While the profiles themselves can be considered a summary of a peer's \n" -"performance, to allow for effective peer selection we break each summary " -"down \n" -"into four simple values, representing the peer's speed, its capacity, how" -" well \n" +"performance, to allow for effective peer selection we break each summary down \n" +"into four simple values, representing the peer's speed, its capacity, how well \n" "integrated into the network it is, and whether it is failing." msgstr "" @@ -9624,8 +8016,7 @@ msgstr "Velocità " msgid "" "The speed calculation\n" "simply goes through the profile and estimates how much data we can\n" -"send or receive on a single tunnel through the peer in a minute. For " -"this estimate it just looks at\n" +"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n" "performance in the previous minute." msgstr "" @@ -9637,13 +8028,11 @@ msgstr "Capacità " msgid "" "The capacity calculation\n" "simply goes through the profile and estimates how many tunnels the peer\n" -"would agree to participate in over a given time period. For this " -"estimate it looks at \n" +"would agree to participate in over a given time period. For this estimate it looks at \n" "how many tunnel build requests\n" "the peer has accepted, rejected, and dropped, and how many\n" "of the agreed-to tunnels later failed.\n" -"While the calculation is time-weighted so that recent activity counts " -"more than later activity,\n" +"While the calculation is time-weighted so that recent activity counts more than later activity,\n" "statistics up to 48 hours old may be included." msgstr "" @@ -9651,10 +8040,8 @@ msgstr "" msgid "" "Recognizing and avoiding unreliable and unreachable\n" "peers is critically important.\n" -"Unfortunately, as the tunnel building and testing require the " -"participation of several peers,\n" -"it is difficult to positively identify the cause of a dropped build " -"request or test failure.\n" +"Unfortunately, as the tunnel building and testing require the participation of several peers,\n" +"it is difficult to positively identify the cause of a dropped build request or test failure.\n" "The router assigns a probability of failure to each of the\n" "peers, and uses that probability in the capacity calculation.\n" "Drops and test failures are weighted much higher than rejections." @@ -9666,10 +8053,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:124 msgid "" -"As mentioned above, we drill through each peer's profile to come up with " -"a \n" -"few key calculations, and based upon those, we organize each peer into " -"three\n" +"As mentioned above, we drill through each peer's profile to come up with a \n" +"few key calculations, and based upon those, we organize each peer into three\n" "groups - fast, high capacity, and standard." msgstr "" @@ -9679,15 +8064,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:134 msgid "" -"A peer is considered \"high capacity\" if its capacity calculation meets " -"or \n" +"A peer is considered \"high capacity\" if its capacity calculation meets or \n" "exceeds the median of all peers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:138 msgid "" -"A peer is considered \"fast\" if they are already \"high capacity\" and " -"their \n" +"A peer is considered \"fast\" if they are already \"high capacity\" and their \n" "speed calculation meets or exceeds the median of all peers." msgstr "" @@ -9713,25 +8096,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:156 msgid "" "The fast group is limited to 30 peers.\n" -"If there would be more, only the ones with the highest speed rating are " -"placed in the group." +"If there would be more, only the ones with the highest speed rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:160 msgid "" -"The high capacity group is limited to 75 peers (including the fast group)" -"\n" -"If there would be more, only the ones with the highest capacity rating " -"are placed in the group." +"The high capacity group is limited to 75 peers (including the fast group)\n" +"If there would be more, only the ones with the highest capacity rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:164 msgid "" -"The standard group has no fixed limit, but is somewhat smaller than the " -"number of RouterInfos\n" +"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n" "stored in the local network database.\n" -"On an active router in today's network, there may be about 1000 " -"RouterInfos and 500 peer profiles\n" +"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n" "(including those in the fast and high capacity groups)" msgstr "" @@ -9747,16 +8125,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:177 msgid "" -"The groups tend to be fairly stable, that is, there is not much \"churn\"" -" in the rankings\n" +"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n" "at each recalculation.\n" -"Peers in the fast and high capacity groups get more tunnels build through" -" them, which increases their speed and capacity ratings,\n" +"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n" "which reinforces their presence in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:188 -msgid "The router selects peers from the above groups to build tunnels through." +msgid "" +"The router selects peers from the above groups to build tunnels through." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:193 @@ -9765,19 +8142,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:194 msgid "" -"Client tunnels are used for application traffic, such as for HTTP proxies" -" and web servers." +"Client tunnels are used for application traffic, such as for HTTP proxies " +"and web servers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:198 msgid "" -"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog" -"/one-cell-enough\">some attacks</a>,\n" +"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n" "and increase performance,\n" -"peers for building client tunnels are chosen randomly from the smallest " -"group, which is the \"fast\" group.\n" -"There is no bias toward selecting peers that were previously participants" -" in a tunnel for the same client." +"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n" +"There is no bias toward selecting peers that were previously participants in a tunnel for the same client." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:206 @@ -9786,35 +8160,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:207 msgid "" -"Exploratory tunnels are used for router administrative purposes, such as " -"network database traffic\n" +"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n" "and testing client tunnels.\n" -"Exploratory tunnels are also used to contact previously unconnected " -"routers, which is why\n" +"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n" "they are called \"exploratory\".\n" "These tunnels are usually low-bandwidth." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:215 msgid "" -"Peers for building exploratory tunnels are generally chosen randomly from" -" the standard group.\n" -"If the success rate of these build attempts is low compared to the client" -" tunnel build success rate,\n" -"the router will select a weighted average of peers randomly from the high" -" capacity group instead.\n" -"This helps maintain a satisfactory build success rate even when network " -"performance is poor.\n" -"There is no bias toward selecting peers that were previously participants" -" in an exploratory tunnel." +"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n" +"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n" +"the router will select a weighted average of peers randomly from the high capacity group instead.\n" +"This helps maintain a satisfactory build success rate even when network performance is poor.\n" +"There is no bias toward selecting peers that were previously participants in an exploratory tunnel." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:223 msgid "" -"As the standard group includes a very large subset of all peers the " -"router knows about,\n" -"exploratory tunnels are essentially built through a random selection of " -"all peers,\n" +"As the standard group includes a very large subset of all peers the router knows about,\n" +"exploratory tunnels are essentially built through a random selection of all peers,\n" "until the build success rate becomes too low." msgstr "" @@ -9824,8 +8189,8 @@ msgstr "Restrizioni " #: i2p2www/pages/site/docs/how/peer-selection.html:232 msgid "" -"To prevent some simple attacks, and for performance, there are the " -"following restrictions:" +"To prevent some simple attacks, and for performance, there are the following" +" restrictions:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:236 @@ -9834,8 +8199,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:239 msgid "" -"A peer may participate in a maximum of 33% of all tunnels created by " -"the router." +"A peer may participate in a maximum of 33% of all tunnels created by the" +" router." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:242 @@ -9856,18 +8221,18 @@ msgid "" "Peers are ordered within tunnels to\n" "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n" "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n" -"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel " -"page</a>." +"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:268 -msgid "Continue to analyze an tune speed and capacity calculations as necessary" +msgid "" +"Continue to analyze an tune speed and capacity calculations as necessary" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:271 msgid "" -"Implement a more aggressive ejection strategy if necessary to control " -"memory usage as the network grows" +"Implement a more aggressive ejection strategy if necessary to control memory" +" usage as the network grows" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:274 @@ -9882,10 +8247,8 @@ msgstr "" #, python-format msgid "" "For those reading the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>,\n" -"please keep in mind the following minor changes in I2P since the paper's " -"publication:" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n" +"please keep in mind the following minor changes in I2P since the paper's publication:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:289 @@ -9951,24 +8314,18 @@ msgstr "Crittografia" #: i2p2www/pages/site/docs/how/tech-intro.html:21 msgid "" "I2P is a scalable, self organizing, resilient packet switched anonymous \n" -"network layer, upon which any number of different anonymity or security " -"conscious \n" -"applications can operate. Each of these applications may make their own " -"anonymity, \n" -"latency, and throughput tradeoffs without worrying about the proper " -"implementation \n" -"of a free route mixnet, allowing them to blend their activity with the " -"larger \n" +"network layer, upon which any number of different anonymity or security conscious \n" +"applications can operate. Each of these applications may make their own anonymity, \n" +"latency, and throughput tradeoffs without worrying about the proper implementation \n" +"of a free route mixnet, allowing them to blend their activity with the larger \n" "anonymity set of users already running on top of I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:30 msgid "" -"Applications available already provide the full range of typical Internet" -" activities -\n" +"Applications available already provide the full range of typical Internet activities -\n" "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n" -"blogging and content syndication, newsgroups, as well as several other " -"applications under development." +"blogging and content syndication, newsgroups, as well as several other applications under development." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:36 @@ -9981,29 +8338,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:38 msgid "" -"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a " -"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" -"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a " -"href=\"#app.i2pbt\">I2P-bt</a>\n" +"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" +"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n" "and others." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:43 msgid "" -"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote" -"\">I2P-Bote</a>." +"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a " +"href=\"#app.i2pbote\">I2P-Bote</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:44 msgid "" -"Blog: using e.g. the pebble plugin or the distributed blogging software " -"<a href=\"#app.syndie\">Syndie</a>." +"Blog: using e.g. the pebble plugin or the distributed blogging software <a " +"href=\"#app.syndie\">Syndie</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:45 msgid "" -"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS " -"cloud over I2P." +"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud " +"over I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:46 @@ -10012,77 +8367,47 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:49 msgid "" -"Unlike web sites hosted within content distribution networks like <a " -"href=\"#similar.freenet\">Freenet</a> \n" -"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services " -"hosted on \n" -"I2P are fully interactive - there are traditional web-style search " -"engines, \n" -"bulletin boards, blogs you can comment on, database driven sites, and " -"bridges \n" -"to query static systems like Freenet without needing to install it " -"locally." +"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n" +"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n" +"I2P are fully interactive - there are traditional web-style search engines, \n" +"bulletin boards, blogs you can comment on, database driven sites, and bridges \n" +"to query static systems like Freenet without needing to install it locally." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:57 msgid "" "With all of these anonymity enabled applications, I2P takes on the role \n" -"of the message oriented middleware - applications say that they want to " -"send \n" -"some data to a cryptographic identifier (a \"destination\") and I2P takes" -" care \n" -"of making sure it gets there securely and anonymously. I2P also bundles a" -" \n" -"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's " -"anonymous \n" -"best-effort messages to transfer as reliable, in-order streams, " -"transparently \n" -"offering a TCP based congestion control algorithm tuned for the high " -"bandwidth \n" -"delay product of the network. While there have been several simple SOCKS " -"proxies \n" -"available to tie existing applications into the network, their value has " -"been \n" -"limited as nearly every application routinely exposes what, in an " -"anonymous \n" -"context, is sensitive information. The only safe way to go is to fully " -"audit \n" -"an application to ensure proper operation and to assist in that we " -"provide \n" -"a series of APIs in various languages which can be used to make the most " -"out \n" +"of the message oriented middleware - applications say that they want to send \n" +"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n" +"of making sure it gets there securely and anonymously. I2P also bundles a \n" +"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n" +"best-effort messages to transfer as reliable, in-order streams, transparently \n" +"offering a TCP based congestion control algorithm tuned for the high bandwidth \n" +"delay product of the network. While there have been several simple SOCKS proxies \n" +"available to tie existing applications into the network, their value has been \n" +"limited as nearly every application routinely exposes what, in an anonymous \n" +"context, is sensitive information. The only safe way to go is to fully audit \n" +"an application to ensure proper operation and to assist in that we provide \n" +"a series of APIs in various languages which can be used to make the most out \n" "of the network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:74 #, python-format msgid "" -"I2P is not a research project - academic, commercial, or governmental, " -"but \n" -"is instead an engineering effort aimed at doing whatever is necessary to " -"provide \n" -"a sufficient level of anonymity to those who need it. It has been in " -"active \n" -"development since early 2003 with one full time developer and a dedicated" -" \n" -"group of part time contributors from all over the world. All of the work " -"done \n" -"on I2P is open source and freely available on the <a " -"href=\"%(site)s\">website</a>, \n" -"with the majority of the code released outright into the public domain, " -"though \n" -"making use of a few cryptographic routines under BSD-style licenses. The " -"people \n" -"working on I2P do not control what people release client applications " -"under, \n" -"and there are several GPL'ed applications available (<a " -"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" -"<a href=\"#app.i2pmail\">susimail</a>, <a " -"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-" -"Bote</a>, \n" +"I2P is not a research project - academic, commercial, or governmental, but \n" +"is instead an engineering effort aimed at doing whatever is necessary to provide \n" +"a sufficient level of anonymity to those who need it. It has been in active \n" +"development since early 2003 with one full time developer and a dedicated \n" +"group of part time contributors from all over the world. All of the work done \n" +"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n" +"with the majority of the code released outright into the public domain, though \n" +"making use of a few cryptographic routines under BSD-style licenses. The people \n" +"working on I2P do not control what people release client applications under, \n" +"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" +"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n" "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n" -"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from " -"donations,\n" +"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n" "and does not receive any tax breaks in any jurisdiction at this time,\n" "as many of the developers are themselves anonymous." msgstr "" @@ -10093,40 +8418,27 @@ msgstr "Operazione" #: i2p2www/pages/site/docs/how/tech-intro.html:94 msgid "" -"To understand I2P's operation, it is essential to understand a few key " -"concepts. \n" -"First, I2P makes a strict separation between the software participating " -"in \n" -"the network (a \"router\") and the anonymous endpoints (\"destinations\")" -" associated \n" -"with individual applications. The fact that someone is running I2P is not" -" \n" -"usually a secret. What is hidden is information on what the user is " -"doing, \n" -"if anything at all, as well as what router a particular destination is " -"connected \n" -"to. End users will typically have several local destinations on their " -"router \n" -"- for instance, one proxying in to IRC servers, another supporting the " -"user's \n" -"anonymous webserver (\"eepsite\"), another for an I2Phex instance, " -"another for \n" +"To understand I2P's operation, it is essential to understand a few key concepts. \n" +"First, I2P makes a strict separation between the software participating in \n" +"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n" +"with individual applications. The fact that someone is running I2P is not \n" +"usually a secret. What is hidden is information on what the user is doing, \n" +"if anything at all, as well as what router a particular destination is connected \n" +"to. End users will typically have several local destinations on their router \n" +"- for instance, one proxying in to IRC servers, another supporting the user's \n" +"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n" "torrents, etc." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:107 msgid "" "Another critical concept to understand is the \"tunnel\".\n" -"A tunnel is a directed path through an explicitly selected list of " -"routers.\n" -"Layered encryption is used, so each of the routers can only decrypt a " -"single layer.\n" +"A tunnel is a directed path through an explicitly selected list of routers.\n" +"Layered encryption is used, so each of the routers can only decrypt a single layer.\n" "The decrypted information contains the IP of the next router, along with\n" "the encrypted information to be forwarded.\n" -"Each tunnel has a starting point (the first router, also known as " -"\"gateway\")\n" -"and an end point. Messages can be sent only in one way. To send messages " -"back,\n" +"Each tunnel has a starting point (the first router, also known as \"gateway\")\n" +"and an end point. Messages can be sent only in one way. To send messages back,\n" "another tunnel is required." msgstr "" @@ -10146,15 +8458,12 @@ msgid "" "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n" "Combining these two tunnels allows users to send messages to each other.\n" "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n" -"while the receiver (\"Bob\" in the above image) creates an inbound " -"tunnel.\n" -"The gateway of an inbound tunnel can receive messages from any other user" -"\n" +"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n" +"The gateway of an inbound tunnel can receive messages from any other user\n" "and will send them on until the endpoint (\"Bob\").\n" "The endpoint of the outbound tunnel will need to send the message\n" "on to the gateway of the inbound tunnel.\n" -"To do this, the sender (\"Alice\") adds instructions to her encrypted " -"message.\n" +"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n" "Once the endpoint of the outbound tunnel decrypts the message,\n" "it will have instructions to forward the message to the correct\n" "inbound gateway (the gateway to \"Bob\")." @@ -10162,25 +8471,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:140 msgid "" -"A third critical concept to understand is I2P's <b>\"network " -"database\"</b> (or \"netDb\") \n" -"- a pair of algorithms used to share network metadata. The two types of " -"metadata \n" -"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the " -"routerInfo gives routers the \n" -"data necessary for contacting a particular router (their public keys, " -"transport \n" -"addresses, etc), while the leaseSet gives routers the information " -"necessary \n" -"for contacting a particular destination. A leaseSet contains a number of " -"\"leases\".\n" -"Each of this leases specifies a tunnel gateway, which allows reaching a " -"specific destination.\n" +"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n" +"- a pair of algorithms used to share network metadata. The two types of metadata \n" +"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n" +"data necessary for contacting a particular router (their public keys, transport \n" +"addresses, etc), while the leaseSet gives routers the information necessary \n" +"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n" +"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n" "The full information contained in a lease:" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:151 -msgid "Inbound gateway for a tunnel that allows reaching a specific destination." +msgid "" +"Inbound gateway for a tunnel that allows reaching a specific destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:152 @@ -10195,10 +8498,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:155 msgid "" -"Routers themselves send their routerInfo to the netDb directly, while " -"leaseSets are sent through outbound tunnels\n" -"(leaseSets need to be sent anonymously, to avoid correlating a router " -"with his leaseSets)." +"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" +"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:160 @@ -10209,13 +8510,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" -"To build up her own inbound and outbound tunnels, Alice does a lookup in " -"the netDb to collect routerInfo.\n" +"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" -"She can then send a build message to the first hop, requesting the " -"construction of a tunnel and asking\n" -"that router to send the construction message onward, until the tunnel has" -" been constructed." +"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" +"that router to send the construction message onward, until the tunnel has been constructed." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:171 @@ -10232,30 +8530,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" -"When Alice wants to send a message to Bob, she first does a lookup in the" -" \n" -"netDb to find Bob's leaseSet, giving her his current inbound tunnel " -"gateways. \n" -"She then picks one of her outbound tunnels and sends the message down it " -"with \n" -"instructions for the outbound tunnel's endpoint to forward the message on" -" \n" -"to one of Bob's inbound tunnel gateways. When the outbound tunnel " -"endpoint \n" -"receives those instructions, it forwards the message as requested, and " -"when \n" -"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel" -" \n" -"to Bob's router. If Alice wants Bob to be able to reply to the message, " -"she \n" -"needs to transmit her own destination explicitly as part of the message " -"itself.\n" -"This can be done by introducing a higher-level layer, which is done in " -"the\n" +"When Alice wants to send a message to Bob, she first does a lookup in the \n" +"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n" +"She then picks one of her outbound tunnels and sends the message down it with \n" +"instructions for the outbound tunnel's endpoint to forward the message on \n" +"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n" +"receives those instructions, it forwards the message as requested, and when \n" +"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n" +"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n" +"needs to transmit her own destination explicitly as part of the message itself.\n" +"This can be done by introducing a higher-level layer, which is done in the\n" "<a href=\"#app.streaming\">streaming</a> library.\n" "Alice may also cut down on the response time by bundling her most \n" -"recent LeaseSet with the message so that Bob doesn't need to do a netDb " -"lookup \n" +"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." msgstr "" @@ -10273,208 +8560,126 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:200 msgid "" -"While the tunnels themselves have layered encryption to prevent " -"unauthorized \n" -"disclosure to peers inside the network (as the transport layer itself " -"does \n" -"to prevent unauthorized disclosure to peers outside the network), it is " -"necessary \n" -"to add an additional end to end layer of encryption to hide the message " -"from \n" -"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a " -"href=\"#op.garlic\">garlic \n" -"encryption</a>\" lets Alice's router wrap up multiple messages into a " -"single \n" -"\"garlic message\", encrypted to a particular public key so that " -"intermediary \n" -"peers cannot determine either how many messages are within the garlic, " -"what \n" -"those messages say, or where those individual cloves are destined. For " -"typical \n" -"end to end communication between Alice and Bob, the garlic will be " -"encrypted \n" -"to the public key published in Bob's leaseSet, allowing the message to be" -" \n" +"While the tunnels themselves have layered encryption to prevent unauthorized \n" +"disclosure to peers inside the network (as the transport layer itself does \n" +"to prevent unauthorized disclosure to peers outside the network), it is necessary \n" +"to add an additional end to end layer of encryption to hide the message from \n" +"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n" +"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n" +"\"garlic message\", encrypted to a particular public key so that intermediary \n" +"peers cannot determine either how many messages are within the garlic, what \n" +"those messages say, or where those individual cloves are destined. For typical \n" +"end to end communication between Alice and Bob, the garlic will be encrypted \n" +"to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" -"Another important fact to keep in mind is that I2P is entirely message " -"based \n" -"and that some messages may be lost along the way. Applications using I2P " -"can \n" -"use the message oriented interfaces and take care of their own congestion" -" \n" -"control and reliability needs, but most would be best served by reusing " -"the \n" -"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as " -"a streams \n" +"Another important fact to keep in mind is that I2P is entirely message based \n" +"and that some messages may be lost along the way. Applications using I2P can \n" +"use the message oriented interfaces and take care of their own congestion \n" +"control and reliability needs, but most would be best served by reusing the \n" +"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n" "based network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" "Both inbound and outbound tunnels work along similar principles.\n" -"The tunnel gateway accumulates a number of tunnel messages, eventually " -"preprocessing \n" -"them into something for tunnel delivery. Next, the gateway encrypts that " -"preprocessed \n" -"data and forwards it to the first hop. That peer and subsequent tunnel " -"participants \n" -"add on a layer of encryption after verifying that it isn't a duplicate " -"before \n" -"forward it on to the next peer. Eventually, the message arrives at the " -"endpoint \n" -"where the messages are split out again and forwarded on as requested. The" -" \n" -"difference arises in what the tunnel's creator does - for inbound " -"tunnels, \n" -"the creator is the endpoint and they simply decrypt all of the layers " -"added, \n" -"while for outbound tunnels, the creator is the gateway and they pre-" -"decrypt \n" -"all of the layers so that after all of the layers of per-hop encryption " -"are \n" +"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n" +"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n" +"data and forwards it to the first hop. That peer and subsequent tunnel participants \n" +"add on a layer of encryption after verifying that it isn't a duplicate before \n" +"forward it on to the next peer. Eventually, the message arrives at the endpoint \n" +"where the messages are split out again and forwarded on as requested. The \n" +"difference arises in what the tunnel's creator does - for inbound tunnels, \n" +"the creator is the endpoint and they simply decrypt all of the layers added, \n" +"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" +"all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" -"The choice of specific peers to pass on messages as well as their " -"particular \n" -"ordering is important to understanding both I2P's anonymity and " -"performance \n" -"characteristics. While the network database (below) has its own criteria " -"for \n" -"picking what peers to query and store entries on, tunnel creators may use" -" any peers \n" -"in the network in any order (and even any number of times) in a single " -"tunnel. \n" -"If perfect latency and capacity data were globally known, selection and " -"ordering \n" -"would be driven by the particular needs of the client in tandem with " -"their \n" -"threat model. Unfortunately, latency and capacity data is not trivial to " -"gather \n" -"anonymously, and depending upon untrusted peers to provide this " -"information \n" +"The choice of specific peers to pass on messages as well as their particular \n" +"ordering is important to understanding both I2P's anonymity and performance \n" +"characteristics. While the network database (below) has its own criteria for \n" +"picking what peers to query and store entries on, tunnel creators may use any peers \n" +"in the network in any order (and even any number of times) in a single tunnel. \n" +"If perfect latency and capacity data were globally known, selection and ordering \n" +"would be driven by the particular needs of the client in tandem with their \n" +"threat model. Unfortunately, latency and capacity data is not trivial to gather \n" +"anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" -"From an anonymity perspective, the simplest technique would be to pick " -"peers \n" -"randomly from the entire network, order them randomly and use those peers" -" \n" -"in that order for all eternity. From a performance perspective, the " -"simplest \n" -"technique would be to pick the fastest peers with the necessary spare " -"capacity, \n" -"spreading the load across different peers to handle transparent failover," -" \n" -"and to rebuild the tunnel whenever capacity information changes. While " -"the \n" -"former is both brittle and inefficient, the later requires inaccessible " -"information \n" -"and offers insufficient anonymity. I2P is instead working on offering a " -"range \n" -"of peer selection strategies, coupled with anonymity aware measurement " -"code \n" +"From an anonymity perspective, the simplest technique would be to pick peers \n" +"randomly from the entire network, order them randomly and use those peers \n" +"in that order for all eternity. From a performance perspective, the simplest \n" +"technique would be to pick the fastest peers with the necessary spare capacity, \n" +"spreading the load across different peers to handle transparent failover, \n" +"and to rebuild the tunnel whenever capacity information changes. While the \n" +"former is both brittle and inefficient, the later requires inaccessible information \n" +"and offers insufficient anonymity. I2P is instead working on offering a range \n" +"of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" -"As a base, I2P is constantly profiling the peers with which it interacts" -" \n" -"with by measuring their indirect behavior - for instance, when a peer " -"responds \n" -"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in " -"the \n" -"profiles for all of the routers involved in the two tunnels (inbound and " -"outbound) \n" -"through which the request and response passed, as well as the queried " -"peer's \n" -"profile. Direct measurement, such as transport layer latency or " -"congestion, \n" -"is not used as part of the profile, as it can be manipulated and " -"associated \n" -"with the measuring router, exposing them to trivial attacks. While " -"gathering \n" -"these profiles, a series of calculations are run on each to summarize its" -" \n" -"performance - its latency, capacity to handle lots of activity, whether " -"they \n" -"are currently overloaded, and how well integrated into the network they " -"seem \n" -"to be. These calculations are then compared for active peers to organize " -"the \n" -"routers into four tiers - fast and high capacity, high capacity, not " -"failing, \n" -"and failing. The thresholds for those tiers are determined dynamically, " -"and \n" +"As a base, I2P is constantly profiling the peers with which it interacts \n" +"with by measuring their indirect behavior - for instance, when a peer responds \n" +"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n" +"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n" +"through which the request and response passed, as well as the queried peer's \n" +"profile. Direct measurement, such as transport layer latency or congestion, \n" +"is not used as part of the profile, as it can be manipulated and associated \n" +"with the measuring router, exposing them to trivial attacks. While gathering \n" +"these profiles, a series of calculations are run on each to summarize its \n" +"performance - its latency, capacity to handle lots of activity, whether they \n" +"are currently overloaded, and how well integrated into the network they seem \n" +"to be. These calculations are then compared for active peers to organize the \n" +"routers into four tiers - fast and high capacity, high capacity, not failing, \n" +"and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" -"Using this profile data, the simplest reasonable peer selection strategy " -"is to\n" -"pick peers randomly from the top tier (fast and high capacity), and this " -"is\n" -"currently deployed for client tunnels. Exploratory tunnels (used for " -"netDb and\n" -"tunnel management) pick peers randomly from the \"not failing\" tier " -"(which\n" +"Using this profile data, the simplest reasonable peer selection strategy is to\n" +"pick peers randomly from the top tier (fast and high capacity), and this is\n" +"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n" +"tunnel management) pick peers randomly from the \"not failing\" tier (which\n" "includes routers in 'better' tiers as well), allowing the peer to sample\n" -"routers more widely, in effect optimizing the peer selection through " -"randomized\n" -"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill " -"climbing</a>. These\n" +"routers more widely, in effect optimizing the peer selection through randomized\n" +"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n" "strategies alone do however leak information regarding the peers in the\n" -"router's top tier through predecessor and netDb harvesting attacks. In " -"turn,\n" -"several alternatives exist which, while not balancing the load as evenly," -" will\n" +"router's top tier through predecessor and netDb harvesting attacks. In turn,\n" +"several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" -"By picking a random key and ordering the peers according to their XOR " -"distance \n" -"from it, the information leaked is reduced in predecessor and harvesting " -"attacks \n" -"according to the peers' failure rate and the tier's churn. Another simple" -" \n" -"strategy for dealing with netDb harvesting attacks is to simply fix the " -"inbound \n" -"tunnel gateway(s) yet randomize the peers further on in the tunnels. To " -"deal \n" -"with predecessor attacks for adversaries which the client contacts, the " -"outbound \n" -"tunnel endpoints would also remain fixed. The selection of which peer to " -"fix \n" -"on the most exposed point would of course need to have a limit to the " -"duration, \n" -"as all peers fail eventually, so it could either be reactively adjusted " -"or \n" -"proactively avoided to mimic a measured mean time between failures of " -"other \n" -"routers. These two strategies can in turn be combined, using a fixed " -"exposed \n" -"peer and an XOR based ordering within the tunnels themselves. A more " -"rigid \n" -"strategy would fix the exact peers and ordering of a potential tunnel, " -"only \n" -"using individual peers if all of them agree to participate in the same " -"way \n" -"each time. This varies from the XOR based ordering in that the " -"predecessor \n" -"and successor of each peer is always the same, while the XOR only makes " -"sure \n" +"By picking a random key and ordering the peers according to their XOR distance \n" +"from it, the information leaked is reduced in predecessor and harvesting attacks \n" +"according to the peers' failure rate and the tier's churn. Another simple \n" +"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n" +"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n" +"with predecessor attacks for adversaries which the client contacts, the outbound \n" +"tunnel endpoints would also remain fixed. The selection of which peer to fix \n" +"on the most exposed point would of course need to have a limit to the duration, \n" +"as all peers fail eventually, so it could either be reactively adjusted or \n" +"proactively avoided to mimic a measured mean time between failures of other \n" +"routers. These two strategies can in turn be combined, using a fixed exposed \n" +"peer and an XOR based ordering within the tunnels themselves. A more rigid \n" +"strategy would fix the exact peers and ordering of a potential tunnel, only \n" +"using individual peers if all of them agree to participate in the same way \n" +"each time. This varies from the XOR based ordering in that the predecessor \n" +"and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." msgstr "" @@ -10483,10 +8688,8 @@ msgstr "" msgid "" "As mentioned before, I2P currently (release 0.8) includes the tiered \n" "random strategy above, with XOR-based ordering. A \n" -"more detailed discussion of the mechanics involved in tunnel operation, " -"management, \n" -"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel " -"spec</a>." +"more detailed discussion of the mechanics involved in tunnel operation, management, \n" +"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:326 @@ -10500,27 +8703,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" "A percentage of I2P users are appointed as 'floodfill peers'.\n" -"Currently, I2P installations that have a lot of bandwidth and are fast " -"enough,\n" -"will appoint themselves as floodfill as soon as the number of existing " -"floodfill routers\n" +"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" +"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format msgid "" -"Other I2P routers will store their data and lookup data by sending simple" -" 'store' and 'lookup' queries to the floodfills.\n" -"If a floodfill router receives a 'store' query, it will spread the " -"information to other floodfill routers\n" -"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia " -"algorithm</a>.\n" -"The 'lookup' queries currently function differently, to avoid an " -"important\n" +"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n" +"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n" +"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n" +"The 'lookup' queries currently function differently, to avoid an important\n" "<a href=\"%(netdb)s#lookup\">security issue</a>.\n" -"When a lookup is done, the floodfill router will not forward the lookup " -"to other peers,\n" +"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." msgstr "" @@ -10530,8 +8726,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" -"A <b>RouterInfo</b> stores information on a specific I2P router and how " -"to contact it" +"A <b>RouterInfo</b> stores information on a specific I2P router and how to " +"contact it" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:354 @@ -10542,14 +8738,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" -"All of this information is signed by the publishing party and verified by" -" any I2P router using or storing the information.\n" -"In addition, the data contains timing information, to avoid storage of " -"old entries and possible attacks.\n" -"This is also why I2P bundles the necessary code for maintaining the " -"correct time, occasionally querying some SNTP servers \n" -"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by" -" default)\n" +"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n" +"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n" +"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" +"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n" "and detecting skew between routers at the transport layer." msgstr "" @@ -10564,10 +8756,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:370 msgid "" "One could only want specific people to be able to reach a destination.\n" -"This is possible by not publishing the destination in the netDb. You will" -" however have to transmit the destination by other means.\n" -"An alternative are the 'encrypted leaseSets'. These leaseSets can only be" -" decoded by people with access to the decryption key." +"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" +"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:377 @@ -10576,13 +8766,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:378 msgid "" -"Bootstrapping the netDb is quite simple. Once a router manages to receive" -" a single routerInfo of a reachable peer,\n" +"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n" "it can query that router for references to other routers in the network.\n" -"Currently, a number of users post their routerInfo files to a website to " -"make this information available.\n" -"I2P automatically connects to one of these websites to gather routerInfo " -"files and bootstrap." +"Currently, a number of users post their routerInfo files to a website to make this information available.\n" +"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:386 @@ -10592,26 +8779,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:387 msgid "" "Lookups in the I2P network are not forwarded to other netDb routers.\n" -"Currently, this is not a major problem, since the network is not very " -"large.\n" -"However, as the network grows, not all routerInfo and leaseSet files will" -" be present\n" -"on each netDb router. This will cause a deterioration of the percentage " -"of successful lookups.\n" -"Because of this, refinements to the netDb will be done in the next " -"releases." +"Currently, this is not a major problem, since the network is not very large.\n" +"However, as the network grows, not all routerInfo and leaseSet files will be present\n" +"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" +"Because of this, refinements to the netDb will be done in the next releases." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" -"Communication between routers needs to provide confidentiality and " -"integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" -"is the one who should receive a given message. The particulars of how " -"routers \n" -"communicate with other routers aren't critical - three separate protocols" -" \n" +"Communication between routers needs to provide confidentiality and integrity \n" +"against external adversaries while authenticating that the router contacted \n" +"is the one who should receive a given message. The particulars of how routers \n" +"communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." msgstr "" @@ -10619,12 +8798,9 @@ msgstr "" #, python-format msgid "" "I2P started with a TCP-based protocol which \n" -"has since been disabled. Then, to accommodate the need for high degree " -"communication \n" -"(as a number of routers will end up speaking with many others), I2P moved" -" \n" -"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - " -"\"Secure \n" +"has since been disabled. Then, to accommodate the need for high degree communication \n" +"(as a number of routers will end up speaking with many others), I2P moved \n" +"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n" "Semireliable UDP\", or \"SSU\"." msgstr "" @@ -10636,46 +8812,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" "The goal of this protocol is to provide secure, authenticated, \n" -"semireliable and unordered message delivery, exposing only a minimal " -"amount \n" -"of data easily discernible to third parties. It should support high " -"degree \n" -"communication as well as TCP-friendly congestion control and may include" -" \n" -"PMTU detection. It should be capable of efficiently moving bulk data at " -"rates \n" -"sufficient for home users. In addition, it should support techniques for " -"addressing \n" +"semireliable and unordered message delivery, exposing only a minimal amount \n" +"of data easily discernible to third parties. It should support high degree \n" +"communication as well as TCP-friendly congestion control and may include \n" +"PMTU detection. It should be capable of efficiently moving bulk data at rates \n" +"sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format msgid "" -"Following the introduction of SSU, after issues with congestion collapse" -" \n" -"appeared, a new NIO-based TCP transport called <a " -"href=\"%(ntcp)s\">NTCP</a> \n" -"was implemented. It is enabled by default for outbound connections only. " -"Those \n" -"who configure their NAT/firewall to allow inbound connections and specify" -" \n" -"the external host and port (dyndns/etc is ok) on /config.jsp can receive " -"inbound \n" -"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread" -" \n" +"Following the introduction of SSU, after issues with congestion collapse \n" +"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n" +"was implemented. It is enabled by default for outbound connections only. Those \n" +"who configure their NAT/firewall to allow inbound connections and specify \n" +"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" +"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" "I2P supports multiple transports simultaneously. A particular transport \n" -"for an outbound connection is selected with \"bids\". Each transport bids" -" for \n" -"the connection and the relative value of these bids assigns the priority." -" \n" -"Transports may reply with different bids, depending on whether there is " -"already \n" +"for an outbound connection is selected with \"bids\". Each transport bids for \n" +"the connection and the relative value of these bids assigns the priority. \n" +"Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." msgstr "" @@ -10683,38 +8845,25 @@ msgstr "" #, python-format msgid "" "The current implementation ranks NTCP as the highest-priority transport \n" -"for outbound connections in most situations. SSU is enabled for both " -"outbound \n" -"and inbound connections. Your firewall and your I2P router must be " -"configured \n" -"to allow inbound NTCP connections. For further information see the <a " -"href=\"%(ntcp)s\">NTCP \n" +"for outbound connections in most situations. SSU is enabled for both outbound \n" +"and inbound connections. Your firewall and your I2P router must be configured \n" +"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n" "page</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" "A bare minimum set of cryptographic primitives are combined together to \n" -"provide I2P's layered defenses against a variety of adversaries. At the " -"lowest \n" -"level, inter router communication is protected by the transport layer " -"security \n" -"- SSU encrypts each packet with AES256/CBC with both an explicit IV and " -"MAC \n" -"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a " -"2048bit \n" -"Diffie-Hellman exchange, station-to-station authentication with the other" -" \n" -"router's DSA key, plus each network message has their own hash for local " -"integrity \n" -"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the " -"transports \n" -"have their own layered AES256/CBC encryption with an explicit IV and " -"verified \n" -"at the tunnel endpoint with an additional SHA256 hash. Various other " -"messages \n" -"are passed along inside \"garlic messages\", which are encrypted with " -"ElGamal/AES+SessionTags \n" +"provide I2P's layered defenses against a variety of adversaries. At the lowest \n" +"level, inter router communication is protected by the transport layer security \n" +"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n" +"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n" +"Diffie-Hellman exchange, station-to-station authentication with the other \n" +"router's DSA key, plus each network message has their own hash for local integrity \n" +"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n" +"have their own layered AES256/CBC encryption with an explicit IV and verified \n" +"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" +"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." msgstr "" @@ -10724,51 +8873,31 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:471 msgid "" -"Garlic messages are an extension of \"onion\" layered encryption, " -"allowing \n" -"the contents of a single message to contain multiple \"cloves\" - fully " -"formed \n" -"messages alongside their own instructions for delivery. Messages are " -"wrapped \n" -"into a garlic message whenever the message would otherwise be passing in " -"cleartext \n" -"through a peer who should not have access to the information - for " -"instance, \n" -"when a router wants to ask another router to participate in a tunnel, " -"they \n" -"wrap the request inside a garlic, encrypt that garlic to the receiving " -"router's \n" -"2048bit ElGamal public key, and forward it through a tunnel. Another " -"example \n" -"is when a client wants to send a message to a destination - the sender's " -"router \n" -"will wrap up that data message (alongside some other messages) into a " -"garlic, \n" -"encrypt that garlic to the 2048bit ElGamal public key published in the " -"recipient's \n" +"Garlic messages are an extension of \"onion\" layered encryption, allowing \n" +"the contents of a single message to contain multiple \"cloves\" - fully formed \n" +"messages alongside their own instructions for delivery. Messages are wrapped \n" +"into a garlic message whenever the message would otherwise be passing in cleartext \n" +"through a peer who should not have access to the information - for instance, \n" +"when a router wants to ask another router to participate in a tunnel, they \n" +"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n" +"2048bit ElGamal public key, and forward it through a tunnel. Another example \n" +"is when a client wants to send a message to a destination - the sender's router \n" +"will wrap up that data message (alongside some other messages) into a garlic, \n" +"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" -"The \"instructions\" attached to each clove inside the encryption layer " -"includes \n" -"the ability to request that the clove be forwarded locally, to a remote " -"router, \n" -"or to a remote tunnel on a remote router. There are fields in those " -"instructions \n" -"allowing a peer to request that the delivery be delayed until a certain " -"time \n" -"or condition has been met, though they won't be honored until the <a " -"href=\"#future.variablelatency\">nontrivial \n" -"delays</a> are deployed. It is possible to explicitly route garlic " -"messages \n" -"any number of hops without building tunnels, or even to reroute tunnel " -"messages \n" -"by wrapping them in garlic messages and forwarding them a number of hops " -"prior \n" -"to delivering them to the next hop in the tunnel, but those techniques " -"are \n" +"The \"instructions\" attached to each clove inside the encryption layer includes \n" +"the ability to request that the clove be forwarded locally, to a remote router, \n" +"or to a remote tunnel on a remote router. There are fields in those instructions \n" +"allowing a peer to request that the delivery be delayed until a certain time \n" +"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n" +"delays</a> are deployed. It is possible to explicitly route garlic messages \n" +"any number of hops without building tunnels, or even to reroute tunnel messages \n" +"by wrapping them in garlic messages and forwarding them a number of hops prior \n" +"to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." msgstr "" @@ -10778,54 +8907,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:500 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" -"Session tags themselves have a very short lifetime, after which they are" -" \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"Session tags themselves have a very short lifetime, after which they are \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" -"One alternative is to transmit only a single session tag, and from that," -" \n" -"seed a deterministic PRNG for determining what tags to use or expect. By " -"keeping \n" -"this PRNG roughly synchronized between the sender and recipient (the " -"recipient \n" -"precomputes a window of the next e.g. 50 tags), the overhead of " -"periodically \n" -"bundling a large number of tags is removed, allowing more options in the " -"space/time \n" -"tradeoff, and perhaps reducing the number of ElGamal encryptions " -"necessary. \n" -"However, it would depend upon the strength of the PRNG to provide the " -"necessary \n" -"cover against internal adversaries, though perhaps by limiting the amount" -" \n" -"of times each PRNG is used, any weaknesses can be minimized. At the " -"moment, \n" +"One alternative is to transmit only a single session tag, and from that, \n" +"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n" +"this PRNG roughly synchronized between the sender and recipient (the recipient \n" +"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n" +"bundling a large number of tags is removed, allowing more options in the space/time \n" +"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n" +"However, it would depend upon the strength of the PRNG to provide the necessary \n" +"cover against internal adversaries, though perhaps by limiting the amount \n" +"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." msgstr "" @@ -10835,12 +8945,9 @@ msgstr "Futuro" #: i2p2www/pages/site/docs/how/tech-intro.html:563 msgid "" -"While I2P is currently functional and sufficient for many scenarios, " -"there \n" -"are several areas which require further improvement to meet the needs of " -"those \n" -"facing more powerful adversaries as well as substantial user experience " -"optimization." +"While I2P is currently functional and sufficient for many scenarios, there \n" +"are several areas which require further improvement to meet the needs of those \n" +"facing more powerful adversaries as well as substantial user experience optimization." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:569 @@ -10849,106 +8956,64 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:570 msgid "" -"I2P is an overlay network designed to be run on top of a functional " -"packet \n" -"switched network, exploiting the end to end principle to offer anonymity " -"and \n" -"security. While the Internet no longer fully embraces the end to end " -"principle\n" +"I2P is an overlay network designed to be run on top of a functional packet \n" +"switched network, exploiting the end to end principle to offer anonymity and \n" +"security. While the Internet no longer fully embraces the end to end principle\n" "(due to the usage of NAT), \n" -"I2P does require a substantial portion of the network to be reachable - " -"there \n" -"may be a number of peers along the edges running using restricted routes," -" \n" -"but I2P does not include an appropriate routing algorithm for the " -"degenerate \n" -"case where most peers are unreachable. It would, however work on top of a" -" \n" +"I2P does require a substantial portion of the network to be reachable - there \n" +"may be a number of peers along the edges running using restricted routes, \n" +"but I2P does not include an appropriate routing algorithm for the degenerate \n" +"case where most peers are unreachable. It would, however work on top of a \n" "network employing such an algorithm." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:582 msgid "" -"Restricted route operation, where there are limits to what peers are " -"reachable \n" -"directly, has several different functional and anonymity implications, " -"dependent \n" -"upon how the restricted routes are handled. At the most basic level, " -"restricted \n" -"routes exist when a peer is behind a NAT or firewall which does not allow" -" \n" -"inbound connections. This was largely addressed in I2P 0.6.0.6 by " -"integrating \n" -"distributed hole punching into the transport layer, allowing people " -"behind \n" -"most NATs and firewalls to receive unsolicited connections without any " -"configuration. \n" -"However, this does not limit the exposure of the peer's IP address to " -"routers \n" -"inside the network, as they can simply get introduced to the peer through" -" \n" +"Restricted route operation, where there are limits to what peers are reachable \n" +"directly, has several different functional and anonymity implications, dependent \n" +"upon how the restricted routes are handled. At the most basic level, restricted \n" +"routes exist when a peer is behind a NAT or firewall which does not allow \n" +"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n" +"distributed hole punching into the transport layer, allowing people behind \n" +"most NATs and firewalls to receive unsolicited connections without any configuration. \n" +"However, this does not limit the exposure of the peer's IP address to routers \n" +"inside the network, as they can simply get introduced to the peer through \n" "the published introducer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:595 msgid "" -"Beyond the functional handling of restricted routes, there are two levels" -" \n" -"of restricted operation that can be used to limit the exposure of one's " -"IP \n" -"address - using router-specific tunnels for communication, and offering " -"'client \n" -"routers'. For the former, routers can either build a new pool of tunnels " -"or \n" -"reuse their exploratory pool, publishing the inbound gateways to some of " -"them \n" -"as part of their routerInfo in place of their transport addresses. When a" -" \n" -"peer wants to get in touch with them, they see those tunnel gateways in " -"the \n" -"netDb and simply send the relevant message to them through one of the " -"published \n" -"tunnels. If the peer behind the restricted route wants to reply, it may " -"do \n" -"so either directly (if they are willing to expose their IP to the peer) " -"or \n" -"indirectly through their outbound tunnels. When the routers that the peer" -" \n" -"has direct connections to want to reach it (to forward tunnel messages, " -"for \n" -"instance), they simply prioritize their direct connection over the " -"published \n" -"tunnel gateway. The concept of 'client routers' simply extends the " -"restricted \n" -"route by not publishing any router addresses. Such a router would not " -"even \n" -"need to publish their routerInfo in the netDb, merely providing their " -"self \n" -"signed routerInfo to the peers that it contacts (necessary to pass the " -"router's \n" -"public keys). Both levels of restricted route operation are planned for " -"I2P \n" +"Beyond the functional handling of restricted routes, there are two levels \n" +"of restricted operation that can be used to limit the exposure of one's IP \n" +"address - using router-specific tunnels for communication, and offering 'client \n" +"routers'. For the former, routers can either build a new pool of tunnels or \n" +"reuse their exploratory pool, publishing the inbound gateways to some of them \n" +"as part of their routerInfo in place of their transport addresses. When a \n" +"peer wants to get in touch with them, they see those tunnel gateways in the \n" +"netDb and simply send the relevant message to them through one of the published \n" +"tunnels. If the peer behind the restricted route wants to reply, it may do \n" +"so either directly (if they are willing to expose their IP to the peer) or \n" +"indirectly through their outbound tunnels. When the routers that the peer \n" +"has direct connections to want to reach it (to forward tunnel messages, for \n" +"instance), they simply prioritize their direct connection over the published \n" +"tunnel gateway. The concept of 'client routers' simply extends the restricted \n" +"route by not publishing any router addresses. Such a router would not even \n" +"need to publish their routerInfo in the netDb, merely providing their self \n" +"signed routerInfo to the peers that it contacts (necessary to pass the router's \n" +"public keys). Both levels of restricted route operation are planned for I2P \n" "2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:617 msgid "" -"There are tradeoffs for those behind restricted routes, as they would " -"likely \n" -"participate in other people's tunnels less frequently, and the routers " -"which \n" -"they are connected to would be able to infer traffic patterns that would " -"not \n" -"otherwise be exposed. On the other hand, if the cost of that exposure is " -"less \n" -"than the cost of an IP being made available, it may be worthwhile. This, " -"of \n" -"course, assumes that the peers that the router behind a restricted route " -"contacts \n" -"are not hostile - either the network is large enough that the probability" -" \n" -"of using a hostile peer to get connected is small enough, or trusted (and" -" \n" +"There are tradeoffs for those behind restricted routes, as they would likely \n" +"participate in other people's tunnels less frequently, and the routers which \n" +"they are connected to would be able to infer traffic patterns that would not \n" +"otherwise be exposed. On the other hand, if the cost of that exposure is less \n" +"than the cost of an IP being made available, it may be worthwhile. This, of \n" +"course, assumes that the peers that the router behind a restricted route contacts \n" +"are not hostile - either the network is large enough that the probability \n" +"of using a hostile peer to get connected is small enough, or trusted (and \n" "perhaps temporary) peers are used instead." msgstr "" @@ -10958,45 +9023,28 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:630 msgid "" -"Even though the bulk of I2P's initial efforts have been on low latency " -"communication, \n" -"it was designed with variable latency services in mind from the " -"beginning. \n" -"At the most basic level, applications running on top of I2P can offer the" -" \n" -"anonymity of medium and high latency communication while still blending " -"their \n" -"traffic patterns in with low latency traffic. Internally though, I2P can " -"offer \n" -"its own medium and high latency communication through the garlic " -"encryption \n" -"- specifying that the message should be sent after a certain delay, at a " -"certain \n" -"time, after a certain number of messages have passed, or another mix " -"strategy. \n" -"With the layered encryption, only the router that the clove exposed the " -"delay \n" -"request would know that the message requires high latency, allowing the " -"traffic \n" -"to blend in further with the low latency traffic. Once the transmission " -"precondition \n" -"is met, the router holding on to the clove (which itself would likely be " -"a \n" -"garlic message) simply forwards it as requested - to a router, to a " -"tunnel, \n" +"Even though the bulk of I2P's initial efforts have been on low latency communication, \n" +"it was designed with variable latency services in mind from the beginning. \n" +"At the most basic level, applications running on top of I2P can offer the \n" +"anonymity of medium and high latency communication while still blending their \n" +"traffic patterns in with low latency traffic. Internally though, I2P can offer \n" +"its own medium and high latency communication through the garlic encryption \n" +"- specifying that the message should be sent after a certain delay, at a certain \n" +"time, after a certain number of messages have passed, or another mix strategy. \n" +"With the layered encryption, only the router that the clove exposed the delay \n" +"request would know that the message requires high latency, allowing the traffic \n" +"to blend in further with the low latency traffic. Once the transmission precondition \n" +"is met, the router holding on to the clove (which itself would likely be a \n" +"garlic message) simply forwards it as requested - to a router, to a tunnel, \n" "or, most likely, to a remote client destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:647 msgid "" -"There are a substantial number of ways to exploit this capacity for high" -" \n" -"latency comm in I2P, but for the moment, doing so has been scheduled for " -"the \n" -"I2P 3.0 release. In the meantime, those requiring the anonymity that high" -" \n" -"latency comm can offer should look towards the application layer to " -"provide \n" +"There are a substantial number of ways to exploit this capacity for high \n" +"latency comm in I2P, but for the moment, doing so has been scheduled for the \n" +"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n" +"latency comm can offer should look towards the application layer to provide \n" "it." msgstr "" @@ -11030,18 +9078,12 @@ msgstr "Sistemi similari" #: i2p2www/pages/site/docs/how/tech-intro.html:665 msgid "" -"I2P's architecture builds on the concepts of message oriented middleware," -" \n" -"the topology of DHTs, the anonymity and cryptography of free route " -"mixnets, \n" -"and the adaptability of packet switched networking. The value comes not " -"from \n" -"novel concepts of algorithms though, but from careful engineering " -"combining \n" -"the research results of existing systems and papers. While there are a " -"few \n" -"similar efforts worth reviewing, both for technical and functional " -"comparisons, \n" +"I2P's architecture builds on the concepts of message oriented middleware, \n" +"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n" +"and the adaptability of packet switched networking. The value comes not from \n" +"novel concepts of algorithms though, but from careful engineering combining \n" +"the research results of existing systems and papers. While there are a few \n" +"similar efforts worth reviewing, both for technical and functional comparisons, \n" "two in particular are pulled out here - Tor and Freenet." msgstr "" @@ -11058,209 +9100,127 @@ msgstr "sito web" #: i2p2www/pages/site/docs/how/tech-intro.html:682 msgid "" "At first glance, Tor and I2P have many functional and anonymity related \n" -"similarities. While I2P's development began before we were aware of the " -"early \n" -"stage efforts on Tor, many of the lessons of the original onion routing " -"and \n" -"ZKS efforts were integrated into I2P's design. Rather than building an " -"essentially \n" -"trusted, centralized system with directory servers, I2P has a self " -"organizing \n" -"network database with each peer taking on the responsibility of profiling" -" \n" -"other routers to determine how best to exploit available resources. " -"Another \n" -"key difference is that while both I2P and Tor use layered and ordered " -"paths \n" -"(tunnels and circuits/streams), I2P is fundamentally a packet switched " -"network, \n" -"while Tor is fundamentally a circuit switched one, allowing I2P to " -"transparently \n" -"route around congestion or other network failures, operate redundant " -"pathways, \n" -"and load balance the data across available resources. While Tor offers " -"the \n" -"useful outproxy functionality by offering integrated outproxy discovery " -"and \n" -"selection, I2P leaves such application layer decisions up to applications" -" \n" -"running on top of I2P - in fact, I2P has even externalized the TCP-like " -"streaming \n" -"library itself to the application layer, allowing developers to " -"experiment \n" -"with different strategies, exploiting their domain specific knowledge to " -"offer \n" +"similarities. While I2P's development began before we were aware of the early \n" +"stage efforts on Tor, many of the lessons of the original onion routing and \n" +"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n" +"trusted, centralized system with directory servers, I2P has a self organizing \n" +"network database with each peer taking on the responsibility of profiling \n" +"other routers to determine how best to exploit available resources. Another \n" +"key difference is that while both I2P and Tor use layered and ordered paths \n" +"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n" +"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n" +"route around congestion or other network failures, operate redundant pathways, \n" +"and load balance the data across available resources. While Tor offers the \n" +"useful outproxy functionality by offering integrated outproxy discovery and \n" +"selection, I2P leaves such application layer decisions up to applications \n" +"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n" +"library itself to the application layer, allowing developers to experiment \n" +"with different strategies, exploiting their domain specific knowledge to offer \n" "better performance." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:703 msgid "" -"From an anonymity perspective, there is much similarity when the core " -"networks \n" -"are compared. However, there are a few key differences. When dealing with" -" \n" -"an internal adversary or most external adversaries, I2P's simplex tunnels" -" \n" -"expose half as much traffic data than would be exposed with Tor's duplex " -"circuits \n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels. \n" -"While I2P's peer selection and ordering strategies should sufficiently " -"address \n" -"predecessor attacks, should a switch to bidirectional tunnels be " -"necessary,\n" -"we could simply build an inbound and outbound tunnel along the same " -"routers." +"From an anonymity perspective, there is much similarity when the core networks \n" +"are compared. However, there are a few key differences. When dealing with \n" +"an internal adversary or most external adversaries, I2P's simplex tunnels \n" +"expose half as much traffic data than would be exposed with Tor's duplex circuits \n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels. \n" +"While I2P's peer selection and ordering strategies should sufficiently address \n" +"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n" +"we could simply build an inbound and outbound tunnel along the same routers." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:717 msgid "" -"Another anonymity issue comes up in Tor's use of telescopic tunnel " -"creation, \n" -"as simple packet counting and timing measurements as the cells in a " -"circuit \n" -"pass through an adversary's node exposes statistical information " -"regarding \n" -"where the adversary is within the circuit. I2P's unidirectional tunnel " -"creation \n" -"with a single message so that this data is not exposed. Protecting the " -"position \n" -"in a tunnel is important, as an adversary would otherwise be able to " -"mount \n" -"a series of powerful predecessor, intersection, and traffic confirmation " -"attacks." +"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n" +"as simple packet counting and timing measurements as the cells in a circuit \n" +"pass through an adversary's node exposes statistical information regarding \n" +"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n" +"with a single message so that this data is not exposed. Protecting the position \n" +"in a tunnel is important, as an adversary would otherwise be able to mount \n" +"a series of powerful predecessor, intersection, and traffic confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:727 msgid "" -"Tor's support for a second tier of \"onion proxies\" does offer a non-" -"trivial \n" -"degree of anonymity while requiring a low cost of entry, while I2P will " -"not \n" +"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n" +"degree of anonymity while requiring a low cost of entry, while I2P will not \n" "offer this topology until <a href=\"#future.restricted\">2.0</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:733 msgid "" -"On the whole, Tor and I2P complement each other in their focus - Tor " -"works \n" -"towards offering high speed anonymous Internet outproxying, while I2P " -"works \n" -"towards offering a decentralized resilient network in itself. In theory, " -"both \n" -"can be used to achieve both purposes, but given limited development " -"resources, \n" -"they both have their strengths and weaknesses. The I2P developers have " -"considered \n" -"the steps necessary to modify Tor to take advantage of I2P's design, but " -"concerns \n" -"of Tor's viability under resource scarcity suggest that I2P's packet " -"switching \n" +"On the whole, Tor and I2P complement each other in their focus - Tor works \n" +"towards offering high speed anonymous Internet outproxying, while I2P works \n" +"towards offering a decentralized resilient network in itself. In theory, both \n" +"can be used to achieve both purposes, but given limited development resources, \n" +"they both have their strengths and weaknesses. The I2P developers have considered \n" +"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n" +"of Tor's viability under resource scarcity suggest that I2P's packet switching \n" "architecture will be able to exploit scarce resources more effectively." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:747 msgid "" -"Freenet played a large part in the initial stages of I2P's design - " -"giving \n" -"proof to the viability of a vibrant pseudonymous community completely " -"contained \n" -"within the network, demonstrating that the dangers inherent in outproxies" -" \n" -"could be avoided. The first seed of I2P began as a replacement " -"communication \n" -"layer for Freenet, attempting to factor out the complexities of a " -"scalable, \n" -"anonymous and secure point to point communication from the complexities " -"of \n" -"a censorship resistant distributed data store. Over time however, some of" -" \n" -"the anonymity and scalability issues inherent in Freenet's algorithms " -"made \n" -"it clear that I2P's focus should stay strictly on providing a generic " -"anonymous \n" -"communication layer, rather than as a component of Freenet. Over the " -"years, \n" -"the Freenet developers have come to see the weaknesses in the older " -"design, \n" -"prompting them to suggest that they will require a \"premix\" layer to " -"offer \n" -"substantial anonymity. In other words, Freenet needs to run on top of a " -"mixnet \n" -"such as I2P or Tor, with \"client nodes\" requesting and publishing data " -"through \n" -"the mixnet to the \"server nodes\" which then fetch and store the data " -"according \n" +"Freenet played a large part in the initial stages of I2P's design - giving \n" +"proof to the viability of a vibrant pseudonymous community completely contained \n" +"within the network, demonstrating that the dangers inherent in outproxies \n" +"could be avoided. The first seed of I2P began as a replacement communication \n" +"layer for Freenet, attempting to factor out the complexities of a scalable, \n" +"anonymous and secure point to point communication from the complexities of \n" +"a censorship resistant distributed data store. Over time however, some of \n" +"the anonymity and scalability issues inherent in Freenet's algorithms made \n" +"it clear that I2P's focus should stay strictly on providing a generic anonymous \n" +"communication layer, rather than as a component of Freenet. Over the years, \n" +"the Freenet developers have come to see the weaknesses in the older design, \n" +"prompting them to suggest that they will require a \"premix\" layer to offer \n" +"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n" +"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n" +"the mixnet to the \"server nodes\" which then fetch and store the data according \n" "to Freenet's heuristic distributed data storage algorithms." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:766 msgid "" -"Freenet's functionality is very complementary to I2P's, as Freenet " -"natively \n" -"provides many of the tools for operating medium and high latency systems," -" \n" -"while I2P natively provides the low latency mix network suitable for " -"offering \n" -"adequate anonymity. The logic of separating the mixnet from the " -"censorship-\n" -"resistant distributed data store still seems self-evident from an " -"engineering, \n" -"anonymity, security, and resource allocation perspective, so hopefully " -"the \n" -"Freenet team will pursue efforts in that direction, if not simply reusing" -" \n" +"Freenet's functionality is very complementary to I2P's, as Freenet natively \n" +"provides many of the tools for operating medium and high latency systems, \n" +"while I2P natively provides the low latency mix network suitable for offering \n" +"adequate anonymity. The logic of separating the mixnet from the censorship-\n" +"resistant distributed data store still seems self-evident from an engineering, \n" +"anonymity, security, and resource allocation perspective, so hopefully the \n" +"Freenet team will pursue efforts in that direction, if not simply reusing \n" "(or helping to improve, as necessary) existing mixnets like I2P or Tor." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:777 msgid "" "It is worth mentioning that there has recently been discussion and work \n" -"by the Freenet developers on a \"globally scalable darknet\" using " -"restricted \n" -"routes between peers of various trust. While insufficient information has" -" \n" -"been made publicly available regarding how such a system would operate " -"for \n" -"a full review, from what has been said the anonymity and scalability " -"claims \n" -"seem highly dubious. In particular, the appropriateness for use in " -"hostile \n" -"regimes against state level adversaries has been tremendously overstated," -" \n" -"and any analysis on the implications of resource scarcity upon the " -"scalability \n" -"of the network has seemingly been avoided. Further questions regarding " -"susceptibility \n" -"to traffic analysis, trust and other topics do exist, but a more in-depth" -" \n" -"review of this \"globally scalable darknet\" will have to wait until the " -"Freenet \n" +"by the Freenet developers on a \"globally scalable darknet\" using restricted \n" +"routes between peers of various trust. While insufficient information has \n" +"been made publicly available regarding how such a system would operate for \n" +"a full review, from what has been said the anonymity and scalability claims \n" +"seem highly dubious. In particular, the appropriateness for use in hostile \n" +"regimes against state level adversaries has been tremendously overstated, \n" +"and any analysis on the implications of resource scarcity upon the scalability \n" +"of the network has seemingly been avoided. Further questions regarding susceptibility \n" +"to traffic analysis, trust and other topics do exist, but a more in-depth \n" +"review of this \"globally scalable darknet\" will have to wait until the Freenet \n" "team makes more information available." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:793 msgid "" -"I2P itself doesn't really do much - it simply sends messages to remote " -"destinations \n" -"and receives messages targeting local destinations - most of the " -"interesting \n" -"work goes on at the layers above it. By itself, I2P could be seen as an " -"anonymous \n" -"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming" -" library</a> \n" -"as an implementation of an anonymous and secure TCP layer on top of it. " -"Beyond \n" -"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP " -"proxying \n" -"system for either getting into or out of the I2P network, plus a variety " -"of \n" +"I2P itself doesn't really do much - it simply sends messages to remote destinations \n" +"and receives messages targeting local destinations - most of the interesting \n" +"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n" +"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n" +"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n" +"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n" +"system for either getting into or out of the I2P network, plus a variety of \n" "network applications provide further functionality for end users." msgstr "" @@ -11270,63 +9230,46 @@ msgstr "Libreria di streaming" #: i2p2www/pages/site/docs/how/tech-intro.html:805 msgid "" -"The I2P streaming library can be viewed as a generic streaming interface " -"(mirroring TCP sockets),\n" -"and the implementation supports a <a " -"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding " -"window protocol</a>\n" -"with several optimizations, to take into account the high delay over I2P." -"\n" +"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n" +"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n" +"with several optimizations, to take into account the high delay over I2P.\n" "Individual streams may adjust the maximum packet size and \n" -"other options, though the default of 4KB compressed seems a reasonable " -"tradeoff \n" -"between the bandwidth costs of retransmitting lost messages and the " -"latency \n" +"other options, though the default of 4KB compressed seems a reasonable tradeoff \n" +"between the bandwidth costs of retransmitting lost messages and the latency \n" "of multiple messages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:815 msgid "" "In addition, in consideration of the relatively high cost of subsequent \n" -"messages, the streaming library's protocol for scheduling and delivering " -"messages \n" -"has been optimized to allow individual messages passed to contain as much" -" \n" -"information as is available. For instance, a small HTTP transaction " -"proxied \n" -"through the streaming library can be completed in a single round trip - " -"the \n" -"first message bundles a SYN, FIN and the small payload (an HTTP request " -"typically \n" -"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many" -" \n" -"HTTP responses fit). While an additional ACK must be transmitted to tell " -"the \n" -"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy " -"can \n" +"messages, the streaming library's protocol for scheduling and delivering messages \n" +"has been optimized to allow individual messages passed to contain as much \n" +"information as is available. For instance, a small HTTP transaction proxied \n" +"through the streaming library can be completed in a single round trip - the \n" +"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n" +"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n" +"HTTP responses fit). While an additional ACK must be transmitted to tell the \n" +"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n" "deliver the full response to the browser immediately." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:828 msgid "" -"On the whole, however, the streaming library bears much resemblance to an" -" \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms \n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK, \n" +"On the whole, however, the streaming library bears much resemblance to an \n" +"abstraction of TCP, with its sliding windows, congestion control algorithms \n" +"(both slow start and congestion avoidance), and general packet behavior (ACK, \n" "SYN, FIN, RST, etc)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:835 -msgid "Naming library and addressbook" +msgid "Naming library and address book" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:836 #, python-format msgid "" -"For more information see the <a href=\"%(naming)s\">Naming and " -"Addressbook</a> page." +"For more information see the <a href=\"%(naming)s\">Naming and Address " +"Book</a> page." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:840 @@ -11344,227 +9287,142 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:842 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning" -" \n" -"with advocates across the spectrum of possibilities. However, given I2P's" -" \n" -"inherent demand for secure communication and decentralized operation, the" -" \n" -"traditional DNS-style naming system is clearly out, as are \"majority " -"rules\" \n" -"voting systems. Instead, I2P ships with a generic naming library and a " -"base \n" -"implementation designed to work off a local name to destination mapping, " -"as \n" -"well as an optional add-on application called the \"addressbook\". The " -"addressbook \n" -"is a web-of-trust-driven secure, distributed, and human readable naming " -"system, \n" -"sacrificing only the call for all human readable names to be globally " -"unique \n" -"by mandating only local uniqueness. While all messages in I2P are " -"cryptographically \n" -"addressed by their destination, different people can have local " -"addressbook \n" -"entries for \"Alice\" which refer to different destinations. People can " -"still \n" -"discover new names by importing published addressbooks of peers specified" -" \n" -"in their web of trust, by adding in the entries provided through a third " -"party, \n" -"or (if some people organize a series of published addressbooks using a " -"first \n" -"come first serve registration system) people can choose to treat these " -"addressbooks \n" +"Naming within I2P has been an oft-debated topic since the very beginning \n" +"with advocates across the spectrum of possibilities. However, given I2P's \n" +"inherent demand for secure communication and decentralized operation, the \n" +"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n" +"voting systems. Instead, I2P ships with a generic naming library and a base \n" +"implementation designed to work off a local name to destination mapping, as \n" +"well as an optional add-on application called the \"Address Book\". The address book \n" +"is a web-of-trust-driven secure, distributed, and human readable naming system, \n" +"sacrificing only the call for all human readable names to be globally unique \n" +"by mandating only local uniqueness. While all messages in I2P are cryptographically \n" +"addressed by their destination, different people can have local address book \n" +"entries for \"Alice\" which refer to different destinations. People can still \n" +"discover new names by importing published address books of peers specified \n" +"in their web of trust, by adding in the entries provided through a third party, \n" +"or (if some people organize a series of published address books using a first \n" +"come first serve registration system) people can choose to treat these address books \n" "as name servers, emulating traditional DNS." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:862 msgid "" "I2P does not promote the use of DNS-like services though, as the damage \n" -"done by hijacking a site can be tremendous - and insecure destinations " -"have \n" -"no value. DNSsec itself still falls back on registrars and certificate " -"authorities, \n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the \n" -"reply spoofed, as they are encrypted to the destination's public keys, " -"and \n" -"a destination itself is just a pair of public keys and a certificate. " -"DNS-style \n" -"systems on the other hand allow any of the name servers on the lookup " -"path \n" -"to mount simple denial of service and spoofing attacks. Adding on a " -"certificate \n" -"authenticating the responses as signed by some centralized certificate " -"authority \n" -"would address many of the hostile nameserver issues but would leave open " -"replay \n" +"done by hijacking a site can be tremendous - and insecure destinations have \n" +"no value. DNSsec itself still falls back on registrars and certificate authorities, \n" +"while with I2P, requests sent to a destination cannot be intercepted or the \n" +"reply spoofed, as they are encrypted to the destination's public keys, and \n" +"a destination itself is just a pair of public keys and a certificate. DNS-style \n" +"systems on the other hand allow any of the name servers on the lookup path \n" +"to mount simple denial of service and spoofing attacks. Adding on a certificate \n" +"authenticating the responses as signed by some centralized certificate authority \n" +"would address many of the hostile nameserver issues but would leave open replay \n" "attacks as well as hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:876 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness \n" -"of Sybil attacks in anonymous systems - the attacker can simply create an" -" \n" -"arbitrarily high number of peers and \"vote\" with each to take over a " -"given \n" -"name. Proof-of-work methods can be used to make identity non-free, but as" -" \n" -"the network grows the load required to contact everyone to conduct online" -" \n" -"voting is implausible, or if the full network is not queried, different " -"sets \n" +"Voting style naming is dangerous as well, especially given the effectiveness \n" +"of Sybil attacks in anonymous systems - the attacker can simply create an \n" +"arbitrarily high number of peers and \"vote\" with each to take over a given \n" +"name. Proof-of-work methods can be used to make identity non-free, but as \n" +"the network grows the load required to contact everyone to conduct online \n" +"voting is implausible, or if the full network is not queried, different sets \n" "of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:886 msgid "" -"As with the Internet however, I2P is keeping the design and operation of" -" \n" -"a naming system out of the (IP-like) communication layer. The bundled " -"naming \n" -"library includes a simple service provider interface which alternate " -"naming \n" -"systems can plug into, allowing end users to drive what sort of naming " -"tradeoffs \n" +"As with the Internet however, I2P is keeping the design and operation of \n" +"a naming system out of the (IP-like) communication layer. The bundled naming \n" +"library includes a simple service provider interface which alternate naming \n" +"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n" "they prefer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:895 msgid "" -"The old Syndie bundled with I2P has been replaced by the new Syndie which" -"\n" -"is distributed separately. For more information see the <a " -"href=\"http://syndie.i2p2.de/\">Syndie</a>\n" +"The old Syndie bundled with I2P has been replaced by the new Syndie which\n" +"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n" "pages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:901 msgid "" -"Syndie is a safe, anonymous blogging / content publication / content " -"aggregation \n" -"system. It lets you create information, share it with others, and read " -"posts \n" -"from those you're interested in, all while taking into consideration your" -" \n" -"needs for security and anonymity. Rather than building its own content " -"distribution \n" -"network, Syndie is designed to run on top of existing networks, " -"syndicating \n" -"content through eepsites, Tor hidden services, Freenet freesites, normal " -"websites, \n" -"usenet newsgroups, email lists, RSS feeds, etc. Data published with " -"Syndie \n" -"is done so as to offer pseudonymous authentication to anyone reading or " -"archiving \n" +"Syndie is a safe, anonymous blogging / content publication / content aggregation \n" +"system. It lets you create information, share it with others, and read posts \n" +"from those you're interested in, all while taking into consideration your \n" +"needs for security and anonymity. Rather than building its own content distribution \n" +"network, Syndie is designed to run on top of existing networks, syndicating \n" +"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n" +"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n" +"is done so as to offer pseudonymous authentication to anyone reading or archiving \n" "it." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:916 msgid "" -"I2PTunnel is probably I2P's most popular and versatile client " -"application, \n" -"allowing generic proxying both into and out of the I2P network. I2PTunnel" -" \n" -"can be viewed as four separate proxying applications - a \"client\" which" -" receives \n" -"inbound TCP connections and forwards them to a given I2P destination, an " -"\"httpclient\" \n" -"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the " -"requests to \n" -"the appropriate I2P destination (after querying the naming service if " -"necessary), \n" -"a \"server\" which receives inbound I2P streaming connections on a " -"destination \n" -"and forwards them to a given TCP host+port, and an \"httpserver\" which " -"extends \n" -"the \"server\" by parsing the HTTP request and responses to allow safer " -"operation. \n" -"There is an additional \"socksclient\" application, but its use is not " -"encouraged \n" +"I2PTunnel is probably I2P's most popular and versatile client application, \n" +"allowing generic proxying both into and out of the I2P network. I2PTunnel \n" +"can be viewed as four separate proxying applications - a \"client\" which receives \n" +"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n" +"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n" +"the appropriate I2P destination (after querying the naming service if necessary), \n" +"a \"server\" which receives inbound I2P streaming connections on a destination \n" +"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n" +"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n" +"There is an additional \"socksclient\" application, but its use is not encouraged \n" "for reasons previously mentioned." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:930 msgid "" -"I2P itself is not an outproxy network - the anonymity and security " -"concerns \n" -"inherent in a mix net which forwards data into and out of the mix have " -"kept \n" -"I2P's design focused on providing an anonymous network which capable of " -"meeting \n" -"the user's needs without requiring external resources. However, the " -"I2PTunnel \n" -"\"httpclient\" application offers a hook for outproxying - if the " -"hostname requested \n" -"doesn't end in \".i2p\", it picks a random destination from a user-" -"provided \n" -"set of outproxies and forwards the request to them. These destinations " -"are \n" -"simply I2PTunnel \"server\" instances run by volunteers who have " -"explicitly \n" -"chosen to run outproxies - no one is an outproxy by default, and running " -"an \n" -"outproxy doesn't automatically tell other people to proxy through you. " -"While \n" -"outproxies do have inherent weaknesses, they offer a simple proof of " -"concept \n" -"for using I2P and provide some functionality under a threat model which " -"may \n" +"I2P itself is not an outproxy network - the anonymity and security concerns \n" +"inherent in a mix net which forwards data into and out of the mix have kept \n" +"I2P's design focused on providing an anonymous network which capable of meeting \n" +"the user's needs without requiring external resources. However, the I2PTunnel \n" +"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n" +"doesn't end in \".i2p\", it picks a random destination from a user-provided \n" +"set of outproxies and forwards the request to them. These destinations are \n" +"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n" +"chosen to run outproxies - no one is an outproxy by default, and running an \n" +"outproxy doesn't automatically tell other people to proxy through you. While \n" +"outproxies do have inherent weaknesses, they offer a simple proof of concept \n" +"for using I2P and provide some functionality under a threat model which may \n" "be sufficient for some users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:946 msgid "" -"I2PTunnel enables most of the applications in use. An \"httpserver\" " -"pointing \n" -"at a webserver lets anyone run their own anonymous website (or " -"\"eepsite\") \n" -"- a webserver is bundled with I2P for this purpose, but any webserver can" -" \n" -"be used. Anyone may run a \"client\" pointing at one of the anonymously " -"hosted \n" -"IRC servers, each of which are running a \"server\" pointing at their " -"local \n" -"IRCd and communicating between IRCds over their own \"client\" tunnels. " -"End \n" -"users also have \"client\" tunnels pointing at <a " -"href=\"#app.i2pmail\">I2Pmail's</a> \n" -"POP3 and SMTP destinations (which in turn are simply \"server\" instances" -" pointing \n" -"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at " -"I2P's CVS \n" -"server, allowing anonymous development. At times people have even run " -"\"client\" \n" +"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n" +"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n" +"- a webserver is bundled with I2P for this purpose, but any webserver can \n" +"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n" +"IRC servers, each of which are running a \"server\" pointing at their local \n" +"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n" +"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n" +"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n" +"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n" +"server, allowing anonymous development. At times people have even run \"client\" \n" "proxies to access the \"server\" instances pointing at an NNTP server." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:963 msgid "" -"i2p-bt is a port of the mainline python BitTorrent client to run both the" -" \n" -"tracker and peer communication over I2P. Tracker requests are forwarded " -"through \n" -"the eepproxy to eepsites specified in the torrent file while tracker " -"responses \n" -"refer to peers by their destination explicitly, allowing i2p-bt to open " -"up \n" -"a <a href=\"#app.streaming\">streaming lib</a> connection to query them " -"for \n" +"i2p-bt is a port of the mainline python BitTorrent client to run both the \n" +"tracker and peer communication over I2P. Tracker requests are forwarded through \n" +"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n" +"refer to peers by their destination explicitly, allowing i2p-bt to open up \n" +"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n" "blocks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:972 msgid "" -"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making" -" \n" -"a few modifications as necessary to strip any anonymity-compromising " -"information \n" -"from the application and to take into consideration the fact that IPs " -"cannot \n" +"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n" +"a few modifications as necessary to strip any anonymity-compromising information \n" +"from the application and to take into consideration the fact that IPs cannot \n" "be used for identifying peers." msgstr "" @@ -11577,10 +9435,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:986 msgid "" -"Bundled with the I2P install, I2PSnark offers a simple anonymous " -"BitTorrent \n" -"client with multitorrent capabilities, exposing all of the functionality " -"through \n" +"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n" +"client with multitorrent capabilities, exposing all of the functionality through \n" "a plain HTML web interface." msgstr "" @@ -11588,9 +9444,7 @@ msgstr "" #, python-format msgid "" "Robert is a Bittorrent client written in Python.\n" -"It is hosted on <a " -"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- " -"TODO: expand -->" +"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1003 @@ -11602,12 +9456,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1011 msgid "" -"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to" -" \n" -"run entirely on top of I2P. While it has disabled some of Phex's " -"functionality, \n" -"such as integration with Gnutella webcaches, the basic file sharing and " -"chatting \n" +"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n" +"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n" +"such as integration with Gnutella webcaches, the basic file sharing and chatting \n" "system is fully functional." msgstr "" @@ -11620,62 +9471,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1029 #, python-format msgid "" -"I2Pmail is more a service than an application - postman offers both " -"internal \n" -"and external email with POP3 and SMTP service through I2PTunnel instances" -" \n" -"accessing a series of components developed with mastiejaner, allowing " -"people \n" -"to use their preferred mail clients to send and receive mail " -"pseudonymously. \n" -"However, as most mail clients expose substantial identifying information," -" \n" -"I2P bundles susi23's web based susimail client which has been built " -"specifically \n" -"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers " -"transparent \n" -"virus filtering as well as denial of service prevention with hashcash " -"augmented \n" -"quotas. In addition, each user has control of their batching strategy " -"prior \n" -"to delivery through the mail.i2p outproxies, which are separate from the " -"mail.i2p \n" -"SMTP and POP3 servers - both the outproxies and inproxies communicate " -"with \n" -"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising " -"those \n" -"non-anonymous locations does not give access to the mail accounts or " -"activity \n" -"patterns of the user. At the moment the developers work on a " -"decentralized \n" -"mailsystem, called \"v2mail\". More information can be found on the " -"eepsite \n" +"I2Pmail is more a service than an application - postman offers both internal \n" +"and external email with POP3 and SMTP service through I2PTunnel instances \n" +"accessing a series of components developed with mastiejaner, allowing people \n" +"to use their preferred mail clients to send and receive mail pseudonymously. \n" +"However, as most mail clients expose substantial identifying information, \n" +"I2P bundles susi23's web based susimail client which has been built specifically \n" +"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n" +"virus filtering as well as denial of service prevention with hashcash augmented \n" +"quotas. In addition, each user has control of their batching strategy prior \n" +"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n" +"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n" +"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n" +"non-anonymous locations does not give access to the mail accounts or activity \n" +"patterns of the user. At the moment the developers work on a decentralized \n" +"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n" "<a href=\"http://%(postman)s/\">%(postman)s</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1051 msgid "" -"I2P-Bote is a distributed e-mail application. It does not use the " -"traditional\n" -"e-mail concept of sending an e-mail to a server and retrieving it from a " -"server.\n" +"I2P-Bote is a distributed e-mail application. It does not use the traditional\n" +"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n" "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n" -"One user can push a mail into the DHT, while another can request the " -"e-mail from the DHT.\n" -"And all the mails sent within the I2P-Bote network are automatically " -"encrypted end-to-end. <br>\n" -"Furthermore, I2P-Bote offers a remailer function on top of I2P, for " -"increased high-latency anonymity." +"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n" +"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n" +"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1061 msgid "" -"I2P-Messenger is an end-to-end encrypted serverless communication " -"application.\n" -"For communication between two users, they need to give each other their " -"destination keys, to allow the other to connect.\n" -"It supports file transfer and has a search for other users, based on " -"Seedless." +"I2P-Messenger is an end-to-end encrypted serverless communication application.\n" +"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n" +"It supports file transfer and has a search for other users, based on Seedless." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:2 @@ -11825,18 +9653,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" -"to find out information you don't want them to know?\" - who you are, " -"where\n" -"you are located, who you communicate with, or even when you communicate." -" \n" -"\"Perfect\" anonymity is not a useful concept here - software will not " -"make \n" -"you indistinguishable from people that don't use computers or who are not" -" on\n" -"the Internet. Instead, we are working to provide sufficient anonymity to" -" meet the\n" -"real needs of whomever we can - from those simply browsing websites, to " -"those exchanging\n" +"to find out information you don't want them to know?\" - who you are, where\n" +"you are located, who you communicate with, or even when you communicate. \n" +"\"Perfect\" anonymity is not a useful concept here - software will not make \n" +"you indistinguishable from people that don't use computers or who are not on\n" +"the Internet. Instead, we are working to provide sufficient anonymity to meet the\n" +"real needs of whomever we can - from those simply browsing websites, to those exchanging\n" "data, to those fearful of discovery by powerful organizations or states." msgstr "" @@ -11844,17 +9666,14 @@ msgstr "" msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" -"answering that question by exploring how I2P operates under various " -"attacks\n" +"answering that question by exploring how I2P operates under various attacks\n" "so that you may decide whether it meets your needs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" -"We welcome further research and analysis on I2P's resistance to the " -"threats described below.\n" -"More review of existing literature (much of it focused on Tor) and " -"original\n" +"We welcome further research and analysis on I2P's resistance to the threats described below.\n" +"More review of existing literature (much of it focused on Tor) and original\n" "work focused on I2P is needed." msgstr "" @@ -11866,69 +9685,52 @@ msgstr "" #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" -"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in" -" mind when \n" +"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n" "reviewing related literature:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:102 msgid "" -"<b>I2P is a free route mixnet</b> - the message creator explicitly " -"defines the\n" -"path that messages will be sent out (the outbound tunnel), and the " -"message \n" -"recipient explicitly defines the path that messages will be received on " -"(the\n" +"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n" +"path that messages will be sent out (the outbound tunnel), and the message \n" +"recipient explicitly defines the path that messages will be received on (the\n" "inbound tunnel)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:108 msgid "" -"<b>I2P has no official entry and exit points</b> - all peers fully " -"participate in the \n" +"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n" "mix, and there are no network layer in- or out-proxies (however, at the \n" "application layer, a few proxies do exist)" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:113 msgid "" -"<b>I2P is fully distributed</b> - there are no central controls or " -"authorities.\n" -"One could modify some routers to operate mix cascades (building tunnels " -"and giving\n" -"out the keys necessary to control the forwarding at the tunnel endpoint) " -"or directory \n" -"based profiling and selection, all without breaking compatibility with " -"the rest of \n" -"the network, but doing so is of course not necessary (and may even harm " -"one's\n" +"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n" +"One could modify some routers to operate mix cascades (building tunnels and giving\n" +"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n" +"based profiling and selection, all without breaking compatibility with the rest of \n" +"the network, but doing so is of course not necessary (and may even harm one's\n" "anonymity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:123 #, python-format msgid "" -"We have documented plans to implement <a " -"href=\"%(todo)s#stop\">nontrivial delays</a>\n" +"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n" "and <a href=\"%(todo)s#batching\">batching strategies</a> \n" -"whose existence is only known to the particular hop or tunnel gateway " -"that \n" -"receives the message, allowing a mostly low latency mixnet to provide " -"cover \n" +"whose existence is only known to the particular hop or tunnel gateway that \n" +"receives the message, allowing a mostly low latency mixnet to provide cover \n" "traffic for higher latency communication (e.g. email).\n" -"However we are aware that significant delays are required to provide " -"meaningful\n" -"protection, and that implementation of such delays will be a significant " -"challenge.\n" -"It is not clear at this time whether we will actually implement these " -"delay features." +"However we are aware that significant delays are required to provide meaningful\n" +"protection, and that implementation of such delays will be a significant challenge.\n" +"It is not clear at this time whether we will actually implement these delay features." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:134 msgid "" "In theory, routers along the message path may inject an \n" -"arbitrary number of hops before forwarding the message to the next peer, " -"though\n" +"arbitrary number of hops before forwarding the message to the next peer, though\n" "the current implementation does not." msgstr "" @@ -11942,8 +9744,7 @@ msgid "" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n" "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n" -"Our design benefits substantially from the research published around that" -" time.\n" +"Our design benefits substantially from the research published around that time.\n" "I2P uses several onion routing techniques, so we continue to benefit\n" "from the significant academic interest in Tor." msgstr "" @@ -11951,12 +9752,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:152 msgid "" "Taking from the attacks and analysis put forth in the \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " -"literature</a> (largely \n" -"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: " -"Protocols, Attacks, Design \n" -"Issues and Open Problems</a>), the following briefly describes a wide " -"variety \n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n" +"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n" +"Issues and Open Problems</a>), the following briefly describes a wide variety \n" "of attacks as well as many of I2Ps defenses. We update\n" "this list to include new attacks as they are identified." msgstr "" @@ -11984,66 +9782,46 @@ msgstr "" msgid "" "The\n" "<a href=\"%(comparisons)s\">network comparisons</a> and\n" -"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also " -"be helpful\n" +"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n" "to review." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:210 msgid "" -"A brute force attack can be mounted by a global passive or active " -"adversary, \n" -"watching all the messages pass between all of the nodes and attempting to" -" correlate\n" -"which message follows which path. Mounting this attack against I2P " -"should be \n" -"nontrivial, as all peers in the network are frequently sending messages " -"(both\n" -"end to end and network maintenance messages), plus an end to end message " -"changes\n" -"size and data along its path. In addition, the external adversary does " -"not have\n" -"access to the messages either, as inter-router communication is both " -"encrypted\n" -"and streamed (making two 1024 byte messages indistinguishable from one " -"2048 byte\n" +"A brute force attack can be mounted by a global passive or active adversary, \n" +"watching all the messages pass between all of the nodes and attempting to correlate\n" +"which message follows which path. Mounting this attack against I2P should be \n" +"nontrivial, as all peers in the network are frequently sending messages (both\n" +"end to end and network maintenance messages), plus an end to end message changes\n" +"size and data along its path. In addition, the external adversary does not have\n" +"access to the messages either, as inter-router communication is both encrypted\n" +"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n" "message)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:222 msgid "" -"However, a powerful attacker can use brute force to detect trends - if " -"they \n" -"can send 5GB to an I2P destination and monitor everyone's network " -"connection,\n" -"they can eliminate all peers who did not receive 5GB of data. Techniques" -" to \n" +"However, a powerful attacker can use brute force to detect trends - if they \n" +"can send 5GB to an I2P destination and monitor everyone's network connection,\n" +"they can eliminate all peers who did not receive 5GB of data. Techniques to \n" "defeat this attack exist, but may be prohibitively expensive (see: \n" -"<a " -"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s " -"mimics\n" -"or constant rate traffic). Most users are not concerned with this " -"attack, as \n" -"the cost of mounting it are extreme (and often require illegal activity)." -" \n" +"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n" +"or constant rate traffic). Most users are not concerned with this attack, as \n" +"the cost of mounting it are extreme (and often require illegal activity). \n" "However, the attack is still possible, for example by an observer at\n" "a large ISP or an Internet exchange point.\n" "Those who want to defend against it \n" "would want to take appropriate countermeasures, such as\n" -"setting low bandwidth limits, and using unpublished or encrypted " -"leasesets for eepsites.\n" -"Other countermeasures, such as nontrivial delays and restricted routes, " -"are\n" +"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n" +"Other countermeasures, such as nontrivial delays and restricted routes, are\n" "not currently implemented." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:239 #, python-format msgid "" -"As a partial defense against a single router or group of routers trying " -"to route all the network's traffic,\n" -"routers contain limits as to how many tunnels can be routed through a " -"single peer.\n" +"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n" +"routers contain limits as to how many tunnels can be routed through a single peer.\n" "As the network grows, these limits are subject to further adjustment.\n" "Other mechanisms for peer rating, selection and avoidance\n" "are discussed on the\n" @@ -12052,51 +9830,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:254 msgid "" -"I2P's messages are unidirectional and do not necessarily imply that a " -"reply\n" +"I2P's messages are unidirectional and do not necessarily imply that a reply\n" "will be sent. However, applications on top of I2P will most likely have\n" -"recognizable patterns within the frequency of their messages - for " -"instance, an \n" -"HTTP request will be a small message with a large sequence of reply " -"messages \n" -"containing the HTTP response. Using this data as well as a broad view of" -" the \n" -"network topology, an attacker may be able to disqualify some links as " -"being too \n" +"recognizable patterns within the frequency of their messages - for instance, an \n" +"HTTP request will be a small message with a large sequence of reply messages \n" +"containing the HTTP response. Using this data as well as a broad view of the \n" +"network topology, an attacker may be able to disqualify some links as being too \n" "slow to have passed the message along." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:264 msgid "" -"This sort of attack is powerful, but its applicability to I2P is non " -"obvious,\n" -"as the variation on message delays due to queuing, message processing, " -"and \n" -"throttling will often meet or exceed the time of passing a message along " -"a \n" -"single link - even when the attacker knows that a reply will be sent as " -"soon as\n" -"the message is received. There are some scenarios which will expose " -"fairly \n" -"automatic replies though - the streaming library does (with the SYN+ACK) " -"as does the \n" -"message mode of guaranteed delivery (with the " -"DataMessage+DeliveryStatusMessage)." +"This sort of attack is powerful, but its applicability to I2P is non obvious,\n" +"as the variation on message delays due to queuing, message processing, and \n" +"throttling will often meet or exceed the time of passing a message along a \n" +"single link - even when the attacker knows that a reply will be sent as soon as\n" +"the message is received. There are some scenarios which will expose fairly \n" +"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n" +"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:274 #, python-format msgid "" -"Without protocol scrubbing or higher latency, global active adversaries " -"can \n" -"gain substantial information. As such, people concerned with these " -"attacks could\n" -"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> or \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol " -"scrubbing, or\n" -"other advanced tunnel routing <a " -"href=\"%(todo)s#batching\">techniques</a>,\n" +"Without protocol scrubbing or higher latency, global active adversaries can \n" +"gain substantial information. As such, people concerned with these attacks could\n" +"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n" +"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n" "but these are unimplemented in I2P." msgstr "" @@ -12109,25 +9870,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:291 msgid "" -"Intersection attacks against low latency systems are extremely powerful -" -"\n" -"periodically make contact with the target and keep track of what peers " -"are on\n" +"Intersection attacks against low latency systems are extremely powerful -\n" +"periodically make contact with the target and keep track of what peers are on\n" "the network. Over time, as node churn occurs the attacker will gain \n" -"significant information about the target by simply intersecting the sets " -"of\n" -"peers that are online when a message successfully goes through. The cost" -" of \n" -"this attack is significant as the network grows, but may be feasible in " -"some\n" +"significant information about the target by simply intersecting the sets of\n" +"peers that are online when a message successfully goes through. The cost of \n" +"this attack is significant as the network grows, but may be feasible in some\n" "scenarios." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:301 #, python-format msgid "" -"In summary, if an attacker is at both ends of your tunnel at the same " -"time,\n" +"In summary, if an attacker is at both ends of your tunnel at the same time,\n" "he may be successful.\n" "I2P does not have a full defense to this for low latency communication.\n" "This is an inherent weakness of low-latency onion routing.\n" @@ -12146,8 +9901,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:316 #, python-format msgid "" -"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " -"small group that changes slowly" +"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small " +"group that changes slowly" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:319 @@ -12162,7 +9917,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:325 msgid "" -"For eepsites or other hosted services, we support\n" +"For I2P Sites or other hosted services, we support\n" "simultaneous hosting on multiple routers, or\n" "<a href=\"#intersection\">multihoming</a>" msgstr "" @@ -12170,8 +9925,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:332 msgid "" "Even in total, these defenses are not a complete solution.\n" -"Also, we have made some design choices that may significantly increase " -"our vulnerability:" +"Also, we have made some design choices that may significantly increase our vulnerability:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:337 @@ -12180,8 +9934,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" -"We use tunnel pools comprised of several tunnels, and traffic can shift " -"from tunnel to tunnel." +"We use tunnel pools comprised of several tunnels, and traffic can shift from" +" tunnel to tunnel." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:343 @@ -12191,8 +9945,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:346 msgid "" "Tunnel lengths are configurable.\n" -"While 3-hop tunnels are recommended for full protection, several " -"applications and\n" +"While 3-hop tunnels are recommended for full protection, several applications and\n" "services use 2-hop tunnels by default." msgstr "" @@ -12200,14 +9953,10 @@ msgstr "" #, python-format msgid "" "In the future, it could\n" -"for peers who can afford significant delays (per <a " -"href=\"%(todo)s#stop\">nontrivial\n" -"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). " -"In addition,\n" -"this is only relevant for destinations that other people know about - a " -"private\n" -"group whose destination is only known to trusted peers does not have to " -"worry,\n" +"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n" +"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). In addition,\n" +"this is only relevant for destinations that other people know about - a private\n" +"group whose destination is only known to trusted peers does not have to worry,\n" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" @@ -12218,8 +9967,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" -"There are a whole slew of denial of service attacks available against " -"I2P,\n" +"There are a whole slew of denial of service attacks available against I2P,\n" "each with different costs and consequences:" msgstr "" @@ -12242,10 +9990,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:387 msgid "" "Provide easy configuration options so that users may increase their\n" -"contribution (share percentage) to the network. Display easy-to-" -"understand\n" -"metrics such as \"share ratio\" so that users may see what they are " -"contributing." +"contribution (share percentage) to the network. Display easy-to-understand\n" +"metrics such as \"share ratio\" so that users may see what they are contributing." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:392 @@ -12257,29 +10003,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:399 #, python-format msgid "" -"<b>Starvation attack:</b> A hostile user may attempt to harm the network " -"by\n" -"creating a significant number of peers in the network who are not " -"identified as\n" -"being under control of the same entity (as with Sybil). These nodes then" -" \n" -"decide not to provide any resources to the network, causing existing " -"peers \n" -"to search through a larger network database or request more tunnels than" -" \n" +"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n" +"creating a significant number of peers in the network who are not identified as\n" +"being under control of the same entity (as with Sybil). These nodes then \n" +"decide not to provide any resources to the network, causing existing peers \n" +"to search through a larger network database or request more tunnels than \n" "should be necessary. \n" -"Alternatively, the nodes may provide intermittent service by periodically" -"\n" +"Alternatively, the nodes may provide intermittent service by periodically\n" "dropping selected traffic, or refusing connections to certain peers.\n" -"This behavior may be indistinguishable from that of a heavily-loaded or " -"failing node.\n" -"I2P addresses these issues by maintaining <a " -"href=\"%(peerselection)s\">profiles</a> on the \n" +"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n" +"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n" "peers, attempting to identify underperforming ones and simply ignoring \n" "them, or using them rarely.\n" "We have significantly enhanced the\n" -"ability to recognize and avoid troublesome peers; however there are still" -"\n" +"ability to recognize and avoid troublesome peers; however there are still\n" "significant efforts required in this area." msgstr "" @@ -12287,30 +10024,18 @@ msgstr "" #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" -"a peer, a destination, or a tunnel. Network and peer flooding is " -"possible,\n" -"and I2P does nothing to prevent standard IP layer flooding. The flooding" -" of\n" -"a destination with messages by sending a large number to the target's " -"various\n" -"inbound tunnel gateways is possible, but the destination will know this " -"both\n" -"by the contents of the message and because the tunnel's tests will fail." -" The\n" -"same goes for flooding just a single tunnel. I2P has no defenses for a " -"network\n" -"flooding attack. For a destination and tunnel flooding attack, the " -"target\n" -"identifies which tunnels are unresponsive and builds new ones. New code " -"could\n" -"also be written to add even more tunnels if the client wishes to handle " -"the\n" -"larger load. If, on the other hand, the load is more than the client can" -"\n" -"deal with, they can instruct the tunnels to throttle the number of " -"messages or\n" -"bytes they should pass on (once the <a " -"href=\"%(todo)s#batching\">advanced tunnel\n" +"a peer, a destination, or a tunnel. Network and peer flooding is possible,\n" +"and I2P does nothing to prevent standard IP layer flooding. The flooding of\n" +"a destination with messages by sending a large number to the target's various\n" +"inbound tunnel gateways is possible, but the destination will know this both\n" +"by the contents of the message and because the tunnel's tests will fail. The\n" +"same goes for flooding just a single tunnel. I2P has no defenses for a network\n" +"flooding attack. For a destination and tunnel flooding attack, the target\n" +"identifies which tunnels are unresponsive and builds new ones. New code could\n" +"also be written to add even more tunnels if the client wishes to handle the\n" +"larger load. If, on the other hand, the load is more than the client can\n" +"deal with, they can instruct the tunnels to throttle the number of messages or\n" +"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n" "operation</a> is implemented)." msgstr "" @@ -12318,13 +10043,10 @@ msgstr "" msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" -"operation, and a hostile attacker could use these to flood that peer with" -"\n" -"a large number of them in an attempt to overload the CPU. Both using " -"good \n" +"operation, and a hostile attacker could use these to flood that peer with\n" +"a large number of them in an attempt to overload the CPU. Both using good \n" "engineering practices and potentially requiring nontrivial certificates \n" -"(e.g. HashCash) to be attached to these expensive requests should " -"mitigate\n" +"(e.g. HashCash) to be attached to these expensive requests should mitigate\n" "the issue, though there may be room for an attacker to exploit various\n" "bugs in the implementation." msgstr "" @@ -12332,8 +10054,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:451 #, python-format msgid "" -"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " -"network by\n" +"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n" "becoming a floodfill router. The current defenses against unreliable,\n" "intermittent, or malicious floodfill routers are poor.\n" "A floodfill router may provide bad or no response to lookups, and\n" @@ -12348,134 +10069,86 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:470 #, python-format msgid "" -"Tagging attacks - modifying a message so that it can later be identified" -" \n" -"further along the path - are by themselves impossible in I2P, as messages" -" \n" -"passed through tunnels are signed. However, if an attacker is the " -"inbound \n" -"tunnel gateway as well as a participant further along in that tunnel, " -"with\n" -"collusion they can identify the fact that they are in the same tunnel " -"(and \n" -"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and " -"other updates,\n" -"colluding peers within the same tunnel can recognize that fact without " -"any \n" -"effort). An attacker in an outbound tunnel and any part of an inbound " -"tunnel cannot \n" -"collude however, as the tunnel encryption pads and modifies the data " -"separately\n" -"for the inbound and outbound tunnels. External attackers cannot do " -"anything,\n" +"Tagging attacks - modifying a message so that it can later be identified \n" +"further along the path - are by themselves impossible in I2P, as messages \n" +"passed through tunnels are signed. However, if an attacker is the inbound \n" +"tunnel gateway as well as a participant further along in that tunnel, with\n" +"collusion they can identify the fact that they are in the same tunnel (and \n" +"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n" +"colluding peers within the same tunnel can recognize that fact without any \n" +"effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n" +"collude however, as the tunnel encryption pads and modifies the data separately\n" +"for the inbound and outbound tunnels. External attackers cannot do anything,\n" "as the links are encrypted and messages signed." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:488 msgid "" -"Partitioning attacks - finding ways to segregate (technically or " -"analytically)\n" -"the peers in a network - are important to keep in mind when dealing with " -"a \n" -"powerful adversary, since the size of the network plays a key role in " -"determining\n" -"your anonymity. Technical partitioning by cutting links between peers to" -" create\n" -"fragmented networks is addressed by I2P's built in network database, " -"which \n" -"maintains statistics about various peers so as to allow any existing " -"connections\n" -"to other fragmented sections to be exploited so as to heal the network. " -"However,\n" -"if the attacker does disconnect all links to uncontrolled peers, " -"essentially\n" -"isolating the target, no amount of network database healing will fix it." -" At\n" -"that point, the only thing the router can hope to do is notice that a " -"significant\n" -"number of previously reliable peers have become unavailable and alert the" -" client\n" -"that it is temporarily disconnected (this detection code is not " -"implemented at\n" +"Partitioning attacks - finding ways to segregate (technically or analytically)\n" +"the peers in a network - are important to keep in mind when dealing with a \n" +"powerful adversary, since the size of the network plays a key role in determining\n" +"your anonymity. Technical partitioning by cutting links between peers to create\n" +"fragmented networks is addressed by I2P's built in network database, which \n" +"maintains statistics about various peers so as to allow any existing connections\n" +"to other fragmented sections to be exploited so as to heal the network. However,\n" +"if the attacker does disconnect all links to uncontrolled peers, essentially\n" +"isolating the target, no amount of network database healing will fix it. At\n" +"that point, the only thing the router can hope to do is notice that a significant\n" +"number of previously reliable peers have become unavailable and alert the client\n" +"that it is temporarily disconnected (this detection code is not implemented at\n" "the moment)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:504 #, python-format msgid "" -"Partitioning the network analytically by looking for differences in how " -"routers \n" -"and destinations behave and grouping them accordingly is also a very " -"powerful\n" -"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a>" -" the network\n" -"database will know when a particular destination has 5 inbound tunnels in" -" their\n" -"LeaseSet while others have only 2 or 3, allowing the adversary to " -"potentially \n" -"partition clients by the number of tunnels selected. Another partition " -"is \n" -"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> and \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel " -"gateways and the\n" -"particular hops with non-zero delays will likely stand out. However, " -"this data\n" -"is only exposed to those specific hops, so to partition effectively on " -"that \n" -"matter, the attacker would need to control a significant portion of the " -"network\n" -"(and still that would only be a probabilistic partition, as they wouldn't" -" know\n" +"Partitioning the network analytically by looking for differences in how routers \n" +"and destinations behave and grouping them accordingly is also a very powerful\n" +"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n" +"database will know when a particular destination has 5 inbound tunnels in their\n" +"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n" +"partition clients by the number of tunnels selected. Another partition is \n" +"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n" +"particular hops with non-zero delays will likely stand out. However, this data\n" +"is only exposed to those specific hops, so to partition effectively on that \n" +"matter, the attacker would need to control a significant portion of the network\n" +"(and still that would only be a probabilistic partition, as they wouldn't know\n" "which other tunnels or messages have those delays)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:520 #, python-format msgid "" -"Also discussed on the <a href=\"%(netdb)s#threat\">network database " -"page</a> (bootstrap attack)." +"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>" +" (bootstrap attack)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:528 msgid "" -"The predecessor attack is passively gathering statistics in an attempt to" -" see\n" -"what peers are 'close' to the destination by participating in their " -"tunnels and\n" -"keeping track of the previous or next hop (for outbound or inbound " -"tunnels, \n" -"respectively). Over time, using a perfectly random sample of peers and " -"random\n" -"ordering, an attacker would be able to see which peer shows up as " -"'closer' \n" -"statistically more than the rest, and that peer would in turn be where " -"the\n" +"The predecessor attack is passively gathering statistics in an attempt to see\n" +"what peers are 'close' to the destination by participating in their tunnels and\n" +"keeping track of the previous or next hop (for outbound or inbound tunnels, \n" +"respectively). Over time, using a perfectly random sample of peers and random\n" +"ordering, an attacker would be able to see which peer shows up as 'closer' \n" +"statistically more than the rest, and that peer would in turn be where the\n" "target is located." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:538 #, python-format msgid "" -"I2P avoids this in four ways: first, the peers selected to participate in" -"\n" -"tunnels are not randomly sampled throughout the network - they are " -"derived from\n" -"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which " -"breaks them\n" -"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict " -"ordering</a> of peers\n" -"in a tunnel, the fact that a peer shows up more frequently does not mean " -"they're\n" -"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted " -"tunnel length</a>\n" +"I2P avoids this in four ways: first, the peers selected to participate in\n" +"tunnels are not randomly sampled throughout the network - they are derived from\n" +"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n" +"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n" +"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n" +"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n" "(not enabled by default)\n" "even 0 hop tunnels can provide plausible deniability as the occasional \n" "variation of the gateway will look like normal tunnels. Fourth, with \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> " -"(unimplemented), only the peer with\n" -"a restricted connection to the target will ever contact the target, while" -" \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n" +"a restricted connection to the target will ever contact the target, while \n" "attackers will merely run into that gateway." msgstr "" @@ -12513,8 +10186,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" -"Network growth will make it more difficult to obtain a given proportion " -"of the network" +"Network growth will make it more difficult to obtain a given proportion of " +"the network" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:590 @@ -12523,10 +10196,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:593 msgid "" -"\"Hidden mode\", which prevents a router from publishing its information " -"to the netDb,\n" -"(but also prevents it from relaying data) is not widely used now but " -"could be." +"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n" +"(but also prevents it from relaying data) is not widely used now but could be." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:599 @@ -12534,19 +10205,15 @@ msgstr "" msgid "" "In future implementations,\n" "<a href=\"%(todo)s#nat\">basic</a> and \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted " -"routes,\n" -"this attack loses much of its power, as the \"hidden\" peers do not " -"publish their\n" -"contact addresses in the network database - only the tunnels through " -"which \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n" +"this attack loses much of its power, as the \"hidden\" peers do not publish their\n" +"contact addresses in the network database - only the tunnels through which \n" "they can be reached (as well as their public keys, etc)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:608 msgid "" -"In the future, routers could use GeoIP to identify if they are in a " -"particular\n" +"In the future, routers could use GeoIP to identify if they are in a particular\n" "country where identification as an I2P node would be risky.\n" "In that case, the router could automatically enable hidden mode, or\n" "enact other restricted route methods." @@ -12557,10 +10224,8 @@ msgstr "" msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" "or state-level firewall could identify that a computer is running I2P.\n" -"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically " -"designed\n" -"to hide that a computer is running I2P. However, several design decisions" -" made\n" +"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n" +"to hide that a computer is running I2P. However, several design decisions made\n" "in the design of the\n" "<a href=\"%(transport)s\">transport layer and protocols</a>\n" "make it somewhat difficult to identify I2P traffic:" @@ -12576,8 +10241,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:636 msgid "" -"DH key exchange with no protocol bytes or other unencrypted constant " -"fields" +"DH key exchange with no protocol bytes or other unencrypted constant fields" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:639 @@ -12586,14 +10250,13 @@ msgid "" "Simultaneous use of both\n" "<a href=\"%(ntcp)s\">TCP</a> and\n" "<a href=\"%(ssu)s\">UDP</a> transports.\n" -"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to" -" track." +"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:647 msgid "" -"In the near future, we plan to directly address traffic analysis issues " -"by further obfuscation of I2P transport protocols, possibly including:" +"In the near future, we plan to directly address traffic analysis issues by " +"further obfuscation of I2P transport protocols, possibly including:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:651 @@ -12610,20 +10273,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" -"Development of additional transport methods that mimic SSL or other " -"common protocols" +"Development of additional transport methods that mimic SSL or other common " +"protocols" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "" -"Review of padding strategies at higher layers to see how they affect " -"packet sizes at the transport layer" +"Review of padding strategies at higher layers to see how they affect packet " +"sizes at the transport layer" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:663 msgid "" -"Review of methods implemented by various state-level firewalls to block " -"Tor" +"Review of methods implemented by various state-level firewalls to block Tor" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:666 @@ -12639,36 +10301,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:680 msgid "" -"Sybil describes a category of attacks where the adversary creates " -"arbitrarily\n" +"Sybil describes a category of attacks where the adversary creates arbitrarily\n" "large numbers of colluding nodes and uses the increased numbers to help \n" -"mounting other attacks. For instance, if an attacker is in a network " -"where peers\n" -"are selected randomly and they want an 80% chance to be one of those " -"peers, they\n" -"simply create five times the number of nodes that are in the network and " -"roll \n" -"the dice. When identity is free, Sybil can be a very potent technique " -"for a \n" -"powerful adversary. The primary technique to address this is simply to " -"make \n" -"identity 'non free' - <a " -"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" +"mounting other attacks. For instance, if an attacker is in a network where peers\n" +"are selected randomly and they want an 80% chance to be one of those peers, they\n" +"simply create five times the number of nodes that are in the network and roll \n" +"the dice. When identity is free, Sybil can be a very potent technique for a \n" +"powerful adversary. The primary technique to address this is simply to make \n" +"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" "(among others) uses the fact that IP addresses are limited, while \n" "IIP used \n" -"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for " -"creating a new\n" -"identity. We currently have not implemented any particular technique to " -"address\n" +"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n" +"identity. We currently have not implemented any particular technique to address\n" "Sybil, but do include placeholder certificates in the router's and \n" -"destination's data structures which can contain a HashCash certificate of" -" \n" -"appropriate value when necessary (or some other certificate proving " -"scarcity)." +"destination's data structures which can contain a HashCash certificate of \n" +"appropriate value when necessary (or some other certificate proving scarcity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:698 -msgid "Requiring HashCash Certificates in various places has two major problems:" +msgid "" +"Requiring HashCash Certificates in various places has two major problems:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:702 @@ -12678,17 +10330,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:705 msgid "" "The classic HashCash problem -\n" -"selecting HashCash values that are meaningful proofs of work on high-end " -"machines,\n" +"selecting HashCash values that are meaningful proofs of work on high-end machines,\n" "while still being feasible on low-end machines such as mobile devices." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:712 msgid "" -"Various limitations on the number of routers in a given IP range restrict" -"\n" -"the vulnerability to attackers that don't have the ability to put " -"machines\n" +"Various limitations on the number of routers in a given IP range restrict\n" +"the vulnerability to attackers that don't have the ability to put machines\n" "in several IP blocks.\n" "However, this is not a meaningful defense against a powerful adversary." msgstr "" @@ -12710,22 +10359,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:733 #, python-format msgid "" -"By refusing to accept or forward tunnel build requests, except to a " -"colluding peer, a router could ensure\n" +"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n" "that a tunnel is formed wholly from its set of colluding routers.\n" -"The chances of success are enhanced if there is a large number of " -"colluding routers,\n" +"The chances of success are enhanced if there is a large number of colluding routers,\n" "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n" "This is somewhat mitigated by our\n" -"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor " -"the performance\n" +"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n" "of peers.\n" "However, this is a powerful attack as the number of routers approaches\n" "<i>f</i> = 0.2, or 20% malicious nodes, as specifed in the paper.\n" -"The malicous routers could also maintain connections to the target router" -" and provide\n" -"excellent forwarding bandwidth for traffic over those connections, in an " -"attempt\n" +"The malicous routers could also maintain connections to the target router and provide\n" +"excellent forwarding bandwidth for traffic over those connections, in an attempt\n" "to manipulate the profiles managed by the target and appear attractive.\n" "Further research and defenses may be necessary." msgstr "" @@ -12734,38 +10378,29 @@ msgstr "" #, python-format msgid "" "We use strong cryptography with long keys, and\n" -"we assume the security of the industry-standard cryptographic primitives " -"used in I2P, as documented\n" +"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n" "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n" "Security features include the immediate detection of \n" -"altered messages along the path, the inability to decrypt messages not " -"addressed to you,\n" +"altered messages along the path, the inability to decrypt messages not addressed to you,\n" "and defense against man-in-the-middle attacks.\n" -"The key sizes chosen in 2003 were quite conservative at the time, and are" -" still longer than\n" -"those used in <a href=\"https://torproject.org/\">other anonymity " -"networks</a>.\n" +"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n" +"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n" "We don't think the current key lengths are our biggest weakness,\n" "especially for traditional, non-state-level adversaries;\n" "bugs and the small size of the network are much more worrisome.\n" -"Of course, all cryptographic algorithms eventually become obsolete due to" -"\n" -"the advent of faster processors, cryptographic research, and advancements" -" in\n" +"Of course, all cryptographic algorithms eventually become obsolete due to\n" +"the advent of faster processors, cryptographic research, and advancements in\n" "methods such as rainbow tables, clusters of video game hardware, etc.\n" -"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys" -" or change\n" +"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n" "shared secret values while maintaining backward compatibility." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:773 #, python-format msgid "" -"Upgrading the various data structures and protocols to support longer " -"keys\n" +"Upgrading the various data structures and protocols to support longer keys\n" "will have to be tackled eventually, and this will be a\n" -"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be " -"for \n" +"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n" "<a href=\"https://torproject.org/\">others</a>.\n" "Hopefully, through careful planning, we can minimize the disruption, and\n" "implement mechanisms to make it easier for future transitions." @@ -12774,12 +10409,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:782 msgid "" "In the future, several I2P protocols and data structures\n" -"support securely padding messages to arbitrary sizes, so messages could " -"be made constant\n" -"size or garlic messages could be modified randomly so that some cloves " -"appear to contain\n" -"more subcloves than they actually do. At the moment, however, garlic, " -"tunnel, and \n" +"support securely padding messages to arbitrary sizes, so messages could be made constant\n" +"size or garlic messages could be modified randomly so that some cloves appear to contain\n" +"more subcloves than they actually do. At the moment, however, garlic, tunnel, and \n" "end to end messages include simple random padding." msgstr "" @@ -12793,18 +10425,14 @@ msgid "" "In addition to the floodfill DOS attacks described\n" "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n" "to learn about network participants, due to their role\n" -"in the netDb, and the high frequency of communication with those " -"participants.\n" -"This is somewhat mitigated because floodfill routers only manage a " -"portion\n" +"in the netDb, and the high frequency of communication with those participants.\n" +"This is somewhat mitigated because floodfill routers only manage a portion\n" "of the total keyspace, and the keyspace rotates daily, as explained \n" "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n" -"The specific mechanisms by which routers communicate with floodfills have" -" been\n" +"The specific mechanisms by which routers communicate with floodfills have been\n" "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n" "However, these threats should be studied further.\n" -"The specific potential threats and corresponding defenses are a topic for" -" future research." +"The specific potential threats and corresponding defenses are a topic for future research." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:812 @@ -12823,33 +10451,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:826 msgid "" -"There are a few centralized or limited resources (some inside I2P, some " -"not)\n" +"There are a few centralized or limited resources (some inside I2P, some not)\n" "that could be attacked or used as a vector for attacks.\n" -"The absence of jrandom starting November 2007, followed by the loss of " -"the i2p.net hosting service in January 2008,\n" -"highlighted numerous centralized resources in the development and " -"operation of the I2P network,\n" +"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n" +"highlighted numerous centralized resources in the development and operation of the I2P network,\n" "most of which are now distributed.\n" -"Attacks on externally-reachable resources mainly affect the ability of " -"new users to find us,\n" +"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n" "not the operation of the network itself." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:836 #, python-format msgid "" -"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" -" for external public access." +"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin " +"for external public access." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:839 #, python-format msgid "" -"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " -"locations</a>,\n" -"however more reseed hosts may be needed, and the handling of unreliable " -"or malicious\n" +"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n" +"however more reseed hosts may be needed, and the handling of unreliable or malicious\n" "reseed hosts may need improvement." msgstr "" @@ -12865,10 +10487,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:851 msgid "" -"Routers now better handle <a href=\"#ffdos\">multiple unreliable " -"floodfill peers</a>.\n" -"Malicious floodfills <a href=\"#ffdos\">needs</a> <a " -"href=\"#floodfill\">more</a> study." +"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n" +"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:855 @@ -12880,47 +10500,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:858 msgid "" -"Routers rely on a single news host, but there is a hardcoded backup URL " -"pointing to a different host.\n" +"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:862 #, python-format msgid "" -"<a href=\"%(naming)s\">Naming system services</a>, including addressbook " -"subscription providers, add-host services,\n" -"and jump services, could be malicious. Substantial protections for " -"subscriptions were implemented\n" -"in release 0.6.1.31, with additional enhancements in subsequent releases." -"\n" +"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n" +"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n" +"in release 0.6.1.31, with additional enhancements in subsequent releases.\n" "However, all naming services require some measure of trust, see\n" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:869 msgid "" -"We remain reliant on the DNS service for i2p2.de, losing this would cause" -" substantial\n" +"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n" "disruption in our ability to attract new users,\n" -"and would shrink the network (in the short-to-medium term), just as the " -"loss of i2p.net did." +"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:881 msgid "" -"These attacks aren't directly on the network, but instead go after its " -"development team \n" -"by either introducing legal hurdles on anyone contributing to the " -"development\n" -"of the software, or by using whatever means are available to get the " -"developers to \n" -"subvert the software. Traditional technical measures cannot defeat these" -" attacks, and\n" -"if someone threatened the life or livelihood of a developer (or even just" -" issuing a \n" -"court order along with a gag order, under threat of prison), we would " -"have a big problem." +"These attacks aren't directly on the network, but instead go after its development team \n" +"by either introducing legal hurdles on anyone contributing to the development\n" +"of the software, or by using whatever means are available to get the developers to \n" +"subvert the software. Traditional technical measures cannot defeat these attacks, and\n" +"if someone threatened the life or livelihood of a developer (or even just issuing a \n" +"court order along with a gag order, under threat of prison), we would have a big problem." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:890 @@ -12930,26 +10538,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:894 #, python-format msgid "" -"All components of the network must be open source to enable inspection, " -"verification, \n" -"modification, and improvement. If a developer is compromised, once it is" -" noticed \n" -"the community should demand explanation and cease to accept that " -"developer's work.\n" -"All checkins to our <a href=\"%(monotone)s\">distributed source control " -"system</a>\n" -"are cryptographically signed, and the release packagers use a trust-list " -"system\n" +"All components of the network must be open source to enable inspection, verification, \n" +"modification, and improvement. If a developer is compromised, once it is noticed \n" +"the community should demand explanation and cease to accept that developer's work.\n" +"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n" +"are cryptographically signed, and the release packagers use a trust-list system\n" "to restrict modifications to those previously approved." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:902 #, python-format msgid "" -"Development over the network itself, allowing developers to stay " -"anonymous but still \n" -"secure the development process. All I2P development can occur through " -"I2P - using\n" +"Development over the network itself, allowing developers to stay anonymous but still \n" +"secure the development process. All I2P development can occur through I2P - using\n" "a <a href=\"%(monotone)s\">distributed source control system</a>,\n" "a distributed source control system, IRC chat,\n" "public web servers,\n" @@ -12959,8 +10560,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:913 msgid "" -"We also maintain relationships with various organizations that offer " -"legal advice,\n" +"We also maintain relationships with various organizations that offer legal advice,\n" "should any defense be necessary." msgstr "" @@ -12970,52 +10570,38 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:922 msgid "" -"Try as we might, most nontrivial applications include errors in the " -"design or \n" -"implementation, and I2P is no exception. There may be bugs that could be" -" exploited to \n" -"attack the anonymity or security of the communication running over I2P in" -" unexpected \n" -"ways. To help withstand attacks against the design or protocols in use, " -"we publish \n" +"Try as we might, most nontrivial applications include errors in the design or \n" +"implementation, and I2P is no exception. There may be bugs that could be exploited to \n" +"attack the anonymity or security of the communication running over I2P in unexpected \n" +"ways. To help withstand attacks against the design or protocols in use, we publish \n" "all designs and documentation and solicit review and criticism with \n" "the hope that many eyes will improve the system.\n" "We do not believe in\n" -"<a href=\"http://www.haystacknetwork.com/\">security through " -"obscurity</a>." +"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:933 msgid "" "In addition, the code is being \n" -"treated the same way, with little aversion towards reworking or throwing " -"out \n" -"something that isn't meeting the needs of the software system (including " -"ease of \n" -"modification). Documentation for the design and implementation of the " -"network and \n" -"the software components are an essential part of security, as without " -"them it is \n" -"unlikely that developers would be willing to spend the time to learn the " -"software \n" +"treated the same way, with little aversion towards reworking or throwing out \n" +"something that isn't meeting the needs of the software system (including ease of \n" +"modification). Documentation for the design and implementation of the network and \n" +"the software components are an essential part of security, as without them it is \n" +"unlikely that developers would be willing to spend the time to learn the software \n" "enough to identify shortcomings and bugs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:943 msgid "" -"Our software is likely, in particular, to contain bugs related to denial " -"of service\n" -"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues " -"in the router console,\n" -"and other vulnerabilities to non-standard inputs via the various " -"protocols." +"Our software is likely, in particular, to contain bugs related to denial of service\n" +"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,\n" +"and other vulnerabilities to non-standard inputs via the various protocols." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:949 #, python-format msgid "" -"I2P is still a small network with a small development community and " -"almost no\n" +"I2P is still a small network with a small development community and almost no\n" "interest from academic or research groups.\n" "Therefore we lack the analysis that\n" "<a href=\"https://torproject.org/\">other anonymity networks</a>\n" @@ -13029,18 +10615,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" -"To some extent, I2P could be enhanced to avoid peers operating at IP " -"addresses\n" -"listed in a blocklist. Several blocklists are commonly available in " -"standard formats,\n" -"listing anti-P2P organizations, potential state-level adversaries, and " -"others." +"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n" +"listed in a blocklist. Several blocklists are commonly available in standard formats,\n" +"listing anti-P2P organizations, potential state-level adversaries, and others." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:969 msgid "" -"To the extent that active peers actually do show up in the actual " -"blocklist,\n" +"To the extent that active peers actually do show up in the actual blocklist,\n" "blocking by only a subset of peers would tend to segment the network,\n" "exacerbate reachability problems, and decrease overall reliability.\n" "Therefore we would want to agree on a particular blocklist and\n" @@ -13049,8 +10631,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:977 msgid "" -"Blocklists are only a part (perhaps a small part) of an array of defenses" -"\n" +"Blocklists are only a part (perhaps a small part) of an array of defenses\n" "against maliciousness.\n" "In large part the profiling system does a good job of measuring\n" "router behavior so that we don't need to trust anything in netDb.\n" @@ -13063,8 +10644,7 @@ msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" "<a href=\"#central\">central resource attack</a>.\n" -"Automatic subscription to a list gives the list provider the power to " -"shut\n" +"Automatic subscription to a list gives the list provider the power to shut\n" "the i2p network down. Completely." msgstr "" @@ -13073,8 +10653,7 @@ msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" "There is no automatic update mechanism.\n" -"Should a particular IP range implement serious attacks on the I2P " -"network,\n" +"Should a particular IP range implement serious attacks on the I2P network,\n" "we would have to ask people to update their blocklist manually through\n" "out-of-band mechanisms such as forums, blogs, etc." msgstr "" @@ -13089,30 +10668,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:7 msgid "" -"This page contains an overview of I2P tunnel terminology and operation, " -"with\n" +"This page contains an overview of I2P tunnel terminology and operation, with\n" "links to more technical pages, details, and specifications." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:12 #, python-format msgid "" -"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P " -"builds virtual \"tunnels\" -\n" -"temporary and unidirectional paths through a sequence of routers. These" -" \n" +"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n" +"temporary and unidirectional paths through a sequence of routers. These \n" "tunnels are classified as either inbound tunnels (where everything \n" "given to it goes towards the creator of the tunnel) or outbound tunnels\n" "(where the tunnel creator shoves messages away from them). When Alice\n" "wants to send a message to Bob, she will (typically) send it out one of\n" -"her existing outbound tunnels with instructions for that tunnel's " -"endpoint\n" +"her existing outbound tunnels with instructions for that tunnel's endpoint\n" "to forward it to the gateway router for one of Bob's current inbound \n" "tunnels, which in turn passes it to Bob." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:25 -msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel" +msgid "" +"Alice connecting through her outbound tunnel to Bob via his inbound tunnel" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:27 @@ -13148,8 +10724,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:38 #, python-format msgid "" -"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound " -"tunnels,\n" +"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound tunnels,\n" "this is the one mentioned in the LeaseSet published in the\n" "<a href=\"%(netdb)s\">network database</a>. For outbound tunnels, the\n" "gateway is the originating router. (e.g. both A and D above)" @@ -13157,21 +10732,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:44 msgid "" -"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F" -" above)" +"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F " +"above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:45 msgid "" -"<b>Tunnel participant</b> - all routers in a tunnel except for the " -"gateway or\n" +"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n" "endpoint (e.g. both B and E above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:49 msgid "" -"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router " -"jumps, e.g.:" +"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps," +" e.g.:" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:51 @@ -13186,8 +10760,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:53 msgid "" -"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one " -"intermediate\n" +"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n" "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n" "outbound from Alice, one inbound to Bob)" msgstr "" @@ -13195,10 +10768,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:60 #, python-format msgid "" -"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 " -"byte integer</a>\n" -"different for each hop in a tunnel, and unique among all tunnels on a " -"router.\n" +"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n" +"different for each hop in a tunnel, and unique among all tunnels on a router.\n" "Chosen randomly by the tunnel creator." msgstr "" @@ -13209,8 +10780,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:68 #, python-format msgid "" -"Routers performing the three roles (gateway, participant, endpoint) are " -"given\n" +"Routers performing the three roles (gateway, participant, endpoint) are given\n" "different pieces of data in the initial\n" "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n" "to accomplish their tasks:" @@ -13224,9 +10794,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:97 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the next hop" msgstr "" @@ -13234,9 +10802,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:101 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the next hop" msgstr "" @@ -13244,9 +10810,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:105 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request" msgstr "" @@ -13263,8 +10827,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:91 msgid "" -"<b>next hop</b> - what router is the next one in the path (unless this is" -" a 0-hop tunnel, and the gateway is also the endpoint)" +"<b>next hop</b> - what router is the next one in the path (unless this is a " +"0-hop tunnel, and the gateway is also the endpoint)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:92 @@ -13291,27 +10855,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:117 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:121 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:125 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request (outbound endpoints only)" msgstr "" @@ -13327,8 +10885,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:131 msgid "" -"<b>reply router</b> - the inbound gateway of the tunnel to send the reply" -" through (outbound endpoints only)" +"<b>reply router</b> - the inbound gateway of the tunnel to send the reply " +"through (outbound endpoints only)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:132 @@ -13351,8 +10909,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:143 #, python-format msgid "" -"Several tunnels for a particular purpose may be grouped into a \"tunnel " -"pool\",\n" +"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n" "as described in the\n" "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n" "This provides redundancy and additional bandwidth.\n" @@ -13367,20 +10924,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:155 #, python-format msgid "" -"As mentioned above, each client requests that their router provide " -"tunnels to\n" +"As mentioned above, each client requests that their router provide tunnels to\n" "include at least a certain number of hops.\n" "The decision as to how many routers\n" -"to have in one's outbound and inbound tunnels has an important effect " -"upon the\n" -"latency, throughput, reliability, and anonymity provided by I2P - the " -"more peers\n" -"that messages have to go through, the longer it takes to get there and " -"the more\n" -"likely that one of those routers will fail prematurely. The less routers" -" in a\n" -"tunnel, the easier it is for an adversary to mount traffic analysis " -"attacks and\n" +"to have in one's outbound and inbound tunnels has an important effect upon the\n" +"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n" +"that messages have to go through, the longer it takes to get there and the more\n" +"likely that one of those routers will fail prematurely. The less routers in a\n" +"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n" "pierce someone's anonymity.\n" "Tunnel lengths are specified by clients via\n" "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n" @@ -13394,18 +10945,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:172 msgid "" "With no remote routers in a tunnel, the user has very basic plausible\n" -"deniability (since no one knows for sure that the peer that sent them the" -"\n" -"message wasn't simply just forwarding it on as part of the tunnel). " -"However, it\n" -"would be fairly easy to mount a statistical analysis attack and notice " -"that\n" -"messages targeting a specific destination are always sent through a " -"single\n" -"gateway. Statistical analysis against outbound 0-hop tunnels are more " -"complex,\n" -"but could show similar information (though would be slightly harder to " -"mount)." +"deniability (since no one knows for sure that the peer that sent them the\n" +"message wasn't simply just forwarding it on as part of the tunnel). However, it\n" +"would be fairly easy to mount a statistical analysis attack and notice that\n" +"messages targeting a specific destination are always sent through a single\n" +"gateway. Statistical analysis against outbound 0-hop tunnels are more complex,\n" +"but could show similar information (though would be slightly harder to mount)." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:182 @@ -13416,14 +10961,10 @@ msgstr "" #, python-format msgid "" "With only one remote router in a tunnel, the user has both plausible\n" -"deniability and basic anonymity, as long as they are not up against an " -"internal\n" -"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)." -" However,\n" -"if the adversary ran a sufficient number of routers such that the single " -"remote\n" -"router in the tunnel is often one of those compromised ones, they would " -"be able\n" +"deniability and basic anonymity, as long as they are not up against an internal\n" +"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n" +"if the adversary ran a sufficient number of routers such that the single remote\n" +"router in the tunnel is often one of those compromised ones, they would be able\n" "to mount the above statistical traffic analysis attack." msgstr "" @@ -13433,10 +10974,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:193 msgid "" -"With two or more remote routers in a tunnel, the costs of mounting the " -"traffic\n" -"analysis attack increases, since many remote routers would have to be " -"compromised\n" +"With two or more remote routers in a tunnel, the costs of mounting the traffic\n" +"analysis attack increases, since many remote routers would have to be compromised\n" "to mount it." msgstr "" @@ -13450,8 +10989,7 @@ msgid "" "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n" "3 or more hops are recommended for the highest level of protection.\n" "<a href=\"%(url)s\">Recent studies</a>\n" -"also conclude that more than 3 hops does not provide additional " -"protection." +"also conclude that more than 3 hops does not provide additional protection." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:208 @@ -13475,15 +11013,12 @@ msgstr "" #, python-format msgid "" "All tunnels are periodically tested by their creator by sending a\n" -"DeliveryStatusMessage out an outbound tunnel and bound for another " -"inbound tunnel\n" -"(testing both tunnels at once). If either fails a number of consecutive " -"tests, it is marked as no longer\n" +"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n" +"(testing both tunnels at once). If either fails a number of consecutive tests, it is marked as no longer\n" "functional. If it was used for a client's inbound tunnel, a new leaseSet\n" "is created.\n" "Tunnel test failures are also reflected in the\n" -"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer " -"profile</a>." +"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:230 @@ -13493,14 +11028,10 @@ msgstr "Creazione tunnel" #: i2p2www/pages/site/docs/how/tunnel-routing.html:231 #, python-format msgid "" -"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic " -"routing</a>\n" -"a Tunnel Build Message to a router, requesting that they participate in " -"the\n" -"tunnel (providing them with all of the appropriate information, as above," -" along\n" -"with a certificate, which right now is a 'null' cert, but will support " -"hashcash\n" +"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n" +"a Tunnel Build Message to a router, requesting that they participate in the\n" +"tunnel (providing them with all of the appropriate information, as above, along\n" +"with a certificate, which right now is a 'null' cert, but will support hashcash\n" "or other non-free certificates when necessary).\n" "That router forwards the message to the next hop in the tunnel.\n" "Details are in the\n" @@ -13510,8 +11041,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:245 #, python-format msgid "" -"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic" -" encryption</a>\n" +"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n" "of tunnel messages.\n" "Details are in the\n" "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n" @@ -13532,8 +11062,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:267 msgid "" "In a distant future release,\n" -"options specifying the pooling, mixing, and chaff generation settings may" -" be implemented." +"options specifying the pooling, mixing, and chaff generation settings may be implemented." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:272 @@ -13576,20 +11105,14 @@ msgstr "Opzioni I2CP" #: i2p2www/pages/site/docs/protocol/i2cp.html:6 msgid "" -"The I2P Client Protocol (I2CP) exposes a strong separation of concerns " -"between\n" -"the router and any client that wishes to communicate over the network. " -"It enables\n" -"secure and asynchronous messaging by sending and receiving messages over " -"a \n" +"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n" +"the router and any client that wishes to communicate over the network. It enables\n" +"secure and asynchronous messaging by sending and receiving messages over a \n" "single TCP socket.\n" "With I2CP, a client application tells the\n" -"router who they are (their \"destination\"), what anonymity, reliability," -" and \n" -"latency tradeoffs to make, and where to send messages. In turn the " -"router uses\n" -"I2CP to tell the client when any messages have arrived, and to request " -"authorization\n" +"router who they are (their \"destination\"), what anonymity, reliability, and \n" +"latency tradeoffs to make, and where to send messages. In turn the router uses\n" +"I2CP to tell the client when any messages have arrived, and to request authorization\n" "for some tunnels to be used." msgstr "" @@ -13598,10 +11121,8 @@ msgstr "" msgid "" "The protocol itself is implemented in Java, to provide the\n" "<a href=\"%(url)s\">Client SDK</a>.\n" -"This SDK is exposed in the i2p.jar package, which implements the client-" -"side of I2CP.\n" -"Clients should never need to access the router.jar package, which " -"contains the\n" +"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n" +"Clients should never need to access the router.jar package, which contains the\n" "router itself and the router-side of I2CP.\n" "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n" "A non-Java client would also have to implement the\n" @@ -13612,45 +11133,35 @@ msgstr "" #, python-format msgid "" "Applications can take advantage of the base I2CP plus the \n" -"<a href=\"%(streaming)s\">streaming</a> and <a " -"href=\"%(datagrams)s\">datagram</a> libraries\n" -"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a " -"href=\"%(bob)s\">BOB</a> protocols,\n" +"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n" +"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n" "which do not require clients to deal with any sort of cryptography.\n" "Also, clients may access the network by one of several proxies -\n" "HTTP, CONNECT, and SOCKS 4/4a/5.\n" -"Alternatively, Java clients may access those libraries in " -"ministreaming.jar and streaming.jar.\n" +"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n" "So there are several options for both Java and non-Java applications." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:43 #, python-format msgid "" -"Client-side end-to-end encryption (encrypting the data over the I2CP " -"connection)\n" +"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n" "was disabled in I2P release 0.6,\n" -"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end " -"encryption</a>\n" +"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n" "which is implemented in the router.\n" "The only cryptography that client libraries must still implement is\n" "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n" "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n" -"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and" -" management of those keys." +"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:56 msgid "" -"In a standard I2P installation, port 7654 is used by external java " -"clients to communicate\n" +"In a standard I2P installation, port 7654 is used by external java clients to communicate\n" "with the local router via I2CP.\n" -"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, " -"set the\n" -"router advanced configuration option " -"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" -"Clients in the same JVM as the router pass messages directly to the " -"router\n" +"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n" +"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" +"Clients in the same JVM as the router pass messages directly to the router\n" "through an internal JVM interface." msgstr "" @@ -13658,13 +11169,10 @@ msgstr "" #, python-format msgid "" "The router also supports external connections over SSL.\n" -"While SSL is not the default, it is strongly recommended for any traffic " -"that may\n" -"be exposed to the open Internet. The authorization user/password (if " -"any), the\n" +"While SSL is not the default, it is strongly recommended for any traffic that may\n" +"be exposed to the open Internet. The authorization user/password (if any), the\n" "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n" -"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private " -"Key</a> for the\n" +"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "are all transmitted in-the-clear unless SSL is enabled." msgstr "" @@ -13685,19 +11193,12 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:82 #, python-format msgid "" -"When a client connects to the router, it first sends a single protocol " -"version byte (0x2A).\n" -"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and " -"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> " -"response.\n" -"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession " -"Message</a> containing the session configuration.\n" -"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet" -" Message</a> from the router, indicating that inbound tunnels\n" -"have been built, and responds with a CreateLeaseSetMessage containing the" -" signed LeaseSet.\n" -"The client may now initiate or receive connections from other I2P " -"destinations." +"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n" +"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n" +"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n" +"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n" +"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n" +"The client may now initiate or receive connections from other I2P destinations." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:91 @@ -13713,10 +11214,7 @@ msgstr "" #, python-format msgid "" "The following options are traditionally passed to the router via\n" -"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained " -"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or " -"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession " -"Message</a>." +"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:104 @@ -13749,14 +11247,13 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:167 msgid "" "Number of ElGamal/AES Session Tags to send at a time.\n" -"For clients with relatively low bandwidth per-client-pair (IRC, some UDP " -"apps), this may be set lower." +"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:179 msgid "" -"Comma-separated list of Base 64 Hashes of peers to build tunnels through;" -" for debugging only" +"Comma-separated list of Base 64 Hashes of peers to build tunnels through; " +"for debugging only" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:188 @@ -13773,17 +11270,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:322 msgid "" "Guaranteed is disabled;\n" -"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1," -" the client side default is None as of 0.9.4" +"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:334 msgid "" "For authorization, if required by the router.\n" -"If the client is running in the same JVM as a router, this option is not " -"required.\n" -"Warning - username and password are sent in the clear to the router, " -"unless using SSL (i2cp.SSL=true).\n" +"If the client is running in the same JVM as a router, this option is not required.\n" +"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n" "Authorization is only recommended when using SSL." msgstr "" @@ -13857,8 +11351,7 @@ msgid "" "Random amount to add or subtract to the length of tunnels in.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" @@ -13867,16 +11360,14 @@ msgid "" "Random amount to add or subtract to the length of tunnels out.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:464 msgid "" "Name of tunnel - generally used in routerconsole, which will\n" -"use the first few characters of the Base64 hash of the destination by " -"default." +"use the first few characters of the Base64 hash of the destination by default." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:476 @@ -13892,8 +11383,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:497 msgid "" "Number of tunnels in.\n" -"Limit was increased from 6 to 16 in release 0.9; however, numbers higher " -"than 6 are\n" +"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n" "incompatible with older releases." msgstr "" @@ -13908,32 +11398,27 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:538 msgid "" "Any other options prefixed with \"inbound.\" are stored\n" -"in the \"unknown options\" properties of the inbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the inbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:550 msgid "" "Any other options prefixed with \"outbound.\" are stored\n" -"in the \"unknown options\" properties of the outbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the outbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:562 msgid "" "Set to false to disable ever bundling a reply LeaseSet.\n" "For clients that do not publish their LeaseSet, this option must be true\n" -"for any reply to be possible. \"true\" is also recommended for multihomed" -" servers\n" +"for any reply to be possible. \"true\" is also recommended for multihomed servers\n" "with long connection times." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:569 msgid "" -"Setting to \"false\" may save significant outbound bandwidth, especially " -"if\n" -"the client is configured with a large number of inbound tunnels (Leases)." -"\n" +"Setting to \"false\" may save significant outbound bandwidth, especially if\n" +"the client is configured with a large number of inbound tunnels (Leases).\n" "If replies are still required, this may shift the bandwidth burden to\n" "the far-end client and the floodfill.\n" "There are several cases where \"false\" may be appropriate:" @@ -13949,14 +11434,10 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:579 msgid "" -"LeaseSet is published, client is a \"server\", all connections are " -"inbound\n" -"so the connecting far-end destination obviously has the leaseset already." -"\n" -"Connections are either short, or it is acceptable for latency on a long-" -"lived\n" -"connection to temporarily increase while the other end re-fetches the " -"LeaseSet\n" +"LeaseSet is published, client is a \"server\", all connections are inbound\n" +"so the connecting far-end destination obviously has the leaseset already.\n" +"Connections are either short, or it is acceptable for latency on a long-lived\n" +"connection to temporarily increase while the other end re-fetches the LeaseSet\n" "after expiration.\n" "HTTP servers may fit these requirements." msgstr "" @@ -13970,15 +11451,11 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:596 #, python-format msgid "" -"Note: As of release 0.7.7, option names and values must use UTF-8 " -"encoding.\n" +"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n" "This is primarily useful for nicknames.\n" -"Prior to that release, options with multi-byte characters were corrupted." -"\n" -"Since options are encoded in a <a " -"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" -"all option names and values are limited to 255 bytes (not characters) " -"maximum." +"Prior to that release, options with multi-byte characters were corrupted.\n" +"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" +"all option names and values are limited to 255 bytes (not characters) maximum." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:610 @@ -13989,8 +11466,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:611 msgid "" "The following options are interpreted on the client side,\n" -"and will be interpreted if passed to the I2PSession via the " -"I2PClient.createSession() call.\n" +"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n" "The streaming lib should also pass these options through to I2CP.\n" "Other implementations may have different defaults." msgstr "" @@ -14066,28 +11542,24 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:871 msgid "" "Connect to the router using SSL.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:883 msgid "" "Router hostname.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:895 msgid "" "Router I2CP port.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:902 msgid "" -"Note: All arguments, including numbers, are strings. True/false values " -"are case-insensitive strings.\n" +"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n" "Anything other than case-insensitive \"true\" is interpreted as false.\n" "All option names are case-sensitive." msgstr "" @@ -14099,28 +11571,22 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:909 #, python-format msgid "" -"The end-to-end messages handled by I2CP (i.e. the data sent by the client" -" in a\n" +"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n" "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n" "and received by the client in a\n" "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n" "are gzipped with a standard 10-byte gzip\n" "header beginning with 0x1F 0x8B 0x08 as\n" -"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC " -"1952</a>.\n" -"As of release 0.7.1, I2P uses ignored portions of the gzip header to " -"include\n" -"protocol, from-port, and to-port information, thus supporting streaming " -"and\n" -"datagrams on the same destination, and allowing query/response using " -"datagrams\n" +"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n" +"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n" +"protocol, from-port, and to-port information, thus supporting streaming and\n" +"datagrams on the same destination, and allowing query/response using datagrams\n" "to work reliably in the presence of multiple channels." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:923 msgid "" -"The gzip function cannot be completely turned off, however setting " -"i2cp.gzip=false\n" +"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n" "turns the gzip effort setting to 0, which may save a little CPU." msgstr "" @@ -14154,7 +11620,8 @@ msgid "Gzip xflags" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:960 -msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" +msgid "" +"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:969 @@ -14179,8 +11646,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:987 #, python-format msgid "" -"Some improvements may be able to use messages previously defined but not " -"implemented.\n" +"Some improvements may be able to use messages previously defined but not implemented.\n" "For reference, here is the\n" "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n" "(PDF) dated August 28, 2003.\n" @@ -14199,12 +11665,9 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:6 msgid "" "The I2P Network Protocol (I2NP),\n" -"which is sandwiched between I2CP and the various I2P transport protocols," -" manages the\n" -"routing and mixing of messages between routers, as well as the selection " -"of what\n" -"transports to use when communicating with a peer for which there are " -"multiple\n" +"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n" +"routing and mixing of messages between routers, as well as the selection of what\n" +"transports to use when communicating with a peer for which there are multiple\n" "common transports supported." msgstr "" @@ -14214,20 +11677,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:15 msgid "" -"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-" -"router, point-to-point messages.\n" -"By encrypting and wrapping messages in other messages, they can be sent " -"in a secure way\n" +"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n" +"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n" "through multiple hops to the ultimate destination.\n" -"Priority is only used locally at the origin, i.e. when queuing for " -"outbound delivery." +"Priority is only used locally at the origin, i.e. when queuing for outbound delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:22 #, python-format msgid "" -"The priorities listed below may not be current and are subject to change." -"\n" +"The priorities listed below may not be current and are subject to change.\n" "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n" "for the current priority settings.\n" "Priority queueing implementation may vary." @@ -14239,8 +11698,7 @@ msgstr "Formato messaggio" #: i2p2www/pages/site/docs/protocol/i2np.html:31 msgid "" -"The following table specifies the traditional 16-byte header used in " -"NTCP.\n" +"The following table specifies the traditional 16-byte header used in NTCP.\n" "The SSU and NTCP2 transports use modified headers." msgstr "" @@ -14277,23 +11735,18 @@ msgstr "Payload" #: i2p2www/pages/site/docs/protocol/i2np.html:46 #, python-format msgid "" -"While the maximum payload size is nominally 64KB, the size is further " -"constrained by the\n" -"method of fragmenting I2NP messages into multiple 1KB tunnel messages as " -"described on\n" +"While the maximum payload size is nominally 64KB, the size is further constrained by the\n" +"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n" "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n" -"The maximum number of fragments is 64, and the message may not be " -"perfectly aligned,\n" +"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n" "So the message must nominally fit in 63 fragments." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:54 msgid "" -"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL " -"delivery mode);\n" +"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n" "the maximum size of a follow-on fragment is 996 bytes.\n" -"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 " -"bytes, or 61.2 KB." +"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:60 @@ -14301,16 +11754,13 @@ msgid "" "In addition, the transports may have additional restrictions.\n" "The NTCP limit is 16KB - 6 = 16378 bytes.\n" "The SSU limit is approximately 32 KB.\n" -"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher" -" than what a tunnel can support." +"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:67 msgid "" -"Note that these are not the limits for datagrams that the client sees, as" -" the\n" -"router may bundle a reply leaseset and/or session tags together with the " -"client message\n" +"Note that these are not the limits for datagrams that the client sees, as the\n" +"router may bundle a reply leaseset and/or session tags together with the client message\n" "in a garlic message. The leaseset and tags together may add about 5.5KB.\n" "Therefore the current datagram limit is about 10KB. This limit will be\n" "increased in a future release." @@ -14367,8 +11817,7 @@ msgid "" "Priority may vary.\n" "Size is 898 bytes for a typical 2-lease leaseSet.\n" "RouterInfo structures are compressed, and size varies; however\n" -"there is a continuing effort to reduce the amount of data published in a " -"RouterInfo\n" +"there is a continuing effort to reduce the amount of data published in a RouterInfo\n" "as we approach release 1.0." msgstr "" @@ -14378,8 +11827,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:150 msgid "" -"Used for message replies, and for testing tunnels - generally wrapped in " -"a GarlicMessage" +"Used for message replies, and for testing tunnels - generally wrapped in a " +"GarlicMessage" msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:158 @@ -14390,8 +11839,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:185 msgid "" -"The most common message. Priority for tunnel participants, outbound " -"endpoints, and inbound gateways was\n" +"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n" "reduced to 200 as of release 0.6.1.33.\n" "Outbound gateway messages (i.e. those originated locally) remains at 400." msgstr "" @@ -14422,16 +11870,13 @@ msgstr "Specifica completa del protocollo" msgid "" "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n" "See also the\n" -"<a href=\"%(commonstructures)s\">Common Data Structure Specification " -"page</a>." +"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:234 msgid "" -"It isn't clear whether the current priority scheme is generally " -"effective,\n" -"and whether the priorities for various messages should be adjusted " -"further.\n" +"It isn't clear whether the current priority scheme is generally effective,\n" +"and whether the priorities for various messages should be adjusted further.\n" "This is a topic for further research, analysis and testing." msgstr "" @@ -14453,8 +11898,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:12 msgid "" "Each of the layers in the stack provides extra capabilities.\n" -"The capabilities are listed below, starting at the bottom of the protocol" -" stack." +"The capabilities are listed below, starting at the bottom of the protocol stack." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:18 @@ -14463,8 +11907,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:20 msgid "" -"IP: Internet Protocol, allow addressing hosts on the regular internet and" -" routing packets across the internet using best-effort delivery." +"IP: Internet Protocol, allow addressing hosts on the regular internet and " +"routing packets across the internet using best-effort delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:23 @@ -14485,11 +11929,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:30 msgid "" -"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P " -"routers. These are not anonymous yet, this is strictly a hop-to-hop " -"connection.\n" -"Two protocols are implemented to provide these capabilities. NTCP builds " -"on top of TCP, while SSU uses UDP." +"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n" +"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:35 @@ -14507,20 +11948,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:42 #, python-format msgid "" -"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are " -"large messages containing encrypted I2NP (see below) messages and " -"encrypted instructions for their delivery.\n" -"The encryption is layered. The first hop will decrypt the tunnel message " -"and read a part. Another part can still be encrypted (with another key)," -"\n" +"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n" +"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n" "so it will be forwarded." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:48 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" used to pass messages through multiple routers. These I2NP messages are " +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"used to pass messages through multiple routers. These I2NP messages are " "combined in tunnel messages." msgstr "" @@ -14533,54 +11970,51 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:55 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" wrapped in each other and used to ensure encryption between two tunnels " -"and are passed along from source to destination, keeping both anonymous." +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"wrapped in each other and used to ensure encryption between two tunnels and " +"are passed along from source to destination, keeping both anonymous." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:61 msgid "" -"The following layers are strictly speaking no longer part of the I2P " -"Protocol stack, they are not part of the core 'I2P router' functionality." -"\n" -"However, each of these layers adds additional functionality, to allow " -"applications simple and convenient I2P usage." +"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n" +"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:67 msgid "" -"<b>I2P Client Layer:</b> allow any client to use I2P functionality, " -"without requiring the direct use of the router API." +"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without " +"requiring the direct use of the router API." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:69 #, python-format msgid "" "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and " -"asynchronous messaging over I2P by communicating messages over the I2CP " -"TCP socket." +"asynchronous messaging over I2P by communicating messages over the I2CP TCP " +"socket." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:74 msgid "" -"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like " -"functionality on top of I2P." +"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality " +"on top of I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:76 #, python-format msgid "" -"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of " -"TCP-like streams over I2P. This allows easier porting of existing " -"applications to I2P." +"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-" +"like streams over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:80 #, python-format msgid "" "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-" -"like messages over I2P. This allows easier porting of existing " -"applications to I2P." +"like messages over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:85 @@ -14600,8 +12034,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:99 msgid "" -"Finally, what could be considered the <b>'I2P application layer'</b>, is " -"a large number of applications on top of I2P.\n" +"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n" "We can order this based on the I2P stack layer they use." msgstr "" @@ -14653,12 +12086,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:8 msgid "" -"A \"transport\" in I2P is a method for direct, point-to-point " -"communication\n" +"A \"transport\" in I2P is a method for direct, point-to-point communication\n" "between two routers.\n" "Transports must provide confidentiality and integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" +"against external adversaries while authenticating that the router contacted \n" "is the one who should receive a given message." msgstr "" @@ -14712,8 +12143,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:44 msgid "" "Maintain a set of router addresses, one or more for each transport,\n" -"that the router publishes as its global contact information (the " -"RouterInfo).\n" +"that the router publishes as its global contact information (the RouterInfo).\n" "Each transport may connect using one of these addresses, which may be\n" "IPv4 or (as of version 0.9.8) IPv6." msgstr "" @@ -14742,10 +12172,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:55 msgid "" -"Maintenance of connection limits for each transport, implementation of " -"various thresholds for these limits,\n" -"and communication of threshold status to the router so it may make " -"operational changes based on the status" +"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n" +"and communication of threshold status to the router so it may make operational changes based on the status" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:59 @@ -14764,27 +12192,26 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:62 msgid "" -"Coordination of firewall status and local IP, and changes to either, " -"among the transports" +"Coordination of firewall status and local IP, and changes to either, among " +"the transports" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:63 #: i2p2www/pages/site/docs/transport/ssu.html:35 msgid "" -"Communication of firewall status and local IP, and changes to either, to " -"the router and the user interface" +"Communication of firewall status and local IP, and changes to either, to the" +" router and the user interface" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:64 msgid "" -"Determination of a consensus clock, which is used to periodically update " -"the router's clock, as a backup for NTP" +"Determination of a consensus clock, which is used to periodically update the" +" router's clock, as a backup for NTP" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:65 msgid "" -"Maintenance of status for each peer, including whether it is connected, " -"whether it was recently connected,\n" +"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n" "and whether it was reachable in the last attempt" msgstr "" @@ -14794,8 +12221,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:70 msgid "" -"Honoring the automated and manual lists of banned peers maintained by the" -" router,\n" +"Honoring the automated and manual lists of banned peers maintained by the router,\n" "and refusing outbound and inbound connections to those peers" msgstr "" @@ -14805,10 +12231,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:79 msgid "" -"The transport subsystem maintains a set of router addresses, each of " -"which lists a transport method, IP, and port.\n" -"These addresses constitute the advertised contact points, and are " -"published by the router to the network database.\n" +"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n" +"These addresses constitute the advertised contact points, and are published by the router to the network database.\n" "Addresses may also contain an arbitrary set of additional options." msgstr "" @@ -14829,16 +12253,13 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:92 #, python-format msgid "" -"A router is firewalled, and therefore publishes an SSU address which " -"contains a list of cooperating\n" -"peers or \"introducers\" who will assist in NAT traversal (see <a " -"href=\"%(ssu)s\">the SSU spec</a> for details)" +"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n" +"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:96 msgid "" -"A router is not firewalled or its NAT ports are open; it publishes both " -"NTCP and SSU addresses containing\n" +"A router is not firewalled or its NAT ports are open; it publishes both NTCP and SSU addresses containing\n" "directly-accessible IP and ports." msgstr "" @@ -14849,10 +12270,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:104 #, python-format msgid "" -"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> " -"only. The transport selected for any message is\n" -"independent of the upper-layer protocols and contents (router or client " -"messages, whether an external application was using\n" +"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n" +"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n" "TCP or UDP to connect to I2P, whether the upper layer was using\n" "<a href=\"%(streaming)s\">the streaming library</a>\n" "streaming\n" @@ -14864,15 +12283,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:118 msgid "" -"For each outgoing message, the transport system solicits \"bids\" from " -"each transport.\n" -"The transport bidding the lowest (best) value wins the bid and receives " -"the message for delivery.\n" +"For each outgoing message, the transport system solicits \"bids\" from each transport.\n" +"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n" "A transport may refuse to bid." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:124 -msgid "Whether a transport bids, and with what value, depend on numerous factors:" +msgid "" +"Whether a transport bids, and with what value, depend on numerous factors:" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:128 @@ -14895,8 +12313,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:132 msgid "" -"The size of the message, as different transports have different size " -"limits" +"The size of the message, as different transports have different size limits" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:133 @@ -14906,7 +12323,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:134 -msgid "Whether the connection would be indirect (requiring introducers) or direct" +msgid "" +"Whether the connection would be indirect (requiring introducers) or direct" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:135 @@ -14915,8 +12333,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:138 msgid "" -"In general, the bid values are selected so that two routers are only " -"connected by a single transport\n" +"In general, the bid values are selected so that two routers are only connected by a single transport\n" "at any one time. However, this is not a requirement." msgstr "" @@ -14934,8 +12351,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:153 msgid "" -"An \"indirect\" transport for routers that are not reachable by all other" -" routers (one form of \"restricted routes\")" +"An \"indirect\" transport for routers that are not reachable by all other " +"routers (one form of \"restricted routes\")" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:154 @@ -14944,31 +12361,24 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:157 msgid "" -"Work continues on adjusting default connection limits for each transport." -"\n" -"I2P is designed as a \"mesh network\", where it is assumed that any " -"router can connect to any other router.\n" -"This assumption may be broken by routers that have exceeded their " -"connection limits, and by\n" +"Work continues on adjusting default connection limits for each transport.\n" +"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n" +"This assumption may be broken by routers that have exceeded their connection limits, and by\n" "routers that are behind restrictive state firewalls (restricted routes)." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:164 msgid "" -"The current connection limits are higher for SSU than for NTCP, based on " -"the assumption that\n" -"the memory requirements for an NTCP connection are higher than that for " -"SSU.\n" -"However, as NTCP buffers are partially in the kernel and SSU buffers are " -"on the Java heap,\n" +"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n" +"the memory requirements for an NTCP connection are higher than that for SSU.\n" +"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n" "that assumption is difficult to verify." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:171 #, python-format msgid "" -"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol " -"Obfuscation</a>\n" +"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n" "and see how transport-layer padding may improve things." msgstr "" @@ -14979,11 +12389,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:6 #, python-format msgid "" -"The others are <a href=\"%(ssu)s\">SSU</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>.\n" +"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n" "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n" -"Java NIO (new I/O) does not suffer from the 1 thread per connection " -"issues of the old TCP transport.\n" +"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n" "NTCP-over-IPv6 is supported as of version 0.9.8." msgstr "" @@ -14998,8 +12406,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:21 msgid "" -"The NTCP code within I2P is relatively lightweight (1/4 the size of the " -"SSU code)\n" +"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n" "because it uses the underlying Java TCP transport for reliable delivery." msgstr "" @@ -15024,21 +12431,17 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:47 msgid "" "After establishment,\n" -"the NTCP transport sends individual I2NP messages, with a simple " -"checksum.\n" +"the NTCP transport sends individual I2NP messages, with a simple checksum.\n" "The unencrypted message is encoded as follows:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:65 msgid "" -"The data is then AES/256/CBC encrypted. The session key for the " -"encryption\n" +"The data is then AES/256/CBC encrypted. The session key for the encryption\n" "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n" -"The establishment between two routers is implemented in the " -"EstablishState class\n" +"The establishment between two routers is implemented in the EstablishState class\n" "and detailed below.\n" -"The IV for AES/256/CBC encryption is the last 16 bytes of the previous " -"encrypted message." +"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:73 @@ -15062,8 +12465,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:93 msgid "" -"Total length: 16 bytes. The time sync message is sent at approximately 15" -" minute intervals.\n" +"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n" "The message is encrypted just as standard messages are." msgstr "" @@ -15086,14 +12488,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:107 #: i2p2www/pages/site/docs/transport/ssu.html:188 msgid "" -"Idle timeout and connection close is at the discretion of each endpoint " -"and may vary.\n" -"The current implementation lowers the timeout as the number of " -"connections approaches the\n" -"configured maximum, and raises the timeout when the connection count is " -"low.\n" -"The recommended minimum timeout is two minutes or more, and the " -"recommended\n" +"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n" +"The current implementation lowers the timeout as the number of connections approaches the\n" +"configured maximum, and raises the timeout when the connection count is low.\n" +"The recommended minimum timeout is two minutes or more, and the recommended\n" "maximum timeout is ten minutes or more." msgstr "" @@ -15104,12 +12502,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:117 msgid "" "After establishment, and every 30-60 minutes thereafter,\n" -"the two routers should generally exchange RouterInfos using a " -"DatabaseStoreMessage.\n" -"However, Alice should check if the first queued message is a " -"DatabaseStoreMessage\n" -"so as not to send a duplicate message; this is often the case when " -"connecting to a floodfill router." +"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n" +"However, Alice should check if the first queued message is a DatabaseStoreMessage\n" +"so as not to send a duplicate message; this is often the case when connecting to a floodfill router." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:125 @@ -15118,11 +12513,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:126 msgid "" -"In the establish state, there is a 4-phase message sequence to exchange " -"DH keys and signatures.\n" +"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n" "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n" -"Then, signatures of the critical data are exchanged to confirm the " -"connection." +"Then, signatures of the critical data are exchanged to confirm the connection." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:142 @@ -15160,15 +12553,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:159 msgid "" "The DH key exchange consists of a number of steps, displayed below.\n" -"The mapping between these steps and the messages sent between I2P " -"routers,\n" +"The mapping between these steps and the messages sent between I2P routers,\n" "is marked in bold." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:165 msgid "" -"Alice generates a secret integer x. She then calculates <code>X = g^x mod" -" p</code>." +"Alice generates a secret integer x. She then calculates <code>X = g^x mod " +"p</code>." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:166 @@ -15202,8 +12594,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:173 #, python-format msgid "" -"The sessionKey is then used to exchange identities in <b>Message 3</b> " -"and <b>Message 4</b>.\n" +"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n" "The exponent (x and y) length for the DH exchange is documented on the\n" "<a href=\"%(crypto)s#exponent\">cryptography page</a>." msgstr "" @@ -15216,8 +12607,7 @@ msgstr "" #, python-format msgid "" "This is the DH request. Alice already has Bob's\n" -"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router " -"Identity</a>,\n" +"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n" "IP address, and port, as contained in his\n" "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n" "which was published to the\n" @@ -15297,8 +12687,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:312 #, python-format msgid "" -"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" +"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" " the last 16 bytes of Y as the IV" msgstr "" @@ -15314,8 +12703,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:326 msgid "" -"This contains Alice's router identity, and a signature of the critical " -"data. Alice sends Bob:" +"This contains Alice's router identity, and a signature of the critical data." +" Alice sends Bob:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:360 @@ -15335,17 +12724,14 @@ msgstr "0-15 byte di dati casuali" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Bob's `RouterIdentity`, tsA, tsB.\n" -" Alice signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in her `RouterIdentity`" +" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:389 #, python-format msgid "" -"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH" -" session key and\n" -" the last 16 bytes of HXxorHI (i.e., the last 16 bytes " -"of message #1) as the IV" +"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:400 @@ -15360,8 +12746,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:406 msgid "" -"Alice will use the last 16 bytes of the encrypted contents of this " -"message as the IV for the next message." +"Alice will use the last 16 bytes of the encrypted contents of this message " +"as the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:430 @@ -15376,19 +12762,15 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Alice's `RouterIdentity`, tsA, tsB.\n" -" Bob signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in his `RouterIdentity`" +" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:479 #, python-format msgid "" -"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" -" the last 16 bytes of the encrypted contents of message " -"#2 as the IV\n" -" 48 bytes for a DSA signature, may vary for other " -"signature types" +"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of the encrypted contents of message #2 as the IV\n" +" 48 bytes for a DSA signature, may vary for other signature types" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:488 @@ -15397,8 +12779,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:491 msgid "" -"Bob will use the last 16 bytes of the encrypted contents of this message " -"as the IV for the next message." +"Bob will use the last 16 bytes of the encrypted contents of this message as " +"the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:506 @@ -15407,14 +12789,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:507 msgid "" -"The connection is established, and standard or time sync messages may be " -"exchanged.\n" -"All subsequent messages are AES encrypted using the negotiated DH session" -" key.\n" -"Alice will use the last 16 bytes of the encrypted contents of message #3 " -"as the next IV.\n" -"Bob will use the last 16 bytes of the encrypted contents of message #4 as" -" the next IV." +"The connection is established, and standard or time sync messages may be exchanged.\n" +"All subsequent messages are AES encrypted using the negotiated DH session key.\n" +"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n" +"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:516 @@ -15441,8 +12819,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:528 msgid "" -"that many bytes making up the local router's IP address (as reached by " -"the remote side)" +"that many bytes making up the local router's IP address (as reached by the " +"remote side)" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:529 @@ -15461,8 +12839,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:532 msgid "" -"xor of the local router's identity hash and the SHA256 of bytes 32 " -"through bytes 223" +"xor of the local router's identity hash and the SHA256 of bytes 32 through " +"bytes 223" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:535 @@ -15485,11 +12863,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:550 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then.\n" -"However, there is currently no provision for padding beyond the next " -"16-byte boundary,\n" +"However, there is currently no provision for padding beyond the next 16-byte boundary,\n" "to create a limited number of message sizes." msgstr "" @@ -15512,28 +12888,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:7 #, python-format msgid "" -"SSU (also called \"UDP\" in much of the I2P documentation and user " -"interfaces)\n" -"is one of three <a href=\"%(transports)s\">transports</a> currently " -"implemented in I2P.\n" -"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>." +"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n" +"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n" +"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:13 msgid "" "SSU was introduced in I2P release 0.6.\n" -"In a standard I2P installation, the router uses both NTCP and SSU for " -"outbound connections.\n" +"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n" "SSU-over-IPv6 is supported as of version 0.9.8." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:19 msgid "" -"SSU is called \"semireliable\" because it will repeatedly retransmit " -"unacknowledged messages,\n" -"but only up to a maximum number of times. After that, the message is " -"dropped." +"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n" +"but only up to a maximum number of times. After that, the message is dropped." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:24 @@ -15542,10 +12912,8 @@ msgstr "Servizi SSU" #: i2p2www/pages/site/docs/transport/ssu.html:26 msgid "" -"Like the NTCP transport, SSU provides reliable, encrypted, connection-" -"oriented, point-to-point data transport.\n" -"Unique to SSU, it also provides IP detection and NAT traversal services, " -"including:" +"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n" +"Unique to SSU, it also provides IP detection and NAT traversal services, including:" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:32 @@ -15562,8 +12930,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:34 msgid "" -"Communication of firewall status and local IP, and changes to either to " -"NTCP" +"Communication of firewall status and local IP, and changes to either to NTCP" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:46 @@ -15598,26 +12965,20 @@ msgid "" "Packets are scheduled according to the router's policy, taking care\n" "not to exceed the router's outbound capacity or to exceed the measured \n" "capacity of the remote peer. The measured capacity operates along the\n" -"lines of TCP's slow start and congestion avoidance, with additive " -"increases\n" -"to the sending capacity and multiplicative decreases in face of " -"congestion.\n" +"lines of TCP's slow start and congestion avoidance, with additive increases\n" +"to the sending capacity and multiplicative decreases in face of congestion.\n" "Unlike for TCP, routers may give up on some messages after\n" -"a given period or number of retransmissions while continuing to transmit" -" \n" +"a given period or number of retransmissions while continuing to transmit \n" "other messages." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:106 msgid "" "The congestion detection techniques vary from TCP as well, since each \n" -"message has its own unique and nonsequential identifier, and each message" -"\n" -"has a limited size - at most, 32KB. To efficiently transmit this " -"feedback\n" +"message has its own unique and nonsequential identifier, and each message\n" +"has a limited size - at most, 32KB. To efficiently transmit this feedback\n" "to the sender, the receiver periodically includes a list of fully ACKed \n" -"message identifiers and may also include bitfields for partially received" -"\n" +"message identifiers and may also include bitfields for partially received\n" "messages, where each bit represents the reception of a fragment. If \n" "duplicate fragments arrive, the message should be ACKed again, or if the\n" "message has still not been fully received, the bitfield should be \n" @@ -15627,8 +12988,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:118 msgid "" "The current implementation does not pad the packets to\n" -"any particular size, but instead just places a single message fragment " -"into\n" +"any particular size, but instead just places a single message fragment into\n" "a packet and sends it off (careful not to exceed the MTU)." msgstr "" @@ -15636,8 +12996,7 @@ msgstr "" msgid "" "As of router version 0.8.12,\n" "two MTU values are used for IPv4: 620 and 1484.\n" -"The MTU value is adjusted based on the percentage of packets that are " -"retransmitted." +"The MTU value is adjusted based on the percentage of packets that are retransmitted." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:131 @@ -15656,10 +13015,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:143 msgid "" -"Based on measurements, 1492 fits nearly all reasonably small I2NP " -"messages\n" -"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going " -"to fit\n" +"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n" +"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n" "into a live network MTU anyway)." msgstr "" @@ -15679,8 +13036,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:161 msgid "" -"As of release 0.9.2, if a router's network interface MTU is less than " -"1484,\n" +"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n" "it will publish that in the network database, and other routers should\n" "honor that when a connection is established." msgstr "" @@ -15700,13 +13056,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:175 msgid "" "While the maximum message size is nominally 32KB, the practical\n" -"limit differs. The protocol limits the number of fragments to 7 bits, or " -"128.\n" -"The current implementation, however, limits each message to a maximum of " -"64 fragments,\n" +"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n" +"The current implementation, however, limits each message to a maximum of 64 fragments,\n" "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n" -"Due to overhead for bundled LeaseSets and session keys, the practical " -"limit\n" +"Due to overhead for bundled LeaseSets and session keys, the practical limit\n" "at the application level is about 6KB lower, or about 26KB.\n" "Further work is necessary to raise the UDP transport limit above 32KB.\n" "For connections using the larger MTU, larger messages are possible." @@ -15720,8 +13073,7 @@ msgstr "Chiavi" msgid "" "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n" "When Alice originates a session with Bob,\n" -"the MAC and session keys are negotiated as part of the DH exchange, and " -"are then used\n" +"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n" "for the HMAC and encryption, respectively. During the DH exchange, \n" "Bob's publicly knowable introKey is used for the MAC and encryption." msgstr "" @@ -15738,8 +13090,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:216 msgid "" -"Upon receiving a message, the receiver checks the \"from\" IP address and" -" port\n" +"Upon receiving a message, the receiver checks the \"from\" IP address and port\n" "with all established sessions - if there are matches,\n" "that session's MAC keys are tested in the HMAC. If none\n" "of those verify or if there are no matching IP addresses, the \n" @@ -15829,8 +13180,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:296 msgid "" -"Direct session establishment is used when no third party is required for " -"NAT traversal.\n" +"Direct session establishment is used when no third party is required for NAT traversal.\n" "The message sequence is as follows:" msgstr "" @@ -15850,10 +13200,8 @@ msgid "" "After the SessionConfirmed message is received, Bob sends a small\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n" "as a confirmation.\n" -"In this message, the 4-byte message ID is set to a random number, and the" -"\n" -"8-byte \"arrival time\" is set to the current network-wide ID, which is 2" -"\n" +"In this message, the 4-byte message ID is set to a random number, and the\n" +"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n" "(i.e. 0x0000000000000002)." msgstr "" @@ -15869,8 +13217,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:335 msgid "" -"It does not appear that the type of the status message or its contents " -"matters.\n" +"It does not appear that the type of the status message or its contents matters.\n" "It was originally added becasue the DatabaseStore message was delayed\n" "several seconds; since the store is now sent immediately, perhaps\n" "the status message can be eliminated." @@ -15880,8 +13227,7 @@ msgstr "" msgid "" "Introduction keys are delivered through an external channel \n" "(the network database),\n" -"where they have traditionally been identical to the router Hash through " -"release 0.9.47,\n" +"where they have traditionally been identical to the router Hash through release 0.9.47,\n" "but may be random as of release 0.9.48.\n" "They must be used when establishing a session key. For the indirect\n" "address, the peer must first contact the relayhost and ask them for\n" @@ -15900,24 +13246,16 @@ msgid "" "is necessary for efficient NAT traversal. Charlie, a router behind a\n" "NAT or firewall which does not allow unsolicited inbound UDP packets,\n" "first contacts a few peers, choosing some to serve as introducers. Each\n" -"of these peers (Bob, Bill, Betty, etc) provide Charlie with an " -"introduction\n" -"tag - a 4 byte random number - which he then makes available to the " -"public\n" -"as methods of contacting him. Alice, a router who has Charlie's " -"published\n" -"contact methods, first sends a RelayRequest packet to one or more of the" -" \n" +"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n" +"tag - a 4 byte random number - which he then makes available to the public\n" +"as methods of contacting him. Alice, a router who has Charlie's published\n" +"contact methods, first sends a RelayRequest packet to one or more of the \n" "introducers, asking each to introduce her to Charlie (offering the \n" "introduction tag to identify Charlie). Bob then forwards a RelayIntro\n" -"packet to Charlie including Alice's public IP and port number, then sends" -"\n" -"Alice back a RelayResponse packet containing Charlie's public IP and port" -"\n" -"number. When Charlie receives the RelayIntro packet, he sends off a " -"small\n" -"random packet to Alice's IP and port (poking a hole in his NAT/firewall)," -"\n" +"packet to Charlie including Alice's public IP and port number, then sends\n" +"Alice back a RelayResponse packet containing Charlie's public IP and port\n" +"number. When Charlie receives the RelayIntro packet, he sends off a small\n" +"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n" "and when Alice receives Bob's RelayResponse packet, she begins a new \n" "full direction session establishment with the specified IP and port." msgstr "" @@ -15927,20 +13265,21 @@ msgid "Connection establishment (indirect using an introducer)" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:389 -msgid "Alice first connects to introducer Bob, who relays the request to Charlie." +msgid "" +"Alice first connects to introducer Bob, who relays the request to Charlie." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:407 msgid "" -"After the hole punch, the session is established between Alice and " -"Charlie as in a direct establishment." +"After the hole punch, the session is established between Alice and Charlie " +"as in a direct establishment." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:421 +#: i2p2www/pages/site/docs/transport/ssu.html:427 msgid "Peer testing" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:423 +#: i2p2www/pages/site/docs/transport/ssu.html:429 msgid "" "The automation of collaborative reachability testing for peers is\n" "enabled by a sequence of PeerTest messages. With its proper \n" @@ -15949,7 +13288,7 @@ msgid "" "quite simple:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:442 +#: i2p2www/pages/site/docs/transport/ssu.html:448 msgid "" "Each of the PeerTest messages carry a nonce identifying the\n" "test series itself, as initialized by Alice. If Alice doesn't \n" @@ -15959,7 +13298,7 @@ msgid "" "that may be reached are as follows:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:452 +#: i2p2www/pages/site/docs/transport/ssu.html:458 msgid "" "If she doesn't receive a response from Bob, she will retransmit\n" "up to a certain number of times, but if no response ever arrives,\n" @@ -15969,7 +13308,7 @@ msgid "" "Charlie to reply." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:461 +#: i2p2www/pages/site/docs/transport/ssu.html:467 msgid "" "If Alice doesn't receive a PeerTest message with the \n" "expected nonce from a third party (Charlie), she will retransmit\n" @@ -15981,7 +13320,7 @@ msgid "" "IP and port that Bob offered up should be forwarded)." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:472 +#: i2p2www/pages/site/docs/transport/ssu.html:478 msgid "" "If Alice receives Bob's PeerTest message and both of Charlie's\n" "PeerTest messages but the enclosed IP and port numbers in Bob's \n" @@ -15992,7 +13331,7 @@ msgid "" "remote connectivity, ignoring further port discovery." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:482 +#: i2p2www/pages/site/docs/transport/ssu.html:488 msgid "" "If Alice receives Charlie's first message but not his second,\n" "she will retransmit her PeerTest message to Charlie up to a \n" @@ -16000,7 +13339,7 @@ msgid "" "that Charlie is either confused or no longer online." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:490 +#: i2p2www/pages/site/docs/transport/ssu.html:496 msgid "" "Alice should choose Bob arbitrarily from known peers who seem\n" "to be capable of participating in peer tests. Bob in turn should\n" @@ -16011,7 +13350,7 @@ msgid "" "to designate a new peer as Bob and try again with a different nonce." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:500 +#: i2p2www/pages/site/docs/transport/ssu.html:506 msgid "" "Alice's introduction key is included in all of the PeerTest \n" "messages so that she doesn't need to already have an established\n" @@ -16020,11 +13359,11 @@ msgid "" "with either Bob or Charlie, but it is not required." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:528 +#: i2p2www/pages/site/docs/transport/ssu.html:534 msgid "Transmission window, ACKs and Retransmissions" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:529 +#: i2p2www/pages/site/docs/transport/ssu.html:535 #, python-format msgid "" "The DATA message may contain ACKs of full messages and\n" @@ -16034,26 +13373,24 @@ msgid "" "for details." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:537 +#: i2p2www/pages/site/docs/transport/ssu.html:543 #, python-format msgid "" -"The details of windowing, ACK, and retransmission strategies are not " -"specified\n" +"The details of windowing, ACK, and retransmission strategies are not specified\n" "here. See the Java code for the current implementation.\n" "During the establishment phase, and for peer testing, routers\n" "should implement exponential backoff for retransmission.\n" "For an established connection, routers should implement\n" -"an adjustable transmission window, RTT estimate and timeout, similar to " -"TCP\n" +"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n" "or <a href=\"%(streaming)s\">streaming</a>.\n" "See the code for initial, min and max parameters." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:549 +#: i2p2www/pages/site/docs/transport/ssu.html:555 msgid "Security" msgstr "Sicurezza" -#: i2p2www/pages/site/docs/transport/ssu.html:550 +#: i2p2www/pages/site/docs/transport/ssu.html:556 msgid "" "UDP source addresses may, of course, be spoofed.\n" "Additionally, the IPs and ports contained inside specific\n" @@ -16062,115 +13399,98 @@ msgid "" "Also, certain actions and responses may need to be rate-limited." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:558 +#: i2p2www/pages/site/docs/transport/ssu.html:564 msgid "" "The details of validation are not specified\n" "here. Implementers should add defenses where appropriate." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:564 +#: i2p2www/pages/site/docs/transport/ssu.html:570 msgid "Peer capabilities" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:568 +#: i2p2www/pages/site/docs/transport/ssu.html:580 msgid "" "If the peer address contains the 'B' capability, that means \n" "they are willing and able to participate in peer tests as\n" "a 'Bob' or 'Charlie'." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:580 -msgid "" -"If the peer address contains the 'C' capability, that means\n" -"they are willing and able to serve as an introducer - serving\n" -"as a Bob for an otherwise unreachable Alice." -msgstr "" - -#: i2p2www/pages/site/docs/transport/ssu.html:589 +#: i2p2www/pages/site/docs/transport/ssu.html:617 msgid "" -"Analysis of current SSU performance, including assessment of window size " -"adjustment\n" -"and other parameters, and adjustment of the protocol implementation to " -"improve\n" +"Analysis of current SSU performance, including assessment of window size adjustment\n" +"and other parameters, and adjustment of the protocol implementation to improve\n" "performance, is a topic for future work." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:595 +#: i2p2www/pages/site/docs/transport/ssu.html:623 msgid "" -"The current implementation repeatedly sends acknowledgments for the same " -"packets,\n" +"The current implementation repeatedly sends acknowledgments for the same packets,\n" "which unnecessarily increases overhead." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:600 +#: i2p2www/pages/site/docs/transport/ssu.html:628 msgid "" -"The default small MTU value of 620 should be analyzed and possibly " -"increased.\n" +"The default small MTU value of 620 should be analyzed and possibly increased.\n" "The current MTU adjustment strategy should be evaluated.\n" -"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? " -"Probably not." +"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:606 +#: i2p2www/pages/site/docs/transport/ssu.html:634 msgid "The protocol should be extended to exchange MTUs during the setup." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:610 +#: i2p2www/pages/site/docs/transport/ssu.html:638 msgid "Rekeying is currently unimplemented and may never be." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:614 +#: i2p2www/pages/site/docs/transport/ssu.html:642 msgid "" -"The potential use of the 'challenge' fields in RelayIntro and " -"RelayResponse,\n" -"and use of the padding field in SessionRequest and SessionCreated, is " -"undocumented." +"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n" +"and use of the padding field in SessionRequest and SessionCreated, is undocumented." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:619 +#: i2p2www/pages/site/docs/transport/ssu.html:647 msgid "" "Instead of a single fragment per packet, a more efficient\n" -"strategy may be to bundle multiple message fragments into the same " -"packet,\n" +"strategy may be to bundle multiple message fragments into the same packet,\n" "so long as it doesn't exceed the MTU." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:625 +#: i2p2www/pages/site/docs/transport/ssu.html:653 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:631 +#: i2p2www/pages/site/docs/transport/ssu.html:659 msgid "" -"Why are introduction keys the same as the router hash, should it be " -"changed, would there be any benefit?" +"Why are introduction keys the same as the router hash, should it be changed," +" would there be any benefit?" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:635 +#: i2p2www/pages/site/docs/transport/ssu.html:663 msgid "Capacities appear to be unused." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:639 +#: i2p2www/pages/site/docs/transport/ssu.html:667 msgid "" -"Signed-on times in SessionCreated and SessionConfirmed appear to be " -"unused or unverified." +"Signed-on times in SessionCreated and SessionConfirmed appear to be unused " +"or unverified." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:644 +#: i2p2www/pages/site/docs/transport/ssu.html:672 msgid "Implementation Diagram" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:645 +#: i2p2www/pages/site/docs/transport/ssu.html:673 msgid "" "This diagram\n" -"should accurately reflect the current implementation, however there may " -"be small differences." +"should accurately reflect the current implementation, however there may be small differences." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:653 +#: i2p2www/pages/site/docs/transport/ssu.html:681 msgid "Now on the SSU specification page" msgstr "" @@ -16191,12 +13511,9 @@ msgid "" "Within I2P, messages are passed in one direction through a virtual\n" "tunnel of peers, using whatever means are available to pass the \n" "message on to the next hop. Messages arrive at the tunnel's \n" -"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel " -"messages, \n" -"and are forwarded on to the next hop in the tunnel, which processes and " -"verifies\n" -"the validity of the message and sends it on to the next hop, and so on, " -"until\n" +"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n" +"and are forwarded on to the next hop in the tunnel, which processes and verifies\n" +"the validity of the message and sends it on to the next hop, and so on, until\n" "it reaches the tunnel endpoint. That <i>endpoint</i> takes the messages\n" "bundled up by the gateway and forwards them as instructed - either\n" "to another router, to another tunnel on another router, or locally." @@ -16218,12 +13535,9 @@ msgid "" "in the tunnel, and provides each with the necessary configuration\n" "data. They may have any number of hops.\n" "It is the intent to make\n" -"it hard for either participants or third parties to determine the length " -"of \n" -"a tunnel, or even for colluding participants to determine whether they " -"are a\n" -"part of the same tunnel at all (barring the situation where colluding " -"peers are\n" +"it hard for either participants or third parties to determine the length of \n" +"a tunnel, or even for colluding participants to determine whether they are a\n" +"part of the same tunnel at all (barring the situation where colluding peers are\n" "next to each other in the tunnel)." msgstr "" @@ -16261,8 +13575,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:69 #, python-format msgid "" -"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are " -"processed and passed through it.\n" +"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n" "Tunnel operation has four distinct processes, taken on by various \n" "peers in the tunnel." msgstr "" @@ -16289,8 +13602,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:89 msgid "" -"Eventually, the tunnel messages arrive at the endpoint where the I2NP " -"messages\n" +"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n" "originally bundled by the gateway are reassembled and forwarded on as \n" "requested." msgstr "" @@ -16350,11 +13662,13 @@ msgid "Decrypt (using an encryption operation)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:133 -msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message" +msgid "" +"Decrypt (using an encryption operation) to reveal plaintext tunnel message" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:134 -msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" +msgid "" +"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:142 @@ -16415,10 +13729,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:181 msgid "" "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n" -"tunnel ID to listen for messages with and what tunnel ID they should be " -"forwarded\n" -"on as to the next hop, and each hop chooses the tunnel ID which they " -"receive messages\n" +"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n" +"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n" "on. Tunnels themselves are short-lived (10 minutes).\n" "Even if subsequent tunnels are built using the same sequence of \n" "peers, each hop's tunnel ID will change." @@ -16426,16 +13738,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:190 msgid "" -"To prevent adversaries from tagging the messages along the path by " -"adjusting\n" -"the message size, all tunnel messages are a fixed 1024 bytes in size. To" -" accommodate \n" -"larger I2NP messages as well as to support smaller ones more efficiently," -" the\n" -"gateway splits up the larger I2NP messages into fragments contained " -"within each\n" -"tunnel message. The endpoint will attempt to rebuild the I2NP message " -"from the\n" +"To prevent adversaries from tagging the messages along the path by adjusting\n" +"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n" +"larger I2NP messages as well as to support smaller ones more efficiently, the\n" +"gateway splits up the larger I2NP messages into fragments contained within each\n" +"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n" "fragments for a short period of time, but will discard them as necessary." msgstr "" @@ -16452,30 +13759,20 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:207 msgid "" -"After the preprocessing of messages into a padded payload, the gateway " -"builds\n" -"a random 16 byte IV value, iteratively encrypting it and the tunnel " -"message as\n" -"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel " -"message} to the next hop." +"After the preprocessing of messages into a padded payload, the gateway builds\n" +"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n" +"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:213 msgid "" -"How encryption at the gateway is done depends on whether the tunnel is an" -"\n" -"inbound or an outbound tunnel. For inbound tunnels, they simply select a" -" random\n" -"IV, postprocessing and updating it to generate the IV for the gateway and" -" using \n" -"that IV along side their own layer key to encrypt the preprocessed data." -" For outbound \n" -"tunnels they must iteratively decrypt the (unencrypted) IV and " -"preprocessed \n" -"data with the IV and layer keys for all hops in the tunnel. The result " -"of the outbound\n" -"tunnel encryption is that when each peer encrypts it, the endpoint will " -"recover \n" +"How encryption at the gateway is done depends on whether the tunnel is an\n" +"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n" +"IV, postprocessing and updating it to generate the IV for the gateway and using \n" +"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n" +"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n" +"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n" +"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n" "the initial preprocessed data." msgstr "" @@ -16485,46 +13782,29 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:227 msgid "" -"When a peer receives a tunnel message, it checks that the message came " -"from\n" -"the same previous hop as before (initialized when the first message comes" -" through\n" -"the tunnel). If the previous peer is a different router, or if the " -"message has\n" -"already been seen, the message is dropped. The participant then encrypts" -" the \n" -"received IV with AES256/ECB using their IV key to determine the current " -"IV, uses \n" -"that IV with the participant's layer key to encrypt the data, encrypts " -"the \n" -"current IV with AES256/ECB using their IV key again, then forwards the " -"tuple \n" -"{nextTunnelId, nextIV, encryptedData} to the next hop. This double " -"encryption\n" +"When a peer receives a tunnel message, it checks that the message came from\n" +"the same previous hop as before (initialized when the first message comes through\n" +"the tunnel). If the previous peer is a different router, or if the message has\n" +"already been seen, the message is dropped. The participant then encrypts the \n" +"received IV with AES256/ECB using their IV key to determine the current IV, uses \n" +"that IV with the participant's layer key to encrypt the data, encrypts the \n" +"current IV with AES256/ECB using their IV key again, then forwards the tuple \n" +"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n" "of the IV (both before and after use) help address a certain class of\n" "confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:243 msgid "" -"Duplicate message detection is handled by a decaying Bloom filter on " -"message\n" -"IVs. Each router maintains a single Bloom filter to contain the XOR of " -"the IV and\n" -"the first block of the message received for all of the tunnels it is " -"participating\n" -"in, modified to drop seen entries after 10-20 minutes (when the tunnels " -"will have\n" -"expired). The size of the bloom filter and the parameters used are " -"sufficient to\n" -"more than saturate the router's network connection with a negligible " -"chance of \n" -"false positive. The unique value fed into the Bloom filter is the XOR of" -" the IV \n" -"and the first block so as to prevent nonsequential colluding peers in the" -" tunnel \n" -"from tagging a message by resending it with the IV and first block " -"switched." +"Duplicate message detection is handled by a decaying Bloom filter on message\n" +"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n" +"the first block of the message received for all of the tunnels it is participating\n" +"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n" +"expired). The size of the bloom filter and the parameters used are sufficient to\n" +"more than saturate the router's network connection with a negligible chance of \n" +"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n" +"and the first block so as to prevent nonsequential colluding peers in the tunnel \n" +"from tagging a message by resending it with the IV and first block switched." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:256 @@ -16533,27 +13813,19 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:258 msgid "" -"After receiving and validating a tunnel message at the last hop in the " -"tunnel,\n" -"how the endpoint recovers the data encoded by the gateway depends upon " -"whether \n" -"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, " -"the \n" -"endpoint encrypts the message with its layer key just like any other " -"participant, \n" -"exposing the preprocessed data. For inbound tunnels, the endpoint is " -"also the \n" -"tunnel creator so they can merely iteratively decrypt the IV and message," -" using the \n" +"After receiving and validating a tunnel message at the last hop in the tunnel,\n" +"how the endpoint recovers the data encoded by the gateway depends upon whether \n" +"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n" +"endpoint encrypts the message with its layer key just like any other participant, \n" +"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n" +"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n" "layer and IV keys of each step in reverse order." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:268 msgid "" -"At this point, the tunnel endpoint has the preprocessed data sent by the " -"gateway,\n" -"which it may then parse out into the included I2NP messages and forwards " -"them as\n" +"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n" +"which it may then parse out into the included I2NP messages and forwards them as\n" "requested in their delivery instructions." msgstr "" @@ -16563,30 +13835,21 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:277 msgid "" -"When building a tunnel, the creator must send a request with the " -"necessary\n" -"configuration data to each of the hops and wait for all of them to agree " -"before\n" -"enabling the tunnel. The requests are encrypted so that only the peers " -"who need\n" -"to know a piece of information (such as the tunnel layer or IV key) has " -"that\n" -"data. In addition, only the tunnel creator will have access to the " -"peer's\n" -"reply. There are three important dimensions to keep in mind when " -"producing\n" -"the tunnels: what peers are used (and where), how the requests are sent " -"(and \n" +"When building a tunnel, the creator must send a request with the necessary\n" +"configuration data to each of the hops and wait for all of them to agree before\n" +"enabling the tunnel. The requests are encrypted so that only the peers who need\n" +"to know a piece of information (such as the tunnel layer or IV key) has that\n" +"data. In addition, only the tunnel creator will have access to the peer's\n" +"reply. There are three important dimensions to keep in mind when producing\n" +"the tunnels: what peers are used (and where), how the requests are sent (and \n" "replies received), and how they are maintained." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:291 msgid "" -"Beyond the two types of tunnels - inbound and outbound - there are two " -"styles\n" +"Beyond the two types of tunnels - inbound and outbound - there are two styles\n" "of peer selection used for different tunnels - exploratory and client.\n" -"Exploratory tunnels are used for both network database maintenance and " -"tunnel\n" +"Exploratory tunnels are used for both network database maintenance and tunnel\n" "maintenance, while client tunnels are used for end to end client messages." msgstr "" @@ -16596,18 +13859,12 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:301 msgid "" -"Exploratory tunnels are built out of a random selection of peers from a " -"subset\n" -"of the network. The particular subset varies on the local router and on " -"what their\n" -"tunnel routing needs are. In general, the exploratory tunnels are built " -"out of\n" -"randomly selected peers who are in the peer's \"not failing but active\" " -"profile\n" -"category. The secondary purpose of the tunnels, beyond merely tunnel " -"routing,\n" -"is to find underutilized high capacity peers so that they can be promoted" -" for\n" +"Exploratory tunnels are built out of a random selection of peers from a subset\n" +"of the network. The particular subset varies on the local router and on what their\n" +"tunnel routing needs are. In general, the exploratory tunnels are built out of\n" +"randomly selected peers who are in the peer's \"not failing but active\" profile\n" +"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n" +"is to find underutilized high capacity peers so that they can be promoted for\n" "use in client tunnels." msgstr "" @@ -16624,14 +13881,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:319 msgid "" -"Client tunnels are built with a more stringent set of requirements - the " -"local\n" -"router will select peers out of its \"fast and high capacity\" profile " -"category so\n" -"that performance and reliability will meet the needs of the client " -"application.\n" -"However, there are several important details beyond that basic selection " -"that \n" +"Client tunnels are built with a more stringent set of requirements - the local\n" +"router will select peers out of its \"fast and high capacity\" profile category so\n" +"that performance and reliability will meet the needs of the client application.\n" +"However, there are several important details beyond that basic selection that \n" "should be adhered to, depending upon the client's anonymity needs." msgstr "" @@ -16657,10 +13910,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:341 msgid "" "To frustrate the predecessor \n" -"attack, the tunnel selection keeps the peers selected in a strict order -" -"\n" -"if A, B, and C are in a tunnel for a particular tunnel pool, the hop " -"after A is always B, and the hop after\n" +"attack, the tunnel selection keeps the peers selected in a strict order -\n" +"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n" "B is always C." msgstr "" @@ -16669,18 +13920,15 @@ msgid "" "Ordering is implemented by generating a random 32-byte key for each\n" "tunnel pool at startup.\n" "Peers should not be able to guess the ordering, or an attacker could\n" -"craft two router hashes far apart to maximize the chance of being at both" -"\n" +"craft two router hashes far apart to maximize the chance of being at both\n" "ends of a tunnel.\n" "Peers are sorted by XOR distance of the\n" -"SHA256 Hash of (the peer's hash concatenated with the random key) from " -"the random key" +"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:363 msgid "" -"Because each tunnel pool uses a different random key, ordering is " -"consistent\n" +"Because each tunnel pool uses a different random key, ordering is consistent\n" "within a single pool but not between different pools.\n" "New keys are generated at each router restart." msgstr "" @@ -16692,8 +13940,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:372 #, python-format msgid "" -"A multi-hop tunnel is built using a single build message which is " -"repeatedly\n" +"A multi-hop tunnel is built using a single build message which is repeatedly\n" "decrypted and forwarded. In the terminology of\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n" "this is \"non-interactive\" telescopic tunnel building." @@ -16704,38 +13951,28 @@ msgstr "" msgid "" "This tunnel request preparation, delivery, and response method is\n" "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n" -"predecessors exposed, cuts the number of messages transmitted, verifies " -"proper\n" -"connectivity, and avoids the message counting attack of traditional " -"telescopic\n" +"predecessors exposed, cuts the number of messages transmitted, verifies proper\n" +"connectivity, and avoids the message counting attack of traditional telescopic\n" "tunnel creation.\n" -"(This method, which sends messages to extend a tunnel through the " -"already-established\n" -"part of the tunnel, is termed \"interactive\" telescopic tunnel building " -"in\n" +"(This method, which sends messages to extend a tunnel through the already-established\n" +"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n" "the \"Hashing it out\" paper.)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:390 #, python-format msgid "" -"The details of tunnel request and response messages, and their " -"encryption,\n" +"The details of tunnel request and response messages, and their encryption,\n" "<a href=\"%(tunnelcreation)s\">are specified here</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:395 msgid "" -"Peers may reject tunnel creation requests for a variety of reasons, " -"though\n" -"a series of four increasingly severe rejections are known: probabilistic " -"rejection\n" -"(due to approaching the router's capacity, or in response to a flood of " -"requests), \n" -"transient overload, bandwidth overload, and critical failure. When " -"received, \n" -"those four are interpreted by the tunnel creator to help adjust their " -"profile of\n" +"Peers may reject tunnel creation requests for a variety of reasons, though\n" +"a series of four increasingly severe rejections are known: probabilistic rejection\n" +"(due to approaching the router's capacity, or in response to a flood of requests), \n" +"transient overload, bandwidth overload, and critical failure. When received, \n" +"those four are interpreted by the tunnel creator to help adjust their profile of\n" "the router in question." msgstr "" @@ -16753,37 +13990,26 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:412 #, python-format msgid "" -"To allow efficient operation, the router maintains a series of tunnel " -"pools,\n" -"each managing a group of tunnels used for a specific purpose with their " -"own\n" -"configuration. When a tunnel is needed for that purpose, the router " -"selects one\n" -"out of the appropriate pool at random. Overall, there are two " -"exploratory tunnel\n" -"pools - one inbound and one outbound - each using the router's default " -"configuration.\n" +"To allow efficient operation, the router maintains a series of tunnel pools,\n" +"each managing a group of tunnels used for a specific purpose with their own\n" +"configuration. When a tunnel is needed for that purpose, the router selects one\n" +"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n" +"pools - one inbound and one outbound - each using the router's default configuration.\n" "In addition, there is a pair of pools for each local destination -\n" -"one inbound and one outbound tunnel pool. Those pools use the " -"configuration specified\n" -"when the local destination connects to the router via <a " -"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" +"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n" +"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" "not specified." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:424 #, python-format msgid "" -"Each pool has within its configuration a few key settings, defining how " -"many\n" -"tunnels to keep active, how many backup tunnels to maintain in case of " -"failure,\n" +"Each pool has within its configuration a few key settings, defining how many\n" +"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n" "how long the tunnels should be, whether those\n" "lengths should be randomized, as \n" -"well as any of the other settings allowed when configuring individual " -"tunnels.\n" -"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP " -"page</a>." +"well as any of the other settings allowed when configuring individual tunnels.\n" +"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:434 @@ -16800,20 +14026,14 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:440 msgid "" -"Tunnel building is expensive, and tunnels expire a fixed time after they " -"are built.\n" -"However, when a pool that runs out of tunnels, the Destination is " -"essentially dead.\n" -"In addition, tunnel build success rate may vary greatly with both local " -"and global\n" +"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n" +"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n" +"In addition, tunnel build success rate may vary greatly with both local and global\n" "network conditions.\n" -"Therefore, it is important to maintain an anticipatory, adaptive build " -"strategy\n" -"to ensure that new tunnels are successfully built before they are needed," -"\n" +"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n" +"to ensure that new tunnels are successfully built before they are needed,\n" "without building an excess of tunnels, building them too soon,\n" -"or consuming too much CPU or bandwidth creating and sending the encrypted" -" build messages." +"or consuming too much CPU or bandwidth creating and sending the encrypted build messages." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:451 @@ -16821,8 +14041,7 @@ msgid "" "For each tuple {exploratory/client, in/out, length, length variance}\n" "the router maintains statistics on the time required for a successful\n" "tunnel build.\n" -"Using these statistics, it calculates how long before a tunnel's " -"expiration\n" +"Using these statistics, it calculates how long before a tunnel's expiration\n" "it should start attempting to build a replacement.\n" "As the expiration time approaches without a successful replacement,\n" "it starts multiple build attempts in parallel, and then\n" @@ -16844,30 +14063,18 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:473 msgid "" -"Even though the tunnels within I2P bear a resemblance to a circuit " -"switched\n" -"network, everything within I2P is strictly message based - tunnels are " -"merely\n" -"accounting tricks to help organize the delivery of messages. No " -"assumptions are\n" -"made regarding reliability or ordering of messages, and retransmissions " -"are left\n" -"to higher levels (e.g. I2P's client layer streaming library). This " -"allows I2P\n" -"to take advantage of throttling techniques available to both packet " -"switched and\n" -"circuit switched networks. For instance, each router may keep track of " -"the \n" -"moving average of how much data each tunnel is using, combine that with " -"all of \n" -"the averages used by other tunnels the router is participating in, and be" -" able\n" -"to accept or reject additional tunnel participation requests based on its" -" \n" -"capacity and utilization. On the other hand, each router can simply drop" -" \n" -"messages that are beyond its capacity, exploiting the research used on " -"the \n" +"Even though the tunnels within I2P bear a resemblance to a circuit switched\n" +"network, everything within I2P is strictly message based - tunnels are merely\n" +"accounting tricks to help organize the delivery of messages. No assumptions are\n" +"made regarding reliability or ordering of messages, and retransmissions are left\n" +"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n" +"to take advantage of throttling techniques available to both packet switched and\n" +"circuit switched networks. For instance, each router may keep track of the \n" +"moving average of how much data each tunnel is using, combine that with all of \n" +"the averages used by other tunnels the router is participating in, and be able\n" +"to accept or reject additional tunnel participation requests based on its \n" +"capacity and utilization. On the other hand, each router can simply drop \n" +"messages that are beyond its capacity, exploiting the research used on the \n" "normal Internet." msgstr "" @@ -16875,23 +14082,16 @@ msgstr "" msgid "" "In the current implementation, routers implement a\n" "weighted random early discard (WRED) strategy.\n" -"For all participating routers (internal participant, inbound gateway, and" -" outbound endpoint),\n" +"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n" "the router will start randomly dropping a portion of messages as the\n" "bandwidth limits are approached.\n" -"As traffic gets closer to, or exceeds, the limits, more messages are " -"dropped.\n" -"For an internal participant, all messages are fragmented and padded and " -"therefore are the same size.\n" -"At the inbound gateway and outbound endpoint, however, the dropping " -"decision is made\n" -"on the full (coalesced) message, and the message size is taken into " -"account.\n" +"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n" +"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n" +"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n" +"on the full (coalesced) message, and the message size is taken into account.\n" "Larger messages are more likely to be dropped.\n" -"Also, messages are more likely to be dropped at the outbound endpoint " -"than the inbound gateway,\n" -"as those messages are not as \"far along\" in their journey and thus the " -"network cost of\n" +"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n" +"as those messages are not as \"far along\" in their journey and thus the network cost of\n" "dropping those messages is lower." msgstr "" @@ -16901,16 +14101,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:509 msgid "" -"What strategies could be used at the gateway and at each hop for " -"delaying,\n" -"reordering, rerouting, or padding messages? To what extent should this " -"be done\n" -"automatically, how much should be configured as a per tunnel or per hop " -"setting,\n" -"and how should the tunnel's creator (and in turn, user) control this " -"operation?\n" -"All of this is left as unknown, to be worked out for a distant future " -"release." +"What strategies could be used at the gateway and at each hop for delaying,\n" +"reordering, rerouting, or padding messages? To what extent should this be done\n" +"automatically, how much should be configured as a per tunnel or per hop setting,\n" +"and how should the tunnel's creator (and in turn, user) control this operation?\n" +"All of this is left as unknown, to be worked out for a distant future release." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:518 @@ -16919,13 +14114,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:519 msgid "" -"The padding strategies can be used on a variety of levels, addressing the" -"\n" +"The padding strategies can be used on a variety of levels, addressing the\n" "exposure of message size information to different adversaries.\n" -"The current fixed tunnel message size is 1024 bytes. Within this " -"however, the fragmented\n" -"messages themselves are not padded by the tunnel at all, though for end " -"to end \n" +"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n" +"messages themselves are not padded by the tunnel at all, though for end to end \n" "messages, they may be padded as part of the garlic wrapping." msgstr "" @@ -16953,8 +14145,7 @@ msgstr "Novembre 2016" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7 msgid "" -"This page describes the origins and design of I2P's unidirectional " -"tunnels.\n" +"This page describes the origins and design of I2P's unidirectional tunnels.\n" "For further information see:" msgstr "" @@ -16988,8 +14179,7 @@ msgid "" "Several apps and protocols, notably HTTP,\n" "do transfer data in such manner. Having the traffic follow the same \n" "route to its destination and back could make it easier for an \n" -"attacker who has only timing and traffic volume data to infer the path a" -" \n" +"attacker who has only timing and traffic volume data to infer the path a \n" "tunnel is taking.\n" "Having the response come back along a different path arguably \n" "makes it harder." @@ -16998,42 +14188,27 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45 msgid "" "When dealing with \n" -"an internal adversary or most external adversaries, I2P's undirectional " -"tunnels\n" -"expose half as much traffic data than would be exposed with bidirectional" -" circuits\n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels." +"an internal adversary or most external adversaries, I2P's undirectional tunnels\n" +"expose half as much traffic data than would be exposed with bidirectional circuits\n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55 msgid "" "The strategy of using two separate tunnels for inbound and outbound\n" -"communication is not the only technique available, and it does have " -"anonymity\n" -"implications. On the positive side, by using separate tunnels it lessens" -" the\n" -"traffic data exposed for analysis to participants in a tunnel - for " -"instance,\n" -"peers in an outbound tunnel from a web browser would only see the traffic" -" of\n" +"communication is not the only technique available, and it does have anonymity\n" +"implications. On the positive side, by using separate tunnels it lessens the\n" +"traffic data exposed for analysis to participants in a tunnel - for instance,\n" +"peers in an outbound tunnel from a web browser would only see the traffic of\n" "an HTTP GET, while the peers in an inbound tunnel would see the payload \n" -"delivered along the tunnel. With bidirectional tunnels, all participants" -" would\n" -"have access to the fact that e.g. 1KB was sent in one direction, then " -"100KB\n" -"in the other. On the negative side, using unidirectional tunnels means " -"that\n" -"there are two sets of peers which need to be profiled and accounted for, " -"and\n" -"additional care must be taken to address the increased speed of " -"predecessor\n" +"delivered along the tunnel. With bidirectional tunnels, all participants would\n" +"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n" +"in the other. On the negative side, using unidirectional tunnels means that\n" +"there are two sets of peers which need to be profiled and accounted for, and\n" +"additional care must be taken to address the increased speed of predecessor\n" "attacks. The tunnel pooling and building process\n" "(peer selection and ordering strategies)\n" "should minimize the worries of the predecessor attack." @@ -17047,28 +14222,22 @@ msgstr "Anonimità " #, python-format msgid "" "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n" -"declared that I2P's unidirectional tunnels \"seems to be a bad design " -"decision\"." +"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80 msgid "" "The paper's main point is that\n" -"deanonymizations on unidirectional tunnels take a longer time, which is " -"an \n" -"advantage, but that an attacker can be more certain in the unidirectional" -" case. \n" -"Therefore, the paper claims it isn't an advantage at all, but a " -"disadvantage, at least\n" -"with long-living eepsites." +"deanonymizations on unidirectional tunnels take a longer time, which is an \n" +"advantage, but that an attacker can be more certain in the unidirectional case. \n" +"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n" +"with long-living I2P Sites." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88 msgid "" -"This conclusion is not fully supported by the paper. Unidirectional " -"tunnels clearly \n" -"mitigate other attacks and it's not clear how to trade off the risk of " -"the \n" +"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n" +"mitigate other attacks and it's not clear how to trade off the risk of the \n" "attack in the paper\n" "with attacks on a bidirectional tunnel architecture." msgstr "" @@ -17077,63 +14246,45 @@ msgstr "" msgid "" "This conclusion is based on an arbitrary certainty vs. time weighting \n" "(tradeoff) that may not be applicable in all cases. For \n" -"example, somebody could make a list of possible IPs then issue subpoenas " -"to \n" +"example, somebody could make a list of possible IPs then issue subpoenas to \n" "each. Or the attacker could DDoS each in turn and via a simple \n" -"intersection attack see if the eepsite goes down or is slowed down. So " -"close \n" +"intersection attack see if the I2P Site goes down or is slowed down. So close \n" "may be good enough, or time may be more important." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104 msgid "" -"The conclusion is based on a specific weighting of the importance of " -"certainty \n" -"vs. time, and that weighting may be wrong, and it's definitely debatable," -" \n" -"especially in a real world with subpoenas, search warrants, and other " -"methods \n" +"The conclusion is based on a specific weighting of the importance of certainty \n" +"vs. time, and that weighting may be wrong, and it's definitely debatable, \n" +"especially in a real world with subpoenas, search warrants, and other methods \n" "available for final confirmation." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111 msgid "" "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n" -"tunnels is clearly outside the scope of the paper, and has not been done" -" \n" -"elsewhere. For example, how does this attack compare to the numerous " -"possible \n" -"timing attacks published about onion-routed networks? Clearly the authors" -" have not\n" +"tunnels is clearly outside the scope of the paper, and has not been done \n" +"elsewhere. For example, how does this attack compare to the numerous possible \n" +"timing attacks published about onion-routed networks? Clearly the authors have not\n" "done that analysis, if it's even possible to do it\n" "effectively." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120 msgid "" -"Tor uses bidirectional tunnels and has had a lot of academic review. I2P" -" \n" -"uses unidirectional tunnels and has had very little review. Does the lack" -" of a \n" -"research paper defending unidirectional tunnels mean that it is a poor " -"design \n" +"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n" +"uses unidirectional tunnels and has had very little review. Does the lack of a \n" +"research paper defending unidirectional tunnels mean that it is a poor design \n" "choice, or just that it needs more study? Timing attacks and \n" -"distributed attacks are difficult to defend against in both I2P and Tor. " -"The \n" -"design intent (see references above) was that unidirectional tunnels are " -"more \n" -"resistant to timing attacks. However, the paper presents a somewhat " -"different type of timing \n" +"distributed attacks are difficult to defend against in both I2P and Tor. The \n" +"design intent (see references above) was that unidirectional tunnels are more \n" +"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n" "attack. Is this attack, innovative as it is, sufficient to label I2P's \n" "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n" -"implication clearly inferior to Tor, or is it just a design alternative " -"that \n" -"clearly needs further investigation and analysis? There are several other" -" reasons \n" -"to consider I2P currently inferior to Tor and other projects (small " -"network \n" -"size, lack of funding, lack of review) but is unidirectional tunnels " -"really a \n" +"implication clearly inferior to Tor, or is it just a design alternative that \n" +"clearly needs further investigation and analysis? There are several other reasons \n" +"to consider I2P currently inferior to Tor and other projects (small network \n" +"size, lack of funding, lack of review) but is unidirectional tunnels really a \n" "reason?" msgstr "" @@ -17144,4 +14295,3 @@ msgid "" "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n" "conclusion is not supported by the paper." msgstr "" - diff --git a/i2p2www/translations/it/LC_MESSAGES/misc.po b/i2p2www/translations/it/LC_MESSAGES/misc.po index c5b19147ae69cf32c87fb37ca7b0515b13dc8764..3655e9c19a413d0ab4c179acaa4bfd55b891ac12 100644 --- a/i2p2www/translations/it/LC_MESSAGES/misc.po +++ b/i2p2www/translations/it/LC_MESSAGES/misc.po @@ -1,25 +1,26 @@ -# Italian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# Giuseppe Pignataro (Fastbyte01) <rogepix@gmail.com>, 2014 -# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2015-2017 -# Sebastiano Pistore <SebastianoPistore.info@protonmail.ch>, 2018 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# Giuseppe Pignataro <rogepix@gmail.com>, 2014 +# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2015-2017 +# SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2018-08-16 15:05+0000\n" -"Last-Translator: Sebastiano Pistore " -"<SebastianoPistore.info@protonmail.ch>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2018\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -28,51 +29,37 @@ msgstr "" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." msgstr "" #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" msgstr "" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." msgstr "" #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." msgstr "" #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" msgstr "" @@ -85,7 +72,7 @@ msgstr "" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" @@ -103,12 +90,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" +msgid "For the name: <code>\"I2P Site\"</code>" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Per la descrizione: <code>\"È bello il mio eepsite, no?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -138,14 +125,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" msgstr "" @@ -163,7 +146,7 @@ msgid "I2PTunnel services" msgstr "Servizi I2PTunnel" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 @@ -179,23 +162,23 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 @@ -208,8 +191,8 @@ msgstr "" msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 @@ -224,28 +207,28 @@ msgstr "2 - Generare una coppia di chiavi di destinazione I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 @@ -268,9 +251,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 @@ -281,27 +264,27 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 @@ -310,9 +293,9 @@ msgstr "3 - Apri un 'tunnel' da I2P al tuo server locale" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 @@ -337,9 +320,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 @@ -357,9 +340,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 @@ -393,42 +376,42 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 @@ -460,11 +443,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 @@ -475,25 +457,25 @@ msgstr "7 - Condividi i dettagli del tuo server con gli altri utenti" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 @@ -502,8 +484,8 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 @@ -512,8 +494,8 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 @@ -524,16 +506,16 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." msgstr "" #: i2p2www/pages/site/misc/invisiblenet.html:2 @@ -542,13 +524,11 @@ msgstr "Vecchia documentazione" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." +"However, the I2CP and I2NP documents in particular have some good information." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:3 @@ -561,8 +541,7 @@ msgstr "Panoramica" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." msgstr "" @@ -576,18 +555,15 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" @@ -601,8 +577,7 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." msgstr "" @@ -613,31 +588,25 @@ msgstr "Requisiti" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " +"The required code is available in monotone database and the latest source " +"tarball. " msgstr "" #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." msgstr "" @@ -648,8 +617,7 @@ msgstr "Istruzioni passo-passo" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" msgstr "" @@ -677,27 +645,20 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" msgstr "" @@ -711,18 +672,14 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." msgstr "" @@ -730,17 +687,13 @@ msgstr "" msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." msgstr "" @@ -768,11 +721,8 @@ msgstr "Riavvia I2P." #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." msgstr "" @@ -782,8 +732,7 @@ msgstr "" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." msgstr "" @@ -792,8 +741,7 @@ msgstr "" msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" @@ -815,33 +763,24 @@ msgstr "Installare manualmente il wrapper Java" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." msgstr "" @@ -850,7 +789,8 @@ msgid "Using existing binaries" msgstr "Usare il binari precompilati" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -866,8 +806,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:43 @@ -876,16 +816,15 @@ msgstr "Compilare dai sorgenti" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:49 @@ -894,8 +833,8 @@ msgstr "Estrai il tarball" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:54 @@ -934,164 +873,110 @@ msgstr "" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" msgstr "" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." msgstr "" #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." msgstr "" #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" msgstr "" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" msgstr "" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." msgstr "" @@ -1106,8 +991,8 @@ msgstr "" #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" msgstr "" #: i2p2www/pages/site/misc/ratestats.html:10 @@ -1122,18 +1007,15 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." msgstr "" #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." msgstr "" @@ -1145,9 +1027,7 @@ msgstr "Guida" msgid "" "\n" "The following is a detailed guide by Complication." -msgstr "" -"\n" -"Segue una guida dettagliata scritta da Complication." +msgstr "\nSegue una guida dettagliata scritta da Complication." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2 msgid "How to Upgrade from 0.6.1.30 and Earlier" @@ -1164,24 +1044,20 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." @@ -1194,8 +1070,8 @@ msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 @@ -1217,8 +1093,7 @@ msgstr "Fai click su \"Applica\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." msgstr "" @@ -1227,7 +1102,5 @@ msgstr "" msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." +"Thank you for your support during this transition. For help please contact us on #i2p." msgstr "" - diff --git a/i2p2www/translations/it/LC_MESSAGES/research.po b/i2p2www/translations/it/LC_MESSAGES/research.po index 04c0552e3a5877bd13efd6a278b327ca5b32204b..fc38cc4bbd0c46a2755db90494bc4f1e5a87387d 100644 --- a/i2p2www/translations/it/LC_MESSAGES/research.po +++ b/i2p2www/translations/it/LC_MESSAGES/research.po @@ -1,26 +1,27 @@ -# Italian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # alamir <christianm@libero.it>, 2014 +# alamir <christianm@libero.it>, 2014 # Fletcher Lynd <fletcherlynd@hotmail.com>, 2013 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2016-2017 # SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-05-06 14:26+0000\n" -"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>" -"\n" +"PO-Revision-Date: 2013-07-15 12:01+0000\n" +"Last-Translator: SebastianoPistore <SebastianoPistore.info@protonmail.ch>, 2020-2021\n" "Language-Team: Italian (http://www.transifex.com/otf/I2P/language/it/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: it\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -41,16 +42,11 @@ msgstr "" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." msgstr "" @@ -58,49 +54,27 @@ msgstr "" #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" -msgstr "" -"\n" -"Esiste una grande comunità di ricerca che indaga una vasta gamma di " -"aspetti \n" -"relativi all'anonimato. Per un elenco aggiornato e completo di documenti," -"\n" -"consulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven " -"Anonymity</a>.\n" -"I2P si avvantaggia di molte delle ricerche relative a Tor e all'onion " -"routing, \n" -"ma c'è poco interesse dedicato alla ricerca nel campo della teoria alla " -"base\n" -"di I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta " -"una\n" -"opportunità di ricerca originale unica.\n" +msgstr "\nEsiste una grande comunità di ricerca che indaga una vasta gamma di aspetti \nrelativi all'anonimato. Per un elenco aggiornato e completo di documenti,\nconsulta la <a href=\"%(anonbib)s\">bibliografia di Free Haven Anonymity</a>.\nI2P si avvantaggia di molte delle ricerche relative a Tor e all'onion routing, \nma c'è poco interesse dedicato alla ricerca nel campo della teoria alla base\ndi I2P e alle scelte e ai compromessi fatti dalla rete. Questo presenta una\nopportunità di ricerca originale unica.\n" #: i2p2www/pages/site/research/index.html:29 #, python-format msgid "" "A list of known published papers about I2P is available <a " "href=\"%(papers)s\">here</a>." -msgstr "" -"Un elenco di documenti pubblicati inerenti a I2P di cui siamo a " -"conoscenza è disponibile <a href=\"%(papers)s\">qui</a>." +msgstr "Un elenco di documenti pubblicati inerenti a I2P di cui siamo a conoscenza è disponibile <a href=\"%(papers)s\">qui</a>." #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" msgstr "" @@ -114,16 +88,12 @@ msgstr "" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" @@ -134,27 +104,17 @@ msgstr "" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"<b>please</b> \n" -"<a href=\"%(contact)s\">communicate your ideas</a> to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to <b>please</b> \n" +"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" @@ -170,13 +130,11 @@ msgstr "Linee guida generali" msgid "" "<ol>\n" " <li>\n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" " </li>\n" " <li>\n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" " </li>\n" " <li>\n" @@ -184,10 +142,8 @@ msgid "" " collecting data about yourself\n" " </li>\n" " <li>\n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" " </li>\n" " <li>\n" @@ -195,10 +151,8 @@ msgid "" " publication and collect as little as possible\n" " </li>\n" " <li>\n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is <b><i>not</i></b> intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is <b><i>not</i></b> intended to be private by the\n" " originator\n" " </li>\n" "</ol>" @@ -210,32 +164,24 @@ msgstr "" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n" "router.config before starting." msgstr "" @@ -246,13 +192,10 @@ msgstr "" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please <a " -"href=\"%(contact)s\">contact\n" +"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n" " us</a> before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -262,35 +205,23 @@ msgstr "" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -345,8 +276,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." +"This process is subject to change. Please refer to this page for the current VRP." msgstr "" #: i2p2www/pages/site/research/vrp.html:10 @@ -355,22 +285,15 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:12 msgid "" -"Researchers: while you research/hack, we ask that you refrain from the " -"following: - Performing active exploits or Denial of Service attacks on " -"the\n" -"i2p network - Performing social engineering on i2p development team " -"members - Performing any physical or electronic attempts against i2p " -"property and/or data\n" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" "centers" msgstr "" #: i2p2www/pages/site/research/vrp.html:15 msgid "" -"As i2p is an open-source community, many volunteers and development team " -"members run their own I2P Sites as well as public (“non-private " -"internetâ€) domains. These\n" -"sites/servers are NOT in the scope of the vulnerability assessment / " -"response process, only the underlying code of i2p is." +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internetâ€) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." msgstr "" #: i2p2www/pages/site/research/vrp.html:18 @@ -397,8 +320,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." msgstr "" @@ -411,8 +333,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." msgstr "" @@ -432,8 +353,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." msgstr "" #: i2p2www/pages/site/research/vrp.html:70 @@ -441,15 +362,12 @@ msgid "" "\n" "Establish severity of vulnerability:\n" " " -msgstr "" -"\n" -"Capire la gravità di una vulnerabiltà :\n" -" " +msgstr "\nCapire la gravità di una vulnerabiltà :\n " #: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Affects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." msgstr "" #: i2p2www/pages/site/research/vrp.html:79 @@ -467,19 +385,18 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." msgstr "" #: i2p2www/pages/site/research/vrp.html:98 -msgid "The notification should list appropriate steps for users to take, if any." +msgid "" +"The notification should list appropriate steps for users to take, if any." msgstr "" #: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." msgstr "" @@ -502,8 +419,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:122 msgid "" "Response Manager works on a patch LOCALLY, patches are shared by the " -"response team via PGP-encrypted e-mail until such a time as it is safe to" -" expose to the public." +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" #: i2p2www/pages/site/research/vrp.html:125 @@ -512,10 +429,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." msgstr "" #: i2p2www/pages/site/research/vrp.html:132 @@ -550,19 +465,14 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." +"Response Manager includes vulnerability announcement draft in release notes." msgstr "" #: i2p2www/pages/site/research/vrp.html:162 msgid "" -"Proceed with the Point or Regular Release. At this time, it is not " -"possible to release an in-network update for only one operating system or" -"\n" -"\t\tarchitecture. In order that all affected products can be released as " -"quickly as possible, the person responsible\n" -"\t\tfor that software should be able to perform necessary release " -"processes in a timely manner. Importantly this should include\n" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" @@ -572,11 +482,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." msgstr "" #: i2p2www/pages/site/research/vrp.html:179 -msgid "If the Incident Response process in section III is successfully completed:" +msgid "" +"If the Incident Response process in section III is successfully completed:" msgstr "" #: i2p2www/pages/site/research/vrp.html:183 @@ -628,8 +540,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." msgstr "" #: i2p2www/pages/site/research/vrp.html:217 @@ -637,13 +549,14 @@ msgid "If applicable, credits to the original reporter." msgstr "" #: i2p2www/pages/site/research/vrp.html:222 -msgid "Release finalized vulnerability announcement on website and in news feed." +msgid "" +"Release finalized vulnerability announcement on website and in news feed." msgstr "" #: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" msgstr "" #: i2p2www/pages/site/research/vrp.html:238 @@ -652,8 +565,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." msgstr "" #: i2p2www/pages/site/research/vrp.html:250 @@ -664,33 +577,28 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." msgstr "" #: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." msgstr "" #: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." msgstr "" #: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." msgstr "" @@ -705,7 +613,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:282 #: i2p2www/pages/site/research/vrp.html:302 -msgid "Response Team and developers should coordinate to work on the following:" +msgid "" +"Response Team and developers should coordinate to work on the following:" msgstr "" #: i2p2www/pages/site/research/vrp.html:286 @@ -734,15 +643,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." +"If results are not sensitive, share with the public via IRC or public Trac." msgstr "" #: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." msgstr "" @@ -752,10 +659,8 @@ msgstr "Soluzioni" #: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" msgstr "" @@ -765,8 +670,7 @@ msgstr "Continuous Improvement" #: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." msgstr "" @@ -803,4 +707,3 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "" - diff --git a/i2p2www/translations/ja/LC_MESSAGES/get-involved.po b/i2p2www/translations/ja/LC_MESSAGES/get-involved.po index 92879038e2b48c032891108e1b44508907285483..8005670e0ac04b04f982b53d346c56757f90de31 100644 --- a/i2p2www/translations/ja/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/ja/LC_MESSAGES/get-involved.po @@ -1,26 +1,27 @@ -# Japanese translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # kami <b52c55627324b29125cbcfb101258463_228943>, 2015 # rafe <rafe.kun@gmail.com>, 2015 -# XMPPã¯ã„ã„ãž, 2020-2021 +# daingewuvzeevisiddfddd, 2020-2021 # tama negi, 2020 -# XMPPã¯ã„ã„ãž, 2021 +# daingewuvzeevisiddfddd, 2021 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-09-06 14:33+0000\n" -"Last-Translator: XMPPã¯ã„ã„ãž\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: daingewuvzeevisiddfddd, 2021\n" "Language-Team: Japanese (http://www.transifex.com/otf/I2P/language/ja/)\n" -"Plural-Forms: nplurals=1; plural=0\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ja\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -35,12 +36,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -55,44 +53,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -131,10 +118,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -164,10 +149,8 @@ msgstr "ステッカー" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -182,25 +165,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -226,8 +199,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -241,12 +213,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -257,10 +226,8 @@ msgstr "翻訳" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -271,17 +238,12 @@ msgstr "文書" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -292,16 +254,11 @@ msgstr "テストä¸" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -314,14 +271,10 @@ msgstr "サービス" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -331,9 +284,9 @@ msgstr "å†ã‚·ãƒ¼ãƒ‰" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -377,8 +330,7 @@ msgstr "分æž" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -386,7 +338,7 @@ msgstr "" msgid "Roadmap" msgstr "ãƒãƒ¼ãƒ‰ãƒžãƒƒãƒ—" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -447,84 +399,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -533,17 +462,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -551,29 +475,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -581,42 +499,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -660,72 +569,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -735,8 +624,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -749,33 +638,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -796,76 +679,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -875,25 +739,18 @@ msgstr "匿å性ã¨æ©Ÿå¯†æ€§" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -904,29 +761,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -936,10 +785,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -947,13 +794,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -964,43 +808,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1015,28 +852,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1047,8 +876,7 @@ msgstr "削除ã•ã‚Œã¾ã—ãŸ" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1062,8 +890,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1082,14 +909,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1098,17 +921,14 @@ msgstr "ウェブアプリケーション" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1118,8 +938,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1141,32 +960,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1175,47 +987,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1227,12 +1031,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1257,8 +1058,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1277,8 +1078,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1307,20 +1107,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1392,8 +1188,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1406,24 +1201,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1433,22 +1219,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1484,21 +1262,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1522,10 +1295,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1536,8 +1307,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1550,10 +1320,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1563,7 +1331,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1584,7 +1353,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1592,13 +1362,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1606,7 +1377,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1615,8 +1387,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1648,35 +1419,28 @@ msgstr "ãã®ä»–" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1684,29 +1448,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1733,12 +1491,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1748,10 +1504,8 @@ msgstr "コミュニティー" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1773,8 +1527,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1782,13 +1536,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1797,8 +1552,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1812,34 +1566,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1849,61 +1597,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1930,20 +1666,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1952,14 +1687,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1969,12 +1704,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1994,8 +1730,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2022,12 +1757,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2046,22 +1778,22 @@ msgstr "I2Pã§IDEを使用" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2078,8 +1810,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2096,14 +1828,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2182,34 +1914,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2219,20 +1943,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2249,22 +1969,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2276,10 +1993,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2289,38 +2004,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2338,23 +2045,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2368,11 +2069,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2383,34 +2081,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2423,18 +2114,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2448,16 +2135,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2477,67 +2162,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2561,8 +2236,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2578,44 +2253,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2623,8 +2288,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2633,64 +2297,59 @@ msgid "New Developer's Guide" msgstr "æ–°è¦é–‹ç™ºè€…ã®ã‚¬ã‚¤ãƒ‰" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "ç§é”を知ã‚ã†ï¼" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "翻訳" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "ツール" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2698,42 +2357,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2746,143 +2397,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 -#, python-format -msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2891,93 +2430,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2997,17 +2485,11 @@ msgstr "サイトを翻訳ã™ã‚‹ã«ã¯" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." -msgstr "" -"Webサイトã®ç¿»è¨³ã¯ .po ファイルã«ã‚ˆã£ã¦è¡Œã‚ã‚Œã¾ã™ã€‚\n" -"今ã®ã¨ã“ã‚Webサイト翻訳ã§æœ€ã‚‚簡便ãªæ–¹æ³•ã¯\n" -"<a href=\"%(transifex)s\">Transifex</a>ã§ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã‚’作æˆã—ã€ç¿»è¨³ãƒãƒ¼ãƒ ã¸ã®å‚åŠ ç”³è«‹ã‚’è¡Œã†ã“ã¨ã§ã™ã€‚\n" -"ãã‚Œã¨ã¯åˆ¥ã«ã€ä»¥ä¸‹ã«ç¤ºã™ã€Œå¤ã„ã‚„ã‚Šæ–¹ã€ã‚‚å¯èƒ½ã€‚" +msgstr "Webサイトã®ç¿»è¨³ã¯ .po ファイルã«ã‚ˆã£ã¦è¡Œã‚ã‚Œã¾ã™ã€‚\n今ã®ã¨ã“ã‚Webサイト翻訳ã§æœ€ã‚‚簡便ãªæ–¹æ³•ã¯\n<a href=\"%(transifex)s\">Transifex</a>ã§ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã‚’作æˆã—ã€ç¿»è¨³ãƒãƒ¼ãƒ ã¸ã®å‚åŠ ç”³è«‹ã‚’è¡Œã†ã“ã¨ã§ã™ã€‚\nãã‚Œã¨ã¯åˆ¥ã«ã€ä»¥ä¸‹ã«ç¤ºã™ã€Œå¤ã„ã‚„ã‚Šæ–¹ã€ã‚‚å¯èƒ½ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:17 #: i2p2www/pages/site/get-involved/guides/new-translators.html:82 @@ -3020,14 +2502,9 @@ msgstr "準備" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." -msgstr "" -"IRC上ã®#i2p-devã«æ¥ã¦äººã¨è©±ã—ã¦ãã ã•ã„。\n" -"言語を表明ã—ã¦ãã ã•ã„ - \n" -"ã‚ãªãŸãŒç·¨é›†ä¸ã®ãƒ•ã‚¡ã‚¤ãƒ«ã«ä»–ã®äººãŒè¡çªã—ãªã„よã†ã«ã€<a href=\"%(url)s\">ã“ã®Wikiページ</a>ã®ç¿»è¨³çŠ¶æ³ã‚’æ›´æ–°ã—ã¦ãã ã•ã„。" +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." +msgstr "IRC上ã®#i2p-devã«æ¥ã¦äººã¨è©±ã—ã¦ãã ã•ã„。\n言語を表明ã—ã¦ãã ã•ã„ - \nã‚ãªãŸãŒç·¨é›†ä¸ã®ãƒ•ã‚¡ã‚¤ãƒ«ã«ä»–ã®äººãŒè¡çªã—ãªã„よã†ã«ã€<a href=\"%(url)s\">ã“ã®Wikiページ</a>ã®ç¿»è¨³çŠ¶æ³ã‚’æ›´æ–°ã—ã¦ãã ã•ã„。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 #, python-format @@ -3036,82 +2513,48 @@ msgid "" "Including the installation of monotone,\n" "checking out i2p.www branch, and generate your own monotone keys.\n" "It is not required that you sign a dev agreement." -msgstr "" -"<a href=\"%(newdevs)s\">æ–°è¦é–‹ç™ºè€…å‘ã‘ガイド</a>ã«å¾“ã„ã€\n" -"monotoneã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€i2p.www ブランãƒã®ç¢ºèªã€è‡ªèº«ã®monotoneã‚ーã®ç”Ÿæˆã‚’è¡Œã£ã¦ãã ã•ã„。\n" -"開発者契約をçµã¶å¿…è¦ã¯ã‚ã‚Šã¾ã›ã‚“。" +msgstr "<a href=\"%(newdevs)s\">æ–°è¦é–‹ç™ºè€…å‘ã‘ガイド</a>ã«å¾“ã„ã€\nmonotoneã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€i2p.www ブランãƒã®ç¢ºèªã€è‡ªèº«ã®monotoneã‚ーã®ç”Ÿæˆã‚’è¡Œã£ã¦ãã ã•ã„。\n開発者契約をçµã¶å¿…è¦ã¯ã‚ã‚Šã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:33 msgid "" "<b>Create files:</b>\n" "If the file for your language does not exist yet:" -msgstr "" -"<b>ファイル作æˆï¼š</b>\n" -"ã‚ãªãŸã®è¨€èªžç”¨ã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒã¾ã ãªã„å ´åˆï¼š" +msgstr "<b>ファイル作æˆï¼š</b>\nã‚ãªãŸã®è¨€èªžç”¨ã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒã¾ã ãªã„å ´åˆï¼š" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." -msgstr "" -"<code>./extract-messages.sh</code>ã‚’èµ·å‹•ã—㦠" -"<code>messages.pot</code>をベースディレクトリã«ä½œæˆã€‚\n" -"ヘッダを編集ã—ã€ãã‚Œã‹ã‚‰\"<code>./init-new-po.sh locale</code>\"ã‚’èµ·å‹•ã—ã¦ã€ãƒ•ã‚¡ã‚¤ãƒ« " -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を作æˆã€‚\n" -"ã“ã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’ \"mtn add\" ã—ã¦ãã ã•ã„。" +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." +msgstr "<code>./extract-messages.sh</code>ã‚’èµ·å‹•ã—㦠<code>messages.pot</code>をベースディレクトリã«ä½œæˆã€‚\nヘッダを編集ã—ã€ãã‚Œã‹ã‚‰\"<code>./init-new-po.sh locale</code>\"ã‚’èµ·å‹•ã—ã¦ã€ãƒ•ã‚¡ã‚¤ãƒ« <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を作æˆã€‚\nã“ã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’ \"mtn add\" ã—ã¦ãã ã•ã„。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 msgid "" "Edit <code>i2p2www/pages/global/lang.html</code> and add a line for your " "language (copy an existing line)." -msgstr "" -"<code>i2p2www/pages/global/lang.html</code> " -"を編集ã—ã€ã‚ãªãŸã®è¨€èªžã‚’追記ã™ã‚‹ï¼ˆæ—¢å˜ã®è¡Œã‚’コピーã—ã¦ãã ã•ã„)。" +msgstr "<code>i2p2www/pages/global/lang.html</code> を編集ã—ã€ã‚ãªãŸã®è¨€èªžã‚’追記ã™ã‚‹ï¼ˆæ—¢å˜ã®è¡Œã‚’コピーã—ã¦ãã ã•ã„)。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." -msgstr "" -"<code>i2p2www/static/images/flags/</code> " -"ã«ãƒ¡ãƒ‹ãƒ¥ãƒ¼ç”¨ã®å›½æ——ç”»åƒãƒ•ã‚¡ã‚¤ãƒ«ã‚’è¿½åŠ ã™ã‚‹ï¼ˆãƒ«ãƒ¼ã‚¿ã‹ã‚‰ã‚³ãƒ”ーã—ã¦ãã ã•ã„)。" +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." +msgstr "<code>i2p2www/static/images/flags/</code> ã«ãƒ¡ãƒ‹ãƒ¥ãƒ¼ç”¨ã®å›½æ——ç”»åƒãƒ•ã‚¡ã‚¤ãƒ«ã‚’è¿½åŠ ã™ã‚‹ï¼ˆãƒ«ãƒ¼ã‚¿ã‹ã‚‰ã‚³ãƒ”ーã—ã¦ãã ã•ã„)。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" -msgstr "" -"<b>ファイル編集:</b>\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> " -"を編集ã—ã¦ãã ã•ã„。\n" -".poファイルを効率よã扱ã†ã«ã¯ã€<a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>を使ã†ã¨ã‚ˆã„ã‹ã‚‚ã—ã‚Œã¾ã›ã‚“。" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" +msgstr "<b>ファイル編集:</b>\n<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code> を編集ã—ã¦ãã ã•ã„。\n.poファイルを効率よã扱ã†ã«ã¯ã€<a href=\"http://www.poedit.net/download.php\">POEdit</a>を使ã†ã¨ã‚ˆã„ã‹ã‚‚ã—ã‚Œã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." -msgstr "" -"<b>ãƒã‚§ãƒƒã‚¯ã‚¤ãƒ³ï¼š</b>\n" -"\"<code>mtn pull</code>\"ã€\"<code>mtn update</code>\" ã—ã¦ãã ã•ã„。\n" -"ãã‚Œã‹ã‚‰ \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\" " -"ã§ãƒã‚§ãƒƒã‚¯ã‚¤ãƒ³ã—ã¦ãã ã•ã„。\n" -"ã“ã‚Œã¯ã‚ãªãŸã®ãƒãƒ¼ã‚«ãƒ«ãƒ¬ãƒã‚¸ãƒˆãƒªã«ç·¨é›†å¾Œãƒ•ã‚¡ã‚¤ãƒ«ã®å·®åˆ†æƒ…å ±ã‚’é›†ã‚ã‚‹ã‚‚ã®ã§ã™ã€‚\n" -"次㫠\"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\" ã‚’è¡Œã£ã¦ãã ã•ã„。\n" -"ã“ã‚Œã¯ãƒãƒ¼ã‚«ãƒ«ãƒ¬ãƒã‚¸ãƒˆãƒªã¨ã‚¿ãƒ¼ã‚²ãƒƒãƒˆãƒžã‚·ãƒ³ã®ãƒ¬ãƒã‚¸ãƒˆãƒªã‚’åŒæœŸã•ã›ã¾ã™ã€‚" +msgstr "<b>ãƒã‚§ãƒƒã‚¯ã‚¤ãƒ³ï¼š</b>\n\"<code>mtn pull</code>\"ã€\"<code>mtn update</code>\" ã—ã¦ãã ã•ã„。\nãã‚Œã‹ã‚‰ \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\" ã§ãƒã‚§ãƒƒã‚¯ã‚¤ãƒ³ã—ã¦ãã ã•ã„。\nã“ã‚Œã¯ã‚ãªãŸã®ãƒãƒ¼ã‚«ãƒ«ãƒ¬ãƒã‚¸ãƒˆãƒªã«ç·¨é›†å¾Œãƒ•ã‚¡ã‚¤ãƒ«ã®å·®åˆ†æƒ…å ±ã‚’é›†ã‚ã‚‹ã‚‚ã®ã§ã™ã€‚\n次㫠\"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\" ã‚’è¡Œã£ã¦ãã ã•ã„。\nã“ã‚Œã¯ãƒãƒ¼ã‚«ãƒ«ãƒ¬ãƒã‚¸ãƒˆãƒªã¨ã‚¿ãƒ¼ã‚²ãƒƒãƒˆãƒžã‚·ãƒ³ã®ãƒ¬ãƒã‚¸ãƒˆãƒªã‚’åŒæœŸã•ã›ã¾ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:65 #: i2p2www/pages/site/get-involved/guides/new-translators.html:158 @@ -3125,15 +2568,10 @@ msgstr "ルータコンソールを翻訳ã™ã‚‹ã«ã¯" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." -msgstr "" -"今ã®ã¨ã“ã‚ルータコンソール翻訳ã§æœ€ã‚‚簡便ãªæ–¹æ³•ã¯\n" -"<a href=\"%(transifex)s\">Transifex</a>ã§ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã‚’作æˆã—ã€ç¿»è¨³ãƒãƒ¼ãƒ ã¸ã®å‚åŠ ç”³è«‹ã‚’è¡Œã†ã“ã¨ã§ã™ã€‚\n" -"ãã‚Œã¨ã¯åˆ¥ã«ã€ä»¥ä¸‹ã«ç¤ºã™ã€Œå¤ã„ã‚„ã‚Šæ–¹ã€ã‚‚å¯èƒ½ã€‚" +msgstr "今ã®ã¨ã“ã‚ルータコンソール翻訳ã§æœ€ã‚‚簡便ãªæ–¹æ³•ã¯\n<a href=\"%(transifex)s\">Transifex</a>ã§ã‚¢ã‚«ã‚¦ãƒ³ãƒˆã‚’作æˆã—ã€ç¿»è¨³ãƒãƒ¼ãƒ ã¸ã®å‚åŠ ç”³è«‹ã‚’è¡Œã†ã“ã¨ã§ã™ã€‚\nãã‚Œã¨ã¯åˆ¥ã«ã€ä»¥ä¸‹ã«ç¤ºã™ã€Œå¤ã„ã‚„ã‚Šæ–¹ã€ã‚‚å¯èƒ½ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:90 #, python-format @@ -3141,9 +2579,7 @@ msgid "" "Follow the <a href=\"%(newdevs)s\">new developer's guide</a>,\n" "including the installation of monotone and the gettext tools,\n" "checking out i2p.i2p branch, and generate your own monotone keys." -msgstr "" -"<a href=\"%(newdevs)s\">æ–°è¦é–‹ç™ºè€…å‘ã‘ガイド</a>ã«å¾“ã„ã€\n" -"monotoneã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€i2p.i2p ブランãƒã®ç¢ºèªã€è‡ªèº«ã®monotoneã‚ーã®ç”Ÿæˆã‚’è¡Œã£ã¦ãã ã•ã„。" +msgstr "<a href=\"%(newdevs)s\">æ–°è¦é–‹ç™ºè€…å‘ã‘ガイド</a>ã«å¾“ã„ã€\nmonotoneã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€i2p.i2p ブランãƒã®ç¢ºèªã€è‡ªèº«ã®monotoneã‚ーã®ç”Ÿæˆã‚’è¡Œã£ã¦ãã ã•ã„。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:95 msgid "Generate your own gpg key and sign the dev agreement." @@ -3151,69 +2587,43 @@ msgstr "自身ã®GPGã‚ーを作æˆã—開発者契約をçµã‚“ã§ãã ã•ã„。 #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." -msgstr "" -"コンソール翻訳を始ã‚ã‚‹å‰ã«ã€ã¾ãšI2Pウェブページã®ç¿»è¨³æ”¯æ´ã‚’è¡Œã£ãŸã»ã†ãŒã„ã„ã§ã—ょã†ã€‚\n" -"å°‘ãªãã¨ã‚‚ã‚ãªãŸã®è¨€èªžã®I2Pトップページã¯ã‚„ã‚‹ã¨ã‚ˆã„ã§ã™ã€‚" +msgstr "コンソール翻訳を始ã‚ã‚‹å‰ã«ã€ã¾ãšI2Pウェブページã®ç¿»è¨³æ”¯æ´ã‚’è¡Œã£ãŸã»ã†ãŒã„ã„ã§ã—ょã†ã€‚\nå°‘ãªãã¨ã‚‚ã‚ãªãŸã®è¨€èªžã®I2Pトップページã¯ã‚„ã‚‹ã¨ã‚ˆã„ã§ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:106 msgid "" "<b>What to translate:</b>\n" "There are about 15 files in the i2p.i2p branch that needs translation:" -msgstr "" -"<b>何を翻訳ã™ã‚‹ã®ã‹ï¼š</b>\n" -"i2p.i2pブランãƒã«ã¯ç¿»è¨³ãŒå¿…è¦ãªãƒ•ã‚¡ã‚¤ãƒ«ãŒç´„15コã‚ã‚Šã¾ã™ï¼š" +msgstr "<b>何を翻訳ã™ã‚‹ã®ã‹ï¼š</b>\ni2p.i2pブランãƒã«ã¯ç¿»è¨³ãŒå¿…è¦ãªãƒ•ã‚¡ã‚¤ãƒ«ãŒç´„15コã‚ã‚Šã¾ã™ï¼š" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." -msgstr "" -"xx㌠fr/de/ch/zh/... ã®ã‚ˆã†ãªè¨€èªžã‚³ãƒ¼ãƒ‰ã«ã‚ãŸã‚Šã¾ã™ã€‚\n" -"ã‚ãªãŸã®è¨€èªžã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒæ—¢ã«ã‚ã‚‹ã‹ã¯åˆ†ã‹ã‚Šã¾ã›ã‚“。ãªã„å ´åˆã¯è‡ªåˆ†ã§ä½œæˆã§ãã¾ã™ - " -"ã‚ãªãŸãŒçŸ¥ã£ã¦ã‚‹ä»–ã®è¨€èªžã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’コピーã—ã¦è‡ªåˆ†ã®è¨€èªžã‚³ãƒ¼ãƒ‰ã«æ›¸ãæ›ãˆã¾ã—ょã†ã€‚" +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." +msgstr "xx㌠fr/de/ch/zh/... ã®ã‚ˆã†ãªè¨€èªžã‚³ãƒ¼ãƒ‰ã«ã‚ãŸã‚Šã¾ã™ã€‚\nã‚ãªãŸã®è¨€èªžã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒæ—¢ã«ã‚ã‚‹ã‹ã¯åˆ†ã‹ã‚Šã¾ã›ã‚“。ãªã„å ´åˆã¯è‡ªåˆ†ã§ä½œæˆã§ãã¾ã™ - ã‚ãªãŸãŒçŸ¥ã£ã¦ã‚‹ä»–ã®è¨€èªžã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’コピーã—ã¦è‡ªåˆ†ã®è¨€èªžã‚³ãƒ¼ãƒ‰ã«æ›¸ãæ›ãˆã¾ã—ょã†ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." -msgstr "" -"<b>ファイル作æˆï¼š</b>\n" -"ã‚ãªãŸã®è¨€èªžç”¨ã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒã¾ã ãªã„å ´åˆã€ä»–ã®è¨€èªžãƒ•ã‚¡ã‚¤ãƒ«ã‚’コピーã—ã¦ã€ã‚ãªãŸã®è¨€èªžç”¨ã« <code>foo_xx.bar</code> " -"ã¨ã„ã†æ–°è¦ãƒ•ã‚¡ã‚¤ãƒ«ã¨ã—ã¾ã™ã€‚\n" -"次ã«ãã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’ \"<code>mtn add</code>\" ã—ã¾ã™ã€‚\n" -".poファイルã®ä½œæˆå¾Œã€ãƒ˜ãƒƒãƒ€ã‚’編集ã—ã¾ã™ã€‚ãã‚Œã‹ã‚‰ \"<code>ant distclean poupdate</code>\" を走らã›ã¾ã™ã€‚" +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." +msgstr "<b>ファイル作æˆï¼š</b>\nã‚ãªãŸã®è¨€èªžç”¨ã®ãƒ•ã‚¡ã‚¤ãƒ«ãŒã¾ã ãªã„å ´åˆã€ä»–ã®è¨€èªžãƒ•ã‚¡ã‚¤ãƒ«ã‚’コピーã—ã¦ã€ã‚ãªãŸã®è¨€èªžç”¨ã« <code>foo_xx.bar</code> ã¨ã„ã†æ–°è¦ãƒ•ã‚¡ã‚¤ãƒ«ã¨ã—ã¾ã™ã€‚\n次ã«ãã®ãƒ•ã‚¡ã‚¤ãƒ«ã‚’ \"<code>mtn add</code>\" ã—ã¾ã™ã€‚\n.poファイルã®ä½œæˆå¾Œã€ãƒ˜ãƒƒãƒ€ã‚’編集ã—ã¾ã™ã€‚ãã‚Œã‹ã‚‰ \"<code>ant distclean poupdate</code>\" を走らã›ã¾ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" -msgstr "" -"<b>作æ¥é–‹å§‹ï¼š</b>\n" -"HTMLファイルを好ããªãƒ†ã‚ストエディタã§ç·¨é›†ã—ã¾ã™ã€‚\n" -"エディタをHTMLモードã«ã—ãªã„よã†ã«æ³¨æ„。全ã¦ã®æ›¸å¼ãŒå¤‰ã‚ã£ã¦ã—ã¾ã„ã¾ã™ã€‚\n" -".poファイルを効率よã扱ã†ã«ã¯ã€<a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>を使ã†ã¨ã‚ˆã„ã‹ã‚‚ã—ã‚Œã¾ã›ã‚“。" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" +msgstr "<b>作æ¥é–‹å§‹ï¼š</b>\nHTMLファイルを好ããªãƒ†ã‚ストエディタã§ç·¨é›†ã—ã¾ã™ã€‚\nエディタをHTMLモードã«ã—ãªã„よã†ã«æ³¨æ„。全ã¦ã®æ›¸å¼ãŒå¤‰ã‚ã£ã¦ã—ã¾ã„ã¾ã™ã€‚\n.poファイルを効率よã扱ã†ã«ã¯ã€<a href=\"http://www.poedit.net/download.php\">POEdit</a>を使ã†ã¨ã‚ˆã„ã‹ã‚‚ã—ã‚Œã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." -msgstr "" -"以上ã®ã‚ˆã†ã«ã€ã•ã»ã©é›£ã—ãã¯ã‚ã‚Šã¾ã›ã‚“。\n" -"コンソールã®ç”¨èªžã®æ„味ã«ã¤ã„ã¦ç–‘å•ãŒã‚ã‚Œã°ã€IRCã®<code>#i2p-dev</code>ã§èžã„ã¦ãã ã•ã„。" +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." +msgstr "以上ã®ã‚ˆã†ã«ã€ã•ã»ã©é›£ã—ãã¯ã‚ã‚Šã¾ã›ã‚“。\nコンソールã®ç”¨èªžã®æ„味ã«ã¤ã„ã¦ç–‘å•ãŒã‚ã‚Œã°ã€IRCã®<code>#i2p-dev</code>ã§èžã„ã¦ãã ã•ã„。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 msgid "FAQ" @@ -3221,11 +2631,9 @@ msgstr "よãã‚る質å•" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" -msgstr "" -"Q: " -"ãªãœmonotone・Java・JSPã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€.poファイルã¨HTMLã®å¦ç¿’ãªã©ãªã©ã‚„らãªã‘ã‚Œã°ã„ã‘ãªã„ã‚“ã§ã—ょã†ï¼Ÿã©ã†ã—ã¦ç¿»è¨³ã‚’メールã§é€ã‚‹ã ã‘ã§ã¯ã„ã‘ãªã„ã®ã§ã™ã‹ï¼Ÿ" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" +msgstr "Q: ãªãœmonotone・Java・JSPã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã€.poファイルã¨HTMLã®å¦ç¿’ãªã©ãªã©ã‚„らãªã‘ã‚Œã°ã„ã‘ãªã„ã‚“ã§ã—ょã†ï¼Ÿã©ã†ã—ã¦ç¿»è¨³ã‚’メールã§é€ã‚‹ã ã‘ã§ã¯ã„ã‘ãªã„ã®ã§ã™ã‹ï¼Ÿ" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 msgid "A: Several reasons:" @@ -3236,80 +2644,70 @@ msgstr "A: ç†ç”±ã¯ã•ã¾ã–ã¾ã‚ã‚Šã¾ã™ï¼š" msgid "" "You might be interested in translating via Transifex. Request to join a " "translation team <a href=\"%(transifex)s\">here</a>." -msgstr "" -"Transifexã§ç¿»è¨³ã™ã‚‹ã®ã¯é¢ç™½ã„ã§ã™ã‚ˆã€‚<a " -"href=\"%(transifex)s\">ã“ã“</a>ã®ç¿»è¨³ãƒãƒ¼ãƒ ã«å‚åŠ ç”³è«‹ã‚’è¡Œã£ã¦ãã ã•ã„。" +msgstr "Transifexã§ç¿»è¨³ã™ã‚‹ã®ã¯é¢ç™½ã„ã§ã™ã‚ˆã€‚<a href=\"%(transifex)s\">ã“ã“</a>ã®ç¿»è¨³ãƒãƒ¼ãƒ ã«å‚åŠ ç”³è«‹ã‚’è¡Œã£ã¦ãã ã•ã„。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "ãŠæ‰‹è£½ã®ç¿»è¨³ã‚’å—ã‘付ã‘ã¦ãれらをã‚ãªãŸã®ä»£ã‚ã‚Šã«æˆ‘々ã®ã‚½ãƒ¼ã‚¹åˆ¶å¾¡ã‚·ã‚¹ãƒ†ãƒ ã«æ出ã™ã‚‹ã ã‘ã®æš‡ãŒã‚る人ãŒèª°ã‚‚å±…ã¾ã›ã‚“。仮ã«å±…ãŸã¨ã—ã¦ã€å¤§è¦æ¨¡åŒ–ã¯ã§ãã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "ã‚ãªãŸã¯ç¿»è¨³ãŒ1ステップã®å·¥ç¨‹ã ã¨æ€ã£ã¦ã„ã‚‹ã‹ã‚‚ã—ã‚Œã¾ã›ã‚“ãŒã€ãã†ã§ã¯ã‚ã‚Šã¾ã›ã‚“。1度ã«å…¨ã¦ã‚’片付ã‘ã‚‹ã“ã¨ã¯ã§ãã¾ã›ã‚“。誤りを犯ã™ã“ã¨ã‚‚ã‚ã‚‹ã§ã—ょã†ã€‚ã¾ã¨ã‚‚ã«è¦‹ãˆã‚‹ã‚ˆã†ã«æ出<i>å‰</i>ã«è©¦ã—ãŸã‚Šã„ã˜ã£ãŸã‚Šã™ã‚‹å¿…è¦ã‚‚ã‚ã‚Šã¾ã™ã€‚開発者らãŒè‹±æ–‡ã‚’æ›´æ–°ã—ãŸã‚Šè¿½åŠ ã—ãŸã‚Šã™ã‚Œã°ã€ç¿»è¨³æ›´æ–°ãŒå¿…è¦ã«ãªã‚Šã¾ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." -msgstr "" -"翻訳者ã«ã‚½ãƒ¼ã‚¹åˆ¶å¾¡ã‚·ã‚¹ãƒ†ãƒ を使ã‚ã›ã‚Œã°ã€ç›´ã¡ã«èªè¨¼ã‚„追跡性ãŒæä¾›ã•ã‚Œã¾ã™ - \n" -"誰ãŒä½•ã‚’ã‚„ã£ã¦ã„ã‚‹ã‹æŠŠæ¡ã§ãã€å¤‰æ›´ã®è¿½è·¡ãŒã§ãã€å¿…è¦ã§ã‚ã‚Œã°å·®ã—戻ã—ã§ãã¾ã™ã€‚" +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." +msgstr "翻訳者ã«ã‚½ãƒ¼ã‚¹åˆ¶å¾¡ã‚·ã‚¹ãƒ†ãƒ を使ã‚ã›ã‚Œã°ã€ç›´ã¡ã«èªè¨¼ã‚„追跡性ãŒæä¾›ã•ã‚Œã¾ã™ - \n誰ãŒä½•ã‚’ã‚„ã£ã¦ã„ã‚‹ã‹æŠŠæ¡ã§ãã€å¤‰æ›´ã®è¿½è·¡ãŒã§ãã€å¿…è¦ã§ã‚ã‚Œã°å·®ã—戻ã—ã§ãã¾ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr ".poファイルã¯é›£ã—ãã‚ã‚Šã¾ã›ã‚“。直接ãれを触りãŸããªã„ãªã‚‰ 'poedit' を勧ã‚ã¾ã™ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "HTMLファイルã¯é›£ã—ãã‚ã‚Šã¾ã›ã‚“。ãŸã HTML関連を無視ã—ã¦ãƒ†ã‚ストを訳ã—ã¾ã—ょã†ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "monotoneã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ã¨ä½¿ç”¨ã¯ãã‚Œã»ã©é›£ã—ãã‚ã‚Šã¾ã›ã‚“。I2P翻訳者やãã®ä»–ã®è²¢çŒ®è€…ã®ã„ãらã‹ã¯ãƒ—ãƒã‚°ãƒ©ãƒžãƒ¼ã§ã¯ã‚ã‚Šã¾ã›ã‚“ãŒã€monotoneを日々使ã„ã“ãªã—ã¦ã„ã¾ã™ã€‚Monotoneã¯å˜ã«ã‚½ãƒ¼ã‚¹åˆ¶å¾¡ã‚·ã‚¹ãƒ†ãƒ ã§ã‚ã£ã¦ã€\"コーディング\"ã®é¡žã§ã¯ã‚ã‚Šã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "我々ã®ç¿»è¨³å¯¾è±¡ã¯\"文書\"ã§ã¯ã‚ã‚Šã¾ã›ã‚“。HTMLファイルã¨.poファイルã§ã‚ã‚Šã€ç‰¹å®šã®æ›¸å¼ã¨æ–‡å—コード(UTF-8)をæŒã£ã¦ã„ã¾ã™ã€‚ãã‚Œã¯ç¶æŒã•ã‚Œãªã‘ã‚Œã°ãªã‚‰ãšã€ãƒ¡ãƒ¼ãƒ©ãƒ¼ã‚„別ã®è»¢é€æ–¹æ³•ã«ã‚ˆã‚‹ç ´æã¯è¨±ã•ã‚Œã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." -msgstr "" -"我々ã¯ç¿»è¨³è€…用フãƒãƒ³ãƒˆã‚¨ãƒ³ãƒ‰ã¨ã—㦠'Pootle' " -"を調査ã—ã¦ã„ã¾ã—ãŸã€‚ãã‚Œã¯ä¸Šæ‰‹ãã„ã‹ãšã€ç®¡ç†è€…ãŒå¿…è¦ã§ã€ã‚‚ã—Pootleã«åŸºã¥ã工程ã«ãªã£ã¦ã„ãŸã‚‰ä¸Šè¿°ã—ãŸãŸãã•ã‚“ã®æ¬ 陥ã«æ‚©ã¾ã•ã‚Œã‚‹ã“ã¨ã«ãªã£ãŸã§ã—ょã†ã€‚" +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." +msgstr "我々ã¯ç¿»è¨³è€…用フãƒãƒ³ãƒˆã‚¨ãƒ³ãƒ‰ã¨ã—㦠'Pootle' を調査ã—ã¦ã„ã¾ã—ãŸã€‚ãã‚Œã¯ä¸Šæ‰‹ãã„ã‹ãšã€ç®¡ç†è€…ãŒå¿…è¦ã§ã€ã‚‚ã—Pootleã«åŸºã¥ã工程ã«ãªã£ã¦ã„ãŸã‚‰ä¸Šè¿°ã—ãŸãŸãã•ã‚“ã®æ¬ 陥ã«æ‚©ã¾ã•ã‚Œã‚‹ã“ã¨ã«ãªã£ãŸã§ã—ょã†ã€‚" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." -msgstr "" -"<b>ã¾ã¨ã‚:</b>\n" -"確ã‹ã«ã€ç¿»è¨³é–‹å§‹ã«ã¯ã„ãらã‹ãƒãƒ¼ãƒ‰ãƒ«ãŒã‚ã‚Šã¾ã™ã€‚ã“ã‚ŒãŒæˆ‘々ãŒãŸã 1ã¤å®Ÿç¾å¯èƒ½ãªæ‰‹æ®µãªã®ã§ã™ã€‚ã‚„ã£ã¦ã¿ã¾ã—ょã†ã€‚実際ãã“ã¾ã§é›£ã—ã„ã‚‚ã®ã§ã¯ã‚ã‚Šã¾ã›ã‚“。" +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." +msgstr "<b>ã¾ã¨ã‚:</b>\n確ã‹ã«ã€ç¿»è¨³é–‹å§‹ã«ã¯ã„ãらã‹ãƒãƒ¼ãƒ‰ãƒ«ãŒã‚ã‚Šã¾ã™ã€‚ã“ã‚ŒãŒæˆ‘々ãŒãŸã 1ã¤å®Ÿç¾å¯èƒ½ãªæ‰‹æ®µãªã®ã§ã™ã€‚ã‚„ã£ã¦ã¿ã¾ã—ょã†ã€‚実際ãã“ã¾ã§é›£ã—ã„ã‚‚ã®ã§ã¯ã‚ã‚Šã¾ã›ã‚“。" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 msgid "More Information" @@ -3320,9 +2718,7 @@ msgstr "è©³ç´°æƒ…å ±" msgid "" "The #i2p-dev channel on IRC, or the <a " "href=\"http://%(zzz)s/forums/14\">translation forum on %(zzz)s</a>." -msgstr "" -"IRC上ã®#i2p-devãƒãƒ£ãƒ³ãƒãƒ«ã€ãŠã‚ˆã³<a href=\"http://%(zzz)s/forums/14\">%(zzz)s " -"ã®ç¿»è¨³ãƒ•ã‚©ãƒ¼ãƒ©ãƒ </a>" +msgstr "IRC上ã®#i2p-devãƒãƒ£ãƒ³ãƒãƒ«ã€ãŠã‚ˆã³<a href=\"http://%(zzz)s/forums/14\">%(zzz)s ã®ç¿»è¨³ãƒ•ã‚©ãƒ¼ãƒ©ãƒ </a>" #: i2p2www/pages/site/get-involved/guides/reseed.html:2 msgid "How to Set up a Reseed Server" @@ -3335,10 +2731,8 @@ msgstr "概観" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3347,21 +2741,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3384,8 +2774,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3395,18 +2784,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3416,10 +2800,8 @@ msgstr "プライãƒã‚·ãƒ¼ãƒãƒªã‚·ãƒ¼" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3428,17 +2810,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3447,10 +2827,8 @@ msgstr "始ã‚ã¾ã—ょã†" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3461,18 +2839,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/ko/LC_MESSAGES/about.po b/i2p2www/translations/ko/LC_MESSAGES/about.po index 94091fd12a2010bd567594bf7111c2b18c616d19..df26a844d7e5fbc0d16db1d1d900e67d621eb375 100644 --- a/i2p2www/translations/ko/LC_MESSAGES/about.po +++ b/i2p2www/translations/ko/LC_MESSAGES/about.po @@ -1,21 +1,22 @@ -# Korean translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: HelloKS <kqwe1859@gmail.com>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n" -"Plural-Forms: nplurals=1; plural=0\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ko\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -25,8 +26,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -49,8 +49,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -63,24 +62,158 @@ msgstr "ìš©ì–´ ì‚¬ì „" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -90,15 +223,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -112,12 +244,8 @@ msgstr "ë³´ì´ì§€ 않는 ì¸í„°ë„· 프로ì 트" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -127,13 +255,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -142,15 +270,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -159,28 +287,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -189,36 +316,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -227,13 +353,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -242,15 +368,11 @@ msgstr "비êµ" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -269,9 +391,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -328,8 +449,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -348,8 +468,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -358,8 +477,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -372,8 +490,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -382,8 +499,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -391,8 +508,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -407,15 +523,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -427,8 +541,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -483,16 +596,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -501,11 +612,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -558,16 +667,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -583,12 +690,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -602,35 +706,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -639,16 +737,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -665,11 +761,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -678,18 +820,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -700,84 +839,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -788,8 +904,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -797,27 +912,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -825,26 +936,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -855,10 +957,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -866,18 +966,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -888,10 +985,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1063,7 +1158,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1303,7 +1399,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1353,32 +1450,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1396,8 +1486,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1436,10 +1526,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1453,15 +1541,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1470,11 +1554,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1529,8 +1610,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1548,15 +1628,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1575,14 +1651,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1593,20 +1665,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1617,24 +1682,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1654,33 +1710,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1693,32 +1740,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1728,27 +1767,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1765,17 +1796,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1788,8 +1816,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1800,10 +1827,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1822,30 +1847,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1859,55 +1877,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1918,20 +1921,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1942,16 +1938,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1961,17 +1952,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -1982,20 +1970,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2009,26 +1990,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2037,18 +2008,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2056,16 +2021,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2081,52 +2041,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2141,102 +2082,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2249,4 +2149,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/ko/LC_MESSAGES/blog.po b/i2p2www/translations/ko/LC_MESSAGES/blog.po index 4162f045b3e415b02b456e9a1b4c62b002d97e3b..e11bbcb9211a39b74bb27dcea71e9f2adff00252 100644 --- a/i2p2www/translations/ko/LC_MESSAGES/blog.po +++ b/i2p2www/translations/ko/LC_MESSAGES/blog.po @@ -1,21 +1,22 @@ -# Korean translations for I2P. -# Copyright (C) 2019 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2019-12-04 15:24+0000\n" -"PO-Revision-Date: 2019-11-24 14:31+0000\n" -"Last-Translator: zzzi2p\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n" -"Plural-Forms: nplurals=1; plural=0\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ko\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11 @@ -83,6 +84,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:30 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:29 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:35 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:28 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:40 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34 msgid "RELEASE DETAILS" msgstr "" @@ -149,6 +157,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:46 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:39 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:48 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:41 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:52 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43 msgid "Bug Fixes" msgstr "" @@ -205,6 +220,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:55 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:48 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:61 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:48 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:61 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52 msgid "Other" msgstr "ê·¸ 외" @@ -262,6 +284,13 @@ msgstr "ê·¸ 외" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:69 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:66 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:75 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:65 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:87 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66 msgid "SHA256 Checksums:" msgstr "" @@ -292,11 +321,11 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10 msgid "" -"0.9.2 includes extensive low-level changes to improve the performance and" -" efficiency of the router. We have updated our UPnP library, to hopefully" -" make UPnP work for more people. I2PSnark now has DHT support, but it is " -"not yet enabled by default, as we plan to do more testing during the " -"upcoming 0.9.3 development cycle." +"0.9.2 includes extensive low-level changes to improve the performance and " +"efficiency of the router. We have updated our UPnP library, to hopefully " +"make UPnP work for more people. I2PSnark now has DHT support, but it is not " +"yet enabled by default, as we plan to do more testing during the upcoming " +"0.9.3 development cycle." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13 @@ -308,8 +337,8 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27 msgid "" -"SSU: Fix several problems in our UDP transport, to improve efficiency and" -" reliability for connection setup. Also improve defenses against various " +"SSU: Fix several problems in our UDP transport, to improve efficiency and " +"reliability for connection setup. Also improve defenses against various " "types of bad input." msgstr "" @@ -327,9 +356,9 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30 msgid "" -"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered " -"are now much more flexible, which should lessen protocol overhead and " -"reduce stalls caused by dropped tags." +"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are " +"now much more flexible, which should lessen protocol overhead and reduce " +"stalls caused by dropped tags." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31 @@ -340,16 +369,18 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35 msgid "" -"Fix various issues affecting memory usage and performance on high-" -"bandwidth routers" +"Fix various issues affecting memory usage and performance on high-bandwidth " +"routers" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36 -msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" +msgid "" +"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37 -msgid "Fix i2psnark bug that prevented a completion announcement to the tracker" +msgid "" +"Fix i2psnark bug that prevented a completion announcement to the tracker" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38 @@ -436,14 +467,14 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10 msgid "" -"0.9.3 includes extensive low-level changes to the queueing of messages in" -" the router. We implement the CoDel Active Queue Management (AQM) " -"algorithm. We also unify the queueing and priority mechanisms in the " -"transports to aid diagnosis and reduce network latency. Work continues " -"on fixing UDP transport bugs and making UDP more resistant to attacks. " -"There are more changes to improve the performance of the router and " -"reduce its memory usage. Also, we enable i2psnark's DHT support, " -"introduced last release, by default." +"0.9.3 includes extensive low-level changes to the queueing of messages in " +"the router. We implement the CoDel Active Queue Management (AQM) algorithm." +" We also unify the queueing and priority mechanisms in the transports to " +"aid diagnosis and reduce network latency. Work continues on fixing UDP " +"transport bugs and making UDP more resistant to attacks. There are more " +"changes to improve the performance of the router and reduce its memory " +"usage. Also, we enable i2psnark's DHT support, introduced last release, by " +"default." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27 @@ -461,8 +492,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33 msgid "" "Several SSU fixes including memory leak, and better handling of routers " -"behind firewalls that change UDP ports; additional defenses for malicious" -" packets." +"behind firewalls that change UDP ports; additional defenses for malicious " +"packets." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34 @@ -487,9 +518,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42 msgid "" -"Fix streaming connection timeout back to 1 minute, was inadvertently " -"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was" -" unlimited" +"Fix streaming connection timeout back to 1 minute, was inadvertently changed" +" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited" msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43 @@ -545,28 +575,24 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10 msgid "" -"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, " -"that was reducing network performance and reliability. It also includes " -"major changes in the in-network update system, and adds the capability to" -" update via in-network torrents." +"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that " +"was reducing network performance and reliability. It also includes major " +"changes in the in-network update system, and adds the capability to update " +"via in-network torrents." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14 msgid "" -"We fixed several bugs in the i2psnark DHT implementation that was " -"introduced\n" +"We fixed several bugs in the i2psnark DHT implementation that was introduced\n" "last release. For those of you using console or http proxy passwords,\n" -"we converted to the more-secure digest method and improved the security " -"for console forms." +"we converted to the more-secure digest method and improved the security for console forms." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20 msgid "" -"For those of you already running development builds, your router should " -"automatically\n" +"For those of you already running development builds, your router should automatically\n" "update to 0.9.4-0 using the new in-network torrent facility.\n" -"For those running 0.9.3-0, you will update normally using in-network " -"HTTP, and\n" +"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n" "we will have more information for you when we release 0.9.5." msgstr "" @@ -582,12 +608,13 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42 msgid "" -"Fix major bug that reduced SSU connection limits which reduced tunnel " -"build success rates" +"Fix major bug that reduced SSU connection limits which reduced tunnel build " +"success rates" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43 -msgid "Fix bug with external I2CP that prevented some external apps from working" +msgid "" +"Fix bug with external I2CP that prevented some external apps from working" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44 @@ -620,8 +647,7 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54 msgid "" -"More performance improvements, memory reduction, and object churn " -"reduction" +"More performance improvements, memory reduction, and object churn reduction" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55 @@ -638,15 +664,15 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58 msgid "" -"Convert http proxy and console from basic to digest authentication for " -"added security" +"Convert http proxy and console from basic to digest authentication for added" +" security" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59 msgid "" "Improved verification of console form submissions, using jsp sessions. " -"Cookies may now be required on forms, except when the console password is" -" enabled" +"Cookies may now be required on forms, except when the console password is " +"enabled" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60 @@ -665,8 +691,8 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63 msgid "" -"Translation updates: Chinese, French, German, Italian, Polish, " -"Portuguese, Swedish, and Ukrainian" +"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, " +"Swedish, and Ukrainian" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65 @@ -684,24 +710,21 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10 msgid "" -"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities" -" that are being investigated by researchers at UCSB. We continue to work " -"with them on additional improvements. This is a good opportunity to " -"remind the community that while our network continues to grow rapidly, it" -" is still relatively small. There may be multiple weaknesses or bugs that" -" could compromise your anonymity. Help us grow the network by spreading " -"the word and contributing where you can." +"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities " +"that are being investigated by researchers at UCSB. We continue to work with" +" them on additional improvements. This is a good opportunity to remind the " +"community that while our network continues to grow rapidly, it is still " +"relatively small. There may be multiple weaknesses or bugs that could " +"compromise your anonymity. Help us grow the network by spreading the word " +"and contributing where you can." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14 #, python-format msgid "" -"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers " -"running a\n" -"development build) will attempt to update via the experimental in-network" -" bittorrent\n" -"with i2psnark. If this doesn't work, it should fall back to standard in-" -"network HTTP update." +"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n" +"development build) will attempt to update via the experimental in-network bittorrent\n" +"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28 @@ -746,8 +769,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39 msgid "" -"Encrypt database lookup messages end-to-end when sent through exploratory" -" tunnels" +"Encrypt database lookup messages end-to-end when sent through exploratory " +"tunnels" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40 @@ -792,8 +815,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 msgid "" -"Translation updates: French, German, Hungarian, Italian, Norwegian, " -"Polish, Portuguese, Russian, Swedish" +"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, " +"Portuguese, Russian, Swedish" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55 @@ -808,17 +831,15 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10 msgid "" "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to " -"Jetty 7.6.10 (2013-03-12). See below for important information on the " -"Jetty update. The Jetty 7 series is actively maintained and we plan to " -"stay current with it in future I2P releases." +"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty " +"update. The Jetty 7 series is actively maintained and we plan to stay " +"current with it in future I2P releases." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14 msgid "" -"Most users will update via HTTP. Those running development builds will " -"attempt to update via the\n" -"experimental in-network bittorrent with i2psnark. We've fixed some bugs " -"that will enable more users\n" +"Most users will update via HTTP. Those running development builds will attempt to update via the\n" +"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n" "to update via torrent in the 0.9.7 update cycle." msgstr "" @@ -828,12 +849,9 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28 msgid "" -"If you first installed I2P with version 0.9.5, on Windows only, we " -"recommend that you follow the\n" -"following instructions to fix your eepsite location **before** you update" -" to 0.9.6.\n" -"Only original installations of 0.9.5-0 on Windows are affected by this " -"issue. If your router version\n" +"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n" +"following instructions to fix your eepsite location **before** you update to 0.9.6.\n" +"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n" "is 0.9.5-0-win1, you already have the fix and need not take any action." msgstr "" @@ -847,36 +865,29 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43 msgid "" -"For most people, the update should just work. If you have multiple Jetty " -"eepsites,\n" -"OR have made changes to jetty.xml or other Jetty configuration files, " -"including changing the port\n" +"For most people, the update should just work. If you have multiple Jetty eepsites,\n" +"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n" "from 7658, you MUST take manual action AFTER updating." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49 msgid "" -"After update, the router will migrate your jetty.xml files to the new " -"Jetty 7 format." +"After update, the router will migrate your jetty.xml files to the new Jetty " +"7 format." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51 msgid "" -"The migration resets the port to 7658. If you have more than one Jetty " -"eepsite, OR your eepsite\n" -" is NOT on port 7658, OR you have made other modifications to jetty.xml " -"(for example changing the\n" -" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml " -"file for each eepsite to fix them up\n" +"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n" +" is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n" +" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n" " after updating, and restart again." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56 msgid "" -"**The following files will be backed up with a ".jetty6" suffix" -" and then migrated.**\n" -"If you have made local changes, you may have to edit them manually and " -"restart.\n" +"**The following files will be backed up with a ".jetty6" suffix and then migrated.**\n" +"If you have made local changes, you may have to edit them manually and restart.\n" "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7." msgstr "" @@ -895,7 +906,8 @@ msgid "" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78 -msgid "If a plugin does not work, please contact the maintainer for that plugin." +msgid "" +"If a plugin does not work, please contact the maintainer for that plugin." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84 @@ -924,14 +936,14 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90 msgid "" -"Ignore unsupported IPs in RouterInfos when selecting an address (prep for" -" IPv6)" +"Ignore unsupported IPs in RouterInfos when selecting an address (prep for " +"IPv6)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91 msgid "" -"Ignore unused option bits in Database Lookup Message (prep for requesting" -" encrypted response)" +"Ignore unused option bits in Database Lookup Message (prep for requesting " +"encrypted response)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92 @@ -1001,31 +1013,24 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12 msgid "" -"For the first time, class 'N' routers (those with a minimumum of 128 " -"KBytes/sec of shared bandwidth)\n" -"will automatically become floodfill (previously it was only 'O' routers " -"with 256 KBps). This will\n" -"increase the floodfill population for additional resistance to certain " -"attacks (see below). Floodfill routers\n" -"don't consume much additional bandwidth, but they do tend to use " -"additional memory and concurrent\n" -"connections. If you do not wish your router to become floodfill, set the " -"advanced configuration\n" +"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n" +"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n" +"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n" +"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n" +"connections. If you do not wish your router to become floodfill, set the advanced configuration\n" "router.floodfillParticipant=false ." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21 #, python-format msgid "" -"As we think the last release fixed the experimental update-via-torrent " -"bugs, 3%(pc)s of routers should\n" +"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n" "update over in-network bittorrent this cycle." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26 msgid "" -"Plugin update checks, possibly broken for several releases, are fixed. " -"Your plugins should once again\n" +"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n" "auto-update after updating the router." msgstr "" @@ -1037,17 +1042,12 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35 msgid "" -"This release contains additional mitigations for the `\"practical " -"attacks\" paper`__.\n" -"However, we have a lot more work to do to resist Sybil attacks on the " -"floodfills, and resist\n" +"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n" +"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n" "traffic analysis at the gateways and endpoints of exploratory tunnels.\n" -"It's a good reminder for everybody that our network is still relatively " -"small and vulnerable.\n" -"We don't currently recommend any uses that would put anybody in serious " -"jeopardy.\n" -"We'll keep working to improve it... please keep working to spread the " -"word. A bigger network is a better network." +"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n" +"We don't currently recommend any uses that would put anybody in serious jeopardy.\n" +"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48 @@ -1092,8 +1092,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60 msgid "" -"Fix i2psnark bug that changed the infohash of torrents created by Robert " -"and fetched via magnet link" +"Fix i2psnark bug that changed the infohash of torrents created by Robert and" +" fetched via magnet link" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61 @@ -1128,8 +1128,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71 msgid "" -"Individual expiration times in leases, for efficiency on destinations " -"with a high number of tunnels" +"Individual expiration times in leases, for efficiency on destinations with a" +" high number of tunnels" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72 @@ -1145,7 +1145,8 @@ msgid "Tomcat 6.0.37" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75 -msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76 @@ -1163,12 +1164,11 @@ msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10 msgid "" -"This unscheduled release disables the RouterInfo verification messages " -"that were used in the attack published in the UCSB paper, which should " -"make correlating a LeaseSet and a Router much more difficult. We have " -"also included a limited number of other fixes listed below. Our 0.9.8 " -"release, which will include IPv6 support, is still on-schedule for late " -"September." +"This unscheduled release disables the RouterInfo verification messages that " +"were used in the attack published in the UCSB paper, which should make " +"correlating a LeaseSet and a Router much more difficult. We have also " +"included a limited number of other fixes listed below. Our 0.9.8 release, " +"which will include IPv6 support, is still on-schedule for late September." msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12 @@ -1218,16 +1218,17 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10 msgid "" -"0.9.8 includes the long-awaited support for IPv6. It's enabled by " -"default, but of course you need a public IPv6 address to use it. " -"Configuration is on the 'network' configuration tab in your console. We " -"also have anonymity improvements including padding of SSU packets and " -"longer router private keys." +"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, " +"but of course you need a public IPv6 address to use it. Configuration is on " +"the 'network' configuration tab in your console. We also have anonymity " +"improvements including padding of SSU packets and longer router private " +"keys." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12 #, python-format -msgid "30%(pc)s of you will update via in-network torrent in this update cycle." +msgid "" +"30%(pc)s of you will update via in-network torrent in this update cycle." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14 @@ -1236,41 +1237,30 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16 msgid "" -"IPv6 is enabled and preferred by default. If you have a public IPv6 " -"address \n" -"and you are connecting to another router with a published IPv6 address, " -"it will \n" -"connect via IPv6. There is a new IPv6 configuration section on /confignet" -" in \n" +"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n" +"and you are connecting to another router with a published IPv6 address, it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n" "the router console. If IPv6 is causing problems you may disable it there." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23 msgid "" "As a part of the IPv6 development effort, I2P now supports multiple \n" -"published IP addresses. If you have multiple public IP addresses (IPv4, " -"IPv6, \n" -"or both), you may enable or disable them individually on /confignet. The" -" \n" -"default is to use the first IPv4 and IPv6 addresses it discovers. If you " -"have \n" -"multiple addresses you should review the configuration on /confignet and " -"adjust \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n" +"multiple addresses you should review the configuration on /confignet and adjust \n" "it if necessary.\n" -"Note that while you may enable multiple IPv4 and IPv6 addresses on " -"/confignet,\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n" "we recommend that you use only one IPv4 and one IPv6 address. There are\n" "bugs still to be fixed with multiple addresses of each type." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35 msgid "" -"While IPv6 support was designed and developed over several years, it has" -" \n" -"only been tested by a limited number of users and is still beta. If you " -"do have \n" -"a public IPv6 address, please monitor your router and the logs for " -"problems, \n" +"While IPv6 support was designed and developed over several years, it has \n" +"only been tested by a limited number of users and is still beta. If you do have \n" +"a public IPv6 address, please monitor your router and the logs for problems, \n" "and disable it necessary. Please report any bugs on \n" "http://trac.i2p2.i2p." msgstr "" @@ -1281,26 +1271,19 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45 msgid "" -"For those of you running I2P on faster hardware (generally, 64-bit x86) " -"the \n" -"router will generate a new identity using longer keys. This will " -"substantially \n" -"reduce your participating traffic for 48 hours or more, while your router" -" \n" -"re-integrates into the network. Due to the new keys, the large number of" -" \n" +"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n" +"router will generate a new identity using longer keys. This will substantially \n" +"reduce your participating traffic for 48 hours or more, while your router \n" +"re-integrates into the network. Due to the new keys, the large number of \n" "torrent updates, and the recent network growth, we expect substantial \n" -"disruption to the network for a week or more after the update is " -"released. \n" +"disruption to the network for a week or more after the update is released. \n" "Please be patient and things should start to improve after a few days." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55 msgid "" -"These changes may result in higher CPU usage for some of you. We're doing" -" \n" -"our best to increase efficiency, but stronger security generally requires" -" more \n" +"These changes may result in higher CPU usage for some of you. We're doing \n" +"our best to increase efficiency, but stronger security generally requires more \n" "computation. Performance may also be poor during the first week\n" "due to the network churn.\n" "We will evaluate the network performace before deciding whether to\n" @@ -1309,10 +1292,8 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64 msgid "" -"We are experiencing rapid network growth in the last few weeks, which is" -" \n" -"causing a bit of a bumpy ride for some, especially on weekends. However, " -"the \n" +"We are experiencing rapid network growth in the last few weeks, which is \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, the \n" "network is still performing fairly well, so keep spreading the word." msgstr "" @@ -1324,14 +1305,10 @@ msgstr "" msgid "" "We're in the initial stages of desiging major changes to strengthen our \n" "crypto. Stronger crypto will use more CPU and it may possibly \n" -"require a Java 7 JRE at a minimum. We understand your desire to run I2P " -"on low-power \n" -"and/or older hardware. We're working hard to minimize the impacts, but " -"some \n" -"loss of performance is inevitable. In addition, Java 5 and 6 are no " -"longer \n" -"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " -"in \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n" "minimum requirements will be announced well in advance." msgstr "" @@ -1358,8 +1335,7 @@ msgid "" "Last weekend, echelon attended the CTS IV conference in Berlin and\n" "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" "Several of us will be at 30C3 in Hamburg late this year.\n" -"It's great to see people participating at these events and representing " -"I2P." +"It's great to see people participating at these events and representing I2P." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106 @@ -1387,7 +1363,8 @@ msgid "Fix occasional runtime exception in NTCP" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 -msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgid "" +"Big rework of transport code to accommodate multiple addresses and IPv6" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 @@ -1395,13 +1372,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 -msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgid "" +"Use Transifex for translation of initial news and HTTP proxy error pages" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 msgid "" -"Translation updates: Chinese, French, German, Portuguese, Russian, " -"Swedish, Turkish" +"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, " +"Turkish" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125 @@ -1419,9 +1397,9 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9 msgid "" -"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some " -"people. New installs and non-Windows platforms are not affected, however " -"all platforms will automatically update even if running 0.9.8." +"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. " +"New installs and non-Windows platforms are not affected, however all " +"platforms will automatically update even if running 0.9.8." msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11 @@ -1432,10 +1410,8 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20 msgid "" -"Due to recent attacks, logins are disabled on `Trac`_ and new " -"registrations are\n" -"disabled on `zzz.i2p`_. Until those services are restored, please report " -"all\n" +"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n" +"disabled on `zzz.i2p`_. Until those services are restored, please report all\n" "bugs on IRC freenode or IRC2P #i2p-dev." msgstr "" @@ -1448,9 +1424,9 @@ msgstr "" msgid "" "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and " "starts work on a year-long plan to increase the strength of the " -"cryptographic signing algorithms used in the router, and support multiple" -" algorithms and key lengths simultaneously. Automatic update files will " -"now be signed with 4096-bit RSA keys." +"cryptographic signing algorithms used in the router, and support multiple " +"algorithms and key lengths simultaneously. Automatic update files will now " +"be signed with 4096-bit RSA keys." msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11 @@ -1462,8 +1438,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release.\n" +"The best way to maintain security and help the network is to run the latest release.\n" "Several members of the I2P team will be at 30C3 in Hamburg this year.\n" "Come say hello and ask for an I2P sticker.\n" "Thanks to everyone for their support this year." @@ -1579,8 +1554,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62 msgid "" -"Extend router info expiration and other changes to reduce load on " -"floodfills" +"Extend router info expiration and other changes to reduce load on floodfills" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63 @@ -1617,8 +1591,8 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71 msgid "" -"Translation updates: French, German, Italian, Romanian, Russian, Spanish," -" Swedish, and others" +"Translation updates: French, German, Italian, Romanian, Russian, Spanish, " +"Swedish, and others" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73 @@ -1657,19 +1631,15 @@ msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26 msgid "" "If you have a large database or an identity you wish to preserve,\n" -"you may wish to back up your entire ~/.syndie directory before you start." -"\n" -"The upgrade process does make its own backup, however you may find it " -"easier to use your own backup if the upgrade fails." +"you may wish to back up your entire ~/.syndie directory before you start.\n" +"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32 msgid "" -"Upgrades from 1.103b may fail for some people due to database corruption " -"due to bugs in the old HSQLDB.\n" +"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n" "Unfortunately, we don't know how to fix it.\n" -"Your alternatives are to start over with a clean database, or stay with " -"1.103b forever.\n" +"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n" "Sorry about that." msgstr "" @@ -1677,8 +1647,7 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release." +"The best way to maintain security and help the network is to run the latest release." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57 @@ -1733,6 +1702,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:60 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:57 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:66 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:55 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:78 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58 msgid "Translation updates" msgstr "" @@ -1751,19 +1727,15 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12 msgid "" -"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more " -"difficult for an attacker\n" -"to correlate a Destination with a Router. It also fixes character " -"encoding bugs in susimail,\n" +"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n" +"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n" "and includes lots of other bug fixes and translation updates.\n" -"Most of you will update via torrent, using the new \"su3\" update format " -"with stronger keys." +"Most of you will update via torrent, using the new \"su3\" update format with stronger keys." msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19 msgid "" -"We recently attended `30C3`__ and `Real World Crypto`__, making several " -"new\n" +"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n" "connections and formulating `big plans`__ for 2014. Thanks to those who\n" "supported our attendance with their `donations`__!" msgstr "" @@ -1774,8 +1746,8 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43 msgid "" -"Flood netdb stores to new location before midnight to prevent lookup " -"fails after midnight" +"Flood netdb stores to new location before midnight to prevent lookup fails " +"after midnight" msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44 @@ -1852,24 +1824,19 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12 #, python-format msgid "" -"0.9.11 continues improving LeaseSet lookup and storage to prevent an " -"attacker\n" +"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n" "from correlating a Destination with a Router. It adds support for the\n" "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n" -"reduction in memory usage due to fixes in the transports. We have some " -"I2CP\n" +"reduction in memory usage due to fixes in the transports. We have some I2CP\n" "protocol improvements that will provide better lookup facilities and\n" -"authorization protection for external clients. Of course, there's also " -"the\n" +"authorization protection for external clients. Of course, there's also the\n" "usual collection of bug fixes. All users should update." msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22 msgid "" -"This may be the last release that works with Java 5, which is very old " -"and\n" -"unsupported. If you are using a Java 5 or 6 runtime, we strongly " -"recommend that\n" +"This may be the last release that works with Java 5, which is very old and\n" +"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n" "you upgrade to Java 7." msgstr "" @@ -1906,12 +1873,17 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:24 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:23 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:29 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:22 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:34 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28 msgid "" "As usual, we recommend that you update to this release. The best way to\n" "maintain security and help the network is to run the latest release." -msgstr "" -"í‰ì†Œì™€ ê°™ì´, ì´ ë¦´ë¦¬ì¦ˆë¡œ ì—…ë°ì´íŠ¸í•˜ëŠ” ê²ƒì„ ê¶Œìž¥í•©ë‹ˆë‹¤. ë³´ì•ˆì„ ìœ ì§€í•˜ê³ \n" -"네트워í¬ë¥¼ ë•ê¸° 위한 가장 ì¢‹ì€ ê²ƒì€ ìµœì‹ ë¦´ë¦¬ì¦ˆë¥¼ 사용하는 것입니다." +msgstr "í‰ì†Œì™€ ê°™ì´, ì´ ë¦´ë¦¬ì¦ˆë¡œ ì—…ë°ì´íŠ¸í•˜ëŠ” ê²ƒì„ ê¶Œìž¥í•©ë‹ˆë‹¤. ë³´ì•ˆì„ ìœ ì§€í•˜ê³ \n네트워í¬ë¥¼ ë•ê¸° 위한 가장 ì¢‹ì€ ê²ƒì€ ìµœì‹ ë¦´ë¦¬ì¦ˆë¥¼ 사용하는 것입니다." #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40 msgid "More leaseset handling improvements" @@ -1943,8 +1915,8 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53 msgid "" -"Stricter I2CP authorization enforcement of external clients (incompatible" -" change)" +"Stricter I2CP authorization enforcement of external clients (incompatible " +"change)" msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54 @@ -1968,23 +1940,21 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9 msgid "" -"The site i2pbrowser.net is a fake I2P website mirror serving up malware " -"for Windows." +"The site i2pbrowser.net is a fake I2P website mirror serving up malware for " +"Windows." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11 msgid "" -"We have recently been made aware of the existence of i2pbrowser.net. This" -"\n" -"website copies our homepage and download page, and attempts to trick " -"users into\n" +"We have recently been made aware of the existence of i2pbrowser.net. This\n" +"website copies our homepage and download page, and attempts to trick users into\n" "downloading Windows malware." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17 msgid "" -"There are several indicators that point to i2pbrowser.net being a malware" -" site:" +"There are several indicators that point to i2pbrowser.net being a malware " +"site:" msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21 @@ -1993,29 +1963,26 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22 msgid "" -"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to " -"the same .exe file." +"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the " +"same .exe file." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23 -msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." +msgid "" +"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25 msgid "" -"We have not examined the malware ourselves, but it does not appear to be " -"very\n" -"sophisticated; it is not integrated into or bundled with the I2P " -"software.\n" -"Information security expert `Lance James`__ posted `a tweet`__ labelling " -"it as\n" +"We have not examined the malware ourselves, but it does not appear to be very\n" +"sophisticated; it is not integrated into or bundled with the I2P software.\n" +"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n" "\"a standard dark comet rat\"." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35 msgid "" -"Spread the word. The only official download locations for I2P are linked " -"on our\n" +"Spread the word. The only official download locations for I2P are linked on our\n" "`download page`__. All I2P download packages are GPG-signed by the\n" "`release signing key`__." msgstr "" @@ -2036,31 +2003,21 @@ msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12 msgid "" "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n" -"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly" -" open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" -"on the DuckDuckGo community portal. With an emphasis on privacy, " -"DuckDuckGo provides a search\n" -"engine which does not track its users or store personal data. I2P is an " -"anonymous network intended to\n" -"protect individuals from dragnet surveillance regularly performed by ISPs" -" and governments." +"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" +"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n" +"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n" +"protect individuals from dragnet surveillance regularly performed by ISPs and governments." msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46 msgid "" -"This marks the single largest donation ever received by I2P and reflects " -"a growing interest in\n" -"privacy and security by the Internet community. The funding will help I2P" -" to reach more users, expand\n" -"development, and audit the code. It will also enable I2P developers to " -"attend conferences, such\n" -"as the `Real-World Cryptography`__ conference in New York City, where the" -" developers met and\n" -"collaborated with cryptography experts pursuant to I2P's goals of " -"providing anonymity to the\n" +"This marks the single largest donation ever received by I2P and reflects a growing interest in\n" +"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n" +"development, and audit the code. It will also enable I2P developers to attend conferences, such\n" +"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n" +"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n" "public." msgstr "" @@ -2091,34 +2048,28 @@ msgstr "" msgid "" "I2P now requires Java 6 or higher.\n" "We strongly recommend that you upgrade to Java 7.\n" -"If you are still using Java 5, you must upgrade your Java before " -"installing I2P 0.9.12." +"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19 msgid "" "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n" -"It contains several fixes for the handling of Delivery Status Messages " -"(acknowledgements)\n" +"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n" "and those messages are now end-to-end encrypted for increased security." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24 msgid "" "We have upgraded to Jetty 8.\n" -"Jetty 8 is almost identical to Jetty 7, so there are no complex " -"configuration file conversions as there have been in past Jetty upgrades." -"\n" +"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n" "No manual changes should be necessary." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35 msgid "" "In early March, Internet search company `DuckDuckGo`__ `donated`__\n" -"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly " -"open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" +"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" "on the DuckDuckGo community portal." msgstr "" @@ -2173,7 +2124,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88 -msgid "Reduce target connection count again to reduce tunnel reject rate further" +msgid "" +"Reduce target connection count again to reduce tunnel reject rate further" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89 @@ -2221,10 +2173,8 @@ msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13 msgid "" -"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, " -"and a big SusiMail update.\n" -"Of course, there's also the usual collection of bug fixes and translation" -" updates." +"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n" +"Of course, there's also the usual collection of bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23 @@ -2322,30 +2272,24 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13 msgid "" -"0.9.14 includes critical fixes for XSS and remote execution " -"vulnerabilities reported by Exodus Intelligence.\n" -"As an added precaution, we have disabled several advanced configuration " -"features in the router console,\n" +"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n" +"As an added precaution, we have disabled several advanced configuration features in the router console,\n" "including installation of new plugins.\n" "We plan to re-enable these in a future release after additional review." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20 msgid "" -"Due to I2P library changes, I2P-Bote users must upgrade their plugin to " -"version 0.2.10 to work with I2P 0.9.14.\n" -"Your router should update the plugin automatically after the router " -"restarts." +"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n" +"Your router should update the plugin automatically after the router restarts." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25 msgid "" -"The release also contains several bug fixes in i2ptunnel, i2psnark, and " -"other areas,\n" +"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n" "and updates to the latest Jetty, Tomcat, and Wrapper.\n" "We've also implemented a faster and more secure method for reseeding.\n" -"Of course, there's also the usual collection of minor bug fixes and " -"translation updates." +"Of course, there's also the usual collection of minor bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32 @@ -2396,14 +2340,14 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55 msgid "" -"Several i2psnark improvements and fixes (GUI and DHT), including changes " -"for better compatibility with Vuze" +"Several i2psnark improvements and fixes (GUI and DHT), including changes for" +" better compatibility with Vuze" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60 msgid "" -"Reseeding now fetches a signed zip file containing router infos for " -"security and speed" +"Reseeding now fetches a signed zip file containing router infos for security" +" and speed" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61 @@ -2416,8 +2360,8 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63 msgid "" -"Per-message reliabilitiy settings in I2CP and error propagation back from" -" router to client" +"Per-message reliabilitiy settings in I2CP and error propagation back from " +"router to client" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64 @@ -2449,33 +2393,23 @@ msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13 msgid "" -"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some" -" other web forms.\n" -"We've restored the ability to install plugins via the console, but you " -"must first edit your router.config file\n" -"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the " -"line routerconsole.enablePluginInstall=true.\n" -"Other rarely-used advanced features that were removed in 0.9.14 may be " -"restored by adding the line routerconsole.advanced=true." +"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n" +"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n" +"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n" +"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20 msgid "" -"As usual, if configured with the default \"Download and Verify\", the " -"router will automatically download the update and display a button to " -"restart.\n" -"However, due to a bug in 0.9.14, if your update is configured for " -"\"Notify only\", the download button will not be displayed.\n" -"You must change your configuration to \"Download and Verify\" or " -"\"Download, Verify, and Restart\" to update." +"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n" +"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n" +"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26 msgid "" -"If you are still running 0.9.13 or older, we recommend that you update to" -" this release as soon as possible.\n" -"If you don't often check your router console, please consider changing " -"your configuration to \"Download, Verify, and Restart\"\n" +"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n" +"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n" "to ensure you are always running the latest release." msgstr "" @@ -2529,10 +2463,7 @@ msgstr "" msgid "" "Hello all!\n" "\n" -"Today we announce the Privacy Solutions project, a new organization that " -"develops and maintains I2P software. Privacy Solutions includes several " -"new development efforts designed to enhance the privacy, security, and " -"anonymity for users, based on I2P protocols and technology.\n" +"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n" "\n" "These efforts include\n" "\n" @@ -2542,40 +2473,23 @@ msgid "" "4) The Anoncoin crypto-coin project.\n" "5) The Monero crypto-coin project.\n" "\n" -"Privacy Solutions' initial funding was provided by the supporters of the " -"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-" -"profit type of organization registered within the Norwegian government " -"registers. ( Kind of like US 501(c)3. )\n" +"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n" "\n" -"Privacy Solutions plans to apply for funding from the Norwegian goverment" -" for network research, because of BigBrother (We'll get back to what that" -" is) and the coins that are planned to use low-latency networks as " -"primary transport layer. Our research will support advances in software " -"technology for anonymity, security, and privacy.\n" +"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n" "\n" "\n" -"First a little bit about the Abscond Browser Bundle. This was first a " -"one-man project by Meeh, but later on friends started sending patches, " -"the project is now trying to create the same easy access to I2P as Tor " -"has with their browser bundle. Our first release isn't far away, it's " -"just some gitian script tasks left, including setup of the Apple " -"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C" -" struct keeping vital proces information about an process) from the Java " -"instance to check on I2P before we declare it stable. I2pd will also " -"switch with the Java version once it's ready, and there is no point in " -"shipping a JRE in the bundle anymore. You can read more about the Abscond" -" Browser Bundle at https://hideme.today/dev" +"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev" msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35 msgid "" -"We would also like to inform of the current status of i2pd. I2pd supports" -" bi-directional streaming now, that allows to use not only HTTP but long-" -"lived communication channels. Instant IRC support has been added. I2pd " -"users are able to use it same way as Java I2P for access to I2P IRC " -"network. I2PTunnel is one of key features of I2P network, allowing non-" -"I2P applications communicate transparently. That's why it's vital feature" -" for i2pd and one of key milestones." +"We would also like to inform of the current status of i2pd. I2pd supports " +"bi-directional streaming now, that allows to use not only HTTP but long-" +"lived communication channels. Instant IRC support has been added. I2pd users" +" are able to use it same way as Java I2P for access to I2P IRC network. " +"I2PTunnel is one of key features of I2P network, allowing non-I2P " +"applications communicate transparently. That's why it's vital feature for " +"i2pd and one of key milestones." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39 @@ -2584,18 +2498,17 @@ msgid "" "Bigbrother.i2p, which is a metrics system Meeh made over a year back. " "Recently we noticed that Meeh actually have 100Gb of non-duplicated data " "from nodes reporting in since initial launch. This will also be moved to " -"Privacy Solutions and be rewritten with a NSPOF backend. With this we " -"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-" -"shots ). This will give us a great overview over the network without " -"privacy issues for our end users. The clients filter all data except " -"country, router hash and success rate on tunnel buildings. The name of " -"this service is as always a little joke from Meeh." +"Privacy Solutions and be rewritten with a NSPOF backend. With this we will " +"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). " +"This will give us a great overview over the network without privacy issues " +"for our end users. The clients filter all data except country, router hash " +"and success rate on tunnel buildings. The name of this service is as always " +"a little joke from Meeh." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46 msgid "" -"We have shorted down a bit of the news here, if you're interested in more" -" information please visit https://blog.privacysolutions.no/\n" +"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n" "We're still under construction and more content will come!\n" "\n" "\n" @@ -2619,67 +2532,50 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11 msgid "" -"I2P Android and Bote have been released on Google Play in Norway, as a " -"test run for a future worldwide release." +"I2P Android and Bote have been released on Google Play in Norway, as a test " +"run for a future worldwide release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13 msgid "" -"I2P Android has existed for over three years. In that time, it has " -"evolved from\n" -"a simple test project into a usable, useful Android port of the I2P " -"router. Our\n" -"eventual goal has been to release I2P Android on Google Play, to make it " -"easier\n" -"for users to discover, install and use I2P on their Android devices. " -"After much\n" -"work improving the user interface, fixing bugs and testing, we think that" -" I2P\n" +"I2P Android has existed for over three years. In that time, it has evolved from\n" +"a simple test project into a usable, useful Android port of the I2P router. Our\n" +"eventual goal has been to release I2P Android on Google Play, to make it easier\n" +"for users to discover, install and use I2P on their Android devices. After much\n" +"work improving the user interface, fixing bugs and testing, we think that I2P\n" "Android is finally ready to go where the users are." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22 msgid "" -"Initially, we are only releasing to Android users in Norway, as a test " -"run. I2P\n" -"Android will have far more exposure on Google Play than it has ever had " -"before,\n" -"and there will be bugs and usability issues that we need to fix. It will " -"be much\n" -"easier (and less stressful!) to respond to feedback if we only need to " -"deal with\n" -"reports from hundreds of users instead of thousands (already orders of " -"magnitude\n" +"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n" +"Android will have far more exposure on Google Play than it has ever had before,\n" +"and there will be bugs and usability issues that we need to fix. It will be much\n" +"easier (and less stressful!) to respond to feedback if we only need to deal with\n" +"reports from hundreds of users instead of thousands (already orders of magnitude\n" "more feedback than we have ever had)." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31 msgid "" -"Simultaneously we are making the first public release of Bote, an Android" -" port\n" -"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. " -"It runs\n" -"on top of the I2P network, and while it works as a standalone app, it " -"will use\n" +"Simultaneously we are making the first public release of Bote, an Android port\n" +"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n" +"on top of the I2P network, and while it works as a standalone app, it will use\n" "the I2P Android app by default if installed. As with I2P Android, we are\n" "initially only releasing Bote to Android users in Norway." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41 msgid "" -"The apps are being released on Google Play by `The Privacy Solutions " -"Project`__.\n" -"See their `blog post`__ for further information, and links to the Google " -"Play\n" +"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n" +"See their `blog post`__ for further information, and links to the Google Play\n" "page for Norway users." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50 msgid "" -"As lead developer for I2P Android and Bote, I look forward to your " -"comments. You\n" -"are the people who will be using them, and your perspectives will help me" -" craft\n" +"As lead developer for I2P Android and Bote, I look forward to your comments. You\n" +"are the people who will be using them, and your perspectives will help me craft\n" "simple, intuitive apps that make privacy accessible to everyone." msgstr "" @@ -2689,28 +2585,22 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59 msgid "" -"We have also updated I2P Android on the website to match the release " -"candidate\n" -"deployed in Norway. This version will be updated with changes as we " -"respond to\n" +"We have also updated I2P Android on the website to match the release candidate\n" +"deployed in Norway. This version will be updated with changes as we respond to\n" "feedback from Norwegian users, heading towards our next stable release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65 msgid "" -"Please note that we have upgraded the Android API to 9. This means that " -"Froyo\n" -"Android 2.2 will not be supported anymore; the minimum requirement is now" -"\n" +"Please note that we have upgraded the Android API to 9. This means that Froyo\n" +"Android 2.2 will not be supported anymore; the minimum requirement is now\n" "Gingerbread Android 2.3." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71 msgid "" -"Also note that if you have an earlier version of I2P Android, you will " -"need to\n" -"uninstall and reinstall because we have changed the release keys. Further" -"\n" +"Also note that if you have an earlier version of I2P Android, you will need to\n" +"uninstall and reinstall because we have changed the release keys. Further\n" "information about this will be provided in a subsequent blog post." msgstr "" @@ -2728,31 +2618,23 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13 msgid "" "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n" -"It includes a new persistent configuration backend for i2psnark and fixes" -" several issues with i2psnark's handling of file names.\n" +"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n" "There are several improvements to speed up SAM.\n" "Plugins now support stronger signatures in the su3 file format.\n" -"Plugin installation via the console, which was disabled in 0.9.14, is re-" -"enabled." +"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21 msgid "" -"We have supported ECDSA signatures since 0.9.12, and we would like to " -"start using ECDSA by default.\n" -"Unfortunately, some of you are still running older I2P versions, and for " -"others,\n" +"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n" +"Unfortunately, some of you are still running older I2P versions, and for others,\n" "their distribution or Java runtime does not support ECDSA. Red Hat\n" "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n" "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n" -"others have had success with installing the \"unlimited strength policy " -"files\".\n" -"We've added information about missing crypto to the log file and the " -"/logs page in the console.\n" -"After you update to 0.9.15, please check if you are missing ECDSA " -"support, and attempt to fix it if necessary.\n" -"This is particularly important for those that run popular eepsites and " -"services." +"others have had success with installing the \"unlimited strength policy files\".\n" +"We've added information about missing crypto to the log file and the /logs page in the console.\n" +"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n" +"This is particularly important for those that run popular eepsites and services." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42 @@ -2784,6 +2666,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:32 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:31 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:37 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:30 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:42 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36 msgid "Changes" msgstr "" @@ -2855,8 +2744,8 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68 msgid "" -"i2ptunnel add support for local SSL connections for standard and IRC " -"client tunnels" +"i2ptunnel add support for local SSL connections for standard and IRC client " +"tunnels" msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69 @@ -2893,26 +2782,21 @@ msgid "" "0.9.16 is a significant step forward in our plan to migrate\n" "from DSA to ECDSA and then EdDSA cryptographic signatures,\n" "and makes several other changes to increase your anonymity and security.\n" -"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures" -" by default.\n" -"In addition, we've fixed a large number of serious bugs, including " -"console lockups." +"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n" +"In addition, we've fixed a large number of serious bugs, including console lockups." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21 msgid "" -"Changes in router data structures will require i2pcontrol plugin users to" -" update to version 0.0.9." +"Changes in router data structures will require i2pcontrol plugin users to " +"update to version 0.0.9." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25 msgid "" -"If you run an eepsite or a service and you are not running a recent " -"release,\n" -"or your Java or OS does not support ECDSA (as noted in the logs and on " -"the /logs page in the console),\n" -"please fix the issue as soon as possible or your users will soon be " -"unable to connect." +"If you run an eepsite or a service and you are not running a recent release,\n" +"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n" +"please fix the issue as soon as possible or your users will soon be unable to connect." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42 @@ -2925,8 +2809,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44 msgid "" -"Require I2CP authorization for all messages when enabled (requires 0.9.11" -" or higher client)" +"Require I2CP authorization for all messages when enabled (requires 0.9.11 or" +" higher client)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45 @@ -2945,8 +2829,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48 msgid "" -"New column sorting, set-all priority buttons, and upload ratio display in" -" i2psnark" +"New column sorting, set-all priority buttons, and upload ratio display in " +"i2psnark" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49 @@ -3007,14 +2891,14 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71 msgid "" -"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol" -" plugin)" +"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol " +"plugin)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72 msgid "" -"New router keys now stored in router.keys.dat (eepPriv.dat format) " -"instead of router.keys" +"New router keys now stored in router.keys.dat (eepPriv.dat format) instead " +"of router.keys" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73 @@ -3049,8 +2933,7 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80 msgid "" -"Change eepsite Jetty threadpool and queue configuration (new installs " -"only)" +"Change eepsite Jetty threadpool and queue configuration (new installs only)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81 @@ -3070,39 +2953,34 @@ msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13 msgid "" -"0.9.17 is primarily a bugfix release, but it also continues our migration" -" to stronger cryptographic signatures." +"0.9.17 is primarily a bugfix release, but it also continues our migration to" +" stronger cryptographic signatures." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17 msgid "" -"We have moved the news feed system used for the news on your console and " -"the latest router version indication\n" +"We have moved the news feed system used for the news on your console and the latest router version indication\n" "to a signed format using RSA 4096-bit keys for enhanced security." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22 msgid "" -"New eepsites and servers will be ECDSA-signed by default, if ECDSA is " -"available.\n" +"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n" "There is now a warning in the console sidebar if ECDSA is not available.\n" -"For RedHat users, we have reports of successful installs of the " -"BouncyCastle Provider (bcprov) jar to add ECDSA support." +"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28 msgid "" -"We've fixed several serious bugs, including an SSU packet corruption " -"problem,\n" +"We've fixed several serious bugs, including an SSU packet corruption problem,\n" "and a SAM bug affecting i2p-messenger and other SAM applications.\n" -"There are several fixes for the preliminary ECDSA router signatures added" -" in the last release but not yet enabled." +"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34 msgid "" -"Many of us will be attending 31C3 in Hamburg in December. Stop by our " -"table and say hi!" +"Many of us will be attending 31C3 in Hamburg in December. Stop by our table " +"and say hi!" msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49 @@ -3202,16 +3080,14 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11 msgid "" -"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google" -" Play and F-Droid." +"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google " +"Play and F-Droid." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13 msgid "" -"It has been some time since I last posted updates about our Android " -"development,\n" -"and several I2P releases have gone by without any matching Android " -"releases.\n" +"It has been some time since I last posted updates about our Android development,\n" +"and several I2P releases have gone by without any matching Android releases.\n" "At last, the wait is over!" msgstr "" @@ -3223,47 +3099,31 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24 msgid "" -"New versions of I2P Android and Bote have been released! They can be " -"downloaded\n" +"New versions of I2P Android and Bote have been released! They can be downloaded\n" "from these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35 msgid "" -"The main change in these releases is the transition to Android's new " -"Material\n" -"design system. Material has made it much easier for app developers with, " -"shall\n" -"we say, \"minimalist\" design skills (like myself) to create apps that " -"are nicer\n" -"to use. I2P Android also updates its underlying I2P router to the just-" -"released\n" -"version 0.9.17. Bote brings in several new features along with many " -"smaller\n" -"improvements; for example, you can now add new email destinations via QR " -"codes." +"The main change in these releases is the transition to Android's new Material\n" +"design system. Material has made it much easier for app developers with, shall\n" +"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n" +"to use. I2P Android also updates its underlying I2P router to the just-released\n" +"version 0.9.17. Bote brings in several new features along with many smaller\n" +"improvements; for example, you can now add new email destinations via QR codes." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44 msgid "" -"As I mentioned in `my last update`__, the release key that signs the apps" -" has\n" -"changed. The reason for this was because we needed to change the package " -"name\n" -"of I2P Android. The old package name (``net.i2p.android.router``) had " -"already\n" -"been taken on Google Play (we still don't know who was using it), and we " -"wanted\n" -"to use the same package name and signing key for all distributions of I2P" -"\n" -"Android. Doing so means that a user could initially install the app from " -"the I2P\n" -"website, and then later if the website was blocked they could upgrade it " -"using\n" -"Google Play. Android OS considers an application to be completely " -"different when\n" -"its package name changes, so we took the opportunity to increase the " -"strength of\n" +"As I mentioned in `my last update`__, the release key that signs the apps has\n" +"changed. The reason for this was because we needed to change the package name\n" +"of I2P Android. The old package name (``net.i2p.android.router``) had already\n" +"been taken on Google Play (we still don't know who was using it), and we wanted\n" +"to use the same package name and signing key for all distributions of I2P\n" +"Android. Doing so means that a user could initially install the app from the I2P\n" +"website, and then later if the website was blocked they could upgrade it using\n" +"Google Play. Android OS considers an application to be completely different when\n" +"its package name changes, so we took the opportunity to increase the strength of\n" "the signing key." msgstr "" @@ -3279,25 +3139,18 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73 msgid "" -"A few months ago we `released`__ both I2P Android and Bote on Google Play" -" in\n" -"Norway, to test the release process there. We are pleased to announce " -"that both\n" -"apps are now being released globally by `Privacy Solutions`__. The apps " -"can be\n" +"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n" +"Norway, to test the release process there. We are pleased to announce that both\n" +"apps are now being released globally by `Privacy Solutions`__. The apps can be\n" "found at these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89 msgid "" -"The global release is being done in several stages, starting with the " -"countries\n" -"for which we have translations. The notable exception to this is France; " -"due to\n" -"import regulations on cryptographic code, we are unable yet to distribute" -" these\n" -"apps on Google Play France. This is the same issue that has affected " -"other apps\n" +"The global release is being done in several stages, starting with the countries\n" +"for which we have translations. The notable exception to this is France; due to\n" +"import regulations on cryptographic code, we are unable yet to distribute these\n" +"apps on Google Play France. This is the same issue that has affected other apps\n" "like TextSecure and Orbot." msgstr "" @@ -3309,39 +3162,28 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103 msgid "" -"Don't think we have forgotten about you, F-Droid users! In addition to " -"the two\n" -"locations above, we have set up our own F-Droid repository. If you are " -"reading\n" -"this post on your phone, `click here`__ to add it to F-Droid (this only " -"works in\n" -"some Android browsers). Or, you can manually add the URL below to your " -"F-Droid\n" +"Don't think we have forgotten about you, F-Droid users! In addition to the two\n" +"locations above, we have set up our own F-Droid repository. If you are reading\n" +"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n" +"some Android browsers). Or, you can manually add the URL below to your F-Droid\n" "repository list:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115 msgid "" -"If you would like to manually verify the fingerprint (SHA-256) of the " -"repository\n" +"If you would like to manually verify the fingerprint (SHA-256) of the repository\n" "signing key, or type it in when adding the repository, here it is:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124 msgid "" -"Unfortunately the I2P app in the main F-Droid repository has not been " -"updated\n" -"because our F-Droid maintainer has disappeared. We hope that by " -"maintaining this\n" +"Unfortunately the I2P app in the main F-Droid repository has not been updated\n" +"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n" "binary repository, we can better support our F-Droid users and keep them\n" -"up-to-date. If you have already installed I2P from the main F-Droid " -"repository,\n" -"you will need to uninstall it if you want to upgrade, because the signing" -" key\n" -"will be different. The apps in our F-Droid repository are the same APKs " -"that are\n" -"provided on our website and on Google Play, so in future you will be able" -" to\n" +"up-to-date. If you have already installed I2P from the main F-Droid repository,\n" +"you will need to uninstall it if you want to upgrade, because the signing key\n" +"will be different. The apps in our F-Droid repository are the same APKs that are\n" +"provided on our website and on Google Play, so in future you will be able to\n" "upgrade using any of these sources." msgstr "" @@ -3360,25 +3202,18 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21 msgid "" -"We were, for the second year in a row, at a great location in the " -"Congress, in\n" -"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square " -"has\n" -"really increased our visibility and helped many people find us. Thanks to" -" Noisy\n" +"We were, for the second year in a row, at a great location in the Congress, in\n" +"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n" +"really increased our visibility and helped many people find us. Thanks to Noisy\n" "Square and the 31C3 organizers for a great Congress." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30 msgid "" -"We also thank Gabriel Weinberg and his fabulous search engine " -"`DuckDuckGo`__ for\n" -"their support of open source anonymity tools and their `generous " -"contribution`__\n" -"to I2P in 2014. Funding from DuckDuckGo and others helped support our " -"attendance\n" -"at CCC. This is the primary annual meetup for I2P developers and it is " -"critical\n" +"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n" +"their support of open source anonymity tools and their `generous contribution`__\n" +"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n" +"at CCC. This is the primary annual meetup for I2P developers and it is critical\n" "to our success." msgstr "" @@ -3390,127 +3225,88 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49 msgid "" -"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved " -"himself\n" -"and the project from TU Munich to `Inria`__ in France. He has a large " -"number of\n" -"`open positions`__. This is a great opportunity to get paid to work on " -"open\n" +"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n" +"and the project from TU Munich to `Inria`__ in France. He has a large number of\n" +"`open positions`__. This is a great opportunity to get paid to work on open\n" "source anonymity tools, we encourage everybody to contact him about it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60 msgid "" -"The prospect of an invigorated GNUnet with a large amount of new funding " -"is\n" -"quite interesting. We discussed more ways to work together. In early " -"2014, we\n" -"worked hard to understand the GnuNet DNS replacement, but we were unable " -"to\n" -"figure out a good fit for it in I2P. One of his new ideas is a " -"distributed,\n" -"anonymous statistics gathering subsystem, for detecting problems or " -"attacks on\n" +"The prospect of an invigorated GNUnet with a large amount of new funding is\n" +"quite interesting. We discussed more ways to work together. In early 2014, we\n" +"worked hard to understand the GnuNet DNS replacement, but we were unable to\n" +"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n" +"anonymous statistics gathering subsystem, for detecting problems or attacks on\n" "the network. We'd definitely be interested in that." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69 msgid "" -"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems " -"draft`__.\n" -"A new, greatly simplified version 3 was posted in December. The prospects" -" for\n" +"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n" +"A new, greatly simplified version 3 was posted in December. The prospects for\n" "approval remain unclear. The best way to monitor or participate in the\n" -"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to " -"do so\n" +"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n" "on our side, and also give Hellekin a new point-of-contact for this topic." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80 msgid "" -"We apologized to Christian for not being organized enough to have a talk " -"at his\n" -"`We Fix The Net assembly`__. One of our biggest failures as a project is " -"our\n" -"seeming inability to submit talks at conferences. We'll have to do better" -" in the\n" +"We apologized to Christian for not being organized enough to have a talk at his\n" +"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n" +"seeming inability to submit talks at conferences. We'll have to do better in the\n" "new year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92 msgid "" -"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in " -"with\n" -"other anonymity tools into this new Debian \"superpackage\" of some sort," -" and\n" -"would love to get I2P into Debian in 2015. He claims the process is now " -"easy,\n" +"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n" +"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n" +"would love to get I2P into Debian in 2015. He claims the process is now easy,\n" "just `follow the instructions`__. We said that's funny, we've been\n" "`stuck in the process for over 7 years`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103 msgid "" -"He said, well, try the new process, it works great, should be no problem " -"at all\n" -"if your package is in good shape. The people in Debian that run this " -"process are\n" -"eager volunteers who want nothing more than to get more packages in. We " -"said our\n" -"package is indeed in fantastic shape, and we would try out the new " -"process as\n" -"soon as possible. If all this is true, we will be in the next Debian " -"release in\n" +"He said, well, try the new process, it works great, should be no problem at all\n" +"if your package is in good shape. The people in Debian that run this process are\n" +"eager volunteers who want nothing more than to get more packages in. We said our\n" +"package is indeed in fantastic shape, and we would try out the new process as\n" +"soon as possible. If all this is true, we will be in the next Debian release in\n" "late 2015. This would be very very cool." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115 msgid "" -"We had a nice discussion with BitingBird of Tails. They are very happy " -"with our\n" -"rapid response to the `vulnerability disclosure`__ last summer, resulting" -" in our\n" -"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and " -"they\n" -"took `great offense`__ to that and the lack of private notification. We " -"thanked\n" +"We had a nice discussion with BitingBird of Tails. They are very happy with our\n" +"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n" +"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n" +"took `great offense`__ to that and the lack of private notification. We thanked\n" "them for taking the heat and fighting back." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127 msgid "" -"BitingBird also handles support, and she tells us the number one issue is" -" how\n" -"long I2P takes to start up and be useful for browsing I2P sites. Her " -"standard\n" -"answer is \"wait ten more minutes\" and that seems to be effective. I2P " -"is\n" -"particularly slow to startup on Tails since it does not persist peer data" -" by\n" -"default. It would be nice to change that, but there's also things we can " -"do on\n" -"the I2P side to make things start faster. Expect some improvement in our " -"0.9.18\n" +"BitingBird also handles support, and she tells us the number one issue is how\n" +"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n" +"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n" +"particularly slow to startup on Tails since it does not persist peer data by\n" +"default. It would be nice to change that, but there's also things we can do on\n" +"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n" "release." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140 msgid "" -"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The " -"upcoming\n" -"Tor Hidden Services changes mean that their keys will no longer fit into " -"a\n" -"portion of an IPv6 address, and he was working on a solution. We reminded" -" him\n" -"that this has always been the case for I2P (with \"GarliCat\"), that it's" -" not a\n" -"new problem. He pointed us to `a presentation`__ of his proposal. It " -"involves\n" +"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n" +"Tor Hidden Services changes mean that their keys will no longer fit into a\n" +"portion of an IPv6 address, and he was working on a solution. We reminded him\n" +"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n" +"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n" "storing an extra record in the hidden service directory (equivalent of a\n" -"leaseset I2P's network database). It wasn't completely clear how this " -"would\n" -"work, or if we would consider it abuse of the netDb. We'll follow up with" -" him\n" +"leaseset I2P's network database). It wasn't completely clear how this would\n" +"work, or if we would consider it abuse of the netDb. We'll follow up with him\n" "as he gets further." msgstr "" @@ -3522,23 +3318,15 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160 msgid "" -"We spent hours and hours explaining I2P to people stopping by our table. " -"Some\n" -"had heard of I2P before, some had not; everybody had heard of Tor and had" -" at\n" -"least a vague idea of what hidden services are. As usual, introducing " -"people to\n" -"I2P was a struggle. By the end of the Congress, we became convinced that " -"a part\n" -"of the problem was a difference in terminology. Back 12 years ago, when " -"I2P and\n" -"Tor were both getting started, we each came up with terms for the various" -" parts\n" +"We spent hours and hours explaining I2P to people stopping by our table. Some\n" +"had heard of I2P before, some had not; everybody had heard of Tor and had at\n" +"least a vague idea of what hidden services are. As usual, introducing people to\n" +"I2P was a struggle. By the end of the Congress, we became convinced that a part\n" +"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n" +"Tor were both getting started, we each came up with terms for the various parts\n" "of our systems. Today, the Tor terminology such as \"hidden service\" is\n" -"well-understood and commonplace. The I2P terminology such as \"eepsite\" " -"is\n" -"neither. We agreed to review our documentation, router console, and other" -" places\n" +"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n" +"neither. We agreed to review our documentation, router console, and other places\n" "for opportunities to simplify it and use common terms." msgstr "" @@ -3557,66 +3345,65 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182 msgid "" -"* *Toronto meetup:* CCC is such a productive time for us, and it seems " -"that a second meetup in the year would be quite helpful. We have proposed" -" it for August 2015 in Toronto, Canada, in conjunction with `Toronto " -"Crypto`__. It would include developer meetings together with " -"presentations and tutorials, all open to the public. We are attempting to" -" gauge interest and research possible venues. If you are considering " -"attending, please let us know by `tweeting @i2p`__ or posting `on the dev" -" forum thread`__." +"* *Toronto meetup:* CCC is such a productive time for us, and it seems that " +"a second meetup in the year would be quite helpful. We have proposed it for " +"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It " +"would include developer meetings together with presentations and tutorials, " +"all open to the public. We are attempting to gauge interest and research " +"possible venues. If you are considering attending, please let us know by " +"`tweeting @i2p`__ or posting `on the dev forum thread`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190 msgid "" -"* We discussed Meeh's workload and the state of the various services he " -"is running. We made some plans to reduce his load and have some other " -"people help out." +"* We discussed Meeh's workload and the state of the various services he is " +"running. We made some plans to reduce his load and have some other people " +"help out." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194 msgid "" -"* We reviewed our critieria for placing links to `i2pd`__ on our download" -" page. We agreed that the only remaining item is to have a nice page on " -"the `Privacy Solutions web site`__ or elsewhere with binary packages for " +"* We reviewed our critieria for placing links to `i2pd`__ on our download " +"page. We agreed that the only remaining item is to have a nice page on the " +"`Privacy Solutions web site`__ or elsewhere with binary packages for " "Windows, Linux, and Mac, and source packages. It's not clear who is " -"responsible for building the packages and where the \"official\" version " -"is. Once there's an established process for building and signing packages" -" and an official place to put them, we're ready to link to it. If it is " -"not feasible to host it on the Privacy Solutions website, we will discuss" -" alternatives with orignal, including possible migration to our download " +"responsible for building the packages and where the \"official\" version is." +" Once there's an established process for building and signing packages and " +"an official place to put them, we're ready to link to it. If it is not " +"feasible to host it on the Privacy Solutions website, we will discuss " +"alternatives with orignal, including possible migration to our download " "servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201 msgid "" -"* Lots of people coming by the table asked if we had a non-Java version. " -"It was great to finally answer \"yes\" and we're eager to get the word " -"out and get more users, testers, and developers on it." +"* Lots of people coming by the table asked if we had a non-Java version. It " +"was great to finally answer \"yes\" and we're eager to get the word out and " +"get more users, testers, and developers on it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205 msgid "" -"* `Vuze`__ continues to make good progress on their I2P integration. We " -"look forward to working with them in the new year on a managed rollout to" -" more users." +"* `Vuze`__ continues to make good progress on their I2P integration. We look" +" forward to working with them in the new year on a managed rollout to more " +"users." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211 msgid "" "* We discussed the state of Meeh's and Sindu's reseed servers. They made " -"several improvements while at the congress and are investigating " -"migration to `Matt Drollette's Go implementation`__. The security and " -"reliability of our reseed servers is vital to new users and network " -"operation. `User 'backup'`__ is doing a great job monitoring and managing" -" the pool of reseed servers." +"several improvements while at the congress and are investigating migration " +"to `Matt Drollette's Go implementation`__. The security and reliability of " +"our reseed servers is vital to new users and network operation. `User " +"'backup'`__ is doing a great job monitoring and managing the pool of reseed " +"servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218 msgid "" -"* We agreed to purchase a second root server for development, testing, " -"and services. Echelon will be adminstering it. Contact him if you would " -"like a VM." +"* We agreed to purchase a second root server for development, testing, and " +"services. Echelon will be adminstering it. Contact him if you would like a " +"VM." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222 @@ -3627,26 +3414,26 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226 msgid "" -"* We met with Welterde about the state of his services including his " -"`open tracker`__. These services are not being adequately maintained and " -"will soon become inaccessible due to crypto changes if they are not " -"upgraded. He committed to upgrading them soon." +"* We met with Welterde about the state of his services including his `open " +"tracker`__. These services are not being adequately maintained and will soon" +" become inaccessible due to crypto changes if they are not upgraded. He " +"committed to upgrading them soon." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232 msgid "" -"* We met lots of people interested in our `Android app`__. We passed " -"several ideas and bug reports back to str4d. We plan to make a big push " -"to give the app some development love early in the year." +"* We met lots of people interested in our `Android app`__. We passed several" +" ideas and bug reports back to str4d. We plan to make a big push to give the" +" app some development love early in the year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238 msgid "" -"* Regrettably, we didn't get to see too many talks at the Congress, as we" -" were so busy meeting with people. We plan to catch up and `watch them " -"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and" -" Jacob's talk was great. We hear that the cryptography talks were good as" -" well." +"* Regrettably, we didn't get to see too many talks at the Congress, as we " +"were so busy meeting with people. We plan to catch up and `watch them " +"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and " +"Jacob's talk was great. We hear that the cryptography talks were good as " +"well." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1 @@ -3663,13 +3450,11 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13 msgid "" "0.9.18 contains several bug fixes and performance improvements.\n" -"We have shortened the startup time, and reduced latency throughout our " -"network protocols.\n" +"We have shortened the startup time, and reduced latency throughout our network protocols.\n" "We've increased the default connection limits for the fastest routers,\n" "and reduced the thread usage in i2ptunnel.\n" "UPnP fixes should improve handling of external device changes.\n" -"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP " -"fixes." +"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33 @@ -3677,7 +3462,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34 -msgid "Fix news last-modified processing which prevented notification of update" +msgid "" +"Fix news last-modified processing which prevented notification of update" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35 @@ -3714,8 +3500,7 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46 msgid "" -"Add startup browser configuration with advanced config " -"routerconsole.browser" +"Add startup browser configuration with advanced config routerconsole.browser" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47 @@ -3777,21 +3562,16 @@ msgstr "" msgid "" "0.9.19 has several fixes and improvements for floodfill performance.\n" "Many of you saw high CPU usage after 0.9.18 was released.\n" -"This was caused by a combination of increased encryption usage, the big " -"influx of Vuze users into the network,\n" -"reduced floodfills due to tighter performance requirements, and some " -"longstanding bugs.\n" +"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n" +"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n" "Things should be a lot better after most of the network has updated.\n" -"As always, the best way to reduce CPU usage is to lower your bandwidth " -"limits." +"As always, the best way to reduce CPU usage is to lower your bandwidth limits." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21 msgid "" -"We've also added new ways to reseed manually, and to generate a reseed " -"file you can easily share with others who need it.\n" -"See the reseed configuration page in the router console for more " -"information." +"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n" +"See the reseed configuration page in the router console for more information." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35 @@ -3857,7 +3637,8 @@ msgid "Increase min and default bandwidth for i2psnark" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58 -msgid "Improved strategies for dropping jobs on high job lag to prevent overload" +msgid "" +"Improved strategies for dropping jobs on high job lag to prevent overload" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59 @@ -3897,35 +3678,28 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13 msgid "" -"0.9.20 contains many important bug fixes, and several changes to increase" -" floodfill capacity in the network." +"0.9.20 contains many important bug fixes, and several changes to increase " +"floodfill capacity in the network." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17 msgid "" -"Routers configured for 32-64 KB of shared bandwidth may now become " -"floodfill,\n" -"and routers configured for 512 KB or more of shared bandwidth will have " -"higher connection limits.\n" +"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n" +"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n" "These changes may cause your router to use more resources.\n" -"If the router becomes too busy, the best way to reduce usage is to lower " -"the bandwidth settings in your console.\n" -"If that doesn't help, you may now disable automatic floodfill on the " -"advanced configuration page in the console." +"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n" +"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25 msgid "" -"We're hopeful that these changes will increase network capacity and " -"performance,\n" -"and reduce the congestion that's been affecting the network the last " -"three months." +"We're hopeful that these changes will increase network capacity and performance,\n" +"and reduce the congestion that's been affecting the network the last three months." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35 msgid "" -"Finally, we're excited to announce our first-ever I2P meetup, in Toronto " -"August 15-16.\n" +"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n" "There will be lots of presentations and tutorials. All are welcome.\n" "For more information, see the `announcement`_." msgstr "" @@ -3944,8 +3718,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53 msgid "" -"Raise connection limits for new classes 'P' (512-2000 KBps share " -"bandwidth) and 'X' (over 2000 KBps)" +"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) " +"and 'X' (over 2000 KBps)" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54 @@ -3957,7 +3731,8 @@ msgid "Clock skew fixes" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62 -msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works" +msgid "" +"Fixes and configuration for when IPv4 is firewalled but IPv6 still works" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63 @@ -4030,8 +3805,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86 msgid "" -"Add Bloom filter warning when configured for high bandwidth but not " -"enough memory" +"Add Bloom filter warning when configured for high bandwidth but not enough " +"memory" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87 @@ -4044,8 +3819,7 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89 msgid "" -"Better error handling and user feedback when HTTP client tunnel is " -"disabled" +"Better error handling and user feedback when HTTP client tunnel is disabled" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90 @@ -4078,19 +3852,13 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13 msgid "" -"The I2P team is proud to announce that we are going to host a meetup in " -"Toronto on August 15-16.\n" -"A number of members of our community will be attending and are going to " -"host talks, workshops and discussions about and relating to I2P. This " -"event is not just for I2P people though, it's meant for everyone." +"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n" +"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18 msgid "" -"If you're curious about I2P, interested in privacy/cryptography/anonymity" -" or just want to come by and talk to us, please do. This is an event for " -"everyone. If you're not familiar with any of these topics, come by anyway" -" and we'll show you how I2P works and what you can do with it.\n" +"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n" "\n" "The event is entirely free, you don't need to sign up or register." msgstr "" @@ -4098,9 +3866,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24 msgid "" "The meetup couldn't have been arranged without our friends at `Toronto " -"Crypto <https://torontocrypto.org/>`_ which have been helping us organize" -" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are" -" providing us with a very nice space." +"Crypto <https://torontocrypto.org/>`_ which have been helping us organize " +"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are " +"providing us with a very nice space." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28 @@ -4128,9 +3896,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55 msgid "" -"The focus will be on an introduction to topics surrounding I2P, privacy " -"and anonymity online. People of all backgrounds and knowledge levels are " -"welcome to attend." +"The focus will be on an introduction to topics surrounding I2P, privacy and " +"anonymity online. People of all backgrounds and knowledge levels are welcome" +" to attend." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59 @@ -4147,9 +3915,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63 msgid "" -"The crypto party will contain a number of stations where " -"privacy/anonymity software will be demoed. The goal is to provide people " -"with the tools they need to communicate securely." +"The crypto party will contain a number of stations where privacy/anonymity " +"software will be demoed. The goal is to provide people with the tools they " +"need to communicate securely." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67 @@ -4170,11 +3938,10 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72 msgid "" -"We're currently looking for help staffing the stations. If you want to " -"help out, you can! Bring a monitor/laptop and run a station. The station " -"could be any of the ones listed above, or any other privacy/anonymity " -"related one you would like to run. Please contact us at `@geti2p`_ if " -"you're interested." +"We're currently looking for help staffing the stations. If you want to help " +"out, you can! Bring a monitor/laptop and run a station. The station could be" +" any of the ones listed above, or any other privacy/anonymity related one " +"you would like to run. Please contact us at `@geti2p`_ if you're interested." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81 @@ -4184,8 +3951,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86 msgid "" "The focus will be on in-depth topics surrounding I2P, the roadmap and " -"development. Anyone is welcome to attend, but the content will be " -"somewhat technical." +"development. Anyone is welcome to attend, but the content will be somewhat " +"technical." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90 @@ -4221,35 +3988,26 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:14 msgid "" -"I2PCon is the first event of its kind. It has two short term goals. Where" -" the\n" -"first one is to provide the general public with an event where knowledge " -"about\n" -"privacy and privacy concerns can be obtained. The second goal is to " -"further the\n" -"I2P project and its community. This will take the shape of technical " -"discussions\n" +"I2PCon is the first event of its kind. It has two short term goals. Where the\n" +"first one is to provide the general public with an event where knowledge about\n" +"privacy and privacy concerns can be obtained. The second goal is to further the\n" +"I2P project and its community. This will take the shape of technical discussions\n" "about cryptography, anonymity and I2P centric topics." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:22 msgid "" -"There is a larger and more long-term goal of this event, and it is to " -"build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we would like to provide a forum where this " -"community\n" +"There is a larger and more long-term goal of this event, and it is to build a\n" +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we would like to provide a forum where this community\n" "can grow." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:29 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" -"`Toronto Crypto`_. The venue and everything relating to it is provided by" -"\n" -"`Hacklab`_. Without either of them this event would not have been " -"possible, so\n" +"`Toronto Crypto`_. The venue and everything relating to it is provided by\n" +"`Hacklab`_. Without either of them this event would not have been possible, so\n" "thank you both." msgstr "" @@ -4259,12 +4017,9 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:49 msgid "" -"I2PCon is entirely free to attend! We ask you to register `here`__, to " -"give us\n" -"an estimate of how many people will be attending. No identifying " -"information has\n" -"to be given in order to register, but if you have any concerns, please " -"let us\n" +"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n" +"an estimate of how many people will be attending. No identifying information has\n" +"to be given in order to register, but if you have any concerns, please let us\n" "know." msgstr "" @@ -4309,26 +4064,15 @@ msgstr "" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13 msgid "" -"0.9.21 contains several changes to add capacity to the network, increase " -"the efficiency of the floodfills,\n" -"and use bandwidth more effectively.\n" -"We have migrated the shared clients tunnels to ECDSA signatures and added" -" a DSA fallback\n" -"using the new \"multisession\" capability for those sites that don't " -"support ECDSA." -msgstr "" -"0.9.21 contains several changes to add capacity to the network, increase " -"the efficiency of the floodfills,\n" +"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n" "and use bandwidth more effectively.\n" -"We have migrated the shared clients tunnels to ECDSA signatures and added" -" a DSA fallback\n" -"using the new \"multisession\" capability for those sites that don't " -"support ECDSA." +"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n" +"using the new \"multisession\" capability for those sites that don't support ECDSA." +msgstr "0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\nand use bandwidth more effectively.\nWe have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\nusing the new \"multisession\" capability for those sites that don't support ECDSA." #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20 msgid "" -"The speakers and the schedule of the I2PCon in Toronto 2015 have been " -"announced.\n" +"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n" "Have a look on the `I2PCon page`_ for details.\n" "Reserve your seat on `Eventbrite`_." msgstr "" @@ -4440,21 +4184,15 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14 msgid "" -"I2PCon has been a giant success. For us, the I2P contributors, it " -"represents a\n" -"leap forward in terms of what we're capable of pulling off as a " -"community, how we\n" -"communicate the usecases of I2P and reach out to privacy conscious " -"individuals.\n" +"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n" +"leap forward in terms of what we're capable of pulling off as a community, how we\n" +"communicate the usecases of I2P and reach out to privacy conscious individuals.\n" "\n" -"By arranging this event, we've also grown our community. People who've " -"previously\n" -"only lurked on our irc channels, or run our software or possibly hadn't " -"even heard\n" +"By arranging this event, we've also grown our community. People who've previously\n" +"only lurked on our irc channels, or run our software or possibly hadn't even heard\n" "of I2P are now a part of our comminuty.\n" "\n" -"This event has been our first active step towards building a large and " -"inclusive\n" +"This event has been our first active step towards building a large and inclusive\n" "community, and as such it's been great success." msgstr "" @@ -4462,11 +4200,9 @@ msgstr "" msgid "" "Minutiae\n" "========\n" -"On day 2 we had two short discussion sessions. A more general discussion " -"and a roadmapping discussion.\n" +"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n" "\n" -"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P " -"Discussion session minutiae`_." +"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37 @@ -4495,32 +4231,25 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62 msgid "" -"We've had some wonderful speakers, from both inside- and outside of our " -"community.\n" +"We've had some wonderful speakers, from both inside- and outside of our community.\n" "\n" -"`David Dagon`_ talked to us about the way forward and how I2P could " -"handle potential abuse.\n" +"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n" "\n" -"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us" -" his thoughts about how far I2P has come.\n" +"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n" "\n" -"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and " -"why you should care." +"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72 msgid "" -"I would also like to thank the speakers from our community. `psi`_, " -"`@str4d`_ and `zzz`_ who all had\n" -"wonderful talks. Improving our ability to inform people about I2P is " -"something that\n" +"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_ who all had\n" +"wonderful talks. Improving our ability to inform people about I2P is something that\n" "is going to be important for us going forward." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78 msgid "" -"I would like to thank `Sadie`_ and Siew for helping us out with marketing" -" and graphics.\n" +"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n" "Without you I2PCon would've been a very different event." msgstr "" @@ -4532,43 +4261,39 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87 msgid "" -"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto " -"Crypto`_ for their help during the event." +"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ " +"for their help during the event." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91 msgid "" -"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV " -"and doing all of the post-production\n" +"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n" "work for the videos of all the talks." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96 msgid "" -"I would like to thank `@killyourtv_i2p`_ for hosting a very popular " -"crypto party station." +"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto " +"party station." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100 msgid "" -"Thanks to our new favorite journalist `@robinlevinson`_, for showing an " -"interest in our cause and\n" +"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n" "educating yourself about the technologies involved." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105 msgid "" -"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very " -"much made this event better." +"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much " +"made this event better." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109 msgid "" -"Finally I would like to thank everyone else who just showed up to the " -"event and helped out in any way\n" +"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n" "they could.\n" -"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was " -"most excellent to hang out\n" +"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n" "with you." msgstr "" @@ -4585,25 +4310,11 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13 msgid "" -"0.9.22 contains fixes for i2psnark getting stuck before completion, and " -"begins the migration of router infos to new, stronger Ed25519 signatures." -"\n" -"To reduce network churn, your router will have only a small probability " -"of converting to Ed25519 at each restart.\n" -"When it does rekey, expect to see lower bandwidth usage for a couple of " -"days as it reintegrates into the network with its new identity.\n" -"If all goes well, we will accelerate the rekeying process in the next " -"release." -msgstr "" -"0.9.22 contains fixes for i2psnark getting stuck before completion, and " -"begins the migration of router infos to new, stronger Ed25519 signatures." -"\n" -"To reduce network churn, your router will have only a small probability " -"of converting to Ed25519 at each restart.\n" -"When it does rekey, expect to see lower bandwidth usage for a couple of " -"days as it reintegrates into the network with its new identity.\n" -"If all goes well, we will accelerate the rekeying process in the next " -"release." +"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n" +"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n" +"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n" +"If all goes well, we will accelerate the rekeying process in the next release." +msgstr "0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\nTo reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\nWhen it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\nIf all goes well, we will accelerate the rekeying process in the next release." #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20 msgid "" @@ -4621,14 +4332,13 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46 msgid "" -"Fix i2psnark getting stuck before download complete, and not deleting " -"temp files" +"Fix i2psnark getting stuck before download complete, and not deleting temp " +"files" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47 msgid "" -"Fix starting of torrents added by copying torrent file to i2psnark " -"directory" +"Fix starting of torrents added by copying torrent file to i2psnark directory" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48 @@ -4657,10 +4367,8 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15 msgid "" "Greetings!\n" -"This is the first in a long series of blogs to help the community see " -"what is happening in the I2P community.\n" -"Since many awesome events are happening *inside* the network, we think it" -" will be worthwhile to talk about some of activities here." +"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n" +"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21 @@ -4671,16 +4379,14 @@ msgstr "" msgid "" "Let's face it -- our console needs improvement.\n" "Our site could use an update as well.\n" -"We are looking for feedback on how to improve the usability of I2P for " -"new and existing users!" +"We are looking for feedback on how to improve the usability of I2P for new and existing users!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29 msgid "" "Any and all feedback is welcome.\n" "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n" -"If you don't feel comfortable using Twitter, we are always available via " -"the in-network IRC channel.\n" +"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n" "You don't have to be a long time user.\n" "We want to hear from all sorts of people!" msgstr "" @@ -4692,36 +4398,27 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43 msgid "" "On 03 November there was an I2P developer meeting (`log`_).\n" -"This meeting focused on adding new links to the router console, " -"preparation for CCC, finding a replacement for forum.i2p, and website " -"improvements." +"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50 msgid "" "The consensus was to not add dogecoindark.i2p.\n" -"There are concerns about usability due to many images being included on " -"the page.\n" -"Exchanged.i2p is conditionally added, as long as the maintainer adds a " -"disclaimer on the site.\n" -"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was " -"lenta.i2p (a russian news site)." +"There are concerns about usability due to many images being included on the page.\n" +"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n" +"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57 msgid "" -"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used" -" for developer's services.\n" -"He also suggested a more formalized technical proposal system, with more " -"prominence on the main website." +"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n" +"He also suggested a more formalized technical proposal system, with more prominence on the main website." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62 msgid "" -"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos " -"Computer Congress.\n" -"More details are to come on this, but we can promise there will be " -"stickers." +"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n" +"More details are to come on this, but we can promise there will be stickers." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67 @@ -4729,13 +4426,14 @@ msgid "General Announcements" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69 -msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" +msgid "" +"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75 msgid "" -"Translation deadline Thursday, 12 November, translators please update. " -"All translations are done via `Transifex`_ ." +"Translation deadline Thursday, 12 November, translators please update. All " +"translations are done via `Transifex`_ ." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1 @@ -4753,15 +4451,10 @@ msgstr "0.9.23 는 여러 버그 픽스와 함께 I2PSnarkì˜ ìž‘ì€ ì„±ëŠ¥í–¥ #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13 msgid "" -"Hello I2P! This is the first release signed by me (str4d), after 49 " -"releases\n" -"signed by zzz. This is an important test of our redundancy for all " -"things,\n" +"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n" +"signed by zzz. This is an important test of our redundancy for all things,\n" "including people." -msgstr "" -"안녕하세요! I2P ì‚¬ìš©ìž ì—¬ëŸ¬ë¶„. ì´ ë¦´ë¦¬ì¦ˆëŠ” ì œê°€ 서명한 첫번째 릴리즈입니다 (str4d). zzzê°€ 서명한 49ê°œì˜ ë¦´ë¦¬ì¦ˆë¥¼ " -"ê±°ì³ì„œ ë§ì´ì£ . \n" -"ì´ëŠ” ëª¨ë“ ê²ƒì— ëŒ€í•œ ì •ë¦¬, ê°ì›ì— 중요한 테스트가 ë 것입니다. ì‚¬ëžŒë“¤ì„ í¬í•¨í•´ì„œìš”." +msgstr "안녕하세요! I2P ì‚¬ìš©ìž ì—¬ëŸ¬ë¶„. ì´ ë¦´ë¦¬ì¦ˆëŠ” ì œê°€ 서명한 첫번째 릴리즈입니다 (str4d). zzzê°€ 서명한 49ê°œì˜ ë¦´ë¦¬ì¦ˆë¥¼ ê±°ì³ì„œ ë§ì´ì£ . \nì´ëŠ” ëª¨ë“ ê²ƒì— ëŒ€í•œ ì •ë¦¬, ê°ì›ì— 중요한 테스트가 ë 것입니다. ì‚¬ëžŒë“¤ì„ í¬í•¨í•´ì„œìš”." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19 msgid "Housekeeping" @@ -4769,25 +4462,18 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24 msgid "" -"My signing key has been in router updates for over two years (since " -"0.9.9), so\n" -"if you are on a recent version of I2P this update should be just as easy " -"as\n" -"every other update. However, if you are running an older version than " -"0.9.9, you\n" -"will first need to manually update to a recent version. Update files for " -"recent\n" -"versions `can be downloaded here`__, and instructions on how to manually " -"update\n" -"`are provided here`__. Once you have manually updated, your router will " -"then find\n" +"My signing key has been in router updates for over two years (since 0.9.9), so\n" +"if you are on a recent version of I2P this update should be just as easy as\n" +"every other update. However, if you are running an older version than 0.9.9, you\n" +"will first need to manually update to a recent version. Update files for recent\n" +"versions `can be downloaded here`__, and instructions on how to manually update\n" +"`are provided here`__. Once you have manually updated, your router will then find\n" "and download the 0.9.23 update as usual." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38 msgid "" -"If you installed I2P via a package manager, you are not affected by the " -"change,\n" +"If you installed I2P via a package manager, you are not affected by the change,\n" "and can update as usual." msgstr "만약 패키지 관리ìžë¥¼ 통해 I2P를 설치했다면, 그냥 í‰ì†ŒëŒ€ë¡œ ì—…ë°ì´íŠ¸ 하시면 ë©ë‹ˆë‹¤." @@ -4799,50 +4485,26 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48 msgid "" -"The migration of RouterInfos to new, stronger Ed25519 signatures is going" -" well,\n" -"with at least half of the network already estimated to have rekeyed. This" -"\n" -"release accelerates the rekeying process. To reduce network churn, your " -"router\n" -"will have a small probability of converting to Ed25519 at each restart. " -"When it\n" -"does rekey, expect to see lower bandwidth usage for a couple of days as " -"it\n" -"reintegrates into the network with its new identity." -msgstr "" -"The migration of RouterInfos to new, stronger Ed25519 signatures is going" -" well,\n" -"with at least half of the network already estimated to have rekeyed. This" -"\n" -"release accelerates the rekeying process. To reduce network churn, your " -"router\n" -"will have a small probability of converting to Ed25519 at each restart. " -"When it\n" -"does rekey, expect to see lower bandwidth usage for a couple of days as " -"it\n" +"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n" +"with at least half of the network already estimated to have rekeyed. This\n" +"release accelerates the rekeying process. To reduce network churn, your router\n" +"will have a small probability of converting to Ed25519 at each restart. When it\n" +"does rekey, expect to see lower bandwidth usage for a couple of days as it\n" "reintegrates into the network with its new identity." +msgstr "The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\nwith at least half of the network already estimated to have rekeyed. This\nrelease accelerates the rekeying process. To reduce network churn, your router\nwill have a small probability of converting to Ed25519 at each restart. When it\ndoes rekey, expect to see lower bandwidth usage for a couple of days as it\nreintegrates into the network with its new identity." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57 msgid "" -"Note that this will be the last release to support Java 6. Please update " -"to\n" -"Java 7 or 8 as soon as possible. We are already working to make I2P " -"compatible\n" +"Note that this will be the last release to support Java 6. Please update to\n" +"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n" "with the upcoming Java 9, and some of that work is in this release." -msgstr "" -"ì´ ë¦´ë¦¬ì¦ˆëŠ” Java 6를 지ì›í•˜ëŠ” 마지막 릴리즈가 ë 것입니다. Java 7 í˜¹ì€ 8ë¡œ \n" -"ë¹ ë¥¸ ì‹œì¼ì•ˆì— ì—…ë°ì´íŠ¸ 해주세요. 우리는 곧 나올 Java 9ì— I2Pê°€ 호환 가능하ë„ë¡ \n" -"하는 ìž‘ì—…ì„ ì´ë¯¸ 시작했으며, ì¼ë¶€ëŠ” ì´ ë¦´ë¦¬ì¦ˆì— í¬í•¨ë˜ì—ˆìŠµë‹ˆë‹¤." +msgstr "ì´ ë¦´ë¦¬ì¦ˆëŠ” Java 6를 지ì›í•˜ëŠ” 마지막 릴리즈가 ë 것입니다. Java 7 í˜¹ì€ 8ë¡œ \në¹ ë¥¸ ì‹œì¼ì•ˆì— ì—…ë°ì´íŠ¸ 해주세요. 우리는 곧 나올 Java 9ì— I2Pê°€ 호환 가능하ë„ë¡ \n하는 ìž‘ì—…ì„ ì´ë¯¸ 시작했으며, ì¼ë¶€ëŠ” ì´ ë¦´ë¦¬ì¦ˆì— í¬í•¨ë˜ì—ˆìŠµë‹ˆë‹¤." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63 msgid "" -"We have also made some minor improvements in I2PSnark, and added a new " -"page in\n" +"We have also made some minor improvements in I2PSnark, and added a new page in\n" "the routerconsole for viewing older news items." -msgstr "" -"우리는 I2PSnarkì— ì‚¬ì†Œí•œ ê°œì„ ì„ í–ˆìœ¼ë©°, routerconsoleì— ì´ì „ 뉴스 í•ëª©ì„ ë³¼ 수 있게 \n" -"새로운 페ì´ì§€ë¥¼ 추가했습니다." +msgstr "우리는 I2PSnarkì— ì‚¬ì†Œí•œ ê°œì„ ì„ í–ˆìœ¼ë©°, routerconsoleì— ì´ì „ 뉴스 í•ëª©ì„ ë³¼ 수 있게 \n새로운 페ì´ì§€ë¥¼ 추가했습니다." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78 msgid "Accelerate transition to Ed25519" @@ -4850,14 +4512,13 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83 msgid "" -"Fix some bugs soft restarting after a large clock shift (e.g. resume) " -"(but more to do)" +"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but " +"more to do)" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84 msgid "" -"Fix streaming retransmission timers that were dying, and related timer " -"bugs" +"Fix streaming retransmission timers that were dying, and related timer bugs" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85 @@ -4901,7 +4562,8 @@ msgid "Detect for broken ECDSA support in Gentoo" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98 -msgid "Console: Add a Java 6 warning, this is the last release to support Java 6" +msgid "" +"Console: Add a Java 6 warning, this is the last release to support Java 6" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99 @@ -4910,8 +4572,8 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100 msgid "" -"Pass Accept-Encoding header through client and server proxies, to allow " -"end-to-end compression" +"Pass Accept-Encoding header through client and server proxies, to allow end-" +"to-end compression" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103 @@ -4927,7 +4589,8 @@ msgid "Save magnet parameters across restart" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106 -msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD" +msgid "" +"Don't delete .torrent file on errors at startup, rename to .torrent.BAD" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107 @@ -4959,8 +4622,7 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:13 msgid "" -"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and " -"eche|on." +"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:17 @@ -4968,21 +4630,15 @@ msgid "" "Start\n" "=====\n" "The project has had another successful year at CCC.\n" -"We would like to thank the volunteers at `32C3`__ for all of their help " -"in organizing this event and for being accommodating hosts for us.\n" -"Many I2P contributors were able to attend this year's Congress due to " -"many of the generous donations from supporters like you to the project.\n" -"If you would like to fund I2P, please see `our donation page`__ for more " -"information." +"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n" +"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n" +"If you would like to fund I2P, please see `our donation page`__ for more information." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:29 msgid "" -"Just like previous years we were located in Noisy Square, located near " -"the EFF's table.\n" -"This proved to be an ideal spot for us as our table was almost always " -"busy with current and new users who were interested in I2P, many of whom " -"we wouldn't have otherwise had the ability to talk to." +"Just like previous years we were located in Noisy Square, located near the EFF's table.\n" +"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:63 @@ -4997,13 +4653,10 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:72 msgid "" -"If you don't know what a reseed server is, it is first the connection new" -" routers use to find peers.\n" -"There was a lot of discussion around the current status of the reseed " -"network right now.\n" +"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n" +"There was a lot of discussion around the current status of the reseed network right now.\n" "As always, more reseed operators are needed!\n" -"If you would like to strengthen the reseed infrastructure, (or if you're " -"talented with Go) email `backup -at- i2pmail.org`__." +"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:81 @@ -5014,16 +4667,11 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:86 msgid "" -"Due to the decentralized nature of I2P detecting Sybil attacks is not as " -"straight forward as on other networks (i.e. Tor).\n" -"To mitigate this zzz has been working on a new router-based Sybil " -"detection tool.\n" -"To be brief, the tool runs in the router, and collects information on " -"floodfills your router is currently aware of.\n" -"Currently the tool is mainly collecting a baseline and does not act on " -"any of the information it is collecting.\n" -"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as " -"it is still in active development" +"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n" +"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n" +"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n" +"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n" +"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:94 @@ -5035,21 +4683,15 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:99 msgid "" "On the 30th we held an in person `meeting`__ at our table.\n" -"The meeting focused on organizationally preparing for more project " -"management, and public relations (both from Sadie)." +"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:106 msgid "" -"We discussed how much of the work done on I2P is lost in the commits and " -"there is not much to see for our users.\n" -"To remedy this lazygravy plans on preparing a series of posts explaining " -"some technical topics in I2P.\n" -"The initial ideas that we discussed writing posts on are what encrypted " -"lease sets are, why different tunnel types are needed, and some " -"observations seen in `I2Spy`__.\n" -"But these are just the start and we would like to hear feedback on topics" -" we should write about!" +"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n" +"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n" +"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n" +"But these are just the start and we would like to hear feedback on topics we should write about!" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:115 @@ -5111,41 +4753,37 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:11 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:11 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:11 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:11 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:11 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11 msgid "Update details" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18 msgid "" -"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and " -"efficiency improvements.\n" +"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n" "Note that this release is the first to require Java 7.\n" "Please update to Java 7 or 8 as soon as possible.\n" "Your router will not automatically update if you are using Java 6." -msgstr "" -"0.9.24 는 새 SAM (v3.2) ê³¼ 버그 픽스, 성능향ìƒì´ í¬í•¨ë©ë‹ˆë‹¤.\n" -"ì´ ë¦´ë¦¬ì¦ˆëŠ” 처ìŒìœ¼ë¡œ JAVA7ì„ ìš”êµ¬í•˜ê²Œ ë©ë‹ˆë‹¤. \n" -"JAVA7ì´ë‚˜ JAVA8ë¡œ ì—…ê·¸ë ˆì´ë“œ 하시기 ë°”ëžë‹ˆë‹¤.\n" -"JAVA6ì„ ì‚¬ìš©í•˜ê³ ìžˆë‹¤ë©´ ë¼ìš°í„°ê°€ ìžë™ìœ¼ë¡œ ì—…ë°ì´íŠ¸ê°€ ë˜ì§€ 않습니다." +msgstr "0.9.24 는 새 SAM (v3.2) ê³¼ 버그 픽스, 성능향ìƒì´ í¬í•¨ë©ë‹ˆë‹¤.\nì´ ë¦´ë¦¬ì¦ˆëŠ” 처ìŒìœ¼ë¡œ JAVA7ì„ ìš”êµ¬í•˜ê²Œ ë©ë‹ˆë‹¤. \nJAVA7ì´ë‚˜ JAVA8ë¡œ ì—…ê·¸ë ˆì´ë“œ 하시기 ë°”ëžë‹ˆë‹¤.\nJAVA6ì„ ì‚¬ìš©í•˜ê³ ìžˆë‹¤ë©´ ë¼ìš°í„°ê°€ ìžë™ìœ¼ë¡œ ì—…ë°ì´íŠ¸ê°€ ë˜ì§€ 않습니다." #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25 msgid "" -"To prevent the problems caused by the ancient commons-logging library, we" -" have removed it.\n" -"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by " -"HungryHobo) to crash if they have IMAP enabled.\n" -"The recommended fix is to replace your old I2P-Bote plugin with the " -"current one signed by str4d.\n" +"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n" +"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n" +"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n" "For more details, see `this post`__." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34 msgid "" -"We had a great `32C3 Congress`__ and are making good progress on our 2016" -" project plans.\n" -"Echelon gave a talk on I2P's history and current status, and his slides " -"are `available here`__ (pdf).\n" -"Str4d attended `Real World Crypto`__ and gave a talk on our crypto " -"migration, his slides are `here`__ (pdf)." +"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n" +"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n" +"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58 @@ -5154,8 +4792,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59 msgid "" -"SAM 3.2, with several new advanced features, command parser improvements," -" and lots of bug fixes" +"SAM 3.2, with several new advanced features, command parser improvements, " +"and lots of bug fixes" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60 @@ -5180,8 +4818,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69 msgid "" -"Don't remove tunnel on next-hop failure indication from transport, it " -"isn't reliable" +"Don't remove tunnel on next-hop failure indication from transport, it isn't " +"reliable" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70 @@ -5189,13 +4827,13 @@ msgid "Fix formatting in summary bar to prevent overflow" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71 -msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port" +msgid "" +"Fix console links in i2ptunnel error pages when on nonstandard host/port" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72 msgid "" -"Don't query floodfills whose version is too old to support encrypted " -"replies" +"Don't query floodfills whose version is too old to support encrypted replies" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73 @@ -5242,8 +4880,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87 msgid "" -"Don't offer to introduce unless requested, to introduce only those that " -"need it" +"Don't offer to introduce unless requested, to introduce only those that need" +" it" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88 @@ -5303,6 +4941,13 @@ msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:64 #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:61 #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:70 +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:60 +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:82 +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71 +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88 +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61 msgid "Full list of fixed bugs" msgstr "" @@ -5319,26 +4964,17 @@ msgstr "0.9.25 패치는 SAM 3.3, QR codes, 몇가지 버그 픽스를 í¬í•¨í•© #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18 msgid "" -"0.9.25 contains a major new version of SAM, v3.3, to support " -"sophisticated multiprotocol applications.\n" +"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n" "It adds QR codes for sharing hidden service addresses with others,\n" "and \"identicon\" images for visually distinguishing addresses." -msgstr "" -"0.9.25는 복잡한 ë©€í‹°í”„ë¡œí† ì½œ 어플리케ì´ì…˜ 지ì›ì„ 위해, 새 ë©”ì´ì € ë²„ì „ì˜ SAM, v3.3를 í¬í•¨í•©ë‹ˆë‹¤.\n" -"숨겨진 서비스 ì£¼ì†Œë“¤ì„ QR코드를 통해 타ì¸ê³¼ ê³µìœ í• ìˆ˜ ìžˆê³ , 주소 êµ¬ë³„ì„ ì‹œê°ì 으로 구별하기 위해 \"ì¸ì‹í‘œ\" ì´ë¯¸ì§€ë¥¼ " -"추가했습니다." +msgstr "0.9.25는 복잡한 ë©€í‹°í”„ë¡œí† ì½œ 어플리케ì´ì…˜ 지ì›ì„ 위해, 새 ë©”ì´ì € ë²„ì „ì˜ SAM, v3.3를 í¬í•¨í•©ë‹ˆë‹¤.\n숨겨진 서비스 ì£¼ì†Œë“¤ì„ QR코드를 통해 타ì¸ê³¼ ê³µìœ í• ìˆ˜ ìžˆê³ , 주소 êµ¬ë³„ì„ ì‹œê°ì 으로 구별하기 위해 \"ì¸ì‹í‘œ\" ì´ë¯¸ì§€ë¥¼ 추가했습니다." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24 msgid "" "We've added a new \"router family\" configuration page in the console,\n" -"to make it easier to declare that your group of routers is run by a " -"single person.\n" -"There are several changes to increase the capacity of the network and " -"hopefully improve tunnel build success." -msgstr "" -"우리는 ì½˜ì†”ì— ìƒˆ \"ë¼ìš°í„° ì œí’ˆêµ°\" 페ì´ì§€ë¥¼ ì½˜ì†”ì— ì¶”ê°€í•´ì„œ,\n" -"í•œ ì‚¬ëžŒì´ ë¼ìš°í„° ê·¸ë£¹ì„ ìš´ì˜í•˜ëŠ” ê²ƒì„ ì‰½ê²Œ 알아볼 수 있게 했습니다.\n" -"네트워í¬ì˜ ê°€ìš©ì„±ì„ ì˜¬ë¦¬ê³ í„°ë„ ìƒì„± ì„±ê³µë¥ ì„ ì˜¬ë¦¬ê¸° 위해 몇가지 ìˆ˜ì •ì´ ê°€í•´ì¡ŒìŠµë‹ˆë‹¤." +"to make it easier to declare that your group of routers is run by a single person.\n" +"There are several changes to increase the capacity of the network and hopefully improve tunnel build success." +msgstr "우리는 ì½˜ì†”ì— ìƒˆ \"ë¼ìš°í„° ì œí’ˆêµ°\" 페ì´ì§€ë¥¼ ì½˜ì†”ì— ì¶”ê°€í•´ì„œ,\ní•œ ì‚¬ëžŒì´ ë¼ìš°í„° ê·¸ë£¹ì„ ìš´ì˜í•˜ëŠ” ê²ƒì„ ì‰½ê²Œ 알아볼 수 있게 했습니다.\n네트워í¬ì˜ ê°€ìš©ì„±ì„ ì˜¬ë¦¬ê³ í„°ë„ ìƒì„± ì„±ê³µë¥ ì„ ì˜¬ë¦¬ê¸° 위해 몇가지 ìˆ˜ì •ì´ ê°€í•´ì¡ŒìŠµë‹ˆë‹¤." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40 msgid "Display of identicons and QR codes in address book and i2ptunnel" @@ -5430,34 +5066,26 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a " -"development program aimed at improving the privacy software ecosystem for" -" both developers and users." +"development program aimed at improving the privacy software ecosystem for " +"both developers and users." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13 msgid "" -"Over the last few years, the need for users to be in control of their own" -" data\n" -"has become increasingly apparent. Some excellent progress had been made " -"in this\n" -"regard with the rise of messaging apps like Signal_, and file storage " -"systems\n" -"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to " -"the\n" +"Over the last few years, the need for users to be in control of their own data\n" +"has become increasingly apparent. Some excellent progress had been made in this\n" +"regard with the rise of messaging apps like Signal_, and file storage systems\n" +"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n" "whole world is steadily gaining traction." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21 msgid "" -"But building privacy and anonymity into applications is not trivial. Much" -" of the\n" -"software people use every day was not designed to be privacy-preserving, " -"and the\n" +"But building privacy and anonymity into applications is not trivial. Much of the\n" +"software people use every day was not designed to be privacy-preserving, and the\n" "tools developers have available are generally not easy to work with. The\n" -"recently-published OnionScan_ survey gives some insight into just how " -"easy it is\n" -"for even technical users to mis-configure their services, completely " -"undermining\n" +"recently-published OnionScan_ survey gives some insight into just how easy it is\n" +"for even technical users to mis-configure their services, completely undermining\n" "their intentions." msgstr "" @@ -5470,16 +5098,14 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a\n" -"development program aimed at improving the privacy software ecosystem. " -"Our goal\n" -"is to make life easier both for developers wanting to leverage I2P in " -"their\n" -"applications, and for users trying to configure and run their apps " -"through I2P." +"development program aimed at improving the privacy software ecosystem. Our goal\n" +"is to make life easier both for developers wanting to leverage I2P in their\n" +"applications, and for users trying to configure and run their apps through I2P." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48 -msgid "We will be focusing our time this summer into three complementary areas:" +msgid "" +"We will be focusing our time this summer into three complementary areas:" msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52 @@ -5490,19 +5116,15 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57 msgid "" -"In June, we will be updating the various libraries that exist for " -"interfacing\n" -"with I2P. We have made significant progress this year on extending our " -"SAM_ API\n" -"with additional features, such as support for datagrams and ports. We " -"plan to\n" +"In June, we will be updating the various libraries that exist for interfacing\n" +"with I2P. We have made significant progress this year on extending our SAM_ API\n" +"with additional features, such as support for datagrams and ports. We plan to\n" "make these features easily accessible in our C++ and Python libraries." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64 msgid "" -"We will also soon be making it much easier for Java and Android " -"developers to\n" +"We will also soon be making it much easier for Java and Android developers to\n" "add I2P support to their applications. Stay tuned!" msgstr "" @@ -5514,18 +5136,12 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76 msgid "" -"In July we will be working with applications that have expressed interest" -" in\n" -"adding support for I2P. There are some really neat ideas being developed " -"in the\n" -"privacy space right now, and we want to help their communities leverage " -"over a\n" -"decade of research and development on peer-to-peer anonymity. Extending " -"these\n" -"applications to work natively over I2P is a good step forward for " -"usability, and\n" -"in the process will improve how these applications think about and handle" -" user\n" +"In July we will be working with applications that have expressed interest in\n" +"adding support for I2P. There are some really neat ideas being developed in the\n" +"privacy space right now, and we want to help their communities leverage over a\n" +"decade of research and development on peer-to-peer anonymity. Extending these\n" +"applications to work natively over I2P is a good step forward for usability, and\n" +"in the process will improve how these applications think about and handle user\n" "information." msgstr "" @@ -5537,12 +5153,9 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91 msgid "" -"Finally, in August we will turn out attention to the apps we bundle " -"inside I2P,\n" -"and the wider array of plugins. Some of these are due for some love, to " -"make\n" -"them more user-friendly - as well as fix any outstanding bugs! We hope " -"that\n" +"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n" +"and the wider array of plugins. Some of these are due for some love, to make\n" +"them more user-friendly - as well as fix any outstanding bugs! We hope that\n" "longtime I2P supporters will enjoy the outcome of this work." msgstr "" @@ -5557,14 +5170,10 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -" usable\n" -"websites or interfaces, or writing guides for users: come and chat with " -"us on\n" -"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our " -"community, both\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing usable\n" +"websites or interfaces, or writing guides for users: come and chat with us on\n" +"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n" "inside and outside I2P. We'll be sending I2P stickers out to all new\n" "contributors taking part (or possibly other pending I2P goodies)!" msgstr "" @@ -5572,24 +5181,18 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140 msgid "" -"Likewise, if you are an application developer who wants a hand with " -"integrating\n" -"I2P, or even just to chat about the concepts or details: get in touch! If" -" you\n" -"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ " -"or\n" -"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or " -"FreeNode." +"Likewise, if you are an application developer who wants a hand with integrating\n" +"I2P, or even just to chat about the concepts or details: get in touch! If you\n" +"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n" +"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131 msgid "" -"We'll be posting here as we go, but you can also follow our progress, and" -" share\n" -"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring" -" on the\n" +"We'll be posting here as we go, but you can also follow our progress, and share\n" +"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n" "summer!" msgstr "" @@ -5602,8 +5205,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11 msgid "" -"0.9.26 contains crypto updates, Debian packaging improvements, and bug " -"fixes" +"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes" msgstr "0.9.26ì€ ì•”í˜¸í™” ì—…ë°ì´íŠ¸, ë°ë¹„안 패키지 í–¥ìƒ, 몇몇 버그 픽스가 í¬í•¨ë©ë‹ˆë‹¤." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13 @@ -5617,36 +5219,22 @@ msgid "" "0.9.26 contains a major upgrade to our native crypto library,\n" "a new addressbook subscription protocol with signatures,\n" "and major improvements to the Debian/Ubuntu packaging." -msgstr "" -"0.9.26ì—는 암호화 ë¼ì´ë¸ŒëŸ¬ë¦¬ì˜ 주요 ì—…ë°ì´íŠ¸ê°€ 들어가 있습니다.\n" -"ê·¸ë¦¬ê³ ì„œëª…ëœ ìƒˆ ì£¼ì†Œë¡ êµ¬ë… í”„ë¡œí† ì½œê³¼, ë°ë¹„안/안드로ì´ë“œ íŒ¨í‚¤ì§•ì— ê´€í•œ 주요 ì—…ë°ì´íŠ¸ê°€ í¬í•¨ë©ë‹ˆë‹¤." +msgstr "0.9.26ì—는 암호화 ë¼ì´ë¸ŒëŸ¬ë¦¬ì˜ 주요 ì—…ë°ì´íŠ¸ê°€ 들어가 있습니다.\nê·¸ë¦¬ê³ ì„œëª…ëœ ìƒˆ ì£¼ì†Œë¡ êµ¬ë… í”„ë¡œí† ì½œê³¼, ë°ë¹„안/안드로ì´ë“œ íŒ¨í‚¤ì§•ì— ê´€í•œ 주요 ì—…ë°ì´íŠ¸ê°€ í¬í•¨ë©ë‹ˆë‹¤." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31 msgid "" -"For crypto, we have upgraded to GMP 6.0.0, and added support for newer " -"processors,\n" +"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n" "which will speed up crypto operations considerably.\n" -"Also, we are now using constant-time GMP functions to prevent side-" -"channel attacks.\n" -"For caution, the GMP changes are enabled for new installs and " -"Debian/Ubuntu builds only;\n" +"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n" +"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n" "we will include them for in-net updates in the 0.9.27 release." -msgstr "" -"ì•”í˜¸í™”ì— ê´€ë ¨í•´ ë§ì”€ë“œë¦¬ë©´ ë¼ì´ë¸ŒëŸ¬ë¦¬ë¥¼ GMP 6.0.0 ë²„ì „ìœ¼ë¡œ ì—…ê·¸ë ˆì´ë“œ í•˜ì˜€ê³ ìƒˆë¡œ 나온 í”„ë¡œì„¸ì„œì— ëŒ€í•œ 지ì›ì„ " -"추가하였습니다.\n" -"암호화 ì„±ëŠ¥ì— ë§Žì€ ë„ì›€ì„ ì¤„ê²ƒìœ¼ë¡œ 기대ë©ë‹ˆë‹¤.\n" -"ê·¸ë¦¬ê³ , side-channel attacks를 막기 위해 GMPì˜ constant-time ê¸°ëŠ¥ì„ ì‚¬ìš©í•˜ê¸°ë¡œ 하였습니다.\n" -"그러나 ì´ GMP 변경 사í•ì€ 새로 설치하거나 ë°ë¹„안/우분투 빌드ì—서만 사용 가능합니다.\n" -"in-net ì—…ë°ì´íŠ¸ì—서는 0.9.27ì— í¬í•¨í• 것입니다." +msgstr "ì•”í˜¸í™”ì— ê´€ë ¨í•´ ë§ì”€ë“œë¦¬ë©´ ë¼ì´ë¸ŒëŸ¬ë¦¬ë¥¼ GMP 6.0.0 ë²„ì „ìœ¼ë¡œ ì—…ê·¸ë ˆì´ë“œ í•˜ì˜€ê³ ìƒˆë¡œ 나온 í”„ë¡œì„¸ì„œì— ëŒ€í•œ 지ì›ì„ 추가하였습니다.\n암호화 ì„±ëŠ¥ì— ë§Žì€ ë„ì›€ì„ ì¤„ê²ƒìœ¼ë¡œ 기대ë©ë‹ˆë‹¤.\nê·¸ë¦¬ê³ , side-channel attacks를 막기 위해 GMPì˜ constant-time ê¸°ëŠ¥ì„ ì‚¬ìš©í•˜ê¸°ë¡œ 하였습니다.\n그러나 ì´ GMP 변경 사í•ì€ 새로 설치하거나 ë°ë¹„안/우분투 빌드ì—서만 사용 가능합니다.\nin-net ì—…ë°ì´íŠ¸ì—서는 0.9.27ì— í¬í•¨í• 것입니다." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39 msgid "" -"For Debian/Ubuntu builds, we have added dependencies on several packages," -"\n" +"For Debian/Ubuntu builds, we have added dependencies on several packages,\n" "including Jetty 8 and geoip, and removed the equivalent bundled code." -msgstr "" -"ë°ë¹„안/우분투 ë¹Œë“œì— ìƒˆë¡œìš´ ì˜ì¡´ì„± íŒ¨í‚¤ì§€ë“¤ì„ ì¶”ê°€í–ˆìŠµë‹ˆë‹¤.\n" -"Jetty 8, geoip를 ì¶”ê°€í•˜ê³ ê°™ì€ ì—í• ì„ í•˜ë˜ ë‚´ìž¥ ì½”ë“œë“¤ì€ ì œê±°í–ˆìŠµë‹ˆë‹¤." +msgstr "ë°ë¹„안/우분투 ë¹Œë“œì— ìƒˆë¡œìš´ ì˜ì¡´ì„± íŒ¨í‚¤ì§€ë“¤ì„ ì¶”ê°€í–ˆìŠµë‹ˆë‹¤.\nJetty 8, geoip를 ì¶”ê°€í•˜ê³ ê°™ì€ ì—í• ì„ í•˜ë˜ ë‚´ìž¥ ì½”ë“œë“¤ì€ ì œê±°í–ˆìŠµë‹ˆë‹¤." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44 msgid "" @@ -5656,10 +5244,10 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59 msgid "" -"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant " -"speedups on newer architectures, and constant-time crypto operations " -"(new installs and Debian/Ubuntu builds only, will include in the updates " -"in the next release, 0.9.27)" +"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups " +"on newer architectures, and constant-time crypto operations (new installs " +"and Debian/Ubuntu builds only, will include in the updates in the next " +"release, 0.9.27)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60 @@ -5672,8 +5260,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62 msgid "" -"Enhance hosts blockfile format to allow for multiple destinations per " -"entry" +"Enhance hosts blockfile format to allow for multiple destinations per entry" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63 @@ -5682,8 +5269,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64 msgid "" -"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu " -"packages" +"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65 @@ -5701,8 +5287,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67 msgid "" -"Enhancements to the desktopgui system tray feature, to be enabled by " -"default in next release" +"Enhancements to the desktopgui system tray feature, to be enabled by default" +" in next release" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68 @@ -5717,8 +5303,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75 msgid "" -"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual" -" fix)" +"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual " +"fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76 @@ -5727,8 +5313,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77 msgid "" -"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 " -"for manual fix)" +"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for " +"manual fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78 @@ -5749,8 +5335,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87 msgid "" -"Rework resource bundle generation for 20x speedup in build time (requires" -" gettext version 0.19)" +"Rework resource bundle generation for 20x speedup in build time (requires " +"gettext version 0.19)" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1 @@ -5766,10 +5352,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13 msgid "" -"We're nearly half-way into the APIs month of Summer Dev, and making great" -"\n" -"progress on a number of fronts. I'm happy to announce that the first of " -"these is\n" +"We're nearly half-way into the APIs month of Summer Dev, and making great\n" +"progress on a number of fronts. I'm happy to announce that the first of these is\n" "complete: the I2P client libraries are now available on Maven Central!" msgstr "" @@ -5777,10 +5361,8 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51 msgid "" "This should make it much simpler for Java developers to use I2P in their\n" -"applications. Instead of needing to obtain the libraries from a current " -"install,\n" -"they can simply add I2P to their dependencies. Upgrading to new versions " -"will\n" +"applications. Instead of needing to obtain the libraries from a current install,\n" +"they can simply add I2P to their dependencies. Upgrading to new versions will\n" "similarly be much easier." msgstr "" @@ -5804,25 +5386,21 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39 msgid "" -"Add one or both of these to your project's dependencies, and you're good " -"to go!" +"Add one or both of these to your project's dependencies, and you're good to " +"go!" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67 msgid "" -"For other build systems, see the Maven Central pages for the `core`__ and" -"\n" +"For other build systems, see the Maven Central pages for the `core`__ and\n" "`streaming`__ libraries." msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72 msgid "" -"Android developers should use the `I2P Android client library`__, which " -"contains\n" -"the same libraries along with Android-specific helpers. I'll be updating " -"it soon\n" -"to depend on the new I2P libraries, so that cross-platform applications " -"can work\n" +"Android developers should use the `I2P Android client library`__, which contains\n" +"the same libraries along with Android-specific helpers. I'll be updating it soon\n" +"to depend on the new I2P libraries, so that cross-platform applications can work\n" "natively with either I2P Android or desktop I2P." msgstr "" @@ -5834,10 +5412,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89 msgid "" -"See our `application development`__ guide for help getting started with " -"these\n" -"libraries. You can also chat with us about them in #i2p-dev on IRC. And " -"if you\n" +"See our `application development`__ guide for help getting started with these\n" +"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n" "do start using them, let us know what you're working on with the hashtag\n" "`#I2PSummer`__ on Twitter!" msgstr "" @@ -5851,26 +5427,22 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11 msgid "" -"In the first month of Summer Dev, we have improved the usability of our " -"APIs for Java, Android, and Python developers." +"In the first month of Summer Dev, we have improved the usability of our APIs" +" for Java, Android, and Python developers." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13 msgid "" -"Summer Dev is in full swing: we've been busy greasing wheels, sanding " -"edges, and\n" -"tidying the place up. Now it's time for our first roundup, where we bring" -" you up\n" +"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n" +"tidying the place up. Now it's time for our first roundup, where we bring you up\n" "to speed on the progress we are making!" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19 msgid "" "\n" -"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us" -" the\n" -"fantastic logo you see above. It adds a cheerful personality to our " -"development\n" +"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n" +"fantastic logo you see above. It adds a cheerful personality to our development\n" "program (and is going to look great on t-shirts)." msgstr "" @@ -5882,48 +5454,37 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33 msgid "" -"Our goal for this month was to \"blend in\" - to make our APIs and " -"libraries work\n" -"within the existing infrastructure of various communities, so that " -"application\n" -"developers can work with I2P more efficiently, and users don't need to " -"worry\n" +"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n" +"within the existing infrastructure of various communities, so that application\n" +"developers can work with I2P more efficiently, and users don't need to worry\n" "about the details." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43 msgid "" -"The I2P client libraries are now available on `Maven Central`__ ! See our" -"\n" +"The I2P client libraries are now available on `Maven Central`__ ! See our\n" "`previous blog post`__ for full details.\n" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58 msgid "" -"The `I2P Android client library`__ has also been updated to use the new " -"I2P\n" -"libraries. This means that cross-platform applications can work natively " -"with\n" +"The `I2P Android client library`__ has also been updated to use the new I2P\n" +"libraries. This means that cross-platform applications can work natively with\n" "either I2P Android or desktop I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71 msgid "" -"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work" -"\n" +"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n" "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n" -"`documentation`__ for usage instructions, and report any issues on " -"`GitHub`__." +"`documentation`__ for usage instructions, and report any issues on `GitHub`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84 msgid "" -"The first (beta) version of ``i2psocket`` has been released! This is a " -"direct\n" -"replacement for the standard Python ``socket`` library that extends it " -"with I2P\n" -"support over the SAM API. See its `GitHub page`__ for usage instructions," -" and\n" +"The first (beta) version of ``i2psocket`` has been released! This is a direct\n" +"replacement for the standard Python ``socket`` library that extends it with I2P\n" +"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n" "to report any issues." msgstr "" @@ -5935,15 +5496,15 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98 msgid "" -"zzz has been hard at work on Syndie, getting a headstart on Plugins " -"month. You can follow his progress on `the development forum thread`__." +"zzz has been hard at work on Syndie, getting a headstart on Plugins month. " +"You can follow his progress on `the development forum thread`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100 msgid "" -"psi has been creating an I2P test network using i2pd, and in the process " -"has found and fixed several i2pd bugs that will improve its compatibility" -" with Java I2P." +"psi has been creating an I2P test network using i2pd, and in the process has" +" found and fixed several i2pd bugs that will improve its compatibility with " +"Java I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104 @@ -5954,21 +5515,16 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109 msgid "" -"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a " -"long time\n" -"been home to one of the `largest public grids`__, using a patched version" -" of\n" -"Tahoe-LAFS. During Apps month we will be helping them with their ongoing " -"work to\n" -"add native support for I2P and Tor, so that I2P users can benefit from " -"all of\n" +"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n" +"been home to one of the `largest public grids`__, using a patched version of\n" +"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n" +"add native support for I2P and Tor, so that I2P users can benefit from all of\n" "the improvements upstream." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117 msgid "" -"There are several other projects that we will be talking with about their" -" plans\n" +"There are several other projects that we will be talking with about their plans\n" "for I2P integration, and helping with design. Stay tuned!" msgstr "" @@ -5986,16 +5542,9 @@ msgstr "0.9.27 ë²„ì „ì€ ë²„ê·¸ 픽스를 í¬í•¨í•˜ê³ 있습니다" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18 msgid "" "0.9.27 contains a number of bug fixes.\n" -"The updated GMP library for crypto acceleration, which was bundled in the" -" 0.9.26 release for new installs and Debian builds only, is now included " -"in the in-network update for 0.9.27.\n" -"There are improvements in IPv6 transports, SSU peer testing, and hidden " -"mode." -msgstr "" -"0.9.27 ì€ ë§Žì€ ë²„ê·¸í”½ìŠ¤ë¥¼ í¬í•¨í•©ë‹ˆë‹¤.\n" -"ì´ë¯¸ 0.9.26 ë²„ì „ì˜ ìƒˆ 설치íŒê³¼ ë°ë¹„안 빌드ì—서는 í¬í•¨ë˜ì—ˆë˜ 암호화 ê°€ì†ì„ 위한 GMP ë¼ì´ë¸ŒëŸ¬ë¦¬ ì—…ë°ì´íŠ¸ê°€ ì¸-ë„¤íŠ¸ì›Œí¬ " -"ì—…ë°ì´íŠ¸ íŒì—ë„ í¬í•¨ë©ë‹ˆë‹¤.\n" -"ë˜í•œ IPv6 프랜스í¬íŠ¸, SS 피어 테스팅, ížˆë“ ëª¨ë“œì˜ ì„±ëŠ¥ì„ í–¥ìƒì‹œì¼°ìŠµë‹ˆë‹¤." +"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n" +"There are improvements in IPv6 transports, SSU peer testing, and hidden mode." +msgstr "0.9.27 ì€ ë§Žì€ ë²„ê·¸í”½ìŠ¤ë¥¼ í¬í•¨í•©ë‹ˆë‹¤.\nì´ë¯¸ 0.9.26 ë²„ì „ì˜ ìƒˆ 설치íŒê³¼ ë°ë¹„안 빌드ì—서는 í¬í•¨ë˜ì—ˆë˜ 암호화 ê°€ì†ì„ 위한 GMP ë¼ì´ë¸ŒëŸ¬ë¦¬ ì—…ë°ì´íŠ¸ê°€ ì¸-ë„¤íŠ¸ì›Œí¬ ì—…ë°ì´íŠ¸ íŒì—ë„ í¬í•¨ë©ë‹ˆë‹¤.\në˜í•œ IPv6 프랜스í¬íŠ¸, SS 피어 테스팅, ížˆë“ ëª¨ë“œì˜ ì„±ëŠ¥ì„ í–¥ìƒì‹œì¼°ìŠµë‹ˆë‹¤." #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24 msgid "" @@ -6092,29 +5641,17 @@ msgstr "0.9.28는 버그 픽스를 í¬í•¨í•˜ê³ 있습니다" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18 msgid "" -"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number " -"of bundled software packages including Jetty.\n" -"There are fixes for the IPv6 peer testing feature introduced last " -"release.\n" -"We continue improvements to detect and block peers that are potentially " -"malicious.\n" -"There are preliminary fixes for Java 9, although we do not yet recommend " -"Java 9 for general use." -msgstr "" -"0.9.28ì—서는 25 Tracì´ ë„˜ëŠ” Ticketë“¤ì„ í”½ìŠ¤í–ˆìœ¼ë©°, Jetty를 í¬í•¨í•œ ë§Žì€ ìˆ˜ì˜ ì†Œí”„íŠ¸ì›¨ì–´ 패키지를 ì—…ë°ì´íŠ¸ " -"하였습니다.\n" -"해당 í”½ìŠ¤ë“¤ì€ ì§€ë‚œ ë¦´ë¦¬ì¦ˆì— ì†Œê°œë¬ì—ˆë˜ IPv6 피어 테스트 ê¸°ëŠ¥ì„ ìœ„í•œ 것입니다.\n" -"ë˜í•œ ìœ„í—˜í• ìˆ˜ 있는 í”¼ì–´ë“¤ì„ ê°ì§€í•˜ê³ 차단하는 기능ì—ë„ í–¥ìƒì„ ê±°ë“í•˜ê³ ìžˆìŠµë‹ˆë‹¤.\n" -"Java 9를 대비한 í”½ìŠ¤ë“¤ë„ ìžˆìœ¼ë‚˜, ì•„ì§ê¹Œì§€ëŠ” 해당 ìžë°” ë²„ì „ì„ ì‚¬ìš©í•˜ëŠ”ê²ƒì€ ê¶Œìž¥í•˜ì§€ 않습니다." +"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n" +"There are fixes for the IPv6 peer testing feature introduced last release.\n" +"We continue improvements to detect and block peers that are potentially malicious.\n" +"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "0.9.28ì—서는 25 Tracì´ ë„˜ëŠ” Ticketë“¤ì„ í”½ìŠ¤í–ˆìœ¼ë©°, Jetty를 í¬í•¨í•œ ë§Žì€ ìˆ˜ì˜ ì†Œí”„íŠ¸ì›¨ì–´ 패키지를 ì—…ë°ì´íŠ¸ 하였습니다.\n해당 í”½ìŠ¤ë“¤ì€ ì§€ë‚œ ë¦´ë¦¬ì¦ˆì— ì†Œê°œë¬ì—ˆë˜ IPv6 피어 테스트 ê¸°ëŠ¥ì„ ìœ„í•œ 것입니다.\në˜í•œ ìœ„í—˜í• ìˆ˜ 있는 í”¼ì–´ë“¤ì„ ê°ì§€í•˜ê³ 차단하는 기능ì—ë„ í–¥ìƒì„ ê±°ë“í•˜ê³ ìžˆìŠµë‹ˆë‹¤.\nJava 9를 대비한 í”½ìŠ¤ë“¤ë„ ìžˆìœ¼ë‚˜, ì•„ì§ê¹Œì§€ëŠ” 해당 ìžë°” ë²„ì „ì„ ì‚¬ìš©í•˜ëŠ”ê²ƒì€ ê¶Œìž¥í•˜ì§€ 않습니다." #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25 msgid "" -"I2P will be at 33C3, please stop by our table and give us your ideas on " -"how to improve the network.\n" +"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n" "We will review our 2017 roadmap and priorities 2017 at the Congress." -msgstr "" -"I2PíŒ€ì´ 33C3ì— ì°¸ê°€í•©ë‹ˆë‹¤. ì €í¬ í…Œì´ë¸”ì— ë“¤ë¦¬ì…”ì„œ 네트워í¬ë¥¼ í–¥ìƒí• 수 있는 ì¢‹ì€ ì•„ì´ë””ì–´ë“¤ì„ ë“¤ë ¤ì£¼ì„¸ìš”.\n" -"회ì˜ì—ì„œ ì €í¬ì˜ 2017ë…„ 로드맵과 개발 ìš°ì„ ìˆœìœ„ì— ëŒ€í•´ ë¦¬ë·°í• ê²ƒìž…ë‹ˆë‹¤." +msgstr "I2PíŒ€ì´ 33C3ì— ì°¸ê°€í•©ë‹ˆë‹¤. ì €í¬ í…Œì´ë¸”ì— ë“¤ë¦¬ì…”ì„œ 네트워í¬ë¥¼ í–¥ìƒí• 수 있는 ì¢‹ì€ ì•„ì´ë””ì–´ë“¤ì„ ë“¤ë ¤ì£¼ì„¸ìš”.\n회ì˜ì—ì„œ ì €í¬ì˜ 2017ë…„ 로드맵과 개발 ìš°ì„ ìˆœìœ„ì— ëŒ€í•´ ë¦¬ë·°í• ê²ƒìž…ë‹ˆë‹¤." #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50 msgid "Fix version test for SSU IPv6 peer testing" @@ -6289,22 +5826,13 @@ msgstr "0.9.29는 버그 픽스를 í¬í•¨í•©ë‹ˆë‹¤" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18 msgid "" -"0.9.29 contains fixes for numerous Trac tickets, including workarounds " -"for corrupt compressed messages.\n" +"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n" "We now support NTP over IPv6.\n" "We've added preliminary Docker support.\n" "We now have translated man pages.\n" "We now pass same-origin Referer headers through the HTTP proxy.\n" -"There are more fixes for Java 9, although we do not yet recommend Java 9 " -"for general use." -msgstr "" -"0.9.29ì—서는 corrupt compressed messagesì— ëŒ€í•œ 대책 등, Trac ticketì— ê´€í•œ 버그를 " -"ìˆ˜ì •í–ˆìŠµë‹ˆë‹¤.\n" -"ì´ì œ IPv6 NTP를 지ì›í•©ë‹ˆë‹¤.\n" -"preliminary Docker를 지ì›í•©ë‹ˆë‹¤.\n" -"번ì—ëœ man page를 지ì›í•©ë‹ˆë‹¤.\n" -"HTTP proxy를 통한 same-origin Referer headers를 여과하지 않습니다.\n" -"Java 9를 위한 몇가지 í”½ìŠ¤ë“¤ì„ í¬í•¨í•©ë‹ˆë‹¤ë§Œ ì•„ì§ ì¼ë°˜ì ì¸ ìš©ë„ì˜ ì‚¬ìš©ì„ ê¶Œìž¥í•˜ì§€ëŠ” 않습니다." +"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "0.9.29ì—서는 corrupt compressed messagesì— ëŒ€í•œ 대책 등, Trac ticketì— ê´€í•œ 버그를 ìˆ˜ì •í–ˆìŠµë‹ˆë‹¤.\nì´ì œ IPv6 NTP를 지ì›í•©ë‹ˆë‹¤.\npreliminary Docker를 지ì›í•©ë‹ˆë‹¤.\n번ì—ëœ man page를 지ì›í•©ë‹ˆë‹¤.\nHTTP proxy를 통한 same-origin Referer headers를 여과하지 않습니다.\nJava 9를 위한 몇가지 í”½ìŠ¤ë“¤ì„ í¬í•¨í•©ë‹ˆë‹¤ë§Œ ì•„ì§ ì¼ë°˜ì ì¸ ìš©ë„ì˜ ì‚¬ìš©ì„ ê¶Œìž¥í•˜ì§€ëŠ” 않습니다." #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37 msgid "BOB database refactor" @@ -6415,11 +5943,9 @@ msgstr "" #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18 msgid "" -"The 0.9.29 Windows installer posted on our website two days ago fails " -"during install with an Exception.\n" +"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n" "We have fixed the bug and posted the new installer to our website.\n" -"This does not affect upgrades from previous releases or non-Windows " -"installers.\n" +"This does not affect upgrades from previous releases or non-Windows installers.\n" "We apologize for the issue." msgstr "" @@ -6437,52 +5963,39 @@ msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18 msgid "" "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n" -"The previous versions are no longer supported, and are not available in " -"the upcoming Debian Stretch and Ubuntu Zesty releases." +"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23 msgid "" -"The router will migrate the jetty.xml configuration file for each Jetty " -"website to the new Jetty 9 setup.\n" -"This should work for recent, unmodified configurations but may not work " -"for modified or very old setups.\n" -"Verify that your Jetty website works after upgrading, and contact us on " -"IRC if you need assistance." +"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n" +"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n" +"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29 msgid "" "Several plugins are not compatible with Jetty 9 and must be updated.\n" -"The following plugins have been updated to work with 0.9.30, and your " -"router should update them after restart:" +"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35 msgid "" -"The following plugins (with current versions listed) will not work with " -"0.9.30.\n" +"The following plugins (with current versions listed) will not work with 0.9.30.\n" "Contact the appropriate plugin developer for the status of new versions:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41 msgid "" -"This release also supports migration of old (2014 and earlier) DSA-SHA1 " -"hidden services to the more-secure EdDSA signature type.\n" -"See http://zzz.i2p/topics/2271 for further information, including a guide" -" and FAQ." +"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n" +"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46 msgid "" -"Note: On non-Android ARM platforms such as the Raspberry Pi, the " -"blockfile database will upgrade on restart, which may take several " -"minutes.\n" +"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n" "Please be patient." -msgstr "" -"알림: Raspberry Pi와 ê°™ì€ ë¹„ 안드로ì´ë“œ ARM 플랫í¼ì—ì„œ, 블ë¡íŒŒì¼ ë°ì´í„°ë² ì´ìŠ¤ê°€ ìž¬ì‹œìž‘ì‹œì— ì‹¤í–‰ë˜ë©°, 몇 분 ì •ë„ " -"걸릴 수 있습니다.\n" -"ì¸ë‚´ì‹¬ì„ ê°€ì ¸ì£¼ì„¸ìš”." +msgstr "알림: Raspberry Pi와 ê°™ì€ ë¹„ 안드로ì´ë“œ ARM 플랫í¼ì—ì„œ, 블ë¡íŒŒì¼ ë°ì´í„°ë² ì´ìŠ¤ê°€ ìž¬ì‹œìž‘ì‹œì— ì‹¤í–‰ë˜ë©°, 몇 분 ì •ë„ ê±¸ë¦´ 수 있습니다.\nì¸ë‚´ì‹¬ì„ ê°€ì ¸ì£¼ì„¸ìš”." #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61 msgid "Jetty 9, Tomcat 8" @@ -6593,41 +6106,32 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11 msgid "" -"This year's Summer Dev will be focused on metrics collection and " -"performance improvements for the network." +"This year's Summer Dev will be focused on metrics collection and performance" +" improvements for the network." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13 msgid "" "It's that time of year again! We're embarking on our summer development\n" -"programme, where we focus on a particular aspect of I2P to push it " -"forward. For\n" -"the next three months, we'll be encouraging both new contributors and " -"existing\n" +"programme, where we focus on a particular aspect of I2P to push it forward. For\n" +"the next three months, we'll be encouraging both new contributors and existing\n" "community members to pick a task and have fun with it!" msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20 msgid "" -"`Last year`__, we focused on helping users and developers leverage I2P, " -"by\n" -"improving API tooling and giving some love to applications that run over " -"I2P.\n" -"This year, we want to improve the user experience by working on an aspect" -" that\n" +"`Last year`__, we focused on helping users and developers leverage I2P, by\n" +"improving API tooling and giving some love to applications that run over I2P.\n" +"This year, we want to improve the user experience by working on an aspect that\n" "affects everyone: performance." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29 msgid "" -"Despite onion-routing networks often being called \"low-latency\" " -"networks, there\n" -"is significant overhead created by routing traffic through additional " -"computers.\n" -"I2P's unidirectional tunnel design means that by default, a round trip " -"between\n" -"two Destinations will involve twelve participants! Improving the " -"performance of\n" +"Despite onion-routing networks often being called \"low-latency\" networks, there\n" +"is significant overhead created by routing traffic through additional computers.\n" +"I2P's unidirectional tunnel design means that by default, a round trip between\n" +"two Destinations will involve twelve participants! Improving the performance of\n" "these participants will help to both reduce the latency of end-to-end\n" "connections [1]_, and increase the quality of tunnels network-wide." msgstr "" @@ -6650,11 +6154,9 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52 msgid "" -"We can't tell if we improve performance without a baseline! We'll be " -"creating a\n" +"We can't tell if we improve performance without a baseline! We'll be creating a\n" "metrics system for collecting usage and performance data about I2P in a\n" -"privacy-preserving way, as well as porting various benchmarking tools to " -"run\n" +"privacy-preserving way, as well as porting various benchmarking tools to run\n" "over I2P (e.g. iperf3_)." msgstr "" @@ -6666,10 +6168,8 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66 msgid "" -"There's a lot of scope for improving the performance of our existing " -"code, to\n" -"e.g. reduce the overhead of participating in tunnels. We will be looking " -"at\n" +"There's a lot of scope for improving the performance of our existing code, to\n" +"e.g. reduce the overhead of participating in tunnels. We will be looking at\n" "potential improvements to:" msgstr "" @@ -6699,14 +6199,10 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86 msgid "" -"We have several open proposals for improving the scalability of the I2P " -"network\n" -"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We " -"will be\n" -"working on these proposals, and begin implementing the finalised ones in " -"the\n" -"various network routers. The more feedback these proposals receive, the " -"sooner\n" +"We have several open proposals for improving the scalability of the I2P network\n" +"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n" +"working on these proposals, and begin implementing the finalised ones in the\n" +"various network routers. The more feedback these proposals receive, the sooner\n" "we can roll them out, and the sooner I2P services can start using them!" msgstr "" @@ -6718,46 +6214,36 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106 msgid "" -"I2P is a packet-switched network, like the internet it runs on top of. " -"This\n" -"gives us significant flexibility in how we route packets, both for " -"performance\n" +"I2P is a packet-switched network, like the internet it runs on top of. This\n" +"gives us significant flexibility in how we route packets, both for performance\n" "and privacy. The majority of this flexibility is unexplored! We want to\n" -"encourage research into how various clearnet techniques for improving " -"bandwidth\n" +"encourage research into how various clearnet techniques for improving bandwidth\n" "can be applied to I2P, and how they might affect the privacy of network\n" "participants." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -"\n" -"protocols (cryptographic or otherwise), or researching future ideas - " -"come and\n" -"chat with us on IRC or Twitter! We are always happy to welcome newcomers " -"into\n" -"our community, both inside and outside the I2P network. We'll also be " -"sending\n" -"I2P stickers out to all new contributors taking part! If you want to chat" -" about\n" -"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You" -" can\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing\n" +"protocols (cryptographic or otherwise), or researching future ideas - come and\n" +"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n" +"our community, both inside and outside the I2P network. We'll also be sending\n" +"I2P stickers out to all new contributors taking part! If you want to chat about\n" +"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n" "also find us in #i2p-dev on OFTC or Freenode." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142 msgid "" -"Low-latency onion-routing networks are vulnerable to traffic confirmation" -" attacks, so it would be reasonable to ask whether improved performance " +"Low-latency onion-routing networks are vulnerable to traffic confirmation " +"attacks, so it would be reasonable to ask whether improved performance " "equates to reduced privacy. Some latency can help privacy if applied " "correctly via random delays or batching (neither of which are currently " -"employed by any general-purpose onion-routing network). However, if a " -"tunnel has uniform overall latency, then traffic confirmation attacks " -"should be just as viable with or without that latency; thus there should " -"be little statistical difference when the latency is reduced uniformly." +"employed by any general-purpose onion-routing network). However, if a tunnel" +" has uniform overall latency, then traffic confirmation attacks should be " +"just as viable with or without that latency; thus there should be little " +"statistical difference when the latency is reduced uniformly." msgstr "" #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1 @@ -6777,8 +6263,7 @@ msgid "" "We have refreshed the router console to make it easier to understand,\n" "improve accessibility and cross-browser support,\n" "and generally tidy things up.\n" -"This is the first step in a longer-term plan to make the router console " -"more user-friendly.\n" +"This is the first step in a longer-term plan to make the router console more user-friendly.\n" "We have also added torrent ratings and comments support to i2psnark." msgstr "" @@ -6848,16 +6333,10 @@ msgstr "" #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18 msgid "" -"0.9.32 contains a number of fixes in the router console and associated " -"webapps (addressbook, i2psnark, and susimail).\n" -"We have also changed the way we handle configured hostnames for published" -" router infos, to eliminate some network enumeration attacks via DNS.\n" +"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n" +"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n" "We have added some checks in the console to resist rebinding attacks." -msgstr "" -"0.9.32는 ë¼ìš°í„° 콘솔 ê·¸ë¦¬ê³ ê´€ë ¨ëœ ì›¹ 앱 (주소ë¡, i2psnark, susimail)ì˜ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤.\n" -"ë˜í•œ DNS를 통한 몇몇 ë„¤íŠ¸ì›Œí¬ ì—´ê±° ê³µê²©ì„ ì œê±°í•˜ê¸° 위해, ê²Œì‹œëœ ë¼ìš°í„° ì •ë³´ë¥¼ 위해 ì„¤ì •ëœ í˜¸ìŠ¤íŠ¸ ì´ë¦„ì„ ì²˜ë¦¬í•˜ëŠ” ë°©ë²•ì„ " -"변경했습니다.\n" -"리바ì¸ë”© ê³µê²©ì— ì €í•í•˜ê¸° 위해 ì½˜ì†”ì— ëª‡ëª‡ ê²€ì‚¬ë“¤ì„ ì¶”ê°€í–ˆìŠµë‹ˆë‹¤." +msgstr "0.9.32는 ë¼ìš°í„° 콘솔 ê·¸ë¦¬ê³ ê´€ë ¨ëœ ì›¹ 앱 (주소ë¡, i2psnark, susimail)ì˜ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤.\në˜í•œ DNS를 통한 몇몇 ë„¤íŠ¸ì›Œí¬ ì—´ê±° ê³µê²©ì„ ì œê±°í•˜ê¸° 위해, ê²Œì‹œëœ ë¼ìš°í„° ì •ë³´ë¥¼ 위해 ì„¤ì •ëœ í˜¸ìŠ¤íŠ¸ ì´ë¦„ì„ ì²˜ë¦¬í•˜ëŠ” ë°©ë²•ì„ ë³€ê²½í–ˆìŠµë‹ˆë‹¤.\n리바ì¸ë”© ê³µê²©ì— ì €í•í•˜ê¸° 위해 ì½˜ì†”ì— ëª‡ëª‡ ê²€ì‚¬ë“¤ì„ ì¶”ê°€í–ˆìŠµë‹ˆë‹¤." #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34 msgid "Disallow hostnames in router addresses (proposal 141)" @@ -6897,18 +6376,11 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17 msgid "" -"0.9.33 contains a large number of bug fixes, including i2psnark, " -"i2ptunnel, streaming, and SusiMail.\n" -"For those who cannot access the reseed sites directly, we now support " -"several types of proxies for reseeding.\n" +"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n" +"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n" "We now set rate limits by default in the hidden services manager.\n" -"For those that run high-traffic servers, please review and adjust the " -"limits as necessary." -msgstr "" -"0.9.33ì€ i2psnark, i2ptunnel, 스트리ë°, SusiMailì„ í¬í•¨í•œ ë§Žì€ ìˆ˜ì˜ ë²„ê·¸ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤.\n" -"ìž¬ì‹œë”©ëœ ì‚¬ì´íŠ¸ë¥¼ 바로 ì ‘ê·¼í•˜ì§€ 못하는 ë¶„ë“¤ì„ ìœ„í•´, ì´ì œ ìž¬ì‹œë”©ì„ ìœ„í•œ 여러 ì¢…ë¥˜ì˜ í”„ë¡ì‹œë¥¼ 지ì›í•©ë‹ˆë‹¤.\n" -"ížˆë“ ì„œë¹„ìŠ¤ ë§¤ë‹ˆì €ëŠ” ì´ì œ ì „ì†¡ ì œí•œì„ ê¸°ë³¸ìœ¼ë¡œ ì„¤ì •í•©ë‹ˆë‹¤.\n" -"ë†’ì€ íŠ¸ëž˜í”½ ì„œë²„ë“¤ì„ ìš´ì˜í•˜ëŠ” 경우, ê²€í† í›„ì— í•„ìš”ì— ë§žê²Œ 다시 ì œí•œì„ ì¡°ì ˆí•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤." +"For those that run high-traffic servers, please review and adjust the limits as necessary." +msgstr "0.9.33ì€ i2psnark, i2ptunnel, 스트리ë°, SusiMailì„ í¬í•¨í•œ ë§Žì€ ìˆ˜ì˜ ë²„ê·¸ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤.\nìž¬ì‹œë”©ëœ ì‚¬ì´íŠ¸ë¥¼ 바로 ì ‘ê·¼í•˜ì§€ 못하는 ë¶„ë“¤ì„ ìœ„í•´, ì´ì œ ìž¬ì‹œë”©ì„ ìœ„í•œ 여러 ì¢…ë¥˜ì˜ í”„ë¡ì‹œë¥¼ 지ì›í•©ë‹ˆë‹¤.\nížˆë“ ì„œë¹„ìŠ¤ ë§¤ë‹ˆì €ëŠ” ì´ì œ ì „ì†¡ ì œí•œì„ ê¸°ë³¸ìœ¼ë¡œ ì„¤ì •í•©ë‹ˆë‹¤.\në†’ì€ íŠ¸ëž˜í”½ ì„œë²„ë“¤ì„ ìš´ì˜í•˜ëŠ” 경우, ê²€í† í›„ì— í•„ìš”ì— ë§žê²Œ 다시 ì œí•œì„ ì¡°ì ˆí•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤." #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34 msgid "DesktopGui: Enable on OSX" @@ -6995,7 +6467,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62 -msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies" +msgid "" +"SusuMail: Fix bugs corrupting text attachments and large message bodies" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63 @@ -7062,8 +6535,7 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83 msgid "" -"Debian: Remove ecj dependency; replace glassfish with libtaglibs where " -"able" +"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84 @@ -7133,12 +6605,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13 msgid "" -"One of the many things we discussed at 34C3 was what we should focus on " -"for the\n" -"coming year. In particular, we wanted a roadmap that was clear about what" -" we\n" -"want to ensure we get done, vs what would be really nice to have, and be " -"able to\n" +"One of the many things we discussed at 34C3 was what we should focus on for the\n" +"coming year. In particular, we wanted a roadmap that was clear about what we\n" +"want to ensure we get done, vs what would be really nice to have, and be able to\n" "help onboard newcomers to either category. Here is what we came up with:" msgstr "" @@ -7150,14 +6619,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25 msgid "" -"Many of the current primitives and protocols still retain their original " -"designs\n" -"from circa 2005, and need improvement. We have had a number of open " -"proposals\n" -"for several years with ideas, but forward progress has been slow. We all " -"agreed\n" -"that this needs to be our top priority for 2018. The core components are:" -"\n" +"Many of the current primitives and protocols still retain their original designs\n" +"from circa 2005, and need improvement. We have had a number of open proposals\n" +"for several years with ideas, but forward progress has been slow. We all agreed\n" +"that this needs to be our top priority for 2018. The core components are:\n" "\n" "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n" "- New onion-encryption protocol for building and using tunnels.\n" @@ -7176,8 +6641,7 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50 msgid "" -"We cannot release new protocol specifications across the entire network " -"without\n" +"We cannot release new protocol specifications across the entire network without\n" "work on all of these areas." msgstr "" @@ -7189,31 +6653,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60 msgid "" -"One of the benefits of starting the above work now, is that over the last" -" few\n" +"One of the benefits of starting the above work now, is that over the last few\n" "years there have been independent efforts to create simple protocols and\n" -"protocol frameworks that achieve many of the aims we have for our own " -"protocols,\n" -"and have gained traction with the wider community. By leveraging this " -"work, we\n" +"protocol frameworks that achieve many of the aims we have for our own protocols,\n" +"and have gained traction with the wider community. By leveraging this work, we\n" "get a \"force multiplier\" effect:\n" "\n" -"- We benefit from protocol designs, security proofs, and code written by " -"others,\n" +"- We benefit from protocol designs, security proofs, and code written by others,\n" " reducing the amount of work we need to do for the same level of\n" " feature-completeness and security assurances.\n" "\n" -"- Work we do can be leveraged by other communities, increasing their " -"interest in\n" +"- Work we do can be leveraged by other communities, increasing their interest in\n" " collaborating with us, and thinking about I2P as a whole." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76 msgid "" -"My proposals in particular will be leveraging the `Noise Protocol " -"Framework`_,\n" -"and the `SPHINX packet format`_. I have collaborations lined up with " -"several\n" +"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n" +"and the `SPHINX packet format`_. I have collaborations lined up with several\n" "people outside I2P for these!" msgstr "" @@ -7225,16 +6682,11 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90 msgid "" -"On that topic, we've been slowly building interest over the last six " -"months or\n" -"so. Across PETS2017, 34C3, and RWC2018, I've had some very good " -"discussions\n" -"about ways in which we can improve collaboration with the wider " -"community. This\n" -"is really important to ensure we can garner as much review as possible " -"for new\n" -"protocols. The biggest blocker I've seen is the fact that the majority of" -" I2P\n" +"On that topic, we've been slowly building interest over the last six months or\n" +"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n" +"about ways in which we can improve collaboration with the wider community. This\n" +"is really important to ensure we can garner as much review as possible for new\n" +"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n" "development collaboration currently happens inside I2P itself, which\n" "significantly increases the effort required to contribute." msgstr "" @@ -7243,8 +6695,7 @@ msgstr "" msgid "" "The two priorities in this area are:\n" "\n" -"- Set up a project-run development forum that is accessible both inside " -"and\n" +"- Set up a project-run development forum that is accessible both inside and\n" " outside I2P.\n" "\n" "- Set up mailing lists for review and discussion of proposals (possibly\n" @@ -7255,21 +6706,17 @@ msgstr "" msgid "" "Other goals which are classed as nice-to-have:\n" "\n" -"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit" -"\n" -" clearnet contributions on GitHub while keeping the canonical dev " -"environment\n" +"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n" +" clearnet contributions on GitHub while keeping the canonical dev environment\n" " on Monotone.\n" "\n" -"- Write a \"position paper\" that accurately explains I2P to academic " -"audiences,\n" +"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n" " and puts it in context with existing literature." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123 msgid "" -"I expect that collaborations with people outside I2P will be done " -"entirely on\n" +"I expect that collaborations with people outside I2P will be done entirely on\n" "GitHub, for minimal friction." msgstr "" @@ -7281,24 +6728,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133 msgid "" -"I2P is now in Debian Sid (their unstable repo) which will stablilise in " -"around a\n" +"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n" "year and a half, and has also been pulled into the Ubuntu repository for\n" -"inclusion in the next LTS release in April. We are going to start having " -"I2P\n" -"versions that end up hanging around for years, and we need to ensure we " -"can\n" +"inclusion in the next LTS release in April. We are going to start having I2P\n" +"versions that end up hanging around for years, and we need to ensure we can\n" "handle their presence in the network." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141 msgid "" -"The primary goal here is to roll out as many of the new protocols as we " -"feasibly\n" -"can in the next year, to hit the next Debian stable release. For those " -"that\n" -"require multi-year rollouts, we should incorporate the forward-" -"compatability\n" +"The primary goal here is to roll out as many of the new protocols as we feasibly\n" +"can in the next year, to hit the next Debian stable release. For those that\n" +"require multi-year rollouts, we should incorporate the forward-compatability\n" "changes as early as we can." msgstr "" @@ -7310,32 +6751,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153 msgid "" -"The Debian model encourages having separate packages for separate " -"components. We\n" -"agreed that decoupling the currently-bundled Java applications from the " -"core\n" +"The Debian model encourages having separate packages for separate components. We\n" +"agreed that decoupling the currently-bundled Java applications from the core\n" "Java router would be beneficial for several reasons:\n" "\n" "- It codifies the boundary between the applications and the router.\n" "\n" -"- It should make it easier to get these apps running with non-Java " -"routers.\n" +"- It should make it easier to get these apps running with non-Java routers.\n" "\n" -"- It would enable third parties to create \"I2P bundles\" containing just" -" the\n" +"- It would enable third parties to create \"I2P bundles\" containing just the\n" " applications they want." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167 msgid "" -"In combination with the earlier priorities, this moves the main I2P " -"project more\n" -"in the direction of e.g. the Linux kernel. We will spend more time " -"focusing on\n" -"the network itself, leaving third-party developers to focus on " -"applications that\n" -"use the network (something that is significantly easier to do after our " -"work in\n" +"In combination with the earlier priorities, this moves the main I2P project more\n" +"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n" +"the network itself, leaving third-party developers to focus on applications that\n" +"use the network (something that is significantly easier to do after our work in\n" "the last few years on APIs and libraries)." msgstr "" @@ -7347,25 +6780,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180 msgid "" -"There are a bunch of app-level improvements that we want to work on, but " -"do not\n" -"currently have the developer time to do so, given our other priorities. " -"This is\n" -"an area we would love to see new contributors for! Once the above " -"decoupling is\n" -"complete, it will be significantly easier for someone to work on a " -"specific\n" +"There are a bunch of app-level improvements that we want to work on, but do not\n" +"currently have the developer time to do so, given our other priorities. This is\n" +"an area we would love to see new contributors for! Once the above decoupling is\n" +"complete, it will be significantly easier for someone to work on a specific\n" "application independently of the main Java router." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188 msgid "" -"One such application we would love to have help with is I2P Android. We " -"will be\n" -"keeping it up-to-date with the core I2P releases, and fixing bugs as we " -"can, but\n" -"there is much that could be done to improve the underlying code as well " -"as the\n" +"One such application we would love to have help with is I2P Android. We will be\n" +"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n" +"there is much that could be done to improve the underlying code as well as the\n" "usability." msgstr "" @@ -7377,14 +6803,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200 msgid "" -"Having said that, we do want to work specifically on Susimail and I2P-" -"Bote fixes\n" -"in the near term (some of which have landed in 0.9.33). They have had " -"less work\n" -"over the last few years than other I2P apps, and so we want to spend some" -" time\n" -"bringing their codebases up to par, and making them easier for new " -"contributors\n" +"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n" +"in the near term (some of which have landed in 0.9.33). They have had less work\n" +"over the last few years than other I2P apps, and so we want to spend some time\n" +"bringing their codebases up to par, and making them easier for new contributors\n" "to jump into!" msgstr "" @@ -7396,14 +6818,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213 msgid "" -"We have a large backlog of tickets in a number of I2P subsystems and " -"apps. As\n" -"part of the above stabilisation effort, we would love to clean up some of" -" our\n" -"older long-standing issues. More importantly, we want to ensure that our " -"tickets\n" -"are correctly organised, so that new contributors can find good tickets " -"to work\n" +"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n" +"part of the above stabilisation effort, we would love to clean up some of our\n" +"older long-standing issues. More importantly, we want to ensure that our tickets\n" +"are correctly organised, so that new contributors can find good tickets to work\n" "on." msgstr "" @@ -7415,12 +6833,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226 msgid "" -"One aspect of the above we will be focusing on is keeping in touch with " -"users\n" -"who take the time to report issues. Thank you! The smaller we can make " -"the\n" -"feedback loop, the quicker we can resolve problems that new users face, " -"and the\n" +"One aspect of the above we will be focusing on is keeping in touch with users\n" +"who take the time to report issues. Thank you! The smaller we can make the\n" +"feedback loop, the quicker we can resolve problems that new users face, and the\n" "more likely it is that they keep participating in the community." msgstr "" @@ -7432,15 +6847,13 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238 msgid "" -"That all looks very ambitious, and it is! But many of the items above " -"overlap,\n" +"That all looks very ambitious, and it is! But many of the items above overlap,\n" "and with careful planning we can make a serious dent in them." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243 msgid "" -"If you are interested in helping with any of the goals above, come chat " -"to us!\n" +"If you are interested in helping with any of the goals above, come chat to us!\n" "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)." msgstr "" @@ -7466,16 +6879,10 @@ msgstr "" #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17 msgid "" "0.9.34 contains a lot of bug fixes!\n" -"It also has improvements in SusiMail, IPv6 handling, and tunnel peer " -"selection.\n" +"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n" "We add support for IGD2 schemas in UPnP.\n" -"There's also preparation for more improvements you will see in future " -"releases." -msgstr "" -"0.9.34는 ì—„ì² ë§Žì€ ë²„ê·¸ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤!\n" -"ë˜í•œ SusiMailê³¼ IPv6 처리, í„°ë„ í”¼ì–´ ì„ íƒì— ê´€ë ¨í•´ ê°œì„ ì´ ì´ë£¨ì–´ì¡ŒìŠµë‹ˆë‹¤.\n" -"UPnPì˜ IGD2 스키마 지ì›ì„ 추가했습니다.\n" -"ê·¸ë¦¬ê³ ì¶”í›„ 릴리즈ì—ì„œ 보게 ë 여러 ê°œì„ ì‚¬í•ì„ 위해 준비를 했습니다." +"There's also preparation for more improvements you will see in future releases." +msgstr "0.9.34는 ì—„ì² ë§Žì€ ë²„ê·¸ ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤!\në˜í•œ SusiMailê³¼ IPv6 처리, í„°ë„ í”¼ì–´ ì„ íƒì— ê´€ë ¨í•´ ê°œì„ ì´ ì´ë£¨ì–´ì¡ŒìŠµë‹ˆë‹¤.\nUPnPì˜ IGD2 스키마 지ì›ì„ 추가했습니다.\nê·¸ë¦¬ê³ ì¶”í›„ 릴리즈ì—ì„œ 보게 ë 여러 ê°œì„ ì‚¬í•ì„ 위해 준비를 했습니다." #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34 msgid "SusiMail: Improved startup and memory management" @@ -7537,23 +6944,19 @@ msgstr "0.9.35ì—ì„œ SusiMail í´ë”와 SSL 마법사 추가" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16 msgid "" -"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for " -"setting up HTTPS on your Hidden Service website.\n" +"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n" "We also have the usual collection of bug fixes, especially in SusiMail." -msgstr "" -"0.9.35ì—ì„œ SusiMail í´ë” 지ì›ê³¼ ížˆë“ ì„œë¹„ìŠ¤ 웹사ì´íŠ¸ë¥¼ 위한 HTTPS를 ì„¤ì •í•˜ëŠ” SSL 마법사가 추가ë˜ì—ˆìŠµë‹ˆë‹¤.\n" -"ë˜í•œ 특히 SusiMailì—ì„œ, í‰ì†Œì²˜ëŸ¼ 버그 ìˆ˜ì •ì„ í–ˆìŠµë‹ˆë‹¤." +msgstr "0.9.35ì—ì„œ SusiMail í´ë” 지ì›ê³¼ ížˆë“ ì„œë¹„ìŠ¤ 웹사ì´íŠ¸ë¥¼ 위한 HTTPS를 ì„¤ì •í•˜ëŠ” SSL 마법사가 추가ë˜ì—ˆìŠµë‹ˆë‹¤.\në˜í•œ 특히 SusiMailì—ì„œ, í‰ì†Œì²˜ëŸ¼ 버그 ìˆ˜ì •ì„ í–ˆìŠµë‹ˆë‹¤." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21 msgid "" "We're hard at work on several things for 0.9.36, including a new OSX " "installer and a faster, more secure transport protocol called NTCP2." -msgstr "" -"ì €í¬ëŠ” 0.9.36ì„ ìœ„í•´, NTCP2ë¼ ë¶ˆë¦¬ëŠ” ë” ë¹ ë¥´ê³ ì•ˆì „í•œ ì „ì†¡ í”„ë¡œí† ì½œê³¼ 새 OSX 설치 í”„ë¡œê·¸ëž¨ì„ í¬í•¨í•œ 여러가지를 " -"열심히 ìž‘ì—… 중입니다." +msgstr "ì €í¬ëŠ” 0.9.36ì„ ìœ„í•´, NTCP2ë¼ ë¶ˆë¦¬ëŠ” ë” ë¹ ë¥´ê³ ì•ˆì „í•œ ì „ì†¡ í”„ë¡œí† ì½œê³¼ 새 OSX 설치 í”„ë¡œê·¸ëž¨ì„ í¬í•¨í•œ 여러가지를 열심히 ìž‘ì—… 중입니다." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25 -msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" +msgid "" +"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" msgstr "I2P는 7ì›” 20-22ì¼ì— New York Cityì—ì„œ 열리는 HOPEì— ìžˆì„ ì˜ˆì •ìž…ë‹ˆë‹¤. ì €í¬ë¥¼ 찾아서 반가운 ì¸ì‚¬ 남겨주세요!" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39 @@ -7573,7 +6976,8 @@ msgid "CPUID: Fix TBM detection" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48 -msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled" +msgid "" +"i2psnark: Fix torrents ignoring priority settings when autostart enabled" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49 @@ -7649,25 +7053,16 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:20 msgid "" -"I2P's transport protocols were originally developed around 15 years ago. " -"Back \n" -"then, the main goal was to hide the transferred data, not to hide the " -"fact that \n" -"one was using the protocol itself. Nobody thought seriously about " -"protecting \n" -"against DPI (deep packets inspection) and protocols censorship. Times " -"change, \n" -"and even though original transport protocols are still providing strong " -"security, \n" -"there was a demand for a new transport protocol. NTCP2 is designed to " -"resist \n" -"current censorship threats. Mainly, DPI analysis of packets length. Plus," -" the new \n" -"protocol uses the most modern cryptography developments. NTCP2 is based " -"on the \n" +"I2P's transport protocols were originally developed around 15 years ago. Back \n" +"then, the main goal was to hide the transferred data, not to hide the fact that \n" +"one was using the protocol itself. Nobody thought seriously about protecting \n" +"against DPI (deep packets inspection) and protocols censorship. Times change, \n" +"and even though original transport protocols are still providing strong security, \n" +"there was a demand for a new transport protocol. NTCP2 is designed to resist \n" +"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n" +"protocol uses the most modern cryptography developments. NTCP2 is based on the \n" "`Noise Protocol Framework`_, with SHA256 \n" -"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) " -"key \n" +"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n" "exchange." msgstr "" @@ -7689,23 +7084,17 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:59 msgid "" -"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of " -"ElGamal \n" -"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, " -"and uses \n" -"SipHash for obfuscating the packet's length information. The key " -"derivation \n" +"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n" +"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n" +"SipHash for obfuscating the packet's length information. The key derivation \n" "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:66 msgid "" -"i2pd (C++) implementation note: All of the algorithms mentioned above, " -"except \n" -"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the " -"coming \n" -"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is " -"used in \n" +"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n" +"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n" +"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n" "most of the current systems, core i2pd developer \n" "`Jeff Becker`_ has contributed standalone \n" "implementations of missing cryptographic algorithms." @@ -7719,40 +7108,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:82 msgid "" -"NTCP2 requires having a third (x25519) key in addition to existing two " -"(the \n" -"encryption and signature keys). It is called a static key and it has to " -"be added \n" -"to any of RouterInfo addresses as an \"s\" parameter. It is required for " -"both \n" -"NTCP2 initiator (Alice) and responder (Bob). If more than one address " -"supports \n" -"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for " -"all of \n" -"them. Alice's address is allowed to have just the \"s\" parameter without" -" \"host\" \n" -"and \"port\" set. Also, a \"v\" parameter is required, that is currently " -"always set \n" +"NTCP2 requires having a third (x25519) key in addition to existing two (the \n" +"encryption and signature keys). It is called a static key and it has to be added \n" +"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n" +"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n" +"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n" +"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n" +"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n" "to \"2\"." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:93 msgid "" -"NTCP2 address can be declared as a separate NTCP2 address or as an old-" -"style \n" -"NTCP address with additional parameters, in which case it will accept " -"both \n" -"NTCP and NTCP2 connections. Java I2P implementation uses the second " -"approach, \n" +"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n" +"NTCP address with additional parameters, in which case it will accept both \n" +"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n" "i2pd (C++ implementation) uses the first." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:100 msgid "" -"If a node accepts NTCP2 connections, it has to publish its RouterInfo " -"with the \n" -"\"i\" parameter, which is used as an initialization vector (IV) for the " -"public \n" +"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n" +"\"i\" parameter, which is used as an initialization vector (IV) for the public \n" "encryption key when that node establishes new connections." msgstr "" @@ -7764,14 +7141,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:111 msgid "" -"To establish a connection both sides need to generate pairs of ephemeral " -"x25519 \n" -"keys. Based on those keys and \"static\" keys they derive a set of keys " -"for data \n" -"transferring. Both parties must verify that the other side actually has a" -" \n" -"private key for that static key, and that static key is the same as in " -"RouterInfo." +"To establish a connection both sides need to generate pairs of ephemeral x25519 \n" +"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n" +"transferring. Both parties must verify that the other side actually has a \n" +"private key for that static key, and that static key is the same as in RouterInfo." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:118 @@ -7780,29 +7153,23 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:131 msgid "" -"A common x25519 key, called «input key material», is computed for each " -"message, \n" -"after which message encryption key is generated with a MixKey function. A" -" value \n" +"A common x25519 key, called «input key material», is computed for each message, \n" +"after which message encryption key is generated with a MixKey function. A value \n" "ck (chaining key) is kept while messages are being exchanged. \n" -"That value is used as a final input when generating keys for data " -"transferring." +"That value is used as a final input when generating keys for data transferring." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:138 msgid "" -"MixKey function looks something like this in the C++ implementation of " -"I2P:" +"MixKey function looks something like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:159 msgid "" -"**SessionRequest** message is made of a public x25519 Alice key (32 " -"bytes), a \n" +"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n" "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n" "(16 bytes) and some random data in the end (padding). Padding length is \n" -"defined in the encrypted block of data. Encrypted block also contains " -"length of \n" +"defined in the encrypted block of data. Encrypted block also contains length of \n" "the second part of the **SessionConfirmed** message. A block of data is \n" "encrypted and signed with a key derived from Alice's ephemeral key and \n" "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n" @@ -7811,38 +7178,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:170 msgid "" -"Since 32 bytes of public x25519 key can be detected by DPI, it is " -"encrypted with \n" -"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" " -"parameter \n" +"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n" +"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n" "from RouterInfo as an initialization vector (IV)." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:176 msgid "" -"**SessionCreated** message has the same structure as **SessionRequest**, " -"except \n" -"the key is computed based on ephemeral keys of both sides. IV generated " -"after \n" -"encrypting/decrypting public key from **SessionRequest** message is used " -"as IV \n" +"**SessionCreated** message has the same structure as **SessionRequest**, except \n" +"the key is computed based on ephemeral keys of both sides. IV generated after \n" +"encrypting/decrypting public key from **SessionRequest** message is used as IV \n" "for encrypting/decrypting ephemeral public key." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:183 msgid "" "**SessionConfirmed** message has 2 parts: public static key and Alice's \n" -"RouterInfo. The difference from previous messages is that ephemeral " -"public key \n" -"is encrypted with AEAD/Chaha20/Poly1305 using the same key as " -"**SessionCreated**. \n" +"RouterInfo. The difference from previous messages is that ephemeral public key \n" +"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n" "It leads to increasing first part of the message from 32 to 48 bytes. \n" -"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a" -" new \n" -"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo" -" part \n" -"can also be appended with random data padding, but it is not required, " -"since \n" +"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n" +"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n" +"can also be appended with random data padding, but it is not required, since \n" "RouterInfo usually has various length." msgstr "" @@ -7854,29 +7211,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:199 msgid "" -"If every hash and key verification has succeeded, a common ck value must " -"be \n" -"present after the last MixKey operation on both sides. This value is used" -" to \n" -"generate two sets of keys <k, sipk, sipiv> for each side of a connection." -" \"k\" is \n" -"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an " -"initial \n" +"If every hash and key verification has succeeded, a common ck value must be \n" +"present after the last MixKey operation on both sides. This value is used to \n" +"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n" +"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n" "value for SipHash IV, that is changed after each use." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:207 msgid "" -"Code used to generate keys looks like this in the C++ implementation of " -"I2P:" +"Code used to generate keys looks like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:246 msgid "" -"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array " -"are a \n" -"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, " -"but i2pd \n" +"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n" +"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n" "handles them as a single 16 bytes key." msgstr "" @@ -7903,28 +7253,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:271 msgid "" -"Message length is obfuscated by applying the XOR function with two first " -"bytes \n" +"Message length is obfuscated by applying the XOR function with two first bytes \n" "of the current SipHash IV." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:276 msgid "" -"Encrypted data part contains blocks of data. Each block is prepended with" -" 3 \n" -"bytes header, that defines block type and block length. Generally, I2NP " -"type \n" -"blocks are transferred, that are I2NP messages with an altered header. " -"One NTCP2 \n" +"Encrypted data part contains blocks of data. Each block is prepended with 3 \n" +"bytes header, that defines block type and block length. Generally, I2NP type \n" +"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n" "frame can transfer multiple I2NP blocks." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:283 msgid "" -"The other important data block type is a random data block. It is " -"recommended to \n" -"add a random data block to every NTCP2 frame. Only one random data block " -"can be \n" +"The other important data block type is a random data block. It is recommended to \n" +"add a random data block to every NTCP2 frame. Only one random data block can be \n" "added and it must be the last block." msgstr "" @@ -7934,12 +7278,8 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:293 msgid "" -"- RouterInfo — usually contains Bob's RouterInfo after the connection " -"has been established, but it can also contain RouterInfo of a random node" -" for the purpose of speeding up floodfills (there is a flags field for " -"that case). \n" -"- Termination — is used when a host explicitly terminates a connection " -"and specifies a reason for that.\n" +"- RouterInfo — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n" +"- Termination — is used when a host explicitly terminates a connection and specifies a reason for that.\n" "- DateTime — a current time in seconds." msgstr "" @@ -7951,14 +7291,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:305 msgid "" -"The new I2P transport protocol NTCP2 provides effective resistance " -"against DPI \n" -"censorship. It also results in reduced CPU load because of the faster, " -"modern \n" -"cryptography used. It makes I2P more likely to run on low-end devices, " -"such as \n" -"smartphones and home routers. Both major I2P implementations have full " -"support \n" +"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n" +"censorship. It also results in reduced CPU load because of the faster, modern \n" +"cryptography used. It makes I2P more likely to run on low-end devices, such as \n" +"smartphones and home routers. Both major I2P implementations have full support \n" "for NTCP2 and it make NTCP2 available for use starting with version \n" "0.9.36 (Java) and 2.20 (i2pd, C++)." msgstr "" @@ -8044,7 +7380,8 @@ msgid "i2psnark: Add icon for comments" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60 -msgid "i2ptunnel: Change read timeout defaults to account for streaming changes" +msgid "" +"i2ptunnel: Change read timeout defaults to account for streaming changes" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61 @@ -8069,7 +7406,8 @@ msgid "0.9.37 with NTCP2 enabled" msgstr "0.9.37ì—ì„œ NTCP2ê°€ 활성화ë˜ì—ˆìŠµë‹ˆë‹¤." #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16 -msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2." +msgid "" +"0.9.37 enables the faster, more secure transport protocol called NTCP2." msgstr "" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30 @@ -8110,27 +7448,19 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:18 msgid "" "`Invisible Internet Project`_ (I2P) provides a framework for\n" -"developing privacy-aware applications. It is a virtual network working on" -" top of\n" -"the regular Internet, in which hosts can exchange data without disclosing" -" their\n" -"\"real\" IP addresses. Connections inside I2P network are established " -"between \n" -"virtual addresses called *I2P destinations*. It's possible to have as " -"many\n" -"of destinations as one needs, even use a new destination for each " -"connection,\n" -"they don't disclose any information about the real IP address to the " -"other\n" +"developing privacy-aware applications. It is a virtual network working on top of\n" +"the regular Internet, in which hosts can exchange data without disclosing their\n" +"\"real\" IP addresses. Connections inside I2P network are established between \n" +"virtual addresses called *I2P destinations*. It's possible to have as many\n" +"of destinations as one needs, even use a new destination for each connection,\n" +"they don't disclose any information about the real IP address to the other\n" "side." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:31 msgid "" -"This article describes basic concepts one needs to know when developing " -"I2P\n" -"applications. Code samples are written in Python with the use of built-in" -"\n" +"This article describes basic concepts one needs to know when developing I2P\n" +"applications. Code samples are written in Python with the use of built-in\n" "asynchronous framework asyncio." msgstr "" @@ -8143,15 +7473,11 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:42 msgid "" "I2P provides many different APIs to the client applications. Regular\n" -"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java " -"applications \n" -"usually use I2CP. For developing with other languages, like Python, the " -"best \n" +"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n" +"usually use I2CP. For developing with other languages, like Python, the best \n" "option is `SAM`_. SAM is disabled by \n" -"default in the original Java client implementation, so we need to enable " -"it. \n" -"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run " -"at Startup\" \n" +"default in the original Java client implementation, so we need to enable it. \n" +"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n" "and press \"Start\", then \"Save Client Configuration\"." msgstr "" @@ -8172,12 +7498,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:79 msgid "" -"This library works with the Python's built-in `asynchronous framework " -"asyncio`_,\n" -"so please note that code samples are taken from async functions " -"(coroutines)\n" -"which are running inside the event loop. Additional examples of i2plib " -"usage can\n" +"This library works with the Python's built-in `asynchronous framework asyncio`_,\n" +"so please note that code samples are taken from async functions (coroutines)\n" +"which are running inside the event loop. Additional examples of i2plib usage can\n" "be found in the `source code repository`_." msgstr "" @@ -8189,10 +7512,8 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:94 msgid "" -"I2P destination is literally a set of encryption and cryptographic " -"signature\n" -"keys. Public keys from this set are published to the I2P network and are " -"used to\n" +"I2P destination is literally a set of encryption and cryptographic signature\n" +"keys. Public keys from this set are published to the I2P network and are used to\n" "make connections instead of IP addresses." msgstr "" @@ -8202,28 +7523,22 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:112 msgid "" -"base32 address is a hash which is used by other peers to discover your " -"full\n" -"Destination in the network. If you plan to use this destination as a " -"permanent\n" -"address in your program, save the binary data from " -"*dest.private\\_key.data* \n" +"base32 address is a hash which is used by other peers to discover your full\n" +"Destination in the network. If you plan to use this destination as a permanent\n" +"address in your program, save the binary data from *dest.private\\_key.data* \n" "to a local file." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:119 msgid "" -"Now you can create a SAM session, which literally means to make the " -"Destination\n" +"Now you can create a SAM session, which literally means to make the Destination\n" "online in I2P:" msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:130 msgid "" -"Important note here: Destination will remain online while " -"*session\\_writer* socket\n" -"is kept open. If you wish to switch it off, you can call " -"*session\\_writer.close()*." +"Important note here: Destination will remain online while *session\\_writer* socket\n" +"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:135 @@ -8234,11 +7549,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:140 msgid "" -"Now when the Destination is online, you can use it to connect to other " -"peers.\n" +"Now when the Destination is online, you can use it to connect to other peers.\n" "For example, this is how you connect to\n" -"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send " -"HTTP GET\n" +"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n" "request and read the response (it is \"i2p-projekt.i2p\" web server):" msgstr "" @@ -8250,20 +7563,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:171 msgid "" -"While making outgoing connections is trivial, when you accept connections" -" there\n" -"is one important detail. After a new client is connected, SAM API sends " -"an ASCII\n" -"string with base64-encoded client's Destination to the socket. Since " -"Destination \n" +"While making outgoing connections is trivial, when you accept connections there\n" +"is one important detail. After a new client is connected, SAM API sends an ASCII\n" +"string with base64-encoded client's Destination to the socket. Since Destination \n" "and data can come in one chunk, you should be aware of it." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:178 msgid "" "This is how a simple PING-PONG server looks like. It accepts incoming\n" -"connection, saves client's Destination to a *remote\\_destination* " -"variable and\n" +"connection, saves client's Destination to a *remote\\_destination* variable and\n" "sends back \"PONG\" string:" msgstr "" @@ -8275,21 +7584,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:208 msgid "" -"This article describes the usage of a TCP-like Streaming protocol. SAM " -"API also\n" -"provides a UDP-like protocol to send and receive datagrams. This feature " -"will\n" +"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n" +"provides a UDP-like protocol to send and receive datagrams. This feature will\n" "be added to i2plib later." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:214 msgid "" -"This is just a basic information, but it's enough to start your own " -"project with\n" -"the use of I2P. Invisible Internet is a great tool to develop all kinds " -"of\n" -"privacy-aware applications. There are no design constraints by the " -"network,\n" +"This is just a basic information, but it's enough to start your own project with\n" +"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n" +"privacy-aware applications. There are no design constraints by the network,\n" "those applications can be client-server as well as P2P." msgstr "" @@ -8305,22 +7609,15 @@ msgstr "0.9.38ì—ì„œ 새로운 시작 마법사를 í¬í•¨í•©ë‹ˆë‹¤" msgid "" "0.9.38 includes a new first-install wizard with a bandwidth tester.\n" "We've added support for the latest GeoIP database format.\n" -"There's a new Firefox profile installer and a new, native Mac OSX " -"installer on our website.\n" +"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n" "Work continues on supporting the new \"LS2\" netdb format." -msgstr "" -"0.9.38ì—서는 대ì—í 테스터가 있는 새로운 첫 설치 마법사를 í¬í•¨í•©ë‹ˆë‹¤.\n" -"ì €í¬ëŠ” ìµœì‹ ë²„ì „ì˜ GeoIP ë°ì´í„°ë² ì´ìŠ¤ í¬ë§· 지ì›ì„ 추가했습니다.\n" -"새로운 파ì´ì–´í스 í”„ë¡œíŒŒì¼ ì„¤ì¹˜ 프로그램과 네ì´í‹°ë¸Œ Mac OSX 설치 í”„ë¡œê·¸ëž¨ì´ ì›¹ 사ì´íŠ¸ì— ìƒê²¼ìŠµë‹ˆë‹¤.\n" -"새 \"LS2\" netdb í¬ë§· 지ì›ì„ 위한 ìž‘ì—…ì´ ê³„ì†ë©ë‹ˆë‹¤." +msgstr "0.9.38ì—서는 대ì—í 테스터가 있는 새로운 첫 설치 마법사를 í¬í•¨í•©ë‹ˆë‹¤.\nì €í¬ëŠ” ìµœì‹ ë²„ì „ì˜ GeoIP ë°ì´í„°ë² ì´ìŠ¤ í¬ë§· 지ì›ì„ 추가했습니다.\n새로운 파ì´ì–´í스 í”„ë¡œíŒŒì¼ ì„¤ì¹˜ 프로그램과 네ì´í‹°ë¸Œ Mac OSX 설치 í”„ë¡œê·¸ëž¨ì´ ì›¹ 사ì´íŠ¸ì— ìƒê²¼ìŠµë‹ˆë‹¤.\n새 \"LS2\" netdb í¬ë§· 지ì›ì„ 위한 ìž‘ì—…ì´ ê³„ì†ë©ë‹ˆë‹¤." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23 msgid "" "This release also contains plenty of bug fixes, including several issues " "with susimail attachments, and a fix for IPv6-only routers." -msgstr "" -"ë˜í•œ ì´ ë¦´ë¦¬ì¦ˆëŠ” susimail 첨부파ì¼ì— ê´€ë ¨ëœ ì—¬ëŸ¬ ë¬¸ì œë“¤ê³¼, IPv6 ì „ìš© ë¼ìš°í„°ë¥¼ 위한 ìˆ˜ì • 사í•ì„ í¬í•¨í•œ 다양한 버그 " -"ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤." +msgstr "ë˜í•œ ì´ ë¦´ë¦¬ì¦ˆëŠ” susimail 첨부파ì¼ì— ê´€ë ¨ëœ ì—¬ëŸ¬ ë¬¸ì œë“¤ê³¼, IPv6 ì „ìš© ë¼ìš°í„°ë¥¼ 위한 ìˆ˜ì • 사í•ì„ í¬í•¨í•œ 다양한 버그 ìˆ˜ì •ì„ í¬í•¨í•©ë‹ˆë‹¤." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37 msgid "New setup wizard with bandwidth testing" @@ -8404,25 +7701,25 @@ msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:16 msgid "" -"There are many projects in the I2P world that we are excited about, but " -"not all of them are ready for prime-time. We decided to create a place " -"where we can make those available for anyone interested in trying them " -"out, that will serve as proving grounds for projects that may one day " -"become official I2P products. This place is the `I2P Laboratory`_." +"There are many projects in the I2P world that we are excited about, but not " +"all of them are ready for prime-time. We decided to create a place where we" +" can make those available for anyone interested in trying them out, that " +"will serve as proving grounds for projects that may one day become official " +"I2P products. This place is the `I2P Laboratory`_." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:22 msgid "" -"In the lab we will be offering downoads ready for you to try. Keep in " -"mind that they are not going to be \"release\" quality, and some may not " -"even be \"beta\" quality. We do not offer official support for them. " -"Any of the lab projects may get discontinued at any time." +"In the lab we will be offering downoads ready for you to try. Keep in mind " +"that they are not going to be \"release\" quality, and some may not even be " +"\"beta\" quality. We do not offer official support for them. Any of the " +"lab projects may get discontinued at any time." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:26 msgid "" -"If you are feeling adventurous we invite you to try our ideas. We " -"welcome your feedback at the `I2P Lab Forum`_." +"If you are feeling adventurous we invite you to try our ideas. We welcome " +"your feedback at the `I2P Lab Forum`_." msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2 @@ -8435,26 +7732,17 @@ msgstr "0.9.39ì—ì„œ ì„±ëŠ¥ì´ ê°œì„ ë˜ì—ˆìŠµë‹ˆë‹¤" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16 msgid "" -"0.9.39 includes extensive changes for the new network database types " -"(proposal 123).\n" -"We've bundled the i2pcontrol plugin as a webapp to support development of" -" RPC applications.\n" +"0.9.39 includes extensive changes for the new network database types (proposal 123).\n" +"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n" "There are numerous performance improvements and bug fixes." -msgstr "" -"0.9.39ì—서는 새로운 ë„¤íŠ¸ì›Œí¬ ë°ì´í„°ë² ì´ìŠ¤ 타입 (proposal 123)ì„ ìœ„í•œ 대규모 ë³€ê²½ì„ í¬í•¨í•©ë‹ˆë‹¤.\n" -"ì €í¬ëŠ” RPC 어플리케ì´ì…˜ ê°œë°œì„ ì§€ì›í•˜ê¸° 위해 i2pcontrol 플러그ì¸ì„ 웹 앱으로 í¬í•¨í–ˆìŠµë‹ˆë‹¤.\n" -"ë§Žì€ ì„±ëŠ¥ ê°œì„ ê³¼ 버그 ìˆ˜ì •ì´ ì´ë£¨ì–´ì¡ŒìŠµë‹ˆë‹¤." +msgstr "0.9.39ì—서는 새로운 ë„¤íŠ¸ì›Œí¬ ë°ì´í„°ë² ì´ìŠ¤ 타입 (proposal 123)ì„ ìœ„í•œ 대규모 ë³€ê²½ì„ í¬í•¨í•©ë‹ˆë‹¤.\nì €í¬ëŠ” RPC 어플리케ì´ì…˜ ê°œë°œì„ ì§€ì›í•˜ê¸° 위해 i2pcontrol 플러그ì¸ì„ 웹 앱으로 í¬í•¨í–ˆìŠµë‹ˆë‹¤.\në§Žì€ ì„±ëŠ¥ ê°œì„ ê³¼ 버그 ìˆ˜ì •ì´ ì´ë£¨ì–´ì¡ŒìŠµë‹ˆë‹¤." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22 msgid "" -"We've removed the midnight and classic themes to reduce the maintenance " -"burden;\n" +"We've removed the midnight and classic themes to reduce the maintenance burden;\n" "previous users of those themes will now see the dark or light theme.\n" "There's also new home page icons, a first step in updating the console." -msgstr "" -"ì €í¬ëŠ” ìœ ì§€ë³´ìˆ˜ ë¶€ë‹´ì„ ì¤„ì´ê¸° 위해 미드나잇과 í´ëž˜ì‹ 테마를 ì œê±°í–ˆìŠµë‹ˆë‹¤;\n" -"ì´ì „ì— ì´ í…Œë§ˆë“¤ì„ ì‚¬ìš©í•˜ì‹œë˜ ìœ ì €ë¶„ë“¤ì€ ë‹¤í¬ í˜¹ì€ ë¼ì´íŠ¸ 테마를 보시게 ë 것입니다.\n" -"콘솔 ì—…ë°ì´íŠ¸ì˜ 첫 시작으로, 새로운 홈 페ì´ì§€ ì•„ì´ì½˜ë“¤ë„ 보시게 ë ê²ë‹ˆë‹¤." +msgstr "ì €í¬ëŠ” ìœ ì§€ë³´ìˆ˜ ë¶€ë‹´ì„ ì¤„ì´ê¸° 위해 미드나잇과 í´ëž˜ì‹ 테마를 ì œê±°í–ˆìŠµë‹ˆë‹¤;\nì´ì „ì— ì´ í…Œë§ˆë“¤ì„ ì‚¬ìš©í•˜ì‹œë˜ ìœ ì €ë¶„ë“¤ì€ ë‹¤í¬ í˜¹ì€ ë¼ì´íŠ¸ 테마를 보시게 ë 것입니다.\n콘솔 ì—…ë°ì´íŠ¸ì˜ 첫 시작으로, 새로운 홈 페ì´ì§€ ì•„ì´ì½˜ë“¤ë„ 보시게 ë ê²ë‹ˆë‹¤." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38 msgid "I2PControl RPC plugin bundled as a webapp" @@ -8528,14 +7816,12 @@ msgstr "" msgid "" "0.9.40 includes support for the new encrypted leaseset format.\n" "We disabled the old NTCP 1 transport protocol.\n" -"There's a new SusiDNS import feature, and a new scripted filtering " -"mechanism for incoming connections." +"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections." msgstr "" #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22 msgid "" -"We've made a lot of improvements to the OSX native installer, and we've " -"updated the IzPack installer as well.\n" +"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n" "The work continues on refreshing the console with new icons.\n" "As usual, we've fixed lots of bugs as well!" msgstr "" @@ -8638,24 +7924,16 @@ msgid "" "::\n" "\n" " What is I2P-bote?\n" -" I2P-bote is a private messaging system built on i2p, which has " -"additional\n" -" features to make it even more difficult to discern information " -"about the\n" -" messages that are transmitted. Because of this, it can be used " -"to transmit\n" -" private messages securely while tolerating high latency and not" -" relying on\n" -" a centralized relay to send messages when the sender goes " -"offline. This is\n" -" in contrast to almost every other popular private messaging " -"system, which\n" -" either require both parties to be online or rely on a semi-" -"trusted service\n" +" I2P-bote is a private messaging system built on i2p, which has additional\n" +" features to make it even more difficult to discern information about the\n" +" messages that are transmitted. Because of this, it can be used to transmit\n" +" private messages securely while tolerating high latency and not relying on\n" +" a centralized relay to send messages when the sender goes offline. This is\n" +" in contrast to almost every other popular private messaging system, which\n" +" either require both parties to be online or rely on a semi-trusted service\n" " which transmits messages on behalf of senders who go offline.\n" "\n" -" or, ELI5: It's used similarly to e-mail, but it suffers from " -"none of e-mail's\n" +" or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n" " privacy defects." msgstr "" @@ -8737,11 +8015,9 @@ msgid "" " character set into binary.\n" "2. Second, take bytes 386 and 387 and convert them to a single\n" " Big-Endian integer.\n" -"3. Add the number you computed from the two bytes in step two to 387. " -"This is\n" +"3. Add the number you computed from the two bytes in step two to 387. This is\n" " the length of the base64 destination.\n" -"4. Take that nummber of bytes from the front of the full destination to " -"get\n" +"4. Take that nummber of bytes from the front of the full destination to get\n" " the destination as a range of bytes.\n" "5. Convert back to a base64 representation using i2p's base64 character\n" " set." @@ -8792,8 +8068,7 @@ msgid "" "\n" "::\n" "\n" -" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-" -"config/i2pbote/local_dest.key" +" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149 @@ -8848,8 +8123,7 @@ msgid "" "\n" "Now that you've got the correct destination for your I2P-Bote node, the\n" "final step is to add yourself to the default peers list for `I2P-Bote\n" -"here <https://github.com/i2p/i2p.i2p-" -"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" +"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" "here. You can do this by forking the repository, adding yourself to the\n" "list with your name commented out, and your 516-char destination\n" "directly below it, like this:" @@ -8862,12 +8136,7 @@ msgid "" "::\n" "\n" " # idk\n" -" QuabT3H5ljZyd-PXCQjvDzdfCec-" -"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-" -"bkSo0gEhB-" -"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA" -"~z0Nus-" -"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" +" QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205 @@ -8888,38 +8157,25 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10 msgid "" -"Although the Java I2P router comes pre-configured with a static web " -"server,\n" -"jetty, to provide the user's first eepSite, many require more " -"sophisticated\n" -"functionality from their web server and would rather create an eepSite " -"with a\n" -"different server. This is of course possible, and actually is really easy" -" once\n" +"Although the Java I2P router comes pre-configured with a static web server,\n" +"jetty, to provide the user's first eepSite, many require more sophisticated\n" +"functionality from their web server and would rather create an eepSite with a\n" +"different server. This is of course possible, and actually is really easy once\n" "you've done it one time." msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18 msgid "" -"Although it is easy to do, there are a few things you should consider " -"before\n" -"doing it. You will want to remove identifying characteristics from your " -"web\n" -"server, like potentially identifying headers and default error pages that" -"\n" -"report the server/distro type. More information about threats to " -"anonymity\n" +"Although it is easy to do, there are a few things you should consider before\n" +"doing it. You will want to remove identifying characteristics from your web\n" +"server, like potentially identifying headers and default error pages that\n" +"report the server/distro type. More information about threats to anonymity\n" "posed by improperly configured applications see:\n" -"`Riseup here: <https://riseup.net/en/security/network-security/tor" -"/onionservices-best-practices>`__,\n" +"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n" "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n" -"`This blog article for some opsec fails: " -"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__," -"\n" -"`and the I2P applications page here " -"<https://geti2p.net/en/docs/applications/supported>`__.\n" -"Although much of this information is expressed for Tor Onion Services, " -"the same\n" +"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n" +"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n" +"Although much of this information is expressed for Tor Onion Services, the same\n" "procedures and principles apply to hosting applications over I2P." msgstr "" @@ -8930,8 +8186,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35 msgid "" "Go to the I2P web interface at 127.0.0.1:7657 and open the\n" -"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links" -" to\n" +"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n" "localhost). Click the button that says \"Tunnel Wizard\" to begin." msgstr "" @@ -8941,8 +8196,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48 msgid "" -"The tunnel wizard is very simple. Since we're setting up an http " -"*server*, all\n" +"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n" "we need to do is select a *server* tunnel." msgstr "" @@ -8952,15 +8206,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60 msgid "" -"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP " -"services.\n" +"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n" "It has filtering and rate-limiting features enabled that are tailored\n" -"specifically to that purpose. A standard tunnel may work as well, but if " -"you\n" -"select a atandard tunnel you'll need to take care of those security " -"features\n" -"yourself. A more in-depth dive into the HTTP Tunnel configuration is " -"available\n" +"specifically to that purpose. A standard tunnel may work as well, but if you\n" +"select a atandard tunnel you'll need to take care of those security features\n" +"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n" "in the next tutorial." msgstr "" @@ -8970,12 +8220,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76 msgid "" -"For your own benefit and ability to remeber and distinguish the what you " -"are\n" -"using the tunnel for, give it a good nickname and description. If you " -"need to\n" -"come back and do more management later, then this is how you will " -"identify the\n" +"For your own benefit and ability to remeber and distinguish the what you are\n" +"using the tunnel for, give it a good nickname and description. If you need to\n" +"come back and do more management later, then this is how you will identify the\n" "tunnel in the hidden services manager." msgstr "" @@ -8985,12 +8232,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90 msgid "" -"In this step, you point the web server at the TCP port where your web " -"server is\n" -"listening. Since most web servers listen on port 80 or port 8080, the " -"example\n" -"shows that. If you use alternate ports or virtual machines or containers " -"to\n" +"In this step, you point the web server at the TCP port where your web server is\n" +"listening. Since most web servers listen on port 80 or port 8080, the example\n" +"shows that. If you use alternate ports or virtual machines or containers to\n" "isolate your web services, you may need to adjust the host, port, or both." msgstr "" @@ -9008,12 +8252,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115 msgid "" -"Finally, take a look at the settings you have selected. If you approve, " -"save\n" -"them. If you did not choose to start the tunnel automatically, go to the " -"hidden\n" -"services manager and start it manually when you wish to make your service" -"\n" +"Finally, take a look at the settings you have selected. If you approve, save\n" +"them. If you did not choose to start the tunnel automatically, go to the hidden\n" +"services manager and start it manually when you wish to make your service\n" "available." msgstr "" @@ -9023,10 +8264,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129 msgid "" -"I2P provides a detailed panel for configuring the http server tunnel in " -"custom\n" -"ways. I'll finish this tutorial by walking through all of them. " -"Eventually." +"I2P provides a detailed panel for configuring the http server tunnel in custom\n" +"ways. I'll finish this tutorial by walking through all of them. Eventually." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4 @@ -9039,38 +8278,28 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10 msgid "" -"This blog post is intended as a general guide to running a mirror of a " -"clear-net\n" -"service as an eepSite. It elaborates on the previous blog post about " -"basic\n" +"This blog post is intended as a general guide to running a mirror of a clear-net\n" +"service as an eepSite. It elaborates on the previous blog post about basic\n" "I2PTunnel tunnels." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16 msgid "" -"Unfortunately, it's probably impossible to *completely* cover all " -"possible cases\n" -"of making an existing web site available as an eepSite, there's simply " -"too\n" +"Unfortunately, it's probably impossible to *completely* cover all possible cases\n" +"of making an existing web site available as an eepSite, there's simply too\n" "diverse an array of server-side software, not to mention the in-practice\n" -"peculiarities of any particular deployment of software. Instead, I'm " -"going to\n" -"try and convey, as specifically as possible, the general process " -"preparing a\n" +"peculiarities of any particular deployment of software. Instead, I'm going to\n" +"try and convey, as specifically as possible, the general process preparing a\n" "service for deployment to the eepWeb or other hidden services." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25 msgid "" -"Much of this guide will be treating the reader as a conversational " -"participant,\n" -"in particular If I really mean it I will address the reader directly(i.e." -" using\n" -"\"you\" instead of \"one\") and I'll frequently head sections with " -"questions I think\n" +"Much of this guide will be treating the reader as a conversational participant,\n" +"in particular If I really mean it I will address the reader directly(i.e. using\n" +"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n" "the reader might be asking. This is, after all, a \"process\" that an\n" -"administrator must consider themselves \"involved\" in just like hosting " -"any other\n" +"administrator must consider themselves \"involved\" in just like hosting any other\n" "service." msgstr "" @@ -9080,16 +8309,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37 msgid "" -"While it would be wonderful, it's probably impossible for me to put " -"specific\n" -"instructions for every single kind of software that one might use to host" -" web\n" -"sites. As such, this tutorial requires some assumptions on the part of " -"the\n" -"writer and some critical thinking and common sense on the part of the " -"reader.\n" -"To be clear, **I have assumed that the person following this tutorial " -"is**\n" +"While it would be wonderful, it's probably impossible for me to put specific\n" +"instructions for every single kind of software that one might use to host web\n" +"sites. As such, this tutorial requires some assumptions on the part of the\n" +"writer and some critical thinking and common sense on the part of the reader.\n" +"To be clear, **I have assumed that the person following this tutorial is**\n" "**already operating a clear-web service linkable to a real identity or**\n" "**organization** and thus is simply offering anonymous access and not\n" "anonymizing themselves." @@ -9097,22 +8321,17 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48 msgid "" -"Thus, **it makes no attempt whatsoever to anonymize** a connection from " -"one\n" -"server to another. If you want to run a new, un-linkable hidden service " -"that\n" -"makes server-to-server connections, additional steps will be required and" -" will\n" +"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n" +"server to another. If you want to run a new, un-linkable hidden service that\n" +"makes server-to-server connections, additional steps will be required and will\n" "be covered in another tutorial." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55 msgid "" "That said: If you can be sure that a *brand new service* which is *not*\n" -"*available to the clear-web* will never make a server-to-server " -"connection and\n" -"will not leak server metadata in responses to clients, then services " -"configured\n" +"*available to the clear-web* will never make a server-to-server connection and\n" +"will not leak server metadata in responses to clients, then services configured\n" "in this way will be anonymous." msgstr "" @@ -9126,16 +8345,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68 msgid "" -"In practice, your web service probably uses a number of things to enhance" -" it's\n" -"reliability and security. These things could be proxies, reverse proxies," -"\n" -"containers, tunnels, Intrusion Detection Systems, rate-limiters, load " -"balancers,\n" -"among many other things. When you get started, you should go through your" -"\n" -"deployment and determine which software you are using, and what you are " -"using it\n" +"In practice, your web service probably uses a number of things to enhance it's\n" +"reliability and security. These things could be proxies, reverse proxies,\n" +"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n" +"among many other things. When you get started, you should go through your\n" +"deployment and determine which software you are using, and what you are using it\n" "for." msgstr "" @@ -9145,8 +8359,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80 msgid "" -"These questions should help you evaluate what parts of your software " -"stack are\n" +"These questions should help you evaluate what parts of your software stack are\n" "relevant to your I2P eepSite." msgstr "" @@ -9156,16 +8369,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88 msgid "" -"If you are using software which alters the behavior of traffic based on " -"the IP\n" -"address of the sender, these things will probably not work with I2P, or " -"may work\n" -"in complicated or unexpected ways. This is because the address will " -"usually be\n" -"the localhost, or at least the host where your I2P router is running. " -"Software\n" -"which sometimes does things based on IP addresses could be Fail2Ban, " -"iptables,\n" +"If you are using software which alters the behavior of traffic based on the IP\n" +"address of the sender, these things will probably not work with I2P, or may work\n" +"in complicated or unexpected ways. This is because the address will usually be\n" +"the localhost, or at least the host where your I2P router is running. Software\n" +"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n" "and similar applications." msgstr "" @@ -9175,10 +8383,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100 msgid "" -"Some software may be configured to add information to the traffic it " -"handles.\n" -"Obviously, if this information is identifying it should not be part of " -"the chain\n" +"Some software may be configured to add information to the traffic it handles.\n" +"Obviously, if this information is identifying it should not be part of the chain\n" "of services that is exposed to the I2P network." msgstr "" @@ -9190,37 +8396,27 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109 msgid "" -"Some software may also draw from remote resources, to find up-to-date " -"rules and\n" -"block lists which can be used to prevent attacks. Some of these might be " -"useful\n" -"as part of the service that is exposed to I2P, but you should make sure " -"that the\n" -"rules are applicable and that a rules update cannot be triggered as a " -"result of\n" -"a normal client request. This would create a server-to-server " -"communication\n" +"Some software may also draw from remote resources, to find up-to-date rules and\n" +"block lists which can be used to prevent attacks. Some of these might be useful\n" +"as part of the service that is exposed to I2P, but you should make sure that the\n" +"rules are applicable and that a rules update cannot be triggered as a result of\n" +"a normal client request. This would create a server-to-server communication\n" "which could reveal the timing of an I2P communication to a third party." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118 msgid "" -"Step two: Determine which port to Forward to I2P and Optionally locate " -"your TLS certificate" +"Step two: Determine which port to Forward to I2P and Optionally locate your " +"TLS certificate" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121 msgid "" -"Now you've gathered all the information that you will require to forward " -"your\n" -"service to I2P. Once you've selected the point at which you would like to" -" make\n" -"your site available to I2P, you will need to note the port you wish to " -"foward.\n" -"In simple scenarios, this will probably just be port 80 or port 8080. In " -"more\n" -"sophisticated scenarios, this might be a reverse proxy or something like " -"that.\n" +"Now you've gathered all the information that you will require to forward your\n" +"service to I2P. Once you've selected the point at which you would like to make\n" +"your site available to I2P, you will need to note the port you wish to foward.\n" +"In simple scenarios, this will probably just be port 80 or port 8080. In more\n" +"sophisticated scenarios, this might be a reverse proxy or something like that.\n" "Make a note of the port." msgstr "" @@ -9230,18 +8426,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133 msgid "" -"Should you be a non-anonymous organization that wishes to provide " -"enhanced\n" -"privacy to your users by providing a hidden service, you may wish to " -"establish\n" -"a common identity between versions of your site. However, since we can't " -"add\n" -"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we " -"have to do\n" -"this in another way. To do this, **even if you are forwarding the HTTP " -"port**\n" -"**and not HTTPS**, make a note of the location of your TLS certificate " -"for use\n" +"Should you be a non-anonymous organization that wishes to provide enhanced\n" +"privacy to your users by providing a hidden service, you may wish to establish\n" +"a common identity between versions of your site. However, since we can't add\n" +"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n" +"this in another way. To do this, **even if you are forwarding the HTTP port**\n" +"**and not HTTPS**, make a note of the location of your TLS certificate for use\n" "in the final step." msgstr "" @@ -9251,10 +8441,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146 msgid "" -"Congratulations! You've completed the most difficult part. From here on, " -"the\n" -"decisions you must make, and the consequences that they will have, are " -"much\n" +"Congratulations! You've completed the most difficult part. From here on, the\n" +"decisions you must make, and the consequences that they will have, are much\n" "more straightforward and easy to enumerate. Such is the beauty of a\n" "cryptographically secure network layer like I2P!" msgstr "" @@ -9266,20 +8454,13 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158 msgid "" "For eepSites, you will need to create an HTTP Server Tunnel. This is\n" -"an I2P destination with a few special features for hosting HTTP services " -"to\n" -"enable things like rate-limiting, filtering, and the inclusion of headers" -" to\n" -"identify the destination of the client to the server. These enable " -"flexibility\n" -"in how you handle connections in terms of load-balancing and rate-" -"limiting on\n" -"a case-by-case basis, among other things. Explore these options and how " -"they\n" -"relate to the applications which you considered in step one, even though " -"a very\n" -"simple setup is easy, larger sites may benefit from taking advantage of " -"these\n" +"an I2P destination with a few special features for hosting HTTP services to\n" +"enable things like rate-limiting, filtering, and the inclusion of headers to\n" +"identify the destination of the client to the server. These enable flexibility\n" +"in how you handle connections in terms of load-balancing and rate-limiting on\n" +"a case-by-case basis, among other things. Explore these options and how they\n" +"relate to the applications which you considered in step one, even though a very\n" +"simple setup is easy, larger sites may benefit from taking advantage of these\n" "features." msgstr "" @@ -9289,98 +8470,70 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173 msgid "" -"If you've configured a reverse proxy or an SSH tunnel before, then the " -"general\n" +"If you've configured a reverse proxy or an SSH tunnel before, then the general\n" "idea here should be very familiar to you. I2PTunnel, in essence, is just\n" -"forwarding ports from the host to the I2P Network. To set this up using " -"the web\n" +"forwarding ports from the host to the I2P Network. To set this up using the web\n" "interface, go to the I2PTunnel configuration page." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180 msgid "" -"At the bottom of the \"I2P Hidden Services\" section of the page, select " -"an HTTP\n" +"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n" "Service from the drop-down and click \"Create.\"" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189 msgid "" -"It will immediately drop you into the granular tunnel configuration page," -" which\n" -"we're about to explore from top-to-bottom. The first, most essential " -"settings\n" -"are the tunnel name and the target host:port. **The target host:port is**" -"\n" -"**the place where you input the address of the service you are forwarding" -" to**\n" -"**I2P**. Once you've configured that, your web site will become available" -" over\n" +"It will immediately drop you into the granular tunnel configuration page, which\n" +"we're about to explore from top-to-bottom. The first, most essential settings\n" +"are the tunnel name and the target host:port. **The target host:port is**\n" +"**the place where you input the address of the service you are forwarding to**\n" +"**I2P**. Once you've configured that, your web site will become available over\n" "i2p. However, there are probably a few things that we can improve." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202 msgid "" -"Next, you may want to pick a hostname to use for your eepSite. This " -"hostname\n" -"doesn't need to be universally unique, for now, it will only be used " -"locally.\n" -"We'll publish it to an address helper later. **If** the *Local " -"Destination*\n" -"field isn't populated with your Base64 Destination yet, you should scroll" -" down\n" +"Next, you may want to pick a hostname to use for your eepSite. This hostname\n" +"doesn't need to be universally unique, for now, it will only be used locally.\n" +"We'll publish it to an address helper later. **If** the *Local Destination*\n" +"field isn't populated with your Base64 Destination yet, you should scroll down\n" "to the bottom, save the tunnel configuration, and return to the tunnel\n" "configuration." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215 msgid "" -"A little further down the configuration page, the tunnel options are " -"available.\n" -"Since you've got a site which is not intended to be anonymous, but rather" -" to\n" -"provide anonymous access to others by an alternate gateway, it may be " -"good to\n" +"A little further down the configuration page, the tunnel options are available.\n" +"Since you've got a site which is not intended to be anonymous, but rather to\n" +"provide anonymous access to others by an alternate gateway, it may be good to\n" "reduce the number of hops the tunnel takes on the I2P network." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226 msgid "" -"Next are the encrypted leaseset options. You can probably leave these as " -"the\n" -"defaults, since your site isn't anonymous it probably doesn't need " -"features like\n" -"blinding or encrypted leasesets. If you were to choose encrypted " -"leasesets, you\n" -"would not be accessible to anyone unless you shared a key with them in " -"advance." +"Next are the encrypted leaseset options. You can probably leave these as the\n" +"defaults, since your site isn't anonymous it probably doesn't need features like\n" +"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n" +"would not be accessible to anyone unless you shared a key with them in advance." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237 msgid "" -"The next few parts may be especially useful to you if you run a high-" -"traffic\n" -"site or find yourself subject to DDOS attacks. Here you can configure " -"various\n" +"The next few parts may be especially useful to you if you run a high-traffic\n" +"site or find yourself subject to DDOS attacks. Here you can configure various\n" "kinds of connection limits." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247 msgid "" -"After that, there are a few other ways of filtering connections by client" -"\n" -"characteristics. First, you can block access via inproxies like I2P.to " -"and\n" -"similar. Since you have a clearnet presence already, changing this may be" -" better\n" -"if you want to encourage I2P users to only use your eepSite. You can also" -" block\n" -"accesses via specific user-agents, for instance blocking wget may be " -"helpful if\n" -"you want to prevent spidering. Finally, and of particular interest to " -"Fail2Ban\n" -"users, the \"Unique local address per client\" will give each client it's" -" own\n" +"After that, there are a few other ways of filtering connections by client\n" +"characteristics. First, you can block access via inproxies like I2P.to and\n" +"similar. Since you have a clearnet presence already, changing this may be better\n" +"if you want to encourage I2P users to only use your eepSite. You can also block\n" +"accesses via specific user-agents, for instance blocking wget may be helpful if\n" +"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n" +"users, the \"Unique local address per client\" will give each client it's own\n" "local IP address instead of them all appearing to the server to be from\n" "127.0.0.1." msgstr "" @@ -9391,10 +8544,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271 msgid "" -"Lastly, you can set up an advanced filter definition. Writing filters is " -"beyond\n" -"what I'm prepared to do in this document, for more information see the " -"format\n" +"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n" +"what I'm prepared to do in this document, for more information see the format\n" "specification for now." msgstr "" @@ -9404,22 +8555,16 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284 msgid "" -"One interesting thing that I2P can do is host the same site on multiple " -"servers\n" -"at the same time transparently, which is referred to as \"Multihoming.\" " -"In order\n" -"to multihome your application, you will need to return to the tunnel menu" -" and\n" -"change the location of your private key file to it's own, non-shared " -"location." +"One interesting thing that I2P can do is host the same site on multiple servers\n" +"at the same time transparently, which is referred to as \"Multihoming.\" In order\n" +"to multihome your application, you will need to return to the tunnel menu and\n" +"change the location of your private key file to it's own, non-shared location." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295 msgid "" -"When you're done, copy the new key file for your new multihomed service " -"to a\n" -"storage device. Now, you can re-produce your service/tunnel configuration" -" with\n" +"When you're done, copy the new key file for your new multihomed service to a\n" +"storage device. Now, you can re-produce your service/tunnel configuration with\n" "those same keys on any I2P router and increase your service's redundancy." msgstr "" @@ -9429,11 +8574,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304 msgid "" -"Since you're running an anonymously accessible instance of an existing " -"clear-net\n" +"Since you're running an anonymously accessible instance of an existing clear-net\n" "service, you'll probably want to leverage some existing form of trust to\n" -"distribute your eepSite URL, like a TLS Certificate signed by a " -"recognized and\n" +"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n" "reputable authority. What can I say we live in an imperfect world." msgstr "" @@ -9443,29 +8586,23 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316 msgid "" -"The simplest way to provide a link to your eepSite using an existing site" -" to\n" -"distribute the link is to distribute a so-called \"Base32\" address. The " -"Base32\n" -"address is the hash of the public key of your I2P destination, so it " -"cannot be\n" -"forged if it is provided by a reliable source. In the case of a clear-net" -" site\n" +"The simplest way to provide a link to your eepSite using an existing site to\n" +"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n" +"address is the hash of the public key of your I2P destination, so it cannot be\n" +"forged if it is provided by a reliable source. In the case of a clear-net site\n" "with a hidden service presence, one of those places is likely to be that\n" "clear-net site." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325 msgid "" -"Your base32 address is visible on the main i2ptunnel configuration page " -"and it\n" +"Your base32 address is visible on the main i2ptunnel configuration page and it\n" "looks like this:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334 msgid "" -"Your users can copy-and-paste this link directly into their I2P browsers " -"and\n" +"Your users can copy-and-paste this link directly into their I2P browsers and\n" "it will just work, no additional configuration required." msgstr "" @@ -9475,17 +8612,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342 msgid "" -"You can also distribute a human-readable link to suggest to your " -"potential users\n" -"by taking advantage of I2P's \"Address Book\" feature, which allows the " -"users to\n" +"You can also distribute a human-readable link to suggest to your potential users\n" +"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n" "decide to assign a human-readable domain name to your cryptographically\n" -"assured identity. You can do this by distributing a specially crafted " -"link\n" -"containing the domain name that you want to suggest, followed by a slash," -"\n" -"followed by ?i2paddresshelper=, followed by the Local Destination of the " -"tunnel\n" +"assured identity. You can do this by distributing a specially crafted link\n" +"containing the domain name that you want to suggest, followed by a slash,\n" +"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n" "you just created, which you can see here:" msgstr "" @@ -9495,14 +8627,10 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364 msgid "" -"I keep saying suggest because when the such a link is visited, I2P asks " -"for the\n" -"user's consent to add this human-readable name to the user's local " -"address book.\n" -"That means there is no expectation that this domain be universally agreed" -" upon\n" -"by all visitors on the I2P network, whereas in the case of base32 " -"addresses,\n" +"I keep saying suggest because when the such a link is visited, I2P asks for the\n" +"user's consent to add this human-readable name to the user's local address book.\n" +"That means there is no expectation that this domain be universally agreed upon\n" +"by all visitors on the I2P network, whereas in the case of base32 addresses,\n" "the opposite is true." msgstr "" @@ -9512,16 +8640,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375 msgid "" -"Nonetheless, there do exist publicly available address subscription " -"feeds, and\n" -"special services for discovering new human-readable addresses, such as " -"no.i2p,\n" -"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or " -"Jump\n" -"Services, and can also be subscribed to automatically. This may be " -"espescially\n" -"helpful to users of your service who wish to acquire the address without " -"leaving\n" +"Nonetheless, there do exist publicly available address subscription feeds, and\n" +"special services for discovering new human-readable addresses, such as no.i2p,\n" +"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n" +"Services, and can also be subscribed to automatically. This may be espescially\n" +"helpful to users of your service who wish to acquire the address without leaving\n" "I2P or visiting your clearnet service." msgstr "" @@ -9539,10 +8662,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405 msgid "" -"Most of the security issues of hosting Tor hidden services also apply to " -"I2P. It\n" -"would be advisable to take advantage of their resources as well as this " -"one:" +"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n" +"would be advisable to take advantage of their resources as well as this one:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410 @@ -9595,27 +8716,19 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10 msgid "" -"This is a tutorial on how to set up and tweak an I2P tunnel in order to " -"use it\n" -"to access an SSH server remotely, using either I2P or i2pd. For now, it " -"assumes\n" -"you will install your SSH server from a package manager and that it's " -"running\n" +"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n" +"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n" +"you will install your SSH server from a package manager and that it's running\n" "as a service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17 msgid "" -"Considerations: In this guide, I'm assuming a few things. They will need " -"to be\n" -"adjusted depending on the complications that arise in your particular " -"setup,\n" -"especially if you use VM's or containers for isolation. This assumes that" -" the\n" -"I2P router and the ssh server are running on the same localhost. You " -"should be\n" -"using newly-generated SSH host keys, either by using a freshly installed " -"sshd,\n" +"Considerations: In this guide, I'm assuming a few things. They will need to be\n" +"adjusted depending on the complications that arise in your particular setup,\n" +"especially if you use VM's or containers for isolation. This assumes that the\n" +"I2P router and the ssh server are running on the same localhost. You should be\n" +"using newly-generated SSH host keys, either by using a freshly installed sshd,\n" "or by deleting old keys and forcing their re-generation. For example:" msgstr "" @@ -9630,9 +8743,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41 msgid "" -"Using java I2P's web interface, navigate to the (Links to your Router " -"Console)\\ `Hidden Services Manager " -"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n" +"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n" "and start the tunnel wizard." msgstr "" @@ -9643,15 +8754,13 @@ msgstr "í„°ë„ ë§ˆë²•ì‚¬" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49 msgid "" -"Since you are setting up this tunnel for the SSH server, you need to " -"select the\n" +"Since you are setting up this tunnel for the SSH server, you need to select the\n" "\"Server\" tunnel type." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58 msgid "" -"You should fine-tune it later, but the Standard tunnel type is easiest to" -" start\n" +"You should fine-tune it later, but the Standard tunnel type is easiest to start\n" "with." msgstr "" @@ -9674,23 +8783,17 @@ msgstr "ê³ ê¸‰ ì„¤ì •" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92 msgid "" -"Now head back over the the Hidden Services Manager, and look over the " -"available\n" -"advanced settings. One thing you'll definitely want to change is to set " -"it up\n" +"Now head back over the the Hidden Services Manager, and look over the available\n" +"advanced settings. One thing you'll definitely want to change is to set it up\n" "for interactive connections intstead of bulk connections." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102 msgid "" -"Besides that, these other options can affect performance when accessing " -"your SSH\n" -"server. If you aren't that concerned about your anonymity, then you could" -" reduce\n" -"the number of hops you take. If you have trouble with speed, a higher " -"tunnel\n" -"count might help. A few backup tunnels are probably a good idea. You " -"might have\n" +"Besides that, these other options can affect performance when accessing your SSH\n" +"server. If you aren't that concerned about your anonymity, then you could reduce\n" +"the number of hops you take. If you have trouble with speed, a higher tunnel\n" +"count might help. A few backup tunnels are probably a good idea. You might have\n" "to dial-it-in a bit." msgstr "" @@ -9700,10 +8803,8 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118 msgid "" -"Another interesting setting, especially if you choose to run a high " -"number of\n" -"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels " -"that run\n" +"Another interesting setting, especially if you choose to run a high number of\n" +"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n" "when the serve has experienced extended inactivity." msgstr "" @@ -9714,12 +8815,9 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131 msgid "" -"With i2pd, all configuration is done with files instead of via a web " -"interface.\n" -"In order to configure an SSH Service tunnel for i2pd, tweak the following" -"\n" -"example settings to your anonymity and performance needs and copy them " -"into\n" +"With i2pd, all configuration is done with files instead of via a web interface.\n" +"In order to configure an SSH Service tunnel for i2pd, tweak the following\n" +"example settings to your anonymity and performance needs and copy them into\n" "tunnels.conf" msgstr "" @@ -9733,21 +8831,16 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158 msgid "" -"Depending on how you want to access your SSH Server, you may want to make" -" a few\n" -"changes to the settings. Besides the obvious SSH hardening stuff you " -"should do\n" -"on all SSH servers(Public-Key Authentication, no login as root, etc), if " -"you\n" -"don't want your SSH server to listen on any addresses except your server " -"tunnel,\n" +"Depending on how you want to access your SSH Server, you may want to make a few\n" +"changes to the settings. Besides the obvious SSH hardening stuff you should do\n" +"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n" +"don't want your SSH server to listen on any addresses except your server tunnel,\n" "you should change AddressFamily to inet and ListenAddress to 127.0.0.1." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171 msgid "" -"If you choose to use a port other than 22 for your SSH server, you will " -"need to\n" +"If you choose to use a port other than 22 for your SSH server, you will need to\n" "change the port in your I2P tunnel configuration." msgstr "" @@ -9757,27 +8850,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179 msgid "" -"You will need to be able to see the I2P router console of the SSH server " -"in\n" -"order to configure your client connection. One neat thing about this " -"setup is\n" +"You will need to be able to see the I2P router console of the SSH server in\n" +"order to configure your client connection. One neat thing about this setup is\n" "that the initial connection to the I2P tunnel is authenticated, somewhat\n" -"reducing the risk of your initial connection to the SSH server being " -"MITM'ed,\n" +"reducing the risk of your initial connection to the SSH server being MITM'ed,\n" "as is a risk in Trust-On-First-Use scenarios." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197 msgid "" -"First, start the tunnel configuration wizard from the hidden services " -"manager\n" +"First, start the tunnel configuration wizard from the hidden services manager\n" "and select a client tunnel." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206 msgid "" -"Next, select the standard tunnel type. You will fine-tune this " -"configuration\n" +"Next, select the standard tunnel type. You will fine-tune this configuration\n" "later." msgstr "" @@ -9787,27 +8875,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223 msgid "" -"This is the only slightly tricky part. Go to the hidden services manager " -"of the\n" -"I2P router console and find the base64 \"local destination\" of the SSH " -"server\n" -"tunnel. You'll need to find a way to copy this information into the next " -"step.\n" +"This is the only slightly tricky part. Go to the hidden services manager of the\n" +"I2P router console and find the base64 \"local destination\" of the SSH server\n" +"tunnel. You'll need to find a way to copy this information into the next step.\n" "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n" "should be sufficient for most people." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235 msgid "" -"Once you've found the base64 destination you want to connect to " -"transmitted to\n" +"Once you've found the base64 destination you want to connect to transmitted to\n" "your client device, then paste it into the client destination field." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244 msgid "" -"Lastly, set a local port to connect your ssh client to. This will local " -"port\n" +"Lastly, set a local port to connect your ssh client to. This will local port\n" "will be connected to the base64 destination and thus the SSH server." msgstr "" @@ -9817,19 +8900,15 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266 msgid "" -"Like before, you'll want to change the settings to be optimized for " -"interactive\n" -"connections. Additionally, if you want to set up client whiteliting on " -"the\n" -"server, you should check the \"Generate key to enable persistent client " -"tunnel\n" +"Like before, you'll want to change the settings to be optimized for interactive\n" +"connections. Additionally, if you want to set up client whiteliting on the\n" +"server, you should check the \"Generate key to enable persistent client tunnel\n" "identity\" radial button." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282 msgid "" -"You can set this up by adding the following lines to your tunnels.conf " -"and\n" +"You can set this up by adding the following lines to your tunnels.conf and\n" "adjust it for your performance/anonymity needs." msgstr "" @@ -9843,14 +8922,10 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309 msgid "" -"There are lots of ways to set up an SSH client to connect to your server " -"on I2P,\n" -"but there are a few things you should do to secure your SSH client for " -"anonymous\n" -"use. First, you should configure it to only identify itself to SSH server" -" with\n" -"a single, specific key so that you don't risk contaminating your " -"anonymous and\n" +"There are lots of ways to set up an SSH client to connect to your server on I2P,\n" +"but there are a few things you should do to secure your SSH client for anonymous\n" +"use. First, you should configure it to only identify itself to SSH server with\n" +"a single, specific key so that you don't risk contaminating your anonymous and\n" "non-anonymous SSH connections." msgstr "" @@ -9860,8 +8935,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328 msgid "" -"Alternatively, you could make a .bash_alias entry to enforce your options" -" and\n" +"Alternatively, you could make a .bash_alias entry to enforce your options and\n" "automatically connect to I2P. You get the idea, you need to enforce\n" "IdentitiesOnly and provide an identity file." msgstr "" @@ -9872,26 +8946,21 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343 msgid "" -"This is more-or-less optional, but it's pretty cool and will prevent " -"anyone who\n" -"happens to come across your destination from being able to tell you are " -"hosting\n" +"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n" +"happens to come across your destination from being able to tell you are hosting\n" "an SSH service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349 msgid "" -"First, retrieve the persistent client tunnel destination and transmit it " -"to the\n" +"First, retrieve the persistent client tunnel destination and transmit it to the\n" "server." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358 msgid "" -"Add the client's base64 destination to the server's destination " -"whitelist. Now\n" -"you'll only be able to connect to the server tunnel from that specific " -"client\n" +"Add the client's base64 destination to the server's destination whitelist. Now\n" +"you'll only be able to connect to the server tunnel from that specific client\n" "tunnel and no one else will be able to connect to that destination." msgstr "" @@ -9909,28 +8978,19 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12 msgid "" -"One of the best features of I2P, in my opinion, is it's SAM API, which " -"can be\n" -"used to build a bridge between I2P and your application or language of " -"choice.\n" -"Currently, dozens of SAM libraries exist for a variety of languages, " -"including:" +"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n" +"used to build a bridge between I2P and your application or language of choice.\n" +"Currently, dozens of SAM libraries exist for a variety of languages, including:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32 msgid "" -"If you're using any of these languages, you may be able to port your " -"application\n" -"to I2P already, using an existing library. That's not what this tutorial " -"is\n" -"about, though. This tutorial is about what to do if you want to create a " -"SAM\n" -"library in a new language. In this tutorial, I will implement a new SAM " -"library\n" -"in Java. I chose Java because there isn't a Java library that connects " -"you to\n" -"SAM yet, because of Java's use in Android, and because it's a language " -"almost\n" +"If you're using any of these languages, you may be able to port your application\n" +"to I2P already, using an existing library. That's not what this tutorial is\n" +"about, though. This tutorial is about what to do if you want to create a SAM\n" +"library in a new language. In this tutorial, I will implement a new SAM library\n" +"in Java. I chose Java because there isn't a Java library that connects you to\n" +"SAM yet, because of Java's use in Android, and because it's a language almost\n" "everybody has at least a *little* experience with, so hopefully you can\n" "translate it into a language of your choice." msgstr "" @@ -9941,10 +9001,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46 msgid "" -"How you set up your own library will vary depending on the language you " -"wish\n" -"to use. For this example library, we'll be using java so we can create a " -"library\n" +"How you set up your own library will vary depending on the language you wish\n" +"to use. For this example library, we'll be using java so we can create a library\n" "like this:" msgstr "" @@ -9958,10 +9016,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69 msgid "" -"There are a few pieces of data that almost any SAM library should " -"probably\n" -"manage. It will at least need to store the address of the SAM Bridge you " -"intend\n" +"There are a few pieces of data that almost any SAM library should probably\n" +"manage. It will at least need to store the address of the SAM Bridge you intend\n" "to use and the signature type you wish to use." msgstr "" @@ -9971,8 +9027,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78 msgid "" -"I prefer to store the SAM address as a String and an Integer, and re-" -"combine\n" +"I prefer to store the SAM address as a String and an Integer, and re-combine\n" "them in a function at runtime." msgstr "" @@ -9982,15 +9037,11 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94 msgid "" -"The valid signature types for an I2P Tunnel are DSA_SHA1, " -"ECDSA_SHA256_P256,\n" +"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n" "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n" -"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if " -"you\n" -"implement at least SAM 3.1. In java, the 'enum' datastructure lends " -"itself to\n" -"this task, as it is intended to contain a group of constants. Add the " -"enum, and\n" +"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n" +"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n" +"this task, as it is intended to contain a group of constants. Add the enum, and\n" "an instance of the enum, to your java class definition." msgstr "" @@ -10001,8 +9052,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117 msgid "" "That takes care of reliably storing the signature type in use by the SAM\n" -"connection, but you've still got to retrieve it as a string to " -"communicate it\n" +"connection, but you've still got to retrieve it as a string to communicate it\n" "to the bridge." msgstr "" @@ -10012,10 +9062,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156 msgid "" -"Once that's done, begin creating your constructor. Note that we've given " -"our\n" -"library defaults which will be useful in default situations on all " -"existing I2P\n" +"Once that's done, begin creating your constructor. Note that we've given our\n" +"library defaults which will be useful in default situations on all existing I2P\n" "routers so far." msgstr "" @@ -10025,14 +9073,10 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173 msgid "" -"Finally, the good part. Interaction with the SAM bridge is done by " -"sending a\n" -"\"command\" to the address of the SAM bridge, and you can parse the " -"result of the\n" -"command as a set of string-based key-value pairs. So bearing that in " -"mind, let's\n" -"estabish a read-write connection to the SAM Address we defined before, " -"then\n" +"Finally, the good part. Interaction with the SAM bridge is done by sending a\n" +"\"command\" to the address of the SAM bridge, and you can parse the result of the\n" +"command as a set of string-based key-value pairs. So bearing that in mind, let's\n" +"estabish a read-write connection to the SAM Address we defined before, then\n" "write a \"CommandSAM\" Function and a reply parser." msgstr "" @@ -10042,17 +9086,14 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184 msgid "" -"We're communicating with SAM via a Socket, so in order to connect to, " -"read from,\n" -"and write to the socket, you'll need to create the following private " -"variables\n" +"We're communicating with SAM via a Socket, so in order to connect to, read from,\n" +"and write to the socket, you'll need to create the following private variables\n" "in the Jsam class:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196 msgid "" -"You will also want to instantiate those variables in your Constructors by" -"\n" +"You will also want to instantiate those variables in your Constructors by\n" "creating a function to do so." msgstr "" @@ -10062,23 +9103,17 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222 msgid "" -"Now you're all set up to finally start talking to SAM. In order to keep " -"things\n" -"nicely organized, let's create a function which sends a single command to" -" SAM,\n" -"terminated by a newline, and which returns a Reply object, which we will " -"create\n" +"Now you're all set up to finally start talking to SAM. In order to keep things\n" +"nicely organized, let's create a function which sends a single command to SAM,\n" +"terminated by a newline, and which returns a Reply object, which we will create\n" "in the next step:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241 msgid "" -"Note that we are using the writer and reader we created from the socket " -"in the\n" -"previous step as our inputs and outputs to the socket. When we get a " -"reply from\n" -"the reader, we pass the string to the Reply constructor, which parses it " -"and\n" +"Note that we are using the writer and reader we created from the socket in the\n" +"previous step as our inputs and outputs to the socket. When we get a reply from\n" +"the reader, we pass the string to the Reply constructor, which parses it and\n" "returns the Reply object." msgstr "" @@ -10089,37 +9124,29 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253 msgid "" "In order to more easily handle replies, we'll use a Reply object to\n" -"automatically parse the results we get from the SAM bridge. A reply has " -"at least\n" -"a topic, a type, and a result, as well as an arbitrary number of key-" -"value\n" +"automatically parse the results we get from the SAM bridge. A reply has at least\n" +"a topic, a type, and a result, as well as an arbitrary number of key-value\n" "pairs." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268 msgid "" -"As you can see, we will be storing the \"result\" as an enum, " -"REPLY_TYPES. This\n" -"enum contains all the possible reply results which the SAM bridge might " -"respond\n" +"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n" +"enum contains all the possible reply results which the SAM bridge might respond\n" "with." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335 msgid "" -"Now let's create our constructor, which takes the reply string recieved " -"from the\n" -"socket as a parameter, parses it, and uses the information to set up the " -"reply\n" -"object. The reply is space-delimited, with key-value pairs joined by an " -"equal\n" +"Now let's create our constructor, which takes the reply string recieved from the\n" +"socket as a parameter, parses it, and uses the information to set up the reply\n" +"object. The reply is space-delimited, with key-value pairs joined by an equal\n" "sign and terminated by a newline." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364 msgid "" -"Lastly, for the sake of convenience, let's give the reply object a " -"toString()\n" +"Lastly, for the sake of convenience, let's give the reply object a toString()\n" "function which returns a string representation of the Reply object." msgstr "" @@ -10129,30 +9156,21 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379 msgid "" -"Now we're ready to establish communication with SAM by sending a " -"\"Hello\"\n" -"message. If you're writing a new SAM library, you should probably target " -"at\n" -"least SAM 3.1, since it's available in both I2P and i2pd and introduces " -"support\n" +"Now we're ready to establish communication with SAM by sending a \"Hello\"\n" +"message. If you're writing a new SAM library, you should probably target at\n" +"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n" "for the SIGNATURE_TYPE parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397 msgid "" -"As you can see, we use the CommandSAM function we created before to send " -"the\n" -"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This " -"tells\n" -"SAM that you want to start communicating with the API, and that you know " -"how\n" +"As you can see, we use the CommandSAM function we created before to send the\n" +"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n" +"SAM that you want to start communicating with the API, and that you know how\n" "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n" -"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass" -" to\n" -"the Reply constructor to get a valid Reply object. From now on, we can " -"use our\n" -"CommandSAM function and Reply object to deal with all our communication " -"across\n" +"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n" +"the Reply constructor to get a valid Reply object. From now on, we can use our\n" +"CommandSAM function and Reply object to deal with all our communication across\n" "the SAM bridge." msgstr "" @@ -10162,66 +9180,46 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423 msgid "" -"Now that you've negotiated your connection to SAM and agreed on a SAM " -"version\n" -"you both speak, you can set up peer-to-peer connections for your " -"application\n" -"to connect to other i2p applications. You do this by sending a \"SESSION " -"CREATE\"\n" -"command to the SAM Bridge. To do that, we'll use a CreateSession function" -" that\n" +"Now that you've negotiated your connection to SAM and agreed on a SAM version\n" +"you both speak, you can set up peer-to-peer connections for your application\n" +"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n" +"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n" "accepts a session ID and a destination type parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444 msgid "" -"That was easy, right? All we had to do was adapt the pattern we used in " -"our\n" -"HelloSAM function to the ``SESSION CREATE`` command. A good reply from " -"the\n" -"bridge will still return OK, and in that case we return the ID of the " -"newly\n" -"created SAM connection. Otherwise, we return an empty string because " -"that's an\n" -"invalid ID anyway and it failed, so it's easy to check. Let's see if this" -"\n" +"That was easy, right? All we had to do was adapt the pattern we used in our\n" +"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n" +"bridge will still return OK, and in that case we return the ID of the newly\n" +"created SAM connection. Otherwise, we return an empty string because that's an\n" +"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n" "function works by writing a test for it:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461 msgid "" -"Note that in this test, we *must* call HelloSAM first to establish " -"communication\n" -"with SAM before starting our session. If not, the bridge will reply with " -"an\n" +"Note that in this test, we *must* call HelloSAM first to establish communication\n" +"with SAM before starting our session. If not, the bridge will reply with an\n" "error and the test will fail." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472 msgid "" -"Now you have your session established and your local destination, and " -"need to\n" -"decide what you want to do with them. Your session can now be commanded " -"to\n" -"connect to a remote service over I2P, or to wait for incoming connections" -" to\n" -"respond to. However, before you can connect to a remote destination, you " -"may\n" -"need to obtain the base64 of the destination, which is what the API " -"expects. In\n" -"order to do this, we'll create a LookupName function, which will return " -"the\n" +"Now you have your session established and your local destination, and need to\n" +"decide what you want to do with them. Your session can now be commanded to\n" +"connect to a remote service over I2P, or to wait for incoming connections to\n" +"respond to. However, before you can connect to a remote destination, you may\n" +"need to obtain the base64 of the destination, which is what the API expects. In\n" +"order to do this, we'll create a LookupName function, which will return the\n" "base64 in a usable form." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494 msgid "" -"Again, this is almost the same as our HelloSAM and CreateSession " -"functions,\n" -"with one difference. Since we're looking for the VALUE specifically and " -"the NAME\n" -"field will be the same as the ``name`` argument, it simply returns the " -"base64\n" +"Again, this is almost the same as our HelloSAM and CreateSession functions,\n" +"with one difference. Since we're looking for the VALUE specifically and the NAME\n" +"field will be the same as the ``name`` argument, it simply returns the base64\n" "string of the destination requested." msgstr "" @@ -10231,50 +9229,39 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516 msgid "" -"At last, we are going to establish a connection to another service with " -"our new\n" +"At last, we are going to establish a connection to another service with our new\n" "library. This part confused me a bit at first, but the most astute Java\n" "developers were probably wondering why we didn't extend the socket class\n" -"instead of creating a Socket variable inside of the Jsam class. That's " -"because\n" -"until now, we've been communicating with the \"Control Socket\" and we " -"need to\n" -"create a new socket to do the actual communication. So we've waited to " -"extend\n" +"instead of creating a Socket variable inside of the Jsam class. That's because\n" +"until now, we've been communicating with the \"Control Socket\" and we need to\n" +"create a new socket to do the actual communication. So we've waited to extend\n" "the the Socket class with the Jsam class until now:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530 msgid "" -"Also, let's alter our startConnection function so that we can use it to " -"switch\n" -"over from the control socket to the socket we'll be using in our " -"application. It\n" +"Also, let's alter our startConnection function so that we can use it to switch\n" +"over from the control socket to the socket we'll be using in our application. It\n" "will now take a Socket argument." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556 msgid "" -"This allows us to quickly and easily open a new socket to communicate " -"over,\n" +"This allows us to quickly and easily open a new socket to communicate over,\n" "perform the \"Hello SAM\" handshake over again, and connect the stream." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579 msgid "" -"And now you have a new Socket for communicating over SAM! Let's do the " -"same\n" +"And now you have a new Socket for communicating over SAM! Let's do the same\n" "thing for Accepting remote connections:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599 msgid "" -"There you have it. That's how you build a SAM library, step-by-step. In " -"the\n" -"future, I will cross-reference this with the working version of the " -"library,\n" -"Jsam, and the SAM v3 specification but for now I've got to get some other" -" stuff\n" +"There you have it. That's how you build a SAM library, step-by-step. In the\n" +"future, I will cross-reference this with the working version of the library,\n" +"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n" "done." msgstr "" @@ -10297,8 +9284,7 @@ msgstr "" #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23 msgid "" "Startup should be faster on platforms such as Raspberry Pi.\n" -"We've fixed several bugs, including some serious ones affecting low-level" -" network messages." +"We've fixed several bugs, including some serious ones affecting low-level network messages." msgstr "" #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38 @@ -10392,58 +9378,39 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11 msgid "" -"*This post is adapted directly from material originally created for " -"mhatta's*\n" -"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-" -"c08ec9de225d>`__\\ *.*\n" -"*He deserves the credit for the OP. It has been updated in certain places" -" where*\n" -"*it refers to old versions of I2P as current and has undergone some " -"light*\n" +"*This post is adapted directly from material originally created for mhatta's*\n" +"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n" +"*He deserves the credit for the OP. It has been updated in certain places where*\n" +"*it refers to old versions of I2P as current and has undergone some light*\n" "*editing. -idk*" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17 msgid "" -"Right after it starts up, I2P is often seen as a little bit slow. It's " -"true, and\n" -"we all know why, by nature, `garlic routing " -"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n" -"adds overhead to the familiar experience of using the internet so that " -"you can\n" -"have privacy, but this means that for many or most I2P services, your " -"data will\n" +"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n" +"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n" +"adds overhead to the familiar experience of using the internet so that you can\n" +"have privacy, but this means that for many or most I2P services, your data will\n" "need to go through 12 hops by default." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28 msgid "" -"Also, unlike Tor, I2P was primarily designed as a closed network. You can" -"\n" -"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-" -"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources " -"inside I2P, but you are not supposed\n" -"to access `clearnet " -"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" +"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n" +"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n" +"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" "websites through I2P. There exist a few I2P “outproxies†similar to\n" -"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit" -" nodes to\n" -"access clearnet, but most of them are very slow to use as going to the " -"clearnet\n" -"is effectively *another* hop in the already 6 hops in, six hops out " -"connection." +"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n" +"access clearnet, but most of them are very slow to use as going to the clearnet\n" +"is effectively *another* hop in the already 6 hops in, six hops out connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36 msgid "" -"Until a few versions ago, this problem was even harder to deal with " -"because many\n" -"I2P router users were having difficulties configuring the bandwidth " -"settings for\n" -"their routers. If everyone who can takes the time to adjust their " -"bandwidth\n" -"settings properly, they will improve not only your connection but also " -"the I2P\n" +"Until a few versions ago, this problem was even harder to deal with because many\n" +"I2P router users were having difficulties configuring the bandwidth settings for\n" +"their routers. If everyone who can takes the time to adjust their bandwidth\n" +"settings properly, they will improve not only your connection but also the I2P\n" "network as a whole." msgstr "" @@ -10453,8 +9420,7 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45 msgid "" -"Since I2P is a peer-to-peer network, you have to share some of your " -"network\n" +"Since I2P is a peer-to-peer network, you have to share some of your network\n" "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n" "Configuration†(“Configure Bandwidth†button in the “Applications and\n" "Configuration†section of I2P Router Console, or\n" @@ -10463,47 +9429,34 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55 msgid "" -"If you see a shared bandwidth limit of 48 KBps, which is very low, then " -"you\n" -"may not have adjusted your shared bandwidth from the default. As the " -"original\n" -"author of the material this blog post is adapted from noted, I2P has a " -"default\n" -"shared bandwidth limit that is very low until the user adjusts it to " -"avoid\n" +"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n" +"may not have adjusted your shared bandwidth from the default. As the original\n" +"author of the material this blog post is adapted from noted, I2P has a default\n" +"shared bandwidth limit that is very low until the user adjusts it to avoid\n" "causing issues with the user's connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61 msgid "" -"However, since many users may not know exactly which bandwidth settings " -"to\n" -"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ " -"introduced a\n" -"New Install Wizard. It contains a Bandwidth Test, which automatically " -"detects\n" -"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) " -"and adjusts\n" +"However, since many users may not know exactly which bandwidth settings to\n" +"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n" +"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n" +"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n" "I2P’s bandwidth settings accordingly." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67 msgid "" -"If you want to re-run the wizard, for instance following a change in your" -"\n" -"service provider or bcause you installed I2P before version 0.9.38, you " -"can\n" -"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply " -"access\n" +"If you want to re-run the wizard, for instance following a change in your\n" +"service provider or bcause you installed I2P before version 0.9.38, you can\n" +"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n" "the wizard directly at http://localhost:7657/welcome" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76 msgid "" -"Using the Wizard is straightforward, simply keep clicking “Nextâ€. " -"Sometimes\n" -"M-Lab’s chosen measurement servers are down and the test fails. In such " -"case,\n" +"Using the Wizard is straightforward, simply keep clicking “Nextâ€. Sometimes\n" +"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n" "click “Previous†(do not use your web browser’s “back†button), then\n" "try it again." msgstr "" @@ -10514,27 +9467,19 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88 msgid "" -"Even after adjusted the bandwidth, your connection might still be slow As" -" I\n" -"said, I2P is a P2P network. It will take some time for your I2P router to" -" be\n" -"discovered by other peers and integrated into the I2P network. If your " -"router\n" -"not up long enough to become well integrated, or if you shut down un-" -"gracefully\n" -"too often, the network will remain fairly slow. On the other hand, the " -"longer\n" -"you run your I2P router continuously, the faster and more stable your " -"connection\n" +"Even after adjusted the bandwidth, your connection might still be slow As I\n" +"said, I2P is a P2P network. It will take some time for your I2P router to be\n" +"discovered by other peers and integrated into the I2P network. If your router\n" +"not up long enough to become well integrated, or if you shut down un-gracefully\n" +"too often, the network will remain fairly slow. On the other hand, the longer\n" +"you run your I2P router continuously, the faster and more stable your connection\n" "becomes, and more of your bandwidth share will be used in the network." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96 msgid "" -"However, many people might not be able to stay your I2P router up. In " -"such\n" -"case, you can still run the I2P router on a remote server such as VPS, " -"then use\n" +"However, many people might not be able to stay your I2P router up. In such\n" +"case, you can still run the I2P router on a remote server such as VPS, then use\n" "SSH port forwarding." msgstr "" @@ -10550,10 +9495,8 @@ msgstr "" msgid "" "0.9.42 continues the work to make I2P faster and more reliable.\n" "It includes several changes to speed up our UDP transport.\n" -"We have split up the configuration files to enable future work for more " -"modular packaging.\n" -"We continue work to implement new proposals for faster and more secure " -"encryption.\n" +"We have split up the configuration files to enable future work for more modular packaging.\n" +"We continue work to implement new proposals for faster and more secure encryption.\n" "There are, of course, a lot of bug fixes also." msgstr "" @@ -10582,7 +9525,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40 -msgid "NetDB: Choose alternate gateway for store replies to reduce connections" +msgid "" +"NetDB: Choose alternate gateway for store replies to reduce connections" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41 @@ -10629,134 +9573,91 @@ msgstr "" msgid "Def Con Trip Report- zzz" msgstr "" -#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11 +#: i2p2www/blog/2019/08/30/defcon.rst:11 +#: i2p2www/blog/2019/08/30/defcon2.rst:11 msgid "Def Con Trip Report" msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:14 msgid "" -"idk and I attended DEFCON 27 and presented two workshops on I2P for " -"application\n" -"developers, with support from mhatta and Alex. I gave the workshop at " -"Monero\n" -"Village and idk gave the one at Crypto/Privacy Village. Here, I will " -"summarize\n" -"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will" -" post a\n" +"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n" +"developers, with support from mhatta and Alex. I gave the workshop at Monero\n" +"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n" +"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n" "trip report covering his workshop." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:22 msgid "" -"We had about 8 attendees for the Monero Village workshop, entitled \"I2P " -"for\n" -"Cryptocurrency Developers\". We planned to discuss the particular " -"networking\n" -"needs for each application and work through the various i2ptunnel and SAM" -"\n" -"options available. However, all attendees were relatively unfamiliar with" -" I2P,\n" -"so we pivoted and gave an overview of I2P. As none of the attendees had a" -" laptop\n" -"with them, we helped several of them install I2P on their Android phone " -"and\n" -"walked through some of the features of the app. For all users, the app " -"appeared\n" +"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n" +"Cryptocurrency Developers\". We planned to discuss the particular networking\n" +"needs for each application and work through the various i2ptunnel and SAM\n" +"options available. However, all attendees were relatively unfamiliar with I2P,\n" +"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n" +"with them, we helped several of them install I2P on their Android phone and\n" +"walked through some of the features of the app. For all users, the app appeared\n" "to reseed and build tunnels fairly quickly." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:33 msgid "" -"One common question after installing the app was \"what do I do now?\". " -"The app\n" -"doesn't have a 'hidden services of interest' section or first-run wizard " -"like\n" -"our desktop application does, and most of the default addressbook entries" -" are\n" -"long-dead. There's improvements we could make to the first-run " -"experience.\n" +"One common question after installing the app was \"what do I do now?\". The app\n" +"doesn't have a 'hidden services of interest' section or first-run wizard like\n" +"our desktop application does, and most of the default addressbook entries are\n" +"long-dead. There's improvements we could make to the first-run experience.\n" "Also, some of the more interesting parts of the app are hidden behind an\n" -"advanced setting; we should review those items and consider un-hiding " -"some of\n" +"advanced setting; we should review those items and consider un-hiding some of\n" "them." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:43 msgid "" -"It's always useful to go to Tor talks, not so much to find out what " -"they're\n" -"doing, but to hear how they explain things to people, and what " -"terminology they\n" -"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large " -"room\n" -"attended by about two thousand people. He gave a very brief overview of " -"Tor\n" -"with only three or four slides. He says they now have \"two to eight " -"million\n" -"users a day\". Most of the talk was a review of national blocking " -"attempts over\n" -"the years, starting with Thailand and Iran in '06-'07 through Tunisia, " -"china,\n" -"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He " -"showed a\n" -"new form to be showed to new users, with a checkbox \"Tor is censored in " -"my\n" +"It's always useful to go to Tor talks, not so much to find out what they're\n" +"doing, but to hear how they explain things to people, and what terminology they\n" +"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n" +"attended by about two thousand people. He gave a very brief overview of Tor\n" +"with only three or four slides. He says they now have \"two to eight million\n" +"users a day\". Most of the talk was a review of national blocking attempts over\n" +"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n" +"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n" +"new form to be showed to new users, with a checkbox \"Tor is censored in my\n" "country\"." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:56 msgid "" "Their new pluggable transport \"snowflake\" uses a combination of domain\n" -"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. " -"Roger\n" -"only had one slide on it, and I wasn't familiar with it, so we should do " -"more\n" -"research on what it's all about. He briefly mentioned some things they " -"may be\n" -"working on next, including \"salmon\" distribution of bridges, " -"FTE/Marionette,\n" -"decoy routing, and \"cupcake\" which is an extension of snowflake. While " -"I don't\n" -"have any further information about them, they may be good buzzwords to " -"keep an\n" +"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n" +"only had one slide on it, and I wasn't familiar with it, so we should do more\n" +"research on what it's all about. He briefly mentioned some things they may be\n" +"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n" +"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n" +"have any further information about them, they may be good buzzwords to keep an\n" "eye out for on their mailing lists." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:67 msgid "" "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n" -"handshake is a particular issue and it's been the focus of much of the " -"\"arms\n" -"race\" over the years. In some ways we're in better shape, as we've taken" -"\n" -"several features of their current-best obfs4 pluggable transport and " -"build them\n" -"into NTCP2. However, we do have issues with our website and reseeds being" -"\n" +"handshake is a particular issue and it's been the focus of much of the \"arms\n" +"race\" over the years. In some ways we're in better shape, as we've taken\n" +"several features of their current-best obfs4 pluggable transport and build them\n" +"into NTCP2. However, we do have issues with our website and reseeds being\n" "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:76 msgid "" -"Notes for next time: I do recommend DEFCON, as long as we find a village " -"to\n" -"call our home. It's an enormous conference and the limited general " -"hangout\n" +"Notes for next time: I do recommend DEFCON, as long as we find a village to\n" +"call our home. It's an enormous conference and the limited general hangout\n" "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n" -"Village were fantastic hosts and we had several hours at each spot to " -"meet with\n" -"people. We should find more opportunities to work with both " -"organizations.\n" -"There were also ZCash people at the Monero Village and we should work " -"with them\n" -"also. Any future workshop should be targeted at a more general audience. " -"We do\n" -"need a standard \"Intro to I2P\" slide deck; it would have been helpful " -"at the\n" -"workshops. Don't expect attendees to have laptops with them, focus on " -"Android\n" -"for any hands-on exercises. There's several improvements to be made in " -"our\n" +"Village were fantastic hosts and we had several hours at each spot to meet with\n" +"people. We should find more opportunities to work with both organizations.\n" +"There were also ZCash people at the Monero Village and we should work with them\n" +"also. Any future workshop should be targeted at a more general audience. We do\n" +"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n" +"workshops. Don't expect attendees to have laptops with them, focus on Android\n" +"for any hands-on exercises. There's several improvements to be made in our\n" "Android app. Drink lots of water in Vegas... and stay away from the slot\n" "machines." msgstr "" @@ -10773,95 +9674,67 @@ msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:19 msgid "" -"My workshop went well, we even had a few application developers attend! " -"In\n" -"particular I had a pretty lengthy conversation with a person named Mary " -"about\n" +"My workshop went well, we even had a few application developers attend! In\n" +"particular I had a pretty lengthy conversation with a person named Mary about\n" "how I2P could be used to eliminate centralization and enhance privacy in\n" -"a \"Magic Wormhole\" type of application. While I wasn't totally familiar" -" with\n" -"Magic Wormhole at the time, I think most of my advice was usable. I think" -" Mary\n" -"had some very interesting and workable ideas about sharing information in" -" more\n" -"human-centric ways that could be interesting in I2P applications, and am " -"looking\n" +"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n" +"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n" +"had some very interesting and workable ideas about sharing information in more\n" +"human-centric ways that could be interesting in I2P applications, and am looking\n" "forward to experimenting with some of those." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:30 msgid "" -"The materials I made for the application development workshop are " -"available on\n" -"Github! https://github.com/eyedeekay/defcon Please consider it a living " -"document,\n" -"your input is desired! As it is licensed permissively, you are free to " -"fork it\n" -"and make it your own as well. Share your examples, your hacks, or correct" -" my\n" -"comma use, complain about my document preparation style, or just print " -"off your\n" +"The materials I made for the application development workshop are available on\n" +"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n" +"your input is desired! As it is licensed permissively, you are free to fork it\n" +"and make it your own as well. Share your examples, your hacks, or correct my\n" +"comma use, complain about my document preparation style, or just print off your\n" "own copy in booklet form!" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:39 msgid "" -"I also talked to a guy who gives advice to the government about the " -"differences\n" -"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in " -"which\n" -"peers in a P2P application might want to have enhanced privacy from each-" -"other,\n" +"I also talked to a guy who gives advice to the government about the differences\n" +"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n" +"peers in a P2P application might want to have enhanced privacy from each-other,\n" "and why I2P is perhaps uniquely suited to accomplish that." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:46 msgid "" -"In general, both the application development workshops went well, even " -"though\n" -"they didn't go entirely according to plan in that only a small proportion" -" of the\n" -"audience were application developers. The impression I got was that many " -"people\n" -"are very interested in I2P, but also many people are confused by how " -"interacting\n" -"with I2P works. By re-focusing on their questions and by teaming off with" -" zzz,\n" -"mhatta, and Alex we were fairly successful at dealing with our audience, " -"which\n" +"In general, both the application development workshops went well, even though\n" +"they didn't go entirely according to plan in that only a small proportion of the\n" +"audience were application developers. The impression I got was that many people\n" +"are very interested in I2P, but also many people are confused by how interacting\n" +"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n" +"mhatta, and Alex we were fairly successful at dealing with our audience, which\n" "was more varied in terms of occupation, interest, and I2P knowledge than\n" "expected." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:57 msgid "" -"Besides that, I also talked to Alex about my experimental contextual-" -"identity\n" -"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to" -" talk\n" -"a little about bundling, but not too much, as it was a very busy " -"convention. I'm\n" +"Besides that, I also talked to Alex about my experimental contextual-identity\n" +"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n" +"a little about bundling, but not too much, as it was a very busy convention. I'm\n" "looking forward to following up with him on that soon." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:64 msgid "" "mhatta and I almost won a lobster from a claw machine, but it was a real\n" -"fighter and got away at the last second. Really thought I had it for a " -"moment\n" +"fighter and got away at the last second. Really thought I had it for a moment\n" "though. :)" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:70 msgid "" -"To add to zzz's notes for next time, aside from being more general I " -"believe our\n" -"workshops would not have been as able to adapt to the needs of the " -"audience\n" -"without the support of mhatta and Alex. Having people who can help " -"particpants\n" -"individually or in small groups was immensely helpful, many, many thanks " -"to both\n" +"To add to zzz's notes for next time, aside from being more general I believe our\n" +"workshops would not have been as able to adapt to the needs of the audience\n" +"without the support of mhatta and Alex. Having people who can help particpants\n" +"individually or in small groups was immensely helpful, many, many thanks to both\n" "of them for helping us out." msgstr "" @@ -10872,95 +9745,71 @@ msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:14 msgid "" -"Over the past year I have had the good fortune to participate in the " -"research\n" -"Nguyen Phong Hoang from Stony Brook University has been doing regarding " -"I2P\n" -"censorship. The infrastructure used for this research provided numerous " -"and\n" -"geographically diverse vantage points, and also the ability to conduct " -"in-depth\n" -"measurements across all levels of the network stack. I2P services which " -"were\n" -"measured for availability included official homepage, mirror site, reseed" -"\n" +"Over the past year I have had the good fortune to participate in the research\n" +"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n" +"censorship. The infrastructure used for this research provided numerous and\n" +"geographically diverse vantage points, and also the ability to conduct in-depth\n" +"measurements across all levels of the network stack. I2P services which were\n" +"measured for availability included official homepage, mirror site, reseed\n" "servers and active relays." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:24 msgid "" -"The presentation on Tuesday went very well, and Phong was very busy " -"afterwards\n" -"answering questions about his work. I was busy too answering questions " -"about\n" -"I2P and what it does. The new stickers featuring the updated logo by Ura " -"Design\n" -"got rave reviews! It was a very positive experience and I will be looking" -"\n" -"forward to continuing to work with Phong and monitoring I2P censorship. I" -" would\n" -"encourage anyone who has encountered blocking, or has had success using " -"I2P to\n" +"The presentation on Tuesday went very well, and Phong was very busy afterwards\n" +"answering questions about his work. I was busy too answering questions about\n" +"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n" +"got rave reviews! It was a very positive experience and I will be looking\n" +"forward to continuing to work with Phong and monitoring I2P censorship. I would\n" +"encourage anyone who has encountered blocking, or has had success using I2P to\n" "communicate in restricted environments to reach out if you can. I2P is\n" -"currently working on new solutions to circumvent internet blocking. " -"Having met\n" +"currently working on new solutions to circumvent internet blocking. Having met\n" "people this year who have given me first hand accounts of the effects of\n" -"censorship and the need to stay connected, makes the need for I2P to be " -"more\n" -"resilient where it needs to be and for the team to be creating guides for" -" using\n" +"censorship and the need to stay connected, makes the need for I2P to be more\n" +"resilient where it needs to be and for the team to be creating guides for using\n" "I2P in these situations." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:39 msgid "" -"I will be putting together better resources for researchers interested in" -" I2P,\n" +"I will be putting together better resources for researchers interested in I2P,\n" "as well." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:44 msgid "" "I also had the good fortune to spend time with Mhatta, who is an I2P\n" -"contributor, and to make connections for future funding. A huge thank you" -" to\n" -"the community builders I met in Tunis who I met again and who are " -"offering so\n" -"much support to the project. This has been an exciting year so far, and " -"I2P has\n" -"so much work to do. Please consider donating your time or funding the " -"project\n" +"contributor, and to make connections for future funding. A huge thank you to\n" +"the community builders I met in Tunis who I met again and who are offering so\n" +"much support to the project. This has been an exciting year so far, and I2P has\n" +"so much work to do. Please consider donating your time or funding the project\n" "as it needs to scale quickly to new challenges." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:53 msgid "" -"If you have an opportunity to, you can read the full report Measuring I2P" -"\n" +"If you have an opportunity to, you can read the full report Measuring I2P\n" "Censorship at a Global Scale here\n" "https://www.usenix.org/conference/foci19/presentation/hoang" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:59 msgid "" -"Another great workshop in the measurements workshop was On the Importance" -" of\n" +"Another great workshop in the measurements workshop was On the Importance of\n" "Encrypted-SNI (ESNI) to Censorship Circumvention\n" "https://www.usenix.org/conference/foci19/presentation/chai" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:65 msgid "" -"There are so many great workshops that I attended - anyone who would like" -" too\n" +"There are so many great workshops that I attended - anyone who would like too\n" "can access the program and related materials here:\n" "https://www.usenix.org/conference/foci19/workshop-program" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:71 msgid "" -"I will be attending Our Networks in Toronto next month " -"https://ournetworks.ca/\n" +"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n" "- and so should you! The program can be viewed here\n" "https://ournetworks.ca/program/" msgstr "" @@ -10972,63 +9821,43 @@ msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:14 msgid "" -"This was my first time attending IFF, and what a great experience for I2P" -" this\n" -"was! I met with human rights defenders, people who work on censorship " -"metrics,\n" +"This was my first time attending IFF, and what a great experience for I2P this\n" +"was! I met with human rights defenders, people who work on censorship metrics,\n" "and of course UX and security professionals." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:20 msgid "" "My goal was to connect with people to further support I2P’s UX overhaul,\n" -"keeping in mind security and UX considerations for frontline workers. As " -"it was\n" -"pointed out to me, people see I2P as a very important and powerful " -"resource to\n" -"circumvent censorship and support safe communication, however the " -"interface\n" -"suffers from some usability concerns. People were happy with our initial " -"steps\n" -"to make first time users have a better experience, such as our set up " -"wizard\n" -"and bandwidth detection tool. I also received positive reviews on our " -"changes\n" -"to the website and /home icons. It was very encouraging to hear directly " -"from\n" +"keeping in mind security and UX considerations for frontline workers. As it was\n" +"pointed out to me, people see I2P as a very important and powerful resource to\n" +"circumvent censorship and support safe communication, however the interface\n" +"suffers from some usability concerns. People were happy with our initial steps\n" +"to make first time users have a better experience, such as our set up wizard\n" +"and bandwidth detection tool. I also received positive reviews on our changes\n" +"to the website and /home icons. It was very encouraging to hear directly from\n" "the community that small changes we have made are in the right direction." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:32 msgid "" -"Things like having configuration happen out of the box and not having to " -"put\n" -"people in the position where they need to rely on reading so much " -"documentation\n" -"or chasing documentation were discussed. Also, improved documentation for" -"\n" -"setting up outproxies and and site mirroring were requested and " -"suggested.\n" -"Please see Mikal’s very good instructions on setting up an I2P outproxy " -"that\n" +"Things like having configuration happen out of the box and not having to put\n" +"people in the position where they need to rely on reading so much documentation\n" +"or chasing documentation were discussed. Also, improved documentation for\n" +"setting up outproxies and and site mirroring were requested and suggested.\n" +"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n" "came out of the suggestions this week —\n" -"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to " -"make\n" +"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n" "bug reporting easier." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:43 msgid "" -"To this point, I truly hope that the project will secure resources to " -"continue\n" -"the improvements to its usability that it requires to meet the growing " -"demand\n" -"for I2P services. It is humbling to to be working with such talented " -"people and\n" -"to be able to work together with our community during a time when people " -"all\n" -"over the globe need all of the privacy protecting resources we as people " -"who\n" +"To this point, I truly hope that the project will secure resources to continue\n" +"the improvements to its usability that it requires to meet the growing demand\n" +"for I2P services. It is humbling to to be working with such talented people and\n" +"to be able to work together with our community during a time when people all\n" +"over the globe need all of the privacy protecting resources we as people who\n" "develop, design and educate can offer." msgstr "" @@ -11039,58 +9868,40 @@ msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:14 msgid "" -"The messages from activists in Syria during the Access No\\_! session on " -"the\n" +"The messages from activists in Syria during the Access No\\_! session on the\n" "first day were deeply moving and really drove home why I work in digital\n" -"rights. We listened to the experiences of activists who are unable to " -"travel\n" -"due to lack of status, documentation and active conflict. For these " -"people\n" +"rights. We listened to the experiences of activists who are unable to travel\n" +"due to lack of status, documentation and active conflict. For these people\n" "“the internet is the only passport (they) carry.†Human rights defenders\n" -"spoke of the importance of digital training to keep people protected " -"when they\n" -"are communicating with family inside of the country, as well as with " -"family and\n" -"friends who have left. They had created digital clinics to show people " -"how to\n" +"spoke of the importance of digital training to keep people protected when they\n" +"are communicating with family inside of the country, as well as with family and\n" +"friends who have left. They had created digital clinics to show people how to\n" "use services securely, for instance, how to use features like Signal’s\n" -"disappearing messages so that those messages could not be used against " -"them\n" +"disappearing messages so that those messages could not be used against them\n" "when devices are searched at security check points. Continuing to pursue\n" -"education was also very important, the internet being relied on to access" -"\n" +"education was also very important, the internet being relied on to access\n" "resources." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:30 msgid "" -"The following days we met with people who had both questions about I2P " -"and\n" -"suggestions for potential use cases. We also discussed overhauling the " -"project\n" +"The following days we met with people who had both questions about I2P and\n" +"suggestions for potential use cases. We also discussed overhauling the project\n" "documentation for threat models, improving guides for users with little\n" -"technical background, and ensuring that these guides are easily " -"translatable. I\n" -"made a note that I should go through the proposals and connect then to " -"human\n" -"use cases and solutions. This will be part of the projects’ continued " -"effort\n" +"technical background, and ensuring that these guides are easily translatable. I\n" +"made a note that I should go through the proposals and connect then to human\n" +"use cases and solutions. This will be part of the projects’ continued effort\n" "to improve its user guides and onboarding." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:40 msgid "" -"The opportunity to meet face to face with people who are using I2P and " -"have\n" -"successfully used it to circumvent internet blockages was inspiring. As " -"the\n" +"The opportunity to meet face to face with people who are using I2P and have\n" +"successfully used it to circumvent internet blockages was inspiring. As the\n" "project has began working on its own browser and is examining outproxy\n" -"packaging, it needs as much feedback and testing as possible to create " -"secure\n" -"and frictionless experiences for people. Also, the I2P network needs more" -"\n" -"hosted content and mirrored sites in order to expand resources for its " -"users." +"packaging, it needs as much feedback and testing as possible to create secure\n" +"and frictionless experiences for people. Also, the I2P network needs more\n" +"hosted content and mirrored sites in order to expand resources for its users." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2 @@ -11104,47 +9915,35 @@ msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14 msgid "" -"The weekend of September 20th I traveled to Toronto to meet with Sadie to" -" take\n" -"part in the Our Networks conference. The Our Networks conference " -"encompasses a\n" -"wide variety of topic including many peer-to-peer technologies with an " -"eye\n" +"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n" +"part in the Our Networks conference. The Our Networks conference encompasses a\n" +"wide variety of topic including many peer-to-peer technologies with an eye\n" "toward their potential to make the world a better place." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21 msgid "" -"The conference was fascinating, full of very smart people working on " -"everything\n" -"from physical mesh networks to the distributed web to, of course, " -"anonymity. We\n" -"got to talk to some great people from Tor, Protocol Labs, Parity Labs, " -"the Dat\n" -"Project, as well as a variety of artists and social scientists. Lots of " -"fun too,\n" +"The conference was fascinating, full of very smart people working on everything\n" +"from physical mesh networks to the distributed web to, of course, anonymity. We\n" +"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n" +"Project, as well as a variety of artists and social scientists. Lots of fun too,\n" "and a great environment. Dat in particular presents some pretty cool\n" "opportunities for future co-operation I think." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30 msgid "" -"I hadn't planned on giving a talk, but we were having so much fun that " -"when\n" -"we were asked, Sadie and I put something together and I gave a quick " -"lightning\n" +"I hadn't planned on giving a talk, but we were having so much fun that when\n" +"we were asked, Sadie and I put something together and I gave a quick lightning\n" "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n" -"application development. The talk was recorded and when the video becomes" -"\n" -"available, I'll make sure to add it to this blog. Next year, I'll have " -"some\n" +"application development. The talk was recorded and when the video becomes\n" +"available, I'll make sure to add it to this blog. Next year, I'll have some\n" "submissions for their Zine Library about I2P." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39 msgid "" -"Besides that, I really enjoyed my time visiting Toronto, it was a great " -"place\n" +"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n" "to visit." msgstr "" @@ -11158,14 +9957,10 @@ msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16 msgid "" -"In the 0.9.43 release, we continue work on stronger security and privacy " -"features and performance improvements.\n" -"Our implementation of the new leaseset specification (LS2) is now " -"complete.\n" -"We are beginning our implementation of stronger and faster end-to-end " -"encryption (proposal 144) for a future release.\n" -"Several IPv6 address detection issues have been fixed, and there of " -"course are several other bug fixes." +"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n" +"Our implementation of the new leaseset specification (LS2) is now complete.\n" +"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n" +"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes." msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33 @@ -11209,7 +10004,8 @@ msgid "i2ptunnel support for quoted custom options" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51 -msgid "i2psnark now starts with reduced tunnel count then increases as necessary" +msgid "" +"i2psnark now starts with reduced tunnel count then increases as necessary" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52 @@ -11240,47 +10036,33 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:11 msgid "" -"Highlighting Research - An Empirical Study of the I2P Anonymity Network " -"and its Censorship Resistance" +"Highlighting Research - An Empirical Study of the I2P Anonymity Network and " +"its Censorship Resistance" msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:16 msgid "" -"The following blog post is authored by Information Controls Fellow Hoà ng " -"Nguyên\n" -"Phong. As an ICFP fellow, Phong's research focused on analyzing different" -"\n" -"aspects of the I2P network, a privacy-enhancing Internet tool that can be" -" used\n" +"The following blog post is authored by Information Controls Fellow Hoà ng Nguyên\n" +"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n" +"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n" "to access online content over an anonymity-enhancing network helpful in\n" -"circumventing state-imposed censorship. Working with his host " -"organization, the\n" -"University of Massachusetts Amherst, Phong studied the I2P network's " -"censorship\n" -"resilience, including identifying what blocking methods a state censor " -"might use\n" -"to inhibit access to I2P and investigating potential solutions to make " -"I2P more\n" +"circumventing state-imposed censorship. Working with his host organization, the\n" +"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n" +"resilience, including identifying what blocking methods a state censor might use\n" +"to inhibit access to I2P and investigating potential solutions to make I2P more\n" "resistant to such blockage." msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:28 msgid "" "Phong found blocking attempts on the I2P network (specifically via DNS\n" -"poisoning, SNI-based blocking, TCP packet injection, and page-specific " -"blocks)\n" -"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. " -"Phong\n" -"posits that because the blocks are usually imposed on the I2P download " -"page and\n" -"reseed servers, such blocking could be mitigated by hosting download " -"links to\n" -"this content on large cloud service providers - raising the collateral " -"cost of\n" -"blocking. Phong also built a metrics portal for the platform so that " -"researchers\n" -"and others can better understand who is using I2P, finding that there are" -" about\n" +"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n" +"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n" +"posits that because the blocks are usually imposed on the I2P download page and\n" +"reseed servers, such blocking could be mitigated by hosting download links to\n" +"this content on large cloud service providers - raising the collateral cost of\n" +"blocking. Phong also built a metrics portal for the platform so that researchers\n" +"and others can better understand who is using I2P, finding that there are about\n" "20,000 relays in the network on a daily basis." msgstr "" @@ -11294,10 +10076,8 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:55 msgid "" -"We thank Phong and his collaborators for their excellent study as we move" -" to\n" -"address the issues that were identified. It's exciting to see more " -"academic\n" +"We thank Phong and his collaborators for their excellent study as we move to\n" +"address the issues that were identified. It's exciting to see more academic\n" "study of I2P and are excited to keep working with him." msgstr "" @@ -11306,24 +10086,20 @@ msgid "0.9.44 Release" msgstr "" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:9 -#, fuzzy msgid "0.9.44 with bug fixes" -msgstr "0.9.36ì—ì„œ NTCP2와 버그 ìˆ˜ì •ì´ ì´ë£¨ì–´ì¡ŒìŠµë‹ˆë‹¤." +msgstr "" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16 msgid "" -"0.9.44 contains an important fix for a denial of service issue in hidden " -"services handling of new encryption types.\n" +"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n" "All users should update as soon as possible." msgstr "" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21 msgid "" -"The release includes initial support for new end-to-end encryption " -"(proposal 144).\n" +"The release includes initial support for new end-to-end encryption (proposal 144).\n" "Work continues on this project, and it is not yet ready for use.\n" -"There are changes to the console home page, and new embedded HTML5 media " -"players in i2psnark.\n" +"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n" "Additional fixes for firewalled IPv6 networks are included.\n" "Tunnel build fixes should result in faster startup for some users." msgstr "" @@ -11396,3 +10172,2777 @@ msgstr "" msgid "Change default sig type to EdDSA for Android" msgstr "" +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:2 +msgid "0.9.45 Release" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:9 +msgid "0.9.45 with bug fixes" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16 +msgid "" +"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n" +"There's an update to the console dark theme.\n" +"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)." +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32 +msgid "Dark theme improvements" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:33 +msgid "Console icon changes" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34 +msgid "" +"Move some translations from console to router and core for embedded uses" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37 +msgid "i2psnark HTML5 preview player for partial files" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:43 +msgid "Numerous bandwidth test fixes" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:44 +msgid "Hidden mode fixes to prevent losing peers" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:45 +msgid "Hebrew translation fixes" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:50 +msgid "Content Security Policy improvements" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:51 +msgid "SSU extend timeout for large messages" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:52 +msgid "ECIES-X25519 continued development and fixes" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:53 +msgid "Cancel timeout jobs on message reply" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:54 +msgid "Add SSL and SSL redirect support to EepGet" +msgstr "" + +#: i2p2www/blog/2020/02/25/0.9.45-Release.rst:56 +msgid "Update JBigI library" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:2 +msgid "Git over I2P for Users" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:8 +msgid "Git over I2P" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:10 +msgid "" +"Tutorial for setting up git access through an I2P Tunnel. This tunnel\n" +"will act as your access point to a single git service on I2P. It is part of the\n" +"overall effort to transition I2P from monotone to Git." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:16 +msgid "" +"Before anything else: Know the capabilities the service offers to the public" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:19 +msgid "" +"Depending on how the git service is configured, it may or may not offer\n" +"all services on the same address. In the case of git.idk.i2p, there is a\n" +"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n" +"can be used to push or pull, but SSH is recommended." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:26 +msgid "First: Set up an account at a Git service" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:29 +msgid "" +"To create your repositories on a remote git service, sign up for a user\n" +"account at that service. Of course it’s also possible to create\n" +"repositories locally and push them to a remote git service, but most\n" +"will require an account and for you to create a space for the repository\n" +"on the server. Gitlab has a very simple sign-up form:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:43 +msgid "Second: Create a project to test with" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:46 +msgid "" +"To make sure the setup process works, it helps to make a repository to\n" +"test with from the server, and for the sake of this tutorial, we’re\n" +"going to use a fork of the I2P router. First, browse to the\n" +"i2p-hackers/i2p.i2p repository:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:61 +msgid "Then, fork it to your account." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:73 +msgid "Third: Set up your git client tunnel" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:76 +msgid "" +"To have read-write access to my server, you’ll need to set up a tunnel\n" +"for your SSH client. As an example, we’re going to use the HTTP tunnel\n" +"instead, but if all you need is read-only, HTTP/S cloning, then you can\n" +"skip all this and just use the http_proxy environment variable to\n" +"configure git to use the pre-configured I2P HTTP Proxy. For example:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:97 +msgid "" +"Then, add the address you will be pushing and pulling from. Note that\n" +"this example address is for Read-Only HTTP-over-I2P clones, if your\n" +"admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n" +"need to get the SSH clone base32 from them. Use this Base32 to connect the\n" +"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:109 +msgid "Pick a port to forward the I2P service to locally." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:117 +msgid "" +"I use it alot, so I start my client tunnel automatically, but it’s up to\n" +"you." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:126 +msgid "When you’re all done, it should look alot like this." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:134 +msgid "Fourth: Attempt a clone" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:137 +msgid "Now your tunnel is all set up, you can attempt a clone over SSH." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:146 +msgid "" +"You might get an error where the remote end hangs up unexpectedly.\n" +"Unfortunately git still doesn’t support resumable cloning. Until it\n" +"does, there are a couple fairly easy ways to handle this. The first and\n" +"easiest is to try and clone to a shallow depth:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:158 +msgid "" +"Once you’ve performed a shallow clone, you can fetch the rest resumably\n" +"by changing to the repo directory and running:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:167 +msgid "" +"At this point, you still don’t have all your branches yet. You can get\n" +"them by running the following commands:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:177 +msgid "" +"Which tells git to alter the repository configuration so that fetching\n" +"from origin fetches all branches." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:182 +msgid "" +"If that doesn’t work, you can try opening the tunnel configuration menu\n" +"and adding some backup tunnels." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:193 +msgid "" +"If that doesn’t work, then the next easy thing to try is to decrease the\n" +"tunnel length. Don’t do this if you believe you are at risk of your\n" +"code-contribution activity being de-anonymized by a well-resourced\n" +"attacker seeking to run many malicious nodes and control your whole\n" +"path. If that sounds unlikely to you then you can probably do it safely." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:207 +msgid "Suggested Workflow for Developers!" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:210 +msgid "" +"Revision control can make your life easier, but it works best if you use\n" +"it well! In light of this, we strongly suggest a fork-first,\n" +"feature-branch workflow as many are familiar with from Github. In such a\n" +"workflow, the master branch is used as a sort of “Trunk†for updates and\n" +"is never touched by the programmmer, instead, all changes to the master\n" +"are merged from branches. In order to do set up your workspace for this,\n" +"take the following steps:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:220 +msgid "" +"**Never make changes to the Master Branch**. You will be using the\n" +" master branch to periodially obtain updates to the official source\n" +" code. All changes should be made in feature branches." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:224 +msgid "" +"Set up a second remote in your local repository using the upstream\n" +" source code." +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:231 +msgid "Pull in any upstream changes on your current master:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:237 +msgid "" +"Before making any changes to the source code, check out a new feature\n" +" branch to develop on:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:244 +msgid "" +"When you’re done with your changes, commit them and push them to your\n" +" branch" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:252 +msgid "" +"Submit a merge request. When the merge request is approved and\n" +" brought into the upstream master, check out the master locally and\n" +" pull in the changes:" +msgstr "" + +#: i2p2www/blog/2020/03/06/git-over-i2p.rst:261 +msgid "" +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is\n" +" made, you can update your master code using this procedure as well." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:1 +msgid "Gitlab over I2P Setup" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7 +msgid "" +"Mirror I2P Git repositories and Bridge Clearnet repositories for others." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9 +msgid "" +"This is the setup process I use for configuring Gitlab and I2P, with\n" +"Docker in place to manage the service itself. Gitlab is very easy to\n" +"host on I2P in this fashion, it can be administered by one person\n" +"without much difficulty. In my configuration, I use a Debian VM to host\n" +"docker containers and an I2P router, on a Debian Host system, however,\n" +"this may be more than necessary for some people. These instructions\n" +"should work on any Debian-based system, regardless of whether it is in a\n" +"VM or not, and should easily translate to any system where Docker and an\n" +"I2P router are available. This guide starts at Docker and does not\n" +"assume any VM underneath." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:22 +msgid "Dependencies and Docker" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:25 +msgid "" +"Because Gitlab runs in a container, we only need to install the\n" +"dependencies required for the container on our main system.\n" +"Conveniently, you can install everything you need with:" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:35 +msgid "" +"on an otherwise unmodified Debian system, or if you have added Docker’s\n" +"own “Community†Debian repository, you may use:" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:44 +msgid "instead." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:49 +msgid "Fetch the Docker Containers" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:52 +msgid "" +"Once you have docker installed, you can fetch the docker containers\n" +"required for gitlab. *Don’t run them yet.*" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:61 +msgid "" +"For those who are concerned, the gitlab-ce Docker image is built using\n" +"only Ubuntu Docker images as a parent, which are built from scratch\n" +"images. Since there are no third-party images involved here, updates\n" +"should come as soon as they are available in the host images. To review\n" +"the Dockerfile for yourself, visit the `Gitlab source\n" +"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70 +msgid "" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73 +msgid "" +"Gitlab servers inside of I2P can be run with or without the ability to\n" +"interact with servers on the internet outside of I2P. In the case where\n" +"the Gitlab server is *not allowed* to interact with servers outside of\n" +"I2P, they cannot be de-anonymized by cloning a git repository from a git\n" +"server on the internet outside of I2P. They can, however, export and\n" +"mirror repositories from other git services inside of I2P." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:82 +msgid "" +"In the case where the Gitlab server is *allowed* to interact with\n" +"servers outside of I2P, it can act as a “Bridge†for the users, who can\n" +"use it to mirror content outside I2P to an I2P-accessible source,\n" +"however it *is not anonymous* in this case. Git services on the\n" +"non-anonymous internet will be connected to directly." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:90 +msgid "" +"**If you want to have a bridged, non-anonymous Gitlab instance with\n" +"access to** **web repositories,** no further modification is necessary." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:95 +msgid "" +"**If you want to have an I2P-Only Gitlab instance with no access to\n" +"Web-Only** **Repositories**, you will need to configure Gitlab to use an\n" +"I2P HTTP Proxy. Since the default I2P HTTP proxy only listens on\n" +"``127.0.0.1``, you will need to set up a new one for Docker that listens\n" +"on the Host/Gateway address of the Docker network, which is usually\n" +"``172.17.0.1``. I configure mine on port ``4446``." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:104 +msgid "Start the Container Locally" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:107 +msgid "" +"Once you have that set up, you can start the container and publish your\n" +"Gitlab instance locally." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:124 +msgid "" +"Visit your Local Gitlab instance and set up your admin account. Choose a\n" +"strong password, and configure user account limits to match your\n" +"resources." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:130 +msgid "" +"Modify gitlab.rb(Optional, but a good idea for “Bridged non-anonymous†" +"hosts)" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:133 +msgid "" +"It’s also possible to apply your HTTP Proxy settings in a more granular\n" +"way, so that you can only allow users to mirror repositories from the\n" +"domains that you choose. Since the domain is presumably operated by an\n" +"organization, you can use this to ensure that repositories that are\n" +"mirrorable follow a reasonable set of policies. After all, there is far\n" +"more abusive content on the non-anonymous internet than there is on I2P,\n" +"we wouldn’t want to make it too easy to introduce abusive content from\n" +"such a nefarious place." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:144 +msgid "" +"Add the following lines to your gitlab.rb file inside the\n" +"/src/gitlab/config container. These settings will take effect when you\n" +"restart in a moment." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:169 +msgid "Set up your Service tunnels and sign up for a Hostname" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:172 +msgid "" +"Once you have Gitlab set up locally, go to the I2P Router console. You\n" +"will need to set up two server tunnels, one leading to the Gitlab\n" +"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH\n" +"interface on TCP Port 8022." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:179 +msgid "Gitlab Web(HTTP) Interface" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:182 +msgid "" +"For the Web interface, use an “HTTP†server tunnel. From\n" +"http://127.0.0.1:7657/i2ptunnelmgr launch the “New Tunnel Wizard†and\n" +"enter the following values at each step:" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:188 +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:221 +msgid "Select “Server Tunnelâ€" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:189 +msgid "Select “HTTP Serverâ€" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:190 +msgid "Fill in “Gitlab Web Service†or otherwise describe the tunnel" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:191 +msgid "Fill in ``127.0.0.1`` for the host and ``8080`` for the port." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:192 +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:225 +msgid "Select “Automatically start tunnel when Router Startsâ€" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:193 +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:226 +msgid "Confirm your selections." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:195 +msgid "Register a Hostname(Optional)" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:198 +msgid "" +"Web services on I2P can register hostnames for themselves by providing\n" +"an authentication string to a jump service provider like\n" +"`stats.i2p <http://stats.i2p>`__. To do this, open the\n" +"http://127.0.0.1:7657/i2ptunnelmgr again and click on the “Gitlab Web\n" +"Service†item you just set up. Scroll to the bottom of the “Edit Server\n" +"Settings†section and click Registration Authentication. Copy the field\n" +"that says “Authentication for adding Hostname†and visit\n" +"`stats.i2p <http://stats.i2p/i2p/addkey.html>`__ to add your hostname.\n" +"Note that if you want to use a subdomain(Like git.idk.i2p) then you will\n" +"have to use the correct authentication string for your subdomain, which\n" +"is a little bit more complicated and merits it’s own instructions." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:212 +msgid "Gitlab SSH Interface" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:215 +msgid "" +"For the SSH interface, use a “Standard†server tunnel. From\n" +"http://127.0.0.1:7657/i2ptunnelmgr launch the “New Tunnel Wizard†and\n" +"enter the following values at each step:" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:222 +msgid "Select “Standard Serverâ€" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:223 +msgid "Fill in “Gitlab SSH Service†or otherwise describe the tunnel" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:224 +msgid "Fill in ``127.0.0.1`` for the host and ``8022`` for the port." +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:228 +msgid "Re-start the Gitlab Service with the new Hostname" +msgstr "" + +#: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:231 +msgid "" +"Finally, if you either modified ``gitlab.rb`` or you registered a\n" +"hostname, you will need to re-start the gitlab service for the settings\n" +"to take effect." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:1 +msgid "Using a git bundle to fetch the I2P source code" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:7 +msgid "Download the I2P Source code via Bittorrent." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:9 +msgid "" +"Cloning large software repositories over I2P can be difficult, and using\n" +"git can sometimes make this harder. Fortunately, it can also sometimes\n" +"make it easier. Git has a ``git bundle`` command which can be used to\n" +"turn a git repository into a file which git can then clone, fetch, or\n" +"import from a location on your local disk. By combining this capability\n" +"with bittorrent downloads, we can solve our remaining problems with\n" +"``git clone``." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:17 +msgid "Before you Start" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:20 +msgid "" +"If you intend to generate a git bundle, you **must** already possess a\n" +"full copy of the **git** repository, not the mtn repository. You can get\n" +"it from github or from git.idk.i2p, but a shallow clone(a clone done to\n" +"–depth=1) *will not* *work*. It will fail silently, creating what looks\n" +"like a bundle, but when you try to clone it it will fail. If you are\n" +"just retrieving a pre-generated git bundle, then this section does not\n" +"apply to you." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:28 +msgid "Fetching I2P Source via Bittorrent" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:31 +#, python-format +msgid "" +"Someone will need to supply you with a torrent file or a magnet link\n" +"corresponding to an existing ``git bundle`` that they have already\n" +"generated for you. A recent, correctly-generated bundle of the mainline\n" +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n" +"of I2P at my pastebin\n" +"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n" +"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n" +"and if you're a BiglyBT user who wants to bridge the torrent, use \n" +"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n" +"to announce to clearnet trackers as well." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:43 +msgid "" +"Once you have a bundle, you will need to use git to create a working\n" +"repository from it. If you’re using GNU/Linux and i2psnark, the git\n" +"bundle should be located in $HOME/.i2p/i2psnark or, as a service on\n" +"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on\n" +"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/†instead. The\n" +"examples here assume I2PSnark on GNU/Linux, if you use something else,\n" +"replace the path to the bundle with the download directory preferred by\n" +"your client and platform." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:52 +msgid "Using ``git clone``" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:55 +msgid "Cloning from a git bundle is easy, just:" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:61 +msgid "" +"If you get the following error, try using git init and git fetch\n" +"manually instead." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:68 +msgid "Using ``git init`` and ``git fetch``" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:71 +msgid "First, create an i2p.i2p directory to turn into a git repository." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:77 +msgid "Next, initialize an empty git repository to fetch changes back into." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:84 +msgid "Finally, fetch the repository from the bundle." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:91 +msgid "Replace the bundle remote with the upstream remote" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:94 +msgid "" +"Now that you have a bundle, you can keep up with changes by setting the\n" +"remote to the upstream repository source." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:101 +msgid "Generating a Bundle" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:104 +msgid "" +"First, follow the `Git guide for Users <GIT.md>`__ until you have a\n" +"successfully ``--unshallow``\\ ed clone of clone of the i2p.i2p\n" +"repository. If you already have a clone, make sure you run\n" +"``git fetch --unshallow`` before you generate a torrent bundle." +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:109 +msgid "Once you have that, simply run the corresponding ant target:" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:115 +msgid "" +"and copy the resulting bundle into your I2PSnark downloads directory.\n" +"For instance:" +msgstr "" + +#: i2p2www/blog/2020/03/18/bundle-over-torrent.rst:122 +msgid "" +"In a minute or two, I2PSnark will pick up on the torrent. Click on the\n" +"“Start†button to begin seeding the torrent." +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:2 +msgid "0.9.46 Release" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:9 +msgid "0.9.46 with new ECIES Encryption" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16 +msgid "" +"0.9.46 contains significant performance improvements in the streaming library.\n" +"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing." +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21 +msgid "" +"Windows users only:\n" +"This release fixes a local privilege escalation vulnerability\n" +"which could be exploited by a local user that has the ability to run programs.\n" +"Please apply the update as soon as possible.\n" +"Thanks to Blaze Infosec for their responsible disclosure of the issue." +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29 +msgid "" +"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n" +"Users on those platforms must upgrade to receive future I2P updates." +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44 +msgid "" +"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal " +"144)" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45 +msgid "Hidden Services Manager: Redesign edit pages" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:46 +msgid "i2psnark: Fix marking torrents as BAD at startup" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:47 +msgid "NetDB: Support ECIES replies to lookups (proposal 154)" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:48 +msgid "RRD4J 3.5 replaces jrobin" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:49 +msgid "Streaming performance improvments using Westwood+ congestion control" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54 +msgid "" +"Hidden Services Manager: Fixes for changing shared client options, prevent " +"changing certain options while tunnel is running" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55 +msgid "Reproducible build fix" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:56 +msgid "Streaming: Multiple fixes" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:57 +msgid "UPnP: Several fixes for changing interfaces and devices" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:58 +msgid "Windows: Fix permissions on install directory" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:63 +msgid "Build process changes to support git" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:64 +msgid "Console: Don't show IPv6 temporary addresses as bind options" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:65 +msgid "Console: Fix up javascript, stricter Content Security Policy" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:66 +msgid "Crypto: Disable speculative tagset usage" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:67 +msgid "Eepsites: Add Jetty GzipHandler for Jetty 9.3+" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:68 +msgid "I2CP: Disable gzip for HTTP server tunnels and i2psnark" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:69 +msgid "i2psnark: Connect out to other seeds to fetch new comments" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:70 +msgid "i2psnark: Support file paths in add form" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:71 +msgid "NetDB: Don't send \"fake hash\" to indicate exploration" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:72 +msgid "Profiles: Change decay algorithm" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:73 +msgid "Profiles: Limit average speed calculation to high capacity peers" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:74 +msgid "Router: Auto-floodfill now class N minimum" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:75 +msgid "Router: Checks for key certificates in destinations (proposal 145)" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:76 +msgid "Router: Enforce minimum version for tunnel peers" +msgstr "" + +#: i2p2www/blog/2020/05/25/0.9.46-Release.rst:77 +msgid "SusiDNS: Support adding Base 32 addresses" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:2 +msgid "Help your Friends Join I2P by Sharing Reseed Bundles" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:9 +msgid "Create, exchange, and use reseed bundles" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:11 +msgid "" +"Most new I2P routers join the network by bootstrapping with the help of\n" +"a reseed service. However, reseed services are centralized and\n" +"comparatively easy to block, considering the emphasis on de-centralized\n" +"and un-blockable connections in the rest of the I2P network. If a new\n" +"I2P router finds itself unable to bootstrap, it may be a possible to use\n" +"an existing I2P router to generate a working “Reseed bundle†and\n" +"bootstrap without the need of a reseed service." +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:21 +msgid "" +"It is possible for a user with a working I2P connection to help a\n" +"blocked router join the network by generating a reseed file and passing\n" +"it to them via a secret or non-blocked channel. In fact, in many\n" +"circumstances, an I2P router that is already connected will not be\n" +"affected by reseed blocking at all, so **having working I2P routers\n" +"around means that existing I2P routers can help new I2P routers by\n" +"providing them with a hidden way of bootstrapping**." +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:31 +msgid "Generating a Reseed Bundle" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:34 +msgid "" +"To create a reseed bundle for others to use, go to the `Reseed\n" +" configuration page <http://127.0.0.1:7657/configreseed>`__. You will\n" +" see a section that looks like this. Click the button indicated by the\n" +" red circle. |Create a Reseed Zip|" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:38 +msgid "" +"Now that you’ve clicked the button, a zip will be generated\n" +" containing enough information to bootstrap a new I2P router. Download\n" +" it and transfer it to the computer with the new, un-bootstrapped I2P\n" +" router. |Downloads a Reseed Zip|" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:43 +msgid "Performing a Reseed from File" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:46 +msgid "" +"Obtain an i2preseed.zip file from a friend with an I2P router that is\n" +" already running, or from a trusted source somewhere on the internet,\n" +" and visit the `Reseed Configuration\n" +" page <http://127.0.0.1:7657/configreseed>`__. Click the button that\n" +" says “Select zip or su3 file†and navigate to that file. |Select a\n" +" Reseed Zip|" +msgstr "" + +#: i2p2www/blog/2020/06/07/file-based-reseed.rst:52 +msgid "" +"When you’ve selected your reseed file, click the “Reseed from Fileâ€\n" +" button. |Reseed from a Zip File|. You’re done! Your router will now\n" +" bootstrap using the zip file, and you will be ready to join the I2P\n" +" network." +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:2 +msgid "0.9.47 Release" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:9 +msgid "0.9.47 enables new ECIES Encryption" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16 +msgid "" +"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n" +"The Sybil analysis and blocking tool is now enabled by default." +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21 +msgid "" +"Java 8 or higher is now required.\n" +"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n" +"Users on those platforms should upgrade so you may continue to receive I2P updates." +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37 +msgid "Java 8 now required" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42 +msgid "" +"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, " +"HTTP proxy, and new tunnels" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43 +msgid "Increase streaming MTU for ECIES connections" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:44 +msgid "Enable Sybil analysis and blocking tool by default" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51 +msgid "" +"Hidden Services Manager: Fix missing server tunnel length configuration" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52 +msgid "Hidden Services Manager: Fix missing server throttle configuration" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:53 +msgid "i2psnark: Fix javascript confirmation for delete buttons" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:54 +msgid "UPnP: More fixes for changing interfaces and devices" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:55 +msgid "Fix DoH handling of Cloudflare responses" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:56 +msgid "Fix blinded/encrypted leaseset creation" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:57 +msgid "Fix persistent leaseset keys" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:64 +msgid "Sign Windows dlls" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:65 +msgid "Faster gzip uncompression for level 0" +msgstr "" + +#: i2p2www/blog/2020/08/24/0.9.47-Release.rst:66 +msgid "i2psnark: Increase max pipeline" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:2 +msgid "0.9.48 Release" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:9 +msgid "0.9.48 with performance enhancements" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16 +msgid "" +"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n" +"We have added preliminary support for new tunnel build message encryption (proposal 152).\n" +"There are significant performance improvements throughout the router." +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22 +msgid "" +"Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n" +"Users on that platform should upgrade so you may continue to receive I2P updates." +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37 +msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:38 +msgid "Block same-country connections when in hidden mode" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:39 +msgid "BOB: Add deprecation warning" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:40 +msgid "Build: Drop support for Xenial; ant 1.9.8 or higher required to build" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:41 +msgid "i2ptunnel: Enable dual-key encryption for most tunnel types" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:42 +msgid "JBigI: Add library for Linux aarch64, zen, and zen2" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:43 +msgid "Preliminary support for ECIES-X25519 routers (proposals 152 and 156)" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:44 +msgid "Ratchet: Efficiency improvements and memory reduction" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:45 +msgid "SSU: Randomize intro key" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:46 +msgid "SSU performance improvements" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:47 +msgid "System tray: Enable by default for Linux KDE and LXDE" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:53 +msgid "Build: Set release property for better runtime compatibility" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:54 +msgid "Console: Fix Jetty not starting on Java 11.0.9.1" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:55 +msgid "i2psnark: Limit size of embedded video" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:56 +msgid "Improved IPv6 address validation" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:57 +msgid "Installer: Disable pack200 to support Java 14+" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:58 +msgid "Installer: Add missing linux armv7 and aarch64 wrapper binaries" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:59 +msgid "i2ptunnel: Filter server response headers when not compressing" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:60 +msgid "NTCP2: Fix sending termination message on idle timeout" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:61 +msgid "Streaming: Fix handling of tag options" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:67 +msgid "Build: Reproducible build fix" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:68 +msgid "Core: Refactoring of data structures to reduce memory usage" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:69 +msgid "Crypto: Cache HMAC256 instances" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:70 +msgid "i2psnark: Hide BEP 48 padding directory in UI" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:71 +msgid "i2psnark: Checks for unsupported v2 torrents" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:72 +msgid "i2psnark: Remove old opentrackers" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:73 +msgid "i2ptunnel: Improved support for offline keys" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:75 +msgid "NetDB: Increase minimum floodfill version for leaseset lookups" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:76 +msgid "NTCP: Set nodelay on sockets" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:77 +msgid "Proxy: Remove old jump servers" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:78 +msgid "Ratchet: Rotate keys faster" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:80 +msgid "Wrapper 3.5.44 (new installs only)" +msgstr "" + +#: i2p2www/blog/2020/11/30/0.9.48-Release.rst:82 +msgid "New partial translations for Kurdish, Turkmen, Argentinian Spanish" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:2 +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:11 +msgid "Hello Git, Goodbye Monotone" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:9 +msgid "Hello git, goodbye mtn" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:16 +msgid "The I2P Git Migration is nearly concluded" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21 +msgid "" +"For over a decade, I2P has relied on the venerable Monotone service to support\n" +"its version control needs, but during the past few years, most of the world has\n" +"moved on to the now-universal Git version control system. In that same\n" +"time, the I2P Network has become faster and more reliable, and accessible\n" +"workarounds to Git's non-resumability have been developed." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29 +msgid "" +"Today marks a significant occasion for I2P, as we switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n" +"Monotone to Git officially." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35 +msgid "" +"While our use of mtn has been questioned in the past, and it's not always been a\n" +"popular choice, I'd like to take this moment, as perhaps the very last project to use\n" +"Monotone to thank the Monotone developers, current and former, wherever they are,\n" +"for the software they created." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:44 +msgid "GPG Signing" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49 +msgid "" +"Checkins to the I2P Project repositories require you to configure GPG signing for\n" +"your git commits, including Merge Requests and Pull Requests. Please configure\n" +"your git client for GPG signing before you fork i2p.i2p and check anything in." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55 +msgid "Official Repositories and Gitlab/Github Syncing" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60 +msgid "" +"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n" +"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n" +"at Github at https://github.com/i2p/i2p.i2p." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66 +msgid "" +"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n" +"instance, to Github, and back again. This means that it is possible to create and submit\n" +"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n" +"and a Pull Request on Github, when merged, will appear on Gitlab." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73 +msgid "" +"This means that it's possible to submit code to us through our Gitlab instance or through\n" +"Github depending on what you prefer, however, more of the I2P developers are regularly\n" +"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n" +"than PR's to Github." +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:80 +msgid "Thanks" +msgstr "" + +#: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85 +msgid "" +"Congratulations and thanks to everyone who helped in the git migration, especially\n" +"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n" +"Monotone, it has become a barrier for new and existing participants in I2P development\n" +"and we're excited to join the world of developers using Git to manage their distributed\n" +"projects." +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:2 +msgid "0.9.49 Release" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:9 +msgid "0.9.49 with SSU fixes and faster crypto" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16 +msgid "" +"0.9.49 continues the work to make I2P faster and more secure.\n" +"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n" +"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n" +"(Destinations have been using this encryption for a few releases now)\n" +"We've been working on the specifications and protocols for new encryption for several years,\n" +"and we are getting close to the end of it! The migration will take several releases to complete." +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25 +msgid "" +"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n" +"(randomly selected at restart) will be using the new encryption.\n" +"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n" +"This is normal, because your router has generated a new identity.\n" +"Your performance should recover after a while." +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33 +msgid "" +"We have \"rekeyed\" the network twice before, when changing the default signature type,\n" +"but this is the first time we've changed the default encryption type.\n" +"Hopefully it will all go smoothly, but we're starting slowly to be sure." +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49 +msgid "Build: Git migration" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:50 +msgid "Build: Move web resources to wars" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:51 +msgid "i2psnark WebSeed support" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:52 +msgid "i2psnark padding file support" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:53 +msgid "i2ptunnel: Move proxy resources to jar" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:54 +msgid "Router: Redesign ECIES encryption for floodfills (proposal 156)" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:55 +msgid "Router: Verify RI stores after startup" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:56 +msgid "Router: Reduce Sybil threshold" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:57 +msgid "Router: ECIES for new routers" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:58 +msgid "Router: Start of ECIES migration" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:59 +msgid "SSU: Send individual fragments of messages" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:60 +msgid "SSU: Westwood+ congestion control" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:61 +msgid "SSU: Fast retransmit" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:66 +msgid "Build: Fix Gradle build" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:67 +msgid "Crypto: Increase ratchet tag window to prevent message loss" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68 +msgid "" +"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69 +msgid "i2ptunnel: Fix config file saving issues" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:70 +msgid "Router: Fix leaseset request fails causing watchdog to bark" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:71 +msgid "Router: Hidden mode fixes" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:72 +msgid "SSU: Fix partial acks not being sent" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:73 +msgid "SSU: Fix occasional high CPU usage" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:78 +msgid "Crypto: AES performance improvements" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:79 +msgid "DoH: Change to RFC 8484 style" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:80 +msgid "i2ptunnel: Remove DSA shared clients" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:81 +msgid "Proxy: Add jump servers" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:82 +msgid "Router: Add more countries for hidden mode" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:83 +msgid "Router: Tunnel peer selection changes" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:84 +msgid "Router: Move Sybil subsystem from console to router for embedded use" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:85 +msgid "Router: Verify RI stores for a while after startup" +msgstr "" + +#: i2p2www/blog/2021/02/17/0.9.49-Release.rst:86 +msgid "Util: New unit tests" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2 +msgid "0.9.50 Release" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9 +msgid "0.9.50 with IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16 +msgid "" +"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n" +"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n" +"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22 +msgid "" +"We have finally fixed some longstanding SusiMail corruption bugs.\n" +"Changes to the bandwidth limiter should improve network tunnel performance.\n" +"There are several improvements in our Docker containers.\n" +"We have improved our defenses for possible malicious and buggy routers in the network." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39 +msgid "Docker improvements" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40 +msgid "NTCP: Remove support for version 1" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41 +msgid "Reseed: Use DNSOverHTTPS" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42 +msgid "Router: Increase ECIES rekey probability" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43 +msgid "Router: Persist Sybil blocklist" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44 +msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46 +msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47 +msgid "UPnP: Add support for IPv6" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53 +msgid "Debian: Fix link to compiler jar" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54 +msgid "i2psnark: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55 +msgid "Jetty: Fix detection of SSL connector" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56 +msgid "NetDB: Fix NPE when validating expired blinded leaseset" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57 +msgid "NTP: Year 2036 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58 +msgid "Router: Fix rekeying every restart on ARM" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59 +msgid "Router: Fix decryption of encrypted leasesets" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60 +msgid "SAM: Fix removal of subsessions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61 +msgid "SSU: Fix excessive dropping by the bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62 +msgid "SSU: Fix publishing 'C' capability when not an introducer" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63 +msgid "SSU: Fixes for firewalled/not firewalled state transitions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64 +msgid "SSU: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65 +msgid "SSU: Peer test fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66 +msgid "SusiMail: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67 +msgid "SusiMail: Fix stream closed errors" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68 +msgid "SusiMail: Fix corruption in display of large, new messages" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69 +msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70 +msgid "UPnP: Fix leases not being renewed before expiration" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76 +msgid "Build: Remove empty jars and wars from installers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77 +msgid "Build: Prep for different release and API versions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78 +msgid "Build: Remove launcher code" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79 +msgid "Gradle build fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80 +msgid "Profiles: Disable tunnel peer test" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81 +msgid "Profiles: Remove unused tunnel test response time stat" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82 +msgid "SSU: Avoid outbound connections to buggy routers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83 +msgid "Transports: Increase connection limits for some platforms" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2 +msgid "1.5.0 Release" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9 +msgid "1.5.0 with new tunnel build messages" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16 +msgid "" +"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n" +"This does not signify a major API change, or a claim that development is now complete.\n" +"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22 +msgid "" +"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n" +"We continue the transition of the network's routers to X25519 encryption.\n" +"Of course there are also numerous bug fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39 +msgid "Tunnels: Finish support for new build messages (proposal 157)" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40 +msgid "Updates: Support for .dmg and .exe updates" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45 +msgid "Console: Fix generation of SSL keys on Java 17" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46 +msgid "i2psnark: Fix autostart for magnets" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47 +msgid "Router: Fix rare deadlock in publishing our RI" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48 +msgid "SSU: Fix handling of bad peer test responses" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49 +msgid "UPnP: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54 +msgid "Jetty: Improve sort in directory listings" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55 +msgid "Jetty: Add X-I2P-Location header" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56 +msgid "Router: Increase probability to rekey to ECIES" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57 +msgid "Streaming: Performance improvements for low-latency connections" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2 +msgid "I2P Celebrates its 20th Year" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9 +msgid "I2P has been around for 20 years, let's take a look back" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11 +msgid "20 Years of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16 +msgid "" +"It's hard to believe, but I2P has been around for nearly 20 years! From its\n" +"beginning as a C project which provided anonymous access to IRC, we've had\n" +"hundreds of contributors, accepted checkins from dozens of coders, used 2\n" +"main languages, 3 version control systems, experienced a migration of its\n" +"crypography, and multiple soft-forks. There have been around 500 registered\n" +"sites on the Invisible Web, and countless unregistered I2P sites that were only\n" +"accessible via their cryptographic hostnames." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26 +msgid "" +"Thanks to the participation of users like you, the network has grown from a tiny\n" +"group of power users to over 75,000 nodes operated from all over the world,\n" +"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n" +"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n" +"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n" +"independent C++ implementation of the protocol, i2pd)." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35 +msgid "A Routing Protocol with Flagship Applications" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40 +msgid "" +"Even before other anonymity projects were providing their own application\n" +"bundles, I2P was a tool for building applications that were configured for\n" +"anonymity. Over the years, we've leaned on this strength, by expanding our\n" +"APIs to support more and more versatile applications. Today, we're still\n" +"developing new ways of building I2P into applications." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48 +msgid "" +"Using the power of the Hidden Services Manager or the SAM API, developers of all\n" +"kinds of applications can empower their users with anonymity using I2P. Exciting\n" +"downstream projects like Monero's I2P-Zero have made it very easy for developers\n" +"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n" +"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n" +"protocols." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57 +msgid "An Anonymous Network By Everyone, For Everyone" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62 +msgid "" +"I2P has always been a decentralized network, because its obvious that providing\n" +"an anonymity network is an intrinsically collaborative process. To illustrate\n" +"with the most extreme example, a single computer cannot provide itself\n" +"with anonymity, nor can it be a useful network, by definiton. However, building\n" +"I2P in this fully-decentralized manner hasn't always been easy." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70 +msgid "" +"From the beginning, I2P would need to be scalable, and be able to balance itself\n" +"so that high-bandwidth nodes wouldn't be able to easily take over the network.\n" +"Sybil attacks would leave the realm of academia and we would need to develop\n" +"new defenses against them." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77 +msgid "" +"We've worked very hard to never compromise on this stance, and today every I2P\n" +"router helps participate in providing the network with bandwidth resources and\n" +"providing the users with anonymity. In doing so, we've learned incredible things\n" +"and produced a network which at times has seemed inconceivable." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84 +msgid "Celebrating I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89 +msgid "" +"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n" +"present, and future of I2P, highlight applications and tools that build on\n" +"and enhance I2P, and showcase the best of our community. Check back here for\n" +"more in the coming days!" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96 +msgid "" +"`The History of I2P\n" +" </en/blog/post/2021/08/28/History-of-I2P>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98 +msgid "" +"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n" +" </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100 +msgid "" +"`Level-Up your I2P use with Encrypted LeaseSets\n" +" </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102 +msgid "" +"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for " +"End-Users" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103 +msgid "I2P's Usability Journey" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104 +msgid "Building Bridges - Making Connections with Other Privacy Projects" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2 +msgid "20 Years of Privacy: A brief History of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9 +msgid "A history of I2P As We Know It" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11 +msgid "" +"Invisibility is the best defense: building an internet within an internet" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16 +msgid "" +"I believe most people want this technology so they can express\n" +" themselves freely. It’s a comfortable feeling when you know you can\n" +" do that. At the same time we can conquer some of the problems seen\n" +" within the Internet by changing the way security and privacy is\n" +" viewed, as well as the extent to what it is valued." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23 +msgid "" +"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n" +"“desire for instant communication with other Freenet users to talk about\n" +"Freenet issues, and exchange Freenet keys while still maintaining\n" +"anonymity, privacy and security.†It was called IIP — the Invisible IRC\n" +"Project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35 +msgid "" +"The Invisible IRC Project was based on an ideal and framework behind The\n" +"InvisibleNet:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38 +msgid "In an interview from 2002, 0x90 described the project:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40 +msgid "" +"“InvisibleNet is a research & development driven organization whose main\n" +" focus is the innovation of intelligent network technology. Our goal is\n" +" to provide the highest standards in security and privacy on the widely\n" +" used, yet notoriously insecure Internet.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45 +msgid "" +"\"The InvisibleNet team is comprised of a talented group of developers and\n" +" architects entirely dedicated to providing its users with both\n" +" convenience and the very best in secure communication.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49 +msgid "" +"\"Our technological ideals are reflected in the implementation of a\n" +" framework that is solid in design, and transparent in its application.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52 +msgid "" +"\"Here at InvisibleNet we strive towards the greatest level of quality\n" +" possible by keeping all areas of our research & development open and\n" +" available to the public for peer review, feedback, suggestions and new\n" +" ideas.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57 +msgid "" +"\"The Invisible Internet Project: Defined as the “New Internetâ€.\n" +" Peer 2 Peer Internet. Using your peers to protect you. It is a\n" +" similar concept to the Invisible IRC Project, with its design as our\n" +" test model. We plan to re-design the Internet by taking it a step\n" +" further and having security and privacy be first priority.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63 +msgid "" +"\"The Invisible Internet Project or Protocol will be utilizing the\n" +" tests and research/development concepts of the Invisible IRC Project\n" +" to give us the scalability that we need and leverage this to take it\n" +" to the next level.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68 +msgid "" +"\"This, in essence will be an impenetrable neural-network, that is\n" +" self-driven, self-defensed, and completely seamless to already\n" +" applied protocols, specifically client to server (or agents as I call\n" +" them). It will be THE next transport layer, a layer on top of the\n" +" notoriously insecure Internet, to deliver full anonymity, privacy,\n" +" and security at the highest level possible. Decentralized and peer to\n" +" peer Internet, by the way, means no more worrying about your ISP\n" +" controlling your traffic. This will allow you to do seamless\n" +" activities and change the way we look at security and even the\n" +" Internet, utilizing public key cryptography, IP steganography, and\n" +" message authentication. The Internet that should have been, will be\n" +" soon.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85 +msgid "All citations and quotes are from the interviews found here:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90 +msgid "" +"By 2003, several other similar projects had started, the largest being\n" +"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n" +"encrypt and anonymize a variety of traffic. For IIP, it became clear\n" +"that IRC alone was not a big-enough target. What was needed was an\n" +"anonymizing layer for all protocols. IIP by now was also being called\n" +"“InvisibleNetâ€." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97 +msgid "" +"In early 2003, a new anonymous developer, “jrandom†joined the project.\n" +"His explicit goal was to broaden the charter of IIP." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100 +msgid "" +"jrandom wished to rewrite the IIP code base in Java, a language he was\n" +"familiar with, and the same language Freenet was using. He also wished\n" +"to redesign the IIP protocols based on recent papers and the early\n" +"design decisions that Tor and Freenet were making. Some of these\n" +"concepts and naming conventions, such as “onion routingâ€, were modified\n" +"to become “garlic routingâ€. For several of the design decisions, jrandom\n" +"made different choices than Tor did, including selecting different\n" +"cryptographic primitives in a number of places. Many (but not all) of\n" +"these choices turned out quite well. For some others, such as using\n" +"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n" +"benefits and trade-offs are still not well-studied." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112 +msgid "" +"jrandom also set out a clear vision for the architecture of the code. It\n" +"would be a client/server model, with the server (i.e. the router)\n" +"isolated from any “client†protocols. Clients such as web browsers, web\n" +"servers, IRC clients and servers, and others, would communicate through\n" +"the router using I2CP, the I2P Client Protocol." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118 +msgid "" +"jrandom also had strong opinions on the direction of the project and its\n" +"philosophy. He was strongly committed to open source and free software.\n" +"He explicitly set a goal of protection from organizations with\n" +"“unlimited financial and political resources.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123 +msgid "" +"By late summer 2003, jrandom had taken control of the project, and\n" +"renamed it the Invisible Internet Project or “I2Pâ€. He published a\n" +"document outlining the philosophy of the project, and placed its\n" +"technical goals and design in the context of mixnets and anonymizing\n" +"layers. He also published the specification of two protocols (I2CP and\n" +"I2NP) and their underlying data structures, that formed the basis of the\n" +"network I2P uses today. Lance (“nopâ€) was last seen in a project meeting\n" +"on November 11, 2003." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138 +msgid "" +"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n" +"Week published an article on “The Underground Internet†which referenced\n" +"InvisibleNet and discussed “darknets†extensively. jrandom released I2P\n" +"version 0.2 on November 1, 2003, and continued rapid releases for the\n" +"next 3 years. He maintained regular weekly meetings and status notes\n" +"during this time. Several popular services and “respites†emerged during\n" +"this time. Auto updates via clearnet HTTP became available in 2004." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146 +msgid "" +"Through 2004 and 2005, router development continued, and several\n" +"“clients†or applications were added to the I2P package. “Mihi†wrote\n" +"the first streaming protocol implementation and the i2ptunnel interface\n" +"for configuring and starting client tunnels. “Susi†wrote the web mail\n" +"and address book applications SusiMail and SusiDNS. Many people worked\n" +"on the router console web interface. A bridge to make it easier for\n" +"non-I2P clients to communicate over I2P, called “SAM†(Simple Anonymous\n" +"Messaging) was added." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155 +msgid "In February 2005, zzz installed I2P for the first time." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156 +msgid "" +"Anonymity projects were in the news. After surveying the field, he\n" +" installed Freenet, and found it ambiguous, and difficult to explore.\n" +" Not only that, it was very resource heavy and it was difficult to get\n" +" anything to load. Tor and I2P were the other options, and he tried\n" +" I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162 +msgid "" +"zzz had no preconceived plans to contribute to the project, and had\n" +"never written a line of Java. He had maybe used IRC once. At this time,\n" +"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n" +"floodfills. Forum.i2p and postman’s tracker were up and running at the\n" +"time, and weekly meetings and status notes, and releases every couple of\n" +"week were happening." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169 +msgid "" +"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n" +"which over the years became a central resource for I2P development, and\n" +"still is. The second was stats.i2p, the first site to gather statistics\n" +"on I2P network performance and present graphs on both the network and\n" +"individual routers. While the individual router statistics eventually\n" +"had to be shut down due to the tremendous growth of the network, the\n" +"overall performance graphs remain. We are not sure that he ever planned\n" +"to become the release manger for almost 2 decades, but we are happy he\n" +"did. The project has not only stayed active, it has thrived and scaled\n" +"to the demands of its growth." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184 +msgid "" +"On July 27, 2005, jrandom released I2P version 0.6, including an\n" +"innovative new UDP transport protocol he designed called “SSUâ€, for\n" +"Secure Semi-reliable UDP. It contained features for IP discovery and\n" +"firewall traversal." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189 +msgid "" +"In September 2005, jrandom bundled “Syndieâ€, his new high-latency\n" +"anonymous messaging system. In October 2005, jrandom ported Snark, a\n" +"Java BitTorrent client, to become an I2P application and bundled it with\n" +"the I2P package. This completed the collection of client applications\n" +"that are still bundled with I2P today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195 +msgid "" +"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n" +"tunnels. This was a major effort that was done to increase the security\n" +"of the tunnel building, which is crucial to maintain anonymity and\n" +"resist attacks. He worked closely with the Freenet developers, including\n" +"“Toadâ€, on this design. The new build protocol required new I2NP\n" +"messages and a hard cut-over or “flag dayâ€. These changes were released\n" +"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n" +"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n" +"would not work well, if at all, in today’s network, we are, technically\n" +"speaking, backwards-compatible with this ten-year-old version today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206 +msgid "" +"By early 2006, the I2P software was at least feature-complete, but it\n" +"was still not widely-known. jrandom’s view was that it shouldn’t be\n" +"marketed publicly until it was near-perfect, and labeled as version 1.0.\n" +"The network had perhaps a thousand users at the time. Project members\n" +"were discouraged from talking about it online, and the website\n" +"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213 +msgid "" +"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n" +"innovative new TCP transport protocol he designed called “NTCPâ€, for\n" +"new-IO-based TCP. It used Java’s new IO library for efficient handling\n" +"of large numbers of TCP connections." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218 +msgid "" +"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n" +"his top priority, and the “killer application†for I2P. Highly secure\n" +"and almost unusable, it delayed messages for up to two days before\n" +"delivery to resist traffic analysis. Later in 2006, he stopped work on\n" +"the bundled Syndie application and started a new, incompatible,\n" +"standalone messaging application. This application was, confusingly,\n" +"also called “Syndieâ€. The new Syndie was a large and complex\n" +"development, and it was essentially a one-man project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227 +msgid "" +"From late 2006 into 2007, core I2P development and releases slowed\n" +"dramatically. From almost 30 releases in 2005 and 13 in the first half\n" +"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n" +"of 2007. During this time, zzz and a developer named Complication had\n" +"source code commit privileges and were making changes, but their\n" +"understanding of the code base was limited. zzz worked, for example, on\n" +"improving i2psnark, fixing bugs, and redesigning the strategy for\n" +"anticipatory tunnel building. But there was a lot more that needed to be\n" +"done. Complication and zzz did what they could, and they wrote the code\n" +"for almost all the changes in the four 2007 releases\n" +"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n" +"guidance, code review, or direction for the project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240 +msgid "It wasn’t apparent at the time, but the project was in trouble." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242 +msgid "" +"jrandom had almost stopped working on the core I2P router and\n" +"applications. Even the new Syndie, which he had declared as far more\n" +"important than I2P itself, languished. After regular releases through\n" +"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n" +"I2P releases were required to be signed by jrandom’s key, and he built\n" +"and signed his last release, 0.6.1.30, on October 7, 2007." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249 +msgid "" +"In November 2007, disaster struck. Complication and zzz received a\n" +"cryptic message from jrandom, that he would have to take time off from\n" +"both Syndie and I2P development for a year or more. He expected that he\n" +"would still be available to sign releases, but was willing to pass the\n" +"release signing key to somebody else. Complication and zzz immediately\n" +"replied with a request for the release key and other credentials, such\n" +"as access to the website, mailing list, CVS administration, and others.\n" +"Unfortunately, they never heard from jrandom again." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258 +msgid "" +"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n" +"what to do next. However, all of the project infrastructure remained\n" +"active, so it didn’t seem to be an immediate crisis. They knew, however,\n" +"that without the release key or website access, they would have to sign\n" +"with new keys, host the files on a new website, and require everybody to\n" +"manually update since their keys wouldn’t be recognized." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265 +msgid "" +"The second stage of the disaster happened on January 13, 2008. The\n" +"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n" +"suffered a power outage, and they did not fully return to service. Only\n" +"jrandom had the credentials required to restore service. In addition,\n" +"the centralized CVS source control appeared to be down, so five years of\n" +"source control history appeared to be lost. Luckily, the CVS server was\n" +"up, only the name server for it was down. The full contents of the CVS\n" +"archive was quickly downloaded." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274 +msgid "" +"Complication, welterde, and zzz quickly made a number of decisions to\n" +" get the project back up and running. Welterde started a new website at\n" +" `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n" +" source code control system. They tested bazaar and that did not work\n" +" well over I2P. Git was just getting started. jrandom had used monotone\n" +" for Syndie and liked its security properties, and it worked well over\n" +" I2P, so it was selected." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281 +msgid "" +"Several people set up new services. The next release, 0.6.1.31, was\n" +" signed by Complication and required a manual upgrade. It was released\n" +" on February 10, 2008." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285 +msgid "" +"The project realized that even though it claimed to be totally\n" +"decentralized, it actually depended on a number of centralized\n" +"resources, above all, on jrandom. Work was done throughout 2008 to\n" +"decentralize the project, and distribute roles to a number of people.\n" +"Additionally, it was realized that development had essentially stalled\n" +"in 2007, because jrandom had stopped working on it, but had not\n" +"delegated to other developers. Nobody had an overall understanding of\n" +"the code base." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294 +msgid "" +"Complication continued to sign the releases through mid-2009, but his\n" +"contributions declined as he focused on activism and other projects.\n" +"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n" +"releases." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299 +msgid "" +"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n" +"other I2P project team members for the first time, including hottuna and\n" +"welterde. The experience was overwhelming, and also humbling, as he\n" +"struggled to explain I2P to others or answer even basic questions about\n" +"its design and use of cryptography." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305 +msgid "" +"By mid-2009, zzz had come to understand the code base much better. Far\n" +"from being complete or perfect, it was filled with problems and\n" +"scalability issues. In 2009 the project experienced more network growth\n" +"due to its anonymizing properties as well as its circumvention\n" +"abilities. Participants appeared who were beginning to adopt the network\n" +"for reasons like censorship and clearnet issues like blocking of popular\n" +"services. For development gains, in-net auto updates became available\n" +"for the software." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316 +msgid "" +"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n" +"presentation at HOPE XXXX. Adrian talked about how tech has helped\n" +"expose human rights violations, and the need for defensive tools for\n" +"activists. He urged that we all be ambassadors for all tech, stay on top\n" +"of new tech, and keep the barrier low and educate people about how to\n" +"use the tool we create." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323 +msgid "" +"He also talked about how we need many options for people to use, and\n" +"asked how do we make it easier to support human rights, freedom of\n" +"expression?" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327 +msgid "" +"At the end of the talk, zzz was invited on stage to introduce I2P and\n" +"give an overview of what the project was about. The same weekend, it was\n" +"pointed out that the I2P documentation was not in great shape." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331 +msgid "" +"In Fall 2010, zzz declared a moratorium on I2P development until the\n" +"website documentation was complete and accurate. It took 3 months to get\n" +"it done." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335 +msgid "" +"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n" +"hottuna, and other I2P contributors have attended CCC ( Chaos\n" +"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n" +"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n" +"tables with other projects and celebrate the end of a year of releases.\n" +"The project looks forward to one day being able to meet up again and\n" +"have an in-person yearly roadmap meeting." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343 +msgid "" +"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n" +"for its users was created in 2013. It was the first coin that provided\n" +"built-in support for I2P, as well as Tor that makes it impossible to\n" +"determine the IP address of the user. The developers, including meeh,\n" +"also ran organizations like Privacy Solutions, and provided infrastructure\n" +"support to the I2P network by running services like outproxies and\n" +"reseed servers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351 +msgid "" +"I2PBote development started to take off again in 2014 when str4d began\n" +"contributing to the project. Bote is a server-less email client — it\n" +"stores email in a `distributed hash\n" +"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n" +"“automatically encrypted and digitally signed, which ensures no one but\n" +"the intended recipient can read the email, and third parties cannot\n" +"forge them.†( https://i2pbote.xyz/). The project has existed since\n" +"2009." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366 +msgid "" +"At Real World Crypto that year, zzz, psi and str4d began to talk about\n" +"and review the plan to update I2P’s cryptography. The same year, the\n" +"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n" +"SecureDrop, RiseUp and Mailpile also received donations for supporting\n" +"better trust and privacy online." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372 +msgid "" +"By late 2014 most new signing crypto was complete, including ECDSA and\n" +"EdDSA. New destination crypto was available; but new router info crypto\n" +"needed to wait a year for the network to upgrade sufficiently." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376 +msgid "" +"During the early part of 2015, zzz posted to Twitter that it would be\n" +"great to have a mini conference for I2P. In Spring, it was decided that\n" +"I2PCon would take place that August over the course of a weekend." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380 +msgid "" +"Hottuna and Sadie organized most of the details, getting graphic assets\n" +"created, posters printed and a banner made for the podium. Nick at\n" +"Hacklab, where the event would take place, helped with making sure the\n" +"space was ready for the event. Sadie reached out to the local infosec\n" +"community and helped secure guest speakers as well. The event happened\n" +"on one of the hottest weekends of the Summer, with attendees arriving\n" +"from America and Europe. The I2P community did an amazing job of\n" +"supporting the event by postering, giving talks, and spreading the word\n" +"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n" +"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395 +msgid "" +"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n" +"crypto migration progress and future plans for the project. zzz and\n" +"others would continue weekly meetings to plan the migration over the\n" +"next few years." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400 +msgid "" +"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n" +"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n" +"disabled in 0.9.40." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404 +msgid "" +"The new I2P transport protocol provides effective resistance against\n" +" DPI censorship. It also results in reduced CPU load because of the\n" +" faster, modern cryptography used. It makes I2P more likely to run on\n" +" low-end devices, such as smartphones and home routers. Both major I2P\n" +" implementations have full support for NTCP2 and it make NTCP2\n" +" available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n" +" C++)." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412 +msgid "" +"The complete implementation details can be read here\n" +"https://geti2p.net/en/blog/post/2018/08/20/NTCP2" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415 +msgid "" +"0.9.39 included extensive changes for new network database types\n" +"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n" +"development of RPC applications." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419 +msgid "" +"In 2019, the team decided to attend more conferences. That year IDK and\n" +"zzz attended DefCon, and IDK gave a workshop on I2P application\n" +"development. At Monero Village, zzz gave a talk called I2P for\n" +"Cryptocurrency Developers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424 +msgid "" +"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n" +"IDK gave a lightning talk about I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427 +msgid "" +"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n" +"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n" +"connections we made, the project received grants for usability and\n" +"accessibility support from Open Tech Fund, and most recently Internews.\n" +"This will ensure more user friendly onboarding, UX, and information\n" +"architecture improvements to support the growing interest in the\n" +"network. It will also support specific tooling to help in-need users\n" +"with specific risk surfaces through user research." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438 +msgid "" +"That Summer, Hoà ng Nguyên Phong had his research into I2P censorship\n" +"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n" +"research and they attended together. I2P Metrics was created during this\n" +"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n" +"resistant reseed servers for the I2P network\n" +"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n" +"You can read the research report here\n" +"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447 +msgid "" +"At CCC that year, the decision was made to migrate from Monotone too\n" +"GitLab. The project was one of the last to use Monotone, and it was time\n" +"to prepare to move on. IDK would spend 2020 ensuring the process was as\n" +"smooth as it could be. The pandemic would result in the team not being\n" +"able to see each other that year to celebrate the ( mostly) smooth move\n" +"to Gitlab. On December 10. 2020, the project switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries\n" +"from Monotone to Git officially." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456 +msgid "" +"Congratulations and thanks to everyone who helped in the git\n" +" migration, especially zzz, eche|on, nextloop, and our site mirror\n" +" operators! While some of us will miss Monotone, it has become a\n" +" barrier for new and existing participants in I2P development and\n" +" we’re excited to join the world of developers using Git to manage\n" +" their distributed projects." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465 +msgid "" +"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n" +"default for some services. A Sybil analysis and blocking tool was also\n" +"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n" +"protocol (proposal 144) for most services. Preliminary support was added\n" +"for new tunnel build message encryption (proposal 152). There were\n" +"significant performance improvements throughout the router." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472 +msgid "" +"0.9.49 was the release that brought faster crypto. The I2P network\n" +"became faster and more secure. Improvements and fixes for the SSU (UDP)\n" +"transport resulted in faster speeds. The release also started the\n" +"migration to new, faster ECIES-X25519 encryption for routers. The\n" +"project had been working on the specifications and protocols for new\n" +"encryption for several years, and was getting close to the end of it.\n" +"The migration would take several releases to complete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480 +msgid "" +"To minimize disruption, only new installs and a very small percentage of\n" +"existing installs (randomly selected at restart) would be using the new\n" +"encryption." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484 +msgid "" +"The project had “rekeyed†the network twice before, when changing the\n" +"default signature type, but this was the first time it had changed the\n" +"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n" +"protect users from passive DNS snooping. There were numerous fixes and\n" +"improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492 +msgid "1.5.0 — The early anniversary release because it is so good!" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495 +msgid "" +"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n" +" straight from 0.9.50 to 1.5.0. This does not signify a major API\n" +" change, or a claim that development is now complete. It is simply a\n" +" recognition of almost 20 years of work to provide anonymity and\n" +" security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501 +msgid "" +"This release finishes implementation of smaller tunnel build messages\n" +" to reduce bandwidth. We continue the transition of the network’s\n" +" routers to X25519 encryption. Of course there are also numerous bug\n" +" fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506 +msgid "" +"As usual, we recommend that you update to this release. The best way\n" +" to maintain security and help the network is to run the latest\n" +" release." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510 +msgid "Congratulations team. Let’s do another 20." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2 +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11 +msgid "Level up your I2P Skills with Encrypted LeaseSets" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9 +msgid "" +"It has been said that I2P emphasizes Hidden Services, we examine one " +"interpretation of this" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16 +msgid "" +"It has been said in the past that I2P emphasizes support for Hidden Services,\n" +"which is true in many ways. However, what this means to users, developers, and\n" +"hidden service administrators isn't always the same. Encrypted LeaseSets and\n" +"their use-cases provide a unique, practical window into how I2P makes hidden\n" +"services more versatile, easier to administer, and how I2P extends on the\n" +"Hidden Service concept to provide security benefits for potentially interesting\n" +"use-cases." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26 +msgid "" +"What is a LeaseSet?\n" +"-------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31 +msgid "" +"When you create a hidden service, you publish something called a \"LeaseSet\" to\n" +"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n" +"need to discover \"where\" your hidden service is on the I2P Network. It contains\n" +"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n" +"and the public key of your destination, which clients will encrypt messages to.\n" +"This type of hidden service is reachable by anyone who has the address, which\n" +"is probably the most common use case for now." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41 +msgid "" +"Sometimes, you might not want to allow your hidden services to be accessible by\n" +"anyone, though. Some people use hidden services as a way of accessing an SSH\n" +"server on a home PC, or to stitch together a network of IOT Devices. In these\n" +"cases it's not necessary, and may be counter-productive, to make your hidden\n" +"service accessible to everyone one the I2P Network. This is where \"Encrypted\n" +"LeaseSets\" come into play." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50 +msgid "" +"Encrypted LeaseSets: VERY Hidden Services\n" +"------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55 +msgid "" +"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n" +"encrypted form, where none of the Leases or public keys are visible unless\n" +"the client has the keys required to decrypt the LeaseSet inside of it. Only\n" +"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n" +"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n" +"and no one else." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64 +msgid "" +"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n" +"of each strategy are important to understand when deciding which one to use. If\n" +"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n" +"will generate a key(or keys) which the server operator then shares with each\n" +"client. Of course, this exchange must happen out-of-band, possibly via an\n" +"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n" +"like logging into Wi-Fi with a password. Except, what you're logging into is\n" +"a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75 +msgid "" +"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n" +"strategy, then they keys are generated on the client instead. When a\n" +"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n" +"must first share their keys with the server operator. The server operator then\n" +"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n" +"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n" +"into is a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85 +msgid "" +"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n" +"users to connect to your destination, you make it impossible for unauthorized\n" +"visitors to even discover the real destination of the I2P Hidden Service. Some\n" +"readers have probably already considered a use-case for their own Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93 +msgid "" +"Using Encrypted LeaseSets to Safely Access a Router Console\n" +"-----------------------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98 +msgid "" +"As a general rule, the more complex information a service has access to about\n" +"your device, the more dangerous it is to expose that service to the Internet or\n" +"indeed, to a Hidden Service network like I2P. If you want to expose such a\n" +"service, you need to protect it with something like a password, or, in the case\n" +"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106 +msgid "" +"**Before continuing, please read and understand that if you do the following**\n" +"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n" +"**your I2P router. Do not configure access to your router console over I2P without**\n" +"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n" +"**with any devices you do not control.**" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114 +msgid "" +"One such service which is useful to share over I2P, but ONLY with an Encrypted\n" +"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n" +"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n" +"browser to administer the remote I2P instance. I find this useful for remotely\n" +"monitoring my regular I2P Services. It could also be used to monitor a server\n" +"which is used to seed a torrent long-term as a way to access I2PSnark." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123 +msgid "" +"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n" +"straightforward to configure via the Hidden Services Manager UI." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128 +msgid "" +"On the \"Server\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137 +msgid "" +"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n" +"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n" +"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n" +"\"Tunnel Cryptography Options\" and save the hidden service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148 +msgid "" +"Then, select your new tunnel from the Hidden Services Manager main page. The\n" +"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n" +"this down for the next step, along with the Encrypted Base32 Address of your\n" +"tunnel." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159 +msgid "" +"On the \"Client\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164 +msgid "" +"Now switch computers to the client which will connect to the hidden service,\n" +"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n" +"add the keys from earlier. Start by pasting the Base32 from the Server into\n" +"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n" +"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n" +"and you're ready to securely visit the Hidden Service using an Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178 +msgid "" +"Now You're Ready to Remotely Administer I2P\n" +"-------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183 +msgid "" +"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n" +"which empower them to securely manage their I2P connections from anywhere in the\n" +"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n" +"point to the SSH server, the Portainer instance I user to manage my service\n" +"containers, and my personal NextCloud instance. With I2P, truly private, always\n" +"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n" +"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n" +"could become the key to securing self-hosted home automation or simply become\n" +"the backbone of a new more private peer-to-peer web." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2 +msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9 +msgid "" +"Versatile and emerging ways of installing and embedding I2P in your " +"application" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11 +msgid "" +"For the majority of I2P's existence, it's been an application that runs with the\n" +"help of a Java Virtual Machine that is already installed on the platform. This\n" +"has always been the normal way to distribute Java applications, but it leads to\n" +"a complicated installation procedure for many people. To make things even more\n" +"complicated, the \"right answer\" to making I2P easy to install on any given\n" +"platform might not be the same as any other platform. For example, I2P is quite\n" +"simple to install with standard tools on Debian and Ubuntu based operating\n" +"systems, because we can simply list the required Java components as \"Required\"\n" +"by our package, however on Windows or OSX, there is no such system allowing us to make\n" +"sure that a compatible Java is installed." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24 +msgid "" +"The obvious solution would be to manage the Java installation ourselves, but\n" +"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n" +"in recent Java versions, a new set of options has emerged which has the\n" +"potential to solve this problem for many Java software. This exciting tool is\n" +"called **\"Jpackage.\"**" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32 +msgid "I2P-Zero and Dependency-Free I2P Installation" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37 +msgid "" +"The first very successful effort at building a dependency-free I2P Package was\n" +"I2P-Zero, which was created by the Monero project originally for use with the\n" +"Monero cryptocurrency. This project got us very excited because of it's success\n" +"in creating a general-purpose I2P router which could easily packaged with an\n" +"I2P application. Especially on Reddit, many people express their preference for\n" +"the simplicity of setting up an I2P-Zero router." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46 +msgid "" +"This really proved to us that a dependency-free I2P Package which was easy to\n" +"install was possible using modern Java tools, but I2P-Zero's use case was a\n" +"little bit different than ours. It is best for embedded apps that need an I2P\n" +"router that they can easily control using it's convenient control port on port\n" +"\"8051\". Our next step would be to adapt the technology to the general-purpose\n" +"I2P Application." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55 +msgid "OSX Application Security Changes affect I2P IzPack Installer" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60 +msgid "" +"The issue became more pressing in recent versions of Mac OSX, where it is no\n" +"longer straightforward to use the \"Classic\" installer which comes in the .jar\n" +"format. This is because the application is not \"Notarized\" by Apple authorities\n" +"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n" +"which can be notarized by Apple authorities, conveniently solving our problem." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68 +msgid "" +"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n" +"OSX than ever, no longer requiring users to install Java themselves and using\n" +"standard OSX installation tools in their prescribed ways. The new .dmg installer\n" +"makes setting up I2P on Mac OSX easier than it's ever been." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79 +msgid "The I2P of the future is Easy to Install" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84 +msgid "" +"One of the things I hear from users the most is that if I2P wants adoption, it\n" +"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n" +"experience, to quote or paraphrase many familiar Redditors. Installation should\n" +"not require complicated and error-prone \"post-installation\" steps. Many new\n" +"users are not prepared to deal with their browser configuration in a thorough\n" +"and complete way. To address this problem, we created the I2P Profile Bundle\n" +"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n" +"As it's developed, it's added security features and improved integration with\n" +"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n" +"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n" +"of I2P for Windows, with the only remaining dependency being Firefox itself.\n" +"This should provide an unprecedented level of convenience for I2P users on\n" +"Windows." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2 +msgid "Bitcoin Core adds support for I2P!" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9 +msgid "A new use case and a signal of growing acceptance" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11 +msgid "" +"An event months in the making, Bitcoin Core has added official support for I2P!\n" +"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n" +"using the help of nodes that operate within both I2P and the clearnet, making\n" +"them first-class participants in the Bitcoin network. It's exciting to see\n" +"large communities like Bitcoin taking notice of the advantages I2P can bring\n" +"to them providing privacy and reachability to people all over the world." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20 +msgid "How it Works" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25 +msgid "" +"I2P support is automatic, via the SAM API. This is also exciting news, because\n" +"it highlights some of the things I2P is singularly good at, like empowering \n" +"application developers to build I2P connections programmatically and\n" +"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n" +"enabling the SAM API and running Bitcoin with I2P enabled." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33 +msgid "Configuring your I2P Router" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38 +msgid "" +"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n" +"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n" +"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n" +"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n" +"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n" +"Configuration.\"" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47 +msgid "" +"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n" +"set::\n" +"\n" +" sam.enabled=true\n" +"\n" +"in your i2pd.conf file." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56 +msgid "Configuring your Bitcoin Node for Anonymity and Connectivity" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61 +msgid "" +"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n" +"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n" +"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n" +"OSX. It also requires at least version 22.0.0 for I2P support to be present." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68 +msgid "" +"After following these instructions, you should have a private Bitcoin\n" +"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n" +"connections, so that all your connections are anonymous. For convenience,\n" +"Windows users should open their Bitcoin Data Directory by opening the start menu\n" +"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n" +"press enter." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77 +msgid "" +"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n" +"sure that you've add quotes around the file when you save it, in order to\n" +"prevent Windows from adding a default file extension to the file. The file\n" +"should contain the following I2P-Related Bitcoin configuration options::\n" +"\n" +" i2psam=127.0.0.1:7656\n" +" i2pacceptincoming=true\n" +" onlynet=i2p\n" +"\n" +"Next, you should create another file called \"tor.conf.\" The file should contain\n" +"the following Tor related configuration options::\n" +"\n" +" proxy=127.0.0.1:9050\n" +" onion=127.0.0.1:9050\n" +" onlynet=tor\n" +"\n" +"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n" +"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n" +"lines to your bitcoin.conf file::\n" +"\n" +" includeconf=i2p.conf\n" +" includeconf=tor.conf\n" +"\n" +"Now your Bitcoin node is configured to only use anonymous connections. In order\n" +"to enable direct connections to remote nodes, remove the lines beginning in::\n" +"\n" +" onlynet=\n" +"\n" +"You can do this if you do not require your Bitcoin node to be anonymous, and\n" +"it helps anonymous users connect to the rest of the Bitcoin network." +msgstr "" diff --git a/i2p2www/translations/ko/LC_MESSAGES/comparison.po b/i2p2www/translations/ko/LC_MESSAGES/comparison.po index dedf32951bd38395d2c98b6710efed5e9a1a0f86..ee9bb62b2ebdac73eee353a90ecb76f48a4d3ea4 100644 --- a/i2p2www/translations/ko/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/ko/LC_MESSAGES/comparison.po @@ -1,22 +1,23 @@ -# Korean translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # SEPT____ <xpressengine3@mail.beo.kr>, 2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2020-11-04 00:06+0000\n" -"Last-Translator: ylsun <y15un@y15un.dog>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: SEPT____ <xpressengine3@mail.beo.kr>, 2016\n" "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n" -"Plural-Forms: nplurals=1; plural=0\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ko\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -24,34 +25,23 @@ msgstr "I2P와 í”„ë¦¬ë„·ì˜ ë¹„êµ" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." msgstr "" #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." @@ -59,20 +49,13 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -82,15 +65,11 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -105,10 +84,8 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -126,52 +103,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -179,19 +142,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -203,32 +162,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -237,36 +184,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -274,10 +208,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -291,7 +223,7 @@ msgstr "" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -426,7 +358,7 @@ msgstr "ížˆë“ ì„œë¹„ìŠ¤" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" +msgid "I2P Site or Destination" msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 @@ -497,8 +429,7 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -517,10 +448,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -528,7 +457,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" #: i2p2www/pages/site/comparison/tor.html:96 @@ -567,8 +497,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -705,4 +635,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/ko/LC_MESSAGES/get-involved.po b/i2p2www/translations/ko/LC_MESSAGES/get-involved.po index 0050564954c98b23b07495c63dc9f5ca671580c9..c871de5a9c57edb6d86f2e01de73549b8360e79d 100644 --- a/i2p2www/translations/ko/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/ko/LC_MESSAGES/get-involved.po @@ -1,21 +1,22 @@ -# Korean translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:27+0000\n" -"PO-Revision-Date: 2021-12-26 06:18+0000\n" -"Last-Translator: ë…¸ ìœ í˜„\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Korean (http://www.transifex.com/otf/I2P/language/ko/)\n" -"Plural-Forms: nplurals=1; plural=0\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ko\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -30,12 +31,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -50,44 +48,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -126,10 +113,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -159,10 +144,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -177,25 +160,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -221,8 +194,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -236,12 +208,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -252,10 +221,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -266,17 +233,12 @@ msgstr "문서" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -287,16 +249,11 @@ msgstr "시험중" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -309,14 +266,10 @@ msgstr "서비스들" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -326,9 +279,9 @@ msgstr "재배í¬" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -372,8 +325,7 @@ msgstr "" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -442,84 +394,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -528,17 +457,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -546,29 +470,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -576,42 +494,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -655,72 +564,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -730,8 +619,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -744,33 +633,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -791,76 +674,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -870,25 +734,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -899,29 +756,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -931,10 +780,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -942,13 +789,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -959,43 +803,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1010,28 +847,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1042,8 +871,7 @@ msgstr "ì œê±°ë¨" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1057,8 +885,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1077,14 +904,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1093,17 +916,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1113,8 +933,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1136,32 +955,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1170,47 +982,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1222,12 +1026,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1252,8 +1053,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1272,8 +1073,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1302,20 +1102,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1387,8 +1183,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1401,24 +1196,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1428,22 +1214,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1479,21 +1257,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1517,10 +1290,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1531,8 +1302,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1545,10 +1315,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1558,7 +1326,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1579,7 +1348,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1587,13 +1357,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1601,7 +1372,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1610,8 +1382,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1643,35 +1414,28 @@ msgstr "기타 사í•" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1679,29 +1443,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1728,12 +1486,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1743,10 +1499,8 @@ msgstr "커뮤니티" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1768,8 +1522,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1777,13 +1531,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1792,8 +1547,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1807,34 +1561,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1844,61 +1592,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1925,20 +1661,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1947,14 +1682,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1964,12 +1699,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1989,8 +1725,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2017,12 +1752,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2041,22 +1773,22 @@ msgstr "I2P와 함께 IDE 사용하기" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2073,8 +1805,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2091,14 +1823,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2177,34 +1909,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2214,20 +1938,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2244,22 +1964,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2271,10 +1988,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2284,38 +1999,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2333,23 +2040,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2363,11 +2064,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2378,34 +2076,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2418,18 +2109,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2443,16 +2130,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2472,67 +2157,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2556,8 +2231,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2573,44 +2248,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2618,8 +2283,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2677,8 +2341,7 @@ msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:26 @@ -2691,10 +2354,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:37 @@ -2704,8 +2365,7 @@ msgid "" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:47 @@ -2717,10 +2377,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, " -"however Trac still available for now. Two-way syncing of\n" +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" "issues between Gitlab and Github is a work-in-progress." msgstr "" @@ -2737,13 +2395,11 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:91 @@ -2772,51 +2428,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2836,11 +2480,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -2855,10 +2497,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -2878,12 +2518,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -2894,27 +2531,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -2930,10 +2563,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -2951,8 +2582,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -2965,19 +2595,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -2985,15 +2611,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3002,8 +2626,8 @@ msgstr "FAQ" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3019,67 +2643,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3104,10 +2726,8 @@ msgstr "미리보기" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3116,21 +2736,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3153,8 +2769,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3164,18 +2779,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3185,10 +2795,8 @@ msgstr "ê°œì¸ ì •ë³´ 보호 ì •ì±…" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3197,17 +2805,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3216,10 +2822,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3230,18 +2834,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/mg/LC_MESSAGES/about.po b/i2p2www/translations/mg/LC_MESSAGES/about.po index 47157a1d5bcd0d88ceb1538e718796fa3df45c40..2531b416b7485e8a8f8e08360b80a79229133165 100644 --- a/i2p2www/translations/mg/LC_MESSAGES/about.po +++ b/i2p2www/translations/mg/LC_MESSAGES/about.po @@ -1,22 +1,23 @@ -# Malagasy translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # topdog101 <topdog101@free.fr>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: topdog101 <topdog101@free.fr>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: topdog101 <topdog101@free.fr>, 2014\n" "Language-Team: Malagasy (http://www.transifex.com/otf/I2P/language/mg/)\n" -"Plural-Forms: nplurals=2; plural=(n > 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: mg\n" +"Plural-Forms: nplurals=2; plural=(n > 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -26,8 +27,7 @@ msgstr "" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -50,8 +50,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -64,24 +63,158 @@ msgstr "Fanatontoloana" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -91,15 +224,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -113,12 +245,8 @@ msgstr "Tetik 'asa momba ny Tranonkala Miafina" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -128,13 +256,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -143,15 +271,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -160,28 +288,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -190,36 +317,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -228,13 +354,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -243,15 +369,11 @@ msgstr "Fampitahana" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -270,9 +392,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -329,8 +450,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -349,8 +469,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -359,8 +478,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -373,8 +491,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -383,8 +500,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -392,8 +509,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -408,15 +524,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -428,8 +542,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -484,16 +597,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -502,11 +613,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -559,16 +668,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -584,12 +691,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -603,35 +707,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -640,16 +738,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -666,11 +762,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -679,18 +821,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -701,84 +840,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -789,8 +905,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -798,27 +913,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -826,26 +937,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -856,10 +958,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -867,18 +967,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -889,10 +986,8 @@ msgstr "" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1064,7 +1159,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1304,7 +1400,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1354,32 +1451,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1397,8 +1487,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1437,10 +1527,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1454,15 +1542,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1471,11 +1555,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1530,8 +1611,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1549,15 +1629,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1576,14 +1652,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1594,20 +1666,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1618,24 +1683,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1655,33 +1711,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1694,32 +1741,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1729,27 +1768,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1766,17 +1797,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1789,8 +1817,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1801,10 +1828,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1823,30 +1848,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1860,55 +1878,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1919,20 +1922,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1943,16 +1939,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1962,17 +1953,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -1983,20 +1971,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2010,26 +1991,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2038,18 +2009,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2057,16 +2022,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2082,52 +2042,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2142,102 +2083,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2250,4 +2150,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/nl/LC_MESSAGES/about.po b/i2p2www/translations/nl/LC_MESSAGES/about.po index da20f003d4a76ea03d26904a3e025fe5364f9f7e..8f321a5516eff726950960580d3553c4b21e75ad 100644 --- a/i2p2www/translations/nl/LC_MESSAGES/about.po +++ b/i2p2www/translations/nl/LC_MESSAGES/about.po @@ -1,23 +1,24 @@ -# Dutch translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Jakob Wuhrer <pinoaffe@gmail.com>, 2016 # Nathan Follens, 2015,2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: Desirius <martinjefmeyers@gmail.com>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Nathan Follens, 2015,2018\n" "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: nl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -27,14 +28,9 @@ msgstr "Alternatieve I2P-cliënten" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"De voornaamste implementatie van een I2P-cliënt gebruikt de " -"programmeertaal Java. Als je om een of andere reden Java niet kan " -"gebruiken op je apparaat, zijn er alternatieve implementaties die " -"ontwikkeld worden door leden van de gemeenschap." +msgstr "De voornaamste implementatie van een I2P-cliënt gebruikt de programmeertaal Java. Als je om een of andere reden Java niet kan gebruiken op je apparaat, zijn er alternatieve implementaties die ontwikkeld worden door leden van de gemeenschap." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -42,32 +38,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> is een I2P-cliëntimplementatie geschreven " -"in C++.\n" -"Sinds het begin van 2016 is i2pd stabiel genoeg om in productie gebruikt " -"te worden,\n" -"en sinds de zomer van 2016 implementeert het alle I2P-API’s volledig." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> is een I2P-cliëntimplementatie geschreven in C++.\nSinds het begin van 2016 is i2pd stabiel genoeg om in productie gebruikt te worden,\nen sinds de zomer van 2016 implementeert het alle I2P-API’s volledig." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> is een actieve i2pd-vork, ontwikkeld voor" -" de Monero-cryptomunt." +msgstr "<a href=\"%(kovri)s\">Kovri</a> is een actieve i2pd-vork, ontwikkeld voor de Monero-cryptomunt." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> is een I2P-cliënt ontwikkeld met de\n" -"<a href=\"%(golang)s\">Go</a>-programmeertaal. Het project bevindt zich " -"nog in een vroege fase van ontwikkeling." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> is een I2P-cliënt ontwikkeld met de\n<a href=\"%(golang)s\">Go</a>-programmeertaal. Het project bevindt zich nog in een vroege fase van ontwikkeling." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -79,11 +64,147 @@ msgstr "Woordenlijst" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Deze pagina bevat een lijst met veelgebruikte terminologie bij het " -"bespreken van I2P en cryptografie." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -91,14 +212,10 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -108,19 +225,14 @@ msgstr "Veel dank aan de mensen die gedoneerd hebben aan de I2P!" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Als je gedoneerd hebt, stuur dan een e-mail naar <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" -"met je naam of gebruikersnaam (of mogelijkerwijs een website) zodat we je" -" hier in de lijst kunnen opnemen" +msgstr "Als je gedoneerd hebt, stuur dan een e-mail naar <a href=\"mailto:%(echelon)s\">echelon</a>\nmet je naam of gebruikersnaam (of mogelijkerwijs een website) zodat we je hier in de lijst kunnen opnemen" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -134,12 +246,8 @@ msgstr "Het onzichtbaarinternetproject" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -149,13 +257,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -164,15 +272,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -181,28 +289,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -211,36 +318,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -249,13 +355,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -264,15 +370,11 @@ msgstr "Vergelijkingen" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -291,9 +393,8 @@ msgstr "Presentaties over I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -350,8 +451,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -370,8 +470,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -380,8 +479,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -394,8 +492,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -404,8 +501,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -413,8 +510,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -429,15 +525,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -449,8 +543,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -505,16 +598,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -523,11 +614,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -580,16 +669,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -605,12 +692,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -624,35 +708,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -661,16 +739,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -682,18 +758,62 @@ msgstr "Andere" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P vermeld in Netflix’ ‘House of Cards’, seizoen 2, aflevering 2,\n" -"14 februari 2014" +msgstr "I2P vermeld in Netflix’ ‘House of Cards’, seizoen 2, aflevering 2,\n14 februari 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -702,18 +822,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -724,84 +841,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -812,8 +906,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -821,27 +914,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -849,26 +938,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -879,10 +959,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -890,18 +968,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -912,19 +987,11 @@ msgstr "I2P-projectleden" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"We zijn een kleine groep mensen verspreid over verschillende continenten " -"die werkt\n" -"aan het verbeteren van verschillende aspecten van het project, en het " -"ontwerp van het\n" -"netwerk bespreken.\n" -"<a href=\"%(volunteer)s\">Help mee!</a>" +msgstr "We zijn een kleine groep mensen verspreid over verschillende continenten die werkt\naan het verbeteren van verschillende aspecten van het project, en het ontwerp van het\nnetwerk bespreken.\n<a href=\"%(volunteer)s\">Help mee!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1093,7 +1160,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1333,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1383,32 +1452,25 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1426,8 +1488,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1466,10 +1528,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1483,15 +1543,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1500,11 +1556,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1559,8 +1612,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1578,15 +1630,11 @@ msgstr "Augustus 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1605,14 +1653,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1623,20 +1667,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1647,24 +1684,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1684,33 +1712,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1723,32 +1742,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1758,27 +1769,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1795,17 +1798,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1818,8 +1818,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1830,10 +1829,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1852,30 +1849,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1889,55 +1879,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1948,20 +1923,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1972,16 +1940,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1991,17 +1954,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2012,20 +1972,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2039,26 +1992,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2067,18 +2010,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2086,16 +2023,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2111,52 +2043,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2171,102 +2084,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2279,4 +2151,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/nl/LC_MESSAGES/comparison.po b/i2p2www/translations/nl/LC_MESSAGES/comparison.po index ee8c5b2ae3ffebd48bc36e397f683d80b8df4b27..d1d685a806415006bc7ac44df16d6800b5a82f8e 100644 --- a/i2p2www/translations/nl/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/nl/LC_MESSAGES/comparison.po @@ -1,24 +1,25 @@ -# Dutch translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Just ATranslater <transifex@weinand.nl>, 2017 # Martijn de Boer, 2016 # Nathan Follens, 2015,2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-08-24 11:51+0000\n" -"Last-Translator: zzzi2p\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Nathan Follens, 2015,2018\n" "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: nl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -26,41 +27,23 @@ msgstr "I2P vergeleken met Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor" -" publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief" -" mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het" -" feit dat Freenet is ontwikkeld als een gedistribueerde manier voor " -"gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen" -" voor meer algemene vormen van anonieme communicatie, zoals websites en " -"forums." +msgstr "Freenet is een volledig gedistribueerd, peer to peer anoniem netwerk voor publicaties, met mogelijkheden om veilig gegevens op te slaan, inclusief mogelijke oplossingen om inbreuk op bandbreedte tegen te gaan. Naast het feit dat Freenet is ontwikkeld als een gedistribueerde manier voor gegevensopslag, wordt het tevens gebruikt om hierop applicaties te bouwen voor meer algemene vormen van anonieme communicatie, zoals websites en forums." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." @@ -68,20 +51,13 @@ msgstr "" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." msgstr "" @@ -91,15 +67,11 @@ msgstr "I2P vergeleken met andere projecten" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -114,10 +86,8 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -135,52 +105,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -188,19 +144,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -212,32 +164,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -246,36 +186,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -283,10 +210,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -300,7 +225,7 @@ msgstr "Betaalde VPN-diensten" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -362,9 +287,7 @@ msgstr "Vergelijking van Tor- en I2P-terminologie" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een " -"groot deel van de terminologie verschillend." +msgstr "Hoewel Tor en I2P op verschillende vlakken gelijkaardig zijn, is een groot deel van de terminologie verschillend." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -437,8 +360,8 @@ msgstr "Verborgen dienst" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite of Doel" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -508,8 +431,7 @@ msgstr "Voordelen van Tor over I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -528,10 +450,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -539,7 +459,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" #: i2p2www/pages/site/comparison/tor.html:96 @@ -578,8 +499,8 @@ msgstr "Voordelen van I2P over Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -694,9 +615,7 @@ msgstr "Andere mogelijke voordelen van I2P die nog niet geïmplementeerd zijn" #: i2p2www/pages/site/comparison/tor.html:207 msgid "...and may never be implemented, so don't count on them!" -msgstr "" -"en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet " -"op!" +msgstr "en misschien ook nooit geïmplementeerd zullen worden, dus reken er niet op!" #: i2p2www/pages/site/comparison/tor.html:210 msgid "" @@ -718,4 +637,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/nl/LC_MESSAGES/get-involved.po b/i2p2www/translations/nl/LC_MESSAGES/get-involved.po index 60b4cd3dc7ffe28bb60fbd52b85d6c07a645269c..c4f7c30d5dfdf0b461fe2937b84e974e0d813c70 100644 --- a/i2p2www/translations/nl/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/nl/LC_MESSAGES/get-involved.po @@ -1,22 +1,23 @@ -# Dutch translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Nathan Follens, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: erinm\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Nathan Follens, 2015\n" "Language-Team: Dutch (http://www.transifex.com/otf/I2P/language/nl/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: nl\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +32,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +49,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +114,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +145,8 @@ msgstr "Stickers" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +161,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +195,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +209,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +222,8 @@ msgstr "Vertalen" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +234,12 @@ msgstr "Documentatie" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +250,11 @@ msgstr "Testen" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +267,10 @@ msgstr "Services" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +280,9 @@ msgstr "Reseeden" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +326,7 @@ msgstr "Analyse" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +334,7 @@ msgstr "" msgid "Roadmap" msgstr "Stappenplan" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +395,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +458,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +471,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +495,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +565,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +620,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +634,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +675,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +735,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +757,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +781,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +790,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +804,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +848,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +872,7 @@ msgstr "Verwijderd" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +886,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +905,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +917,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +934,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +956,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +983,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1027,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1054,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1074,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1103,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1388,8 +1184,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1402,24 +1197,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1429,22 +1215,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1480,21 +1258,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1518,10 +1291,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1532,8 +1303,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1546,10 +1316,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1559,7 +1327,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1580,7 +1349,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1588,13 +1358,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1602,7 +1373,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1611,8 +1383,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1644,35 +1415,28 @@ msgstr "Andere" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1680,29 +1444,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1729,12 +1487,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1744,10 +1500,8 @@ msgstr "Gemeenschap" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1769,8 +1523,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1778,13 +1532,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1793,8 +1548,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1808,34 +1562,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1845,61 +1593,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1926,20 +1662,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1948,14 +1683,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1965,12 +1700,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1990,8 +1726,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2018,12 +1753,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2042,22 +1774,22 @@ msgstr "Een IDE met I2P gebruiken" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2074,8 +1806,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2092,14 +1824,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2178,34 +1910,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2215,20 +1939,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2245,22 +1965,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2272,10 +1989,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2285,38 +2000,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2334,23 +2041,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2364,11 +2065,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2379,34 +2077,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2419,18 +2110,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2444,16 +2131,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2473,67 +2158,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2557,8 +2232,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2574,44 +2249,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2619,8 +2284,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2629,64 +2293,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "Vertalingen" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "Gereedschappen" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2694,42 +2353,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2742,143 +2393,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2887,93 +2426,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2993,11 +2481,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3012,10 +2498,8 @@ msgstr "Voorbereiding" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3035,12 +2519,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3051,27 +2532,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3087,10 +2564,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3108,8 +2583,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3122,19 +2596,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3142,15 +2612,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3159,8 +2627,8 @@ msgstr "VGV" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3176,67 +2644,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3261,10 +2727,8 @@ msgstr "Overzicht" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3273,21 +2737,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3310,8 +2770,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3321,18 +2780,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3342,10 +2796,8 @@ msgstr "privacybeleid" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3354,17 +2806,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3373,10 +2823,8 @@ msgstr "Aan de slag" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3387,18 +2835,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/about.po b/i2p2www/translations/pl/LC_MESSAGES/about.po index 35d4d2cb37675874a7e5d305599c40895d6c7adf..5dba0a41ec53389a18c6f2bcd4ac100d8328ab2f 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/about.po +++ b/i2p2www/translations/pl/LC_MESSAGES/about.po @@ -1,27 +1,27 @@ -# Polish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Karol Kosek, 2020 +# Karol Kosek, 2020 # Karol Kosek, 2018 # sebx, 2014 # ☆Verdulo, 2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-05-02 19:58+0000\n" -"Last-Translator: ☆Verdulo\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Karol Kosek, 2020\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -31,8 +31,7 @@ msgstr "Alternatywne klienty I2P" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -55,8 +54,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -69,24 +67,158 @@ msgstr "SÅ‚owniczek pojęć" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" + #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -96,15 +228,14 @@ msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -118,12 +249,8 @@ msgstr "Projekt Niewidzialny Internet" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -133,22 +260,14 @@ msgstr "I2P troszczy siÄ™ o prywatność" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." -msgstr "" -"Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. " -"CaÅ‚y ruch w sieci I2P to ruch wewnÄ™trzny, niemajÄ…cy bezpoÅ›redniego " -"kontaktu ze zwykÅ‚ym internetem. Jest to warstwa sieci nad internetem. " -"Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiÄ™dzy TobÄ… i " -"innymi użytkownikami. Nikt nie może zobaczyć skÄ…d, dokÄ…d i co jest " -"przesyÅ‚ane. Dodatkowo sieć oferuje ochronÄ™ przed rozpoznawaniem wzorców i" -" przed blokadÄ… cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do " -"przesyÅ‚ania ruchu, blokowanie lokalizacji jest również ograniczone." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." +msgstr "Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. CaÅ‚y ruch w sieci I2P to ruch wewnÄ™trzny, niemajÄ…cy bezpoÅ›redniego kontaktu ze zwykÅ‚ym internetem. Jest to warstwa sieci nad internetem. Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiÄ™dzy TobÄ… i innymi użytkownikami. Nikt nie może zobaczyć skÄ…d, dokÄ…d i co jest przesyÅ‚ane. Dodatkowo sieć oferuje ochronÄ™ przed rozpoznawaniem wzorców i przed blokadÄ… cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do przesyÅ‚ania ruchu, blokowanie lokalizacji jest również ograniczone." #: i2p2www/pages/site/about/intro.html:14 msgid "How to Connect to the I2P Network" @@ -156,15 +275,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -173,28 +292,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -203,38 +321,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"WidzÄ™ adresy IP innych użytkowników sieci I2P w konsoli wÄ™zÅ‚a. Czy to " -"oznacza, że mój adres IP jest widoczny dla innych?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "WidzÄ™ adresy IP innych użytkowników sieci I2P w konsoli wÄ™zÅ‚a. Czy to oznacza, że mój adres IP jest widoczny dla innych?" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -243,13 +358,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -258,15 +373,11 @@ msgstr "Porównania" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -285,9 +396,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -344,8 +454,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -364,8 +473,7 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." msgstr "" @@ -374,8 +482,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:76 @@ -388,8 +495,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" @@ -398,8 +504,8 @@ msgstr "" #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." msgstr "" #: i2p2www/pages/site/about/media.html:95 @@ -407,8 +513,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." msgstr "" #: i2p2www/pages/site/about/media.html:101 @@ -423,15 +528,13 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" @@ -443,8 +546,7 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" msgstr "" #: i2p2www/pages/site/about/media.html:129 @@ -499,16 +601,14 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" @@ -517,11 +617,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." +"This tutorial shows how to install and configure software needed to access I2P." msgstr "" #: i2p2www/pages/site/about/media.html:189 @@ -574,16 +672,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." msgstr "" #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." msgstr "" @@ -599,12 +695,9 @@ msgstr "" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:252 @@ -618,35 +711,29 @@ msgstr "" #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" msgstr "" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -655,16 +742,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -681,11 +766,57 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." +msgstr "" + #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" msgstr "" @@ -694,18 +825,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -716,84 +844,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -804,8 +909,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -813,27 +917,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -841,26 +941,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -871,10 +962,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -882,18 +971,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -904,16 +990,11 @@ msgstr "CzÅ‚onkowie projektu I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"JesteÅ›my maÅ‚Ä… grupÄ… ludzi rozsianych po kilku kontynentach, którzy " -"pracujÄ… nad różnymi aspektami projektu i dyskutujÄ… nad projektem sieci. " -"<a href=\"%(volunteer)s\">PrzyÅ‚Ä…cz siÄ™!</a>" +msgstr "JesteÅ›my maÅ‚Ä… grupÄ… ludzi rozsianych po kilku kontynentach, którzy pracujÄ… nad różnymi aspektami projektu i dyskutujÄ… nad projektem sieci. <a href=\"%(volunteer)s\">PrzyÅ‚Ä…cz siÄ™!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1082,7 +1163,8 @@ msgid "Product Development" msgstr "Menadżer rozwoju" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "nadzorowanie projektów od etapu wczesnego planu aż do ukoÅ„czenia" #: i2p2www/pages/site/about/team.html:120 @@ -1164,9 +1246,7 @@ msgstr "wtyczka I2P-Bote" #: i2p2www/pages/site/about/team.html:182 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead" -msgstr "" -"Główny programista <a " -"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" +msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" #: i2p2www/pages/site/about/team.html:184 msgid "Maintains the integrated Bittorrent client" @@ -1175,9 +1255,7 @@ msgstr "zarzÄ…dza rozwojem zintegrowanego klienta BitTorrent" #: i2p2www/pages/site/about/team.html:187 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a> lead" -msgstr "" -"Główny programista <a " -"href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>" +msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>" #: i2p2www/pages/site/about/team.html:189 msgid "Syndie development" @@ -1245,9 +1323,7 @@ msgstr "tworzenie paczek Debiana/Ubuntu i zarzÄ…dzanie PPA" #: i2p2www/pages/site/about/team.html:232 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"back-end i interfejs konsoli wÄ™zÅ‚a, reorganizacja strony, testy " -"jednostkowe" +msgstr "back-end i interfejs konsoli wÄ™zÅ‚a, reorganizacja strony, testy jednostkowe" #: i2p2www/pages/site/about/team.html:237 msgid "Help needed on many fronts!" @@ -1328,7 +1404,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "rozwój jbigi, migracja wiki, uporzÄ…dkowanie dokumentacji" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "odpluskwianie Java i rozwój klienta I2PTunnel i konsoli wÄ™zÅ‚a" #: i2p2www/pages/site/about/team.html:323 @@ -1378,32 +1455,25 @@ msgstr "…i wielu innych" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1421,8 +1491,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1461,10 +1531,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1478,15 +1546,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1495,11 +1559,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1554,8 +1615,7 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1573,15 +1633,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1600,14 +1656,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1618,20 +1670,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1642,24 +1687,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1679,33 +1715,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -1718,32 +1745,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -1753,27 +1772,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -1790,17 +1801,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -1813,8 +1821,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -1825,10 +1832,8 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -1847,30 +1852,23 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -1884,55 +1882,40 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -1943,20 +1926,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -1967,16 +1943,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -1986,17 +1957,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2007,20 +1975,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2034,26 +1995,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2062,18 +2013,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2081,16 +2026,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2106,52 +2046,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2166,102 +2087,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2274,4 +2154,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/blog.po b/i2p2www/translations/pl/LC_MESSAGES/blog.po index 6151e23f7e04611dc6628b9409e8e5de5c810439..ff39cf22b2802dd613f9960f79ba48da2548ab10 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/blog.po +++ b/i2p2www/translations/pl/LC_MESSAGES/blog.po @@ -1,7 +1,7 @@ -# Polish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Karolina <karolina@bitwylesne.pl>, 2014 # Karol Kosek, 2018 @@ -9,19 +9,18 @@ # desik <vardesik@gmail.com>, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:26+0000\n" -"PO-Revision-Date: 2021-10-11 16:29+0000\n" -"Last-Translator: ☆Verdulo\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Karol Kosek, 2018\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11 @@ -326,11 +325,11 @@ msgstr "Wersja 0.9.2 wydana" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10 msgid "" -"0.9.2 includes extensive low-level changes to improve the performance and" -" efficiency of the router. We have updated our UPnP library, to hopefully" -" make UPnP work for more people. I2PSnark now has DHT support, but it is " -"not yet enabled by default, as we plan to do more testing during the " -"upcoming 0.9.3 development cycle." +"0.9.2 includes extensive low-level changes to improve the performance and " +"efficiency of the router. We have updated our UPnP library, to hopefully " +"make UPnP work for more people. I2PSnark now has DHT support, but it is not " +"yet enabled by default, as we plan to do more testing during the upcoming " +"0.9.3 development cycle." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13 @@ -338,14 +337,12 @@ msgstr "" msgid "" "As usual, there's also lots of bug fixes in this release, so updating is " "recommended." -msgstr "" -"Jak zwykle, w tym wydaniu mnóstwo bÅ‚Ä™dow zostaÅ‚o naprawionych, wiÄ™c " -"aktualizacja jest zalecana." +msgstr "Jak zwykle, w tym wydaniu mnóstwo bÅ‚Ä™dow zostaÅ‚o naprawionych, wiÄ™c aktualizacja jest zalecana." #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27 msgid "" -"SSU: Fix several problems in our UDP transport, to improve efficiency and" -" reliability for connection setup. Also improve defenses against various " +"SSU: Fix several problems in our UDP transport, to improve efficiency and " +"reliability for connection setup. Also improve defenses against various " "types of bad input." msgstr "" @@ -363,9 +360,9 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30 msgid "" -"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered " -"are now much more flexible, which should lessen protocol overhead and " -"reduce stalls caused by dropped tags." +"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are " +"now much more flexible, which should lessen protocol overhead and reduce " +"stalls caused by dropped tags." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31 @@ -376,16 +373,18 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35 msgid "" -"Fix various issues affecting memory usage and performance on high-" -"bandwidth routers" +"Fix various issues affecting memory usage and performance on high-bandwidth " +"routers" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36 -msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" +msgid "" +"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37 -msgid "Fix i2psnark bug that prevented a completion announcement to the tracker" +msgid "" +"Fix i2psnark bug that prevented a completion announcement to the tracker" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38 @@ -472,14 +471,14 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10 msgid "" -"0.9.3 includes extensive low-level changes to the queueing of messages in" -" the router. We implement the CoDel Active Queue Management (AQM) " -"algorithm. We also unify the queueing and priority mechanisms in the " -"transports to aid diagnosis and reduce network latency. Work continues " -"on fixing UDP transport bugs and making UDP more resistant to attacks. " -"There are more changes to improve the performance of the router and " -"reduce its memory usage. Also, we enable i2psnark's DHT support, " -"introduced last release, by default." +"0.9.3 includes extensive low-level changes to the queueing of messages in " +"the router. We implement the CoDel Active Queue Management (AQM) algorithm." +" We also unify the queueing and priority mechanisms in the transports to " +"aid diagnosis and reduce network latency. Work continues on fixing UDP " +"transport bugs and making UDP more resistant to attacks. There are more " +"changes to improve the performance of the router and reduce its memory " +"usage. Also, we enable i2psnark's DHT support, introduced last release, by " +"default." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27 @@ -497,8 +496,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33 msgid "" "Several SSU fixes including memory leak, and better handling of routers " -"behind firewalls that change UDP ports; additional defenses for malicious" -" packets." +"behind firewalls that change UDP ports; additional defenses for malicious " +"packets." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34 @@ -523,9 +522,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42 msgid "" -"Fix streaming connection timeout back to 1 minute, was inadvertently " -"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was" -" unlimited" +"Fix streaming connection timeout back to 1 minute, was inadvertently changed" +" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited" msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43 @@ -581,28 +579,24 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10 msgid "" -"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, " -"that was reducing network performance and reliability. It also includes " -"major changes in the in-network update system, and adds the capability to" -" update via in-network torrents." +"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that " +"was reducing network performance and reliability. It also includes major " +"changes in the in-network update system, and adds the capability to update " +"via in-network torrents." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14 msgid "" -"We fixed several bugs in the i2psnark DHT implementation that was " -"introduced\n" +"We fixed several bugs in the i2psnark DHT implementation that was introduced\n" "last release. For those of you using console or http proxy passwords,\n" -"we converted to the more-secure digest method and improved the security " -"for console forms." +"we converted to the more-secure digest method and improved the security for console forms." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20 msgid "" -"For those of you already running development builds, your router should " -"automatically\n" +"For those of you already running development builds, your router should automatically\n" "update to 0.9.4-0 using the new in-network torrent facility.\n" -"For those running 0.9.3-0, you will update normally using in-network " -"HTTP, and\n" +"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n" "we will have more information for you when we release 0.9.5." msgstr "" @@ -618,12 +612,13 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42 msgid "" -"Fix major bug that reduced SSU connection limits which reduced tunnel " -"build success rates" +"Fix major bug that reduced SSU connection limits which reduced tunnel build " +"success rates" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43 -msgid "Fix bug with external I2CP that prevented some external apps from working" +msgid "" +"Fix bug with external I2CP that prevented some external apps from working" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44 @@ -656,8 +651,7 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54 msgid "" -"More performance improvements, memory reduction, and object churn " -"reduction" +"More performance improvements, memory reduction, and object churn reduction" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55 @@ -674,15 +668,15 @@ msgstr "Dodaj formÄ™ hasÅ‚a konsoli" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58 msgid "" -"Convert http proxy and console from basic to digest authentication for " -"added security" +"Convert http proxy and console from basic to digest authentication for added" +" security" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59 msgid "" "Improved verification of console form submissions, using jsp sessions. " -"Cookies may now be required on forms, except when the console password is" -" enabled" +"Cookies may now be required on forms, except when the console password is " +"enabled" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60 @@ -701,8 +695,8 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63 msgid "" -"Translation updates: Chinese, French, German, Italian, Polish, " -"Portuguese, Swedish, and Ukrainian" +"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, " +"Swedish, and Ukrainian" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65 @@ -720,24 +714,21 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10 msgid "" -"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities" -" that are being investigated by researchers at UCSB. We continue to work " -"with them on additional improvements. This is a good opportunity to " -"remind the community that while our network continues to grow rapidly, it" -" is still relatively small. There may be multiple weaknesses or bugs that" -" could compromise your anonymity. Help us grow the network by spreading " -"the word and contributing where you can." +"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities " +"that are being investigated by researchers at UCSB. We continue to work with" +" them on additional improvements. This is a good opportunity to remind the " +"community that while our network continues to grow rapidly, it is still " +"relatively small. There may be multiple weaknesses or bugs that could " +"compromise your anonymity. Help us grow the network by spreading the word " +"and contributing where you can." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14 #, python-format msgid "" -"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers " -"running a\n" -"development build) will attempt to update via the experimental in-network" -" bittorrent\n" -"with i2psnark. If this doesn't work, it should fall back to standard in-" -"network HTTP update." +"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n" +"development build) will attempt to update via the experimental in-network bittorrent\n" +"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28 @@ -782,8 +773,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39 msgid "" -"Encrypt database lookup messages end-to-end when sent through exploratory" -" tunnels" +"Encrypt database lookup messages end-to-end when sent through exploratory " +"tunnels" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40 @@ -828,8 +819,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 msgid "" -"Translation updates: French, German, Hungarian, Italian, Norwegian, " -"Polish, Portuguese, Russian, Swedish" +"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, " +"Portuguese, Russian, Swedish" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55 @@ -844,17 +835,15 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10 msgid "" "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to " -"Jetty 7.6.10 (2013-03-12). See below for important information on the " -"Jetty update. The Jetty 7 series is actively maintained and we plan to " -"stay current with it in future I2P releases." +"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty " +"update. The Jetty 7 series is actively maintained and we plan to stay " +"current with it in future I2P releases." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14 msgid "" -"Most users will update via HTTP. Those running development builds will " -"attempt to update via the\n" -"experimental in-network bittorrent with i2psnark. We've fixed some bugs " -"that will enable more users\n" +"Most users will update via HTTP. Those running development builds will attempt to update via the\n" +"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n" "to update via torrent in the 0.9.7 update cycle." msgstr "" @@ -864,12 +853,9 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28 msgid "" -"If you first installed I2P with version 0.9.5, on Windows only, we " -"recommend that you follow the\n" -"following instructions to fix your eepsite location **before** you update" -" to 0.9.6.\n" -"Only original installations of 0.9.5-0 on Windows are affected by this " -"issue. If your router version\n" +"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n" +"following instructions to fix your eepsite location **before** you update to 0.9.6.\n" +"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n" "is 0.9.5-0-win1, you already have the fix and need not take any action." msgstr "" @@ -883,36 +869,29 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43 msgid "" -"For most people, the update should just work. If you have multiple Jetty " -"eepsites,\n" -"OR have made changes to jetty.xml or other Jetty configuration files, " -"including changing the port\n" +"For most people, the update should just work. If you have multiple Jetty eepsites,\n" +"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n" "from 7658, you MUST take manual action AFTER updating." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49 msgid "" -"After update, the router will migrate your jetty.xml files to the new " -"Jetty 7 format." +"After update, the router will migrate your jetty.xml files to the new Jetty " +"7 format." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51 msgid "" -"The migration resets the port to 7658. If you have more than one Jetty " -"eepsite, OR your eepsite\n" -" is NOT on port 7658, OR you have made other modifications to jetty.xml " -"(for example changing the\n" -" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml " -"file for each eepsite to fix them up\n" +"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n" +" is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n" +" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n" " after updating, and restart again." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56 msgid "" -"**The following files will be backed up with a ".jetty6" suffix" -" and then migrated.**\n" -"If you have made local changes, you may have to edit them manually and " -"restart.\n" +"**The following files will be backed up with a ".jetty6" suffix and then migrated.**\n" +"If you have made local changes, you may have to edit them manually and restart.\n" "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7." msgstr "" @@ -931,7 +910,8 @@ msgid "" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78 -msgid "If a plugin does not work, please contact the maintainer for that plugin." +msgid "" +"If a plugin does not work, please contact the maintainer for that plugin." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84 @@ -960,14 +940,14 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90 msgid "" -"Ignore unsupported IPs in RouterInfos when selecting an address (prep for" -" IPv6)" +"Ignore unsupported IPs in RouterInfos when selecting an address (prep for " +"IPv6)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91 msgid "" -"Ignore unused option bits in Database Lookup Message (prep for requesting" -" encrypted response)" +"Ignore unused option bits in Database Lookup Message (prep for requesting " +"encrypted response)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92 @@ -1037,31 +1017,24 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12 msgid "" -"For the first time, class 'N' routers (those with a minimumum of 128 " -"KBytes/sec of shared bandwidth)\n" -"will automatically become floodfill (previously it was only 'O' routers " -"with 256 KBps). This will\n" -"increase the floodfill population for additional resistance to certain " -"attacks (see below). Floodfill routers\n" -"don't consume much additional bandwidth, but they do tend to use " -"additional memory and concurrent\n" -"connections. If you do not wish your router to become floodfill, set the " -"advanced configuration\n" +"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n" +"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n" +"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n" +"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n" +"connections. If you do not wish your router to become floodfill, set the advanced configuration\n" "router.floodfillParticipant=false ." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21 #, python-format msgid "" -"As we think the last release fixed the experimental update-via-torrent " -"bugs, 3%(pc)s of routers should\n" +"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n" "update over in-network bittorrent this cycle." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26 msgid "" -"Plugin update checks, possibly broken for several releases, are fixed. " -"Your plugins should once again\n" +"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n" "auto-update after updating the router." msgstr "" @@ -1073,17 +1046,12 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35 msgid "" -"This release contains additional mitigations for the `\"practical " -"attacks\" paper`__.\n" -"However, we have a lot more work to do to resist Sybil attacks on the " -"floodfills, and resist\n" +"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n" +"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n" "traffic analysis at the gateways and endpoints of exploratory tunnels.\n" -"It's a good reminder for everybody that our network is still relatively " -"small and vulnerable.\n" -"We don't currently recommend any uses that would put anybody in serious " -"jeopardy.\n" -"We'll keep working to improve it... please keep working to spread the " -"word. A bigger network is a better network." +"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n" +"We don't currently recommend any uses that would put anybody in serious jeopardy.\n" +"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48 @@ -1128,8 +1096,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60 msgid "" -"Fix i2psnark bug that changed the infohash of torrents created by Robert " -"and fetched via magnet link" +"Fix i2psnark bug that changed the infohash of torrents created by Robert and" +" fetched via magnet link" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61 @@ -1164,8 +1132,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71 msgid "" -"Individual expiration times in leases, for efficiency on destinations " -"with a high number of tunnels" +"Individual expiration times in leases, for efficiency on destinations with a" +" high number of tunnels" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72 @@ -1181,7 +1149,8 @@ msgid "Tomcat 6.0.37" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75 -msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76 @@ -1199,12 +1168,11 @@ msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10 msgid "" -"This unscheduled release disables the RouterInfo verification messages " -"that were used in the attack published in the UCSB paper, which should " -"make correlating a LeaseSet and a Router much more difficult. We have " -"also included a limited number of other fixes listed below. Our 0.9.8 " -"release, which will include IPv6 support, is still on-schedule for late " -"September." +"This unscheduled release disables the RouterInfo verification messages that " +"were used in the attack published in the UCSB paper, which should make " +"correlating a LeaseSet and a Router much more difficult. We have also " +"included a limited number of other fixes listed below. Our 0.9.8 release, " +"which will include IPv6 support, is still on-schedule for late September." msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12 @@ -1254,16 +1222,17 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10 msgid "" -"0.9.8 includes the long-awaited support for IPv6. It's enabled by " -"default, but of course you need a public IPv6 address to use it. " -"Configuration is on the 'network' configuration tab in your console. We " -"also have anonymity improvements including padding of SSU packets and " -"longer router private keys." +"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, " +"but of course you need a public IPv6 address to use it. Configuration is on " +"the 'network' configuration tab in your console. We also have anonymity " +"improvements including padding of SSU packets and longer router private " +"keys." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12 #, python-format -msgid "30%(pc)s of you will update via in-network torrent in this update cycle." +msgid "" +"30%(pc)s of you will update via in-network torrent in this update cycle." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14 @@ -1272,41 +1241,30 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16 msgid "" -"IPv6 is enabled and preferred by default. If you have a public IPv6 " -"address \n" -"and you are connecting to another router with a published IPv6 address, " -"it will \n" -"connect via IPv6. There is a new IPv6 configuration section on /confignet" -" in \n" +"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n" +"and you are connecting to another router with a published IPv6 address, it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n" "the router console. If IPv6 is causing problems you may disable it there." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23 msgid "" "As a part of the IPv6 development effort, I2P now supports multiple \n" -"published IP addresses. If you have multiple public IP addresses (IPv4, " -"IPv6, \n" -"or both), you may enable or disable them individually on /confignet. The" -" \n" -"default is to use the first IPv4 and IPv6 addresses it discovers. If you " -"have \n" -"multiple addresses you should review the configuration on /confignet and " -"adjust \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n" +"multiple addresses you should review the configuration on /confignet and adjust \n" "it if necessary.\n" -"Note that while you may enable multiple IPv4 and IPv6 addresses on " -"/confignet,\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n" "we recommend that you use only one IPv4 and one IPv6 address. There are\n" "bugs still to be fixed with multiple addresses of each type." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35 msgid "" -"While IPv6 support was designed and developed over several years, it has" -" \n" -"only been tested by a limited number of users and is still beta. If you " -"do have \n" -"a public IPv6 address, please monitor your router and the logs for " -"problems, \n" +"While IPv6 support was designed and developed over several years, it has \n" +"only been tested by a limited number of users and is still beta. If you do have \n" +"a public IPv6 address, please monitor your router and the logs for problems, \n" "and disable it necessary. Please report any bugs on \n" "http://trac.i2p2.i2p." msgstr "" @@ -1317,26 +1275,19 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45 msgid "" -"For those of you running I2P on faster hardware (generally, 64-bit x86) " -"the \n" -"router will generate a new identity using longer keys. This will " -"substantially \n" -"reduce your participating traffic for 48 hours or more, while your router" -" \n" -"re-integrates into the network. Due to the new keys, the large number of" -" \n" +"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n" +"router will generate a new identity using longer keys. This will substantially \n" +"reduce your participating traffic for 48 hours or more, while your router \n" +"re-integrates into the network. Due to the new keys, the large number of \n" "torrent updates, and the recent network growth, we expect substantial \n" -"disruption to the network for a week or more after the update is " -"released. \n" +"disruption to the network for a week or more after the update is released. \n" "Please be patient and things should start to improve after a few days." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55 msgid "" -"These changes may result in higher CPU usage for some of you. We're doing" -" \n" -"our best to increase efficiency, but stronger security generally requires" -" more \n" +"These changes may result in higher CPU usage for some of you. We're doing \n" +"our best to increase efficiency, but stronger security generally requires more \n" "computation. Performance may also be poor during the first week\n" "due to the network churn.\n" "We will evaluate the network performace before deciding whether to\n" @@ -1345,10 +1296,8 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64 msgid "" -"We are experiencing rapid network growth in the last few weeks, which is" -" \n" -"causing a bit of a bumpy ride for some, especially on weekends. However, " -"the \n" +"We are experiencing rapid network growth in the last few weeks, which is \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, the \n" "network is still performing fairly well, so keep spreading the word." msgstr "" @@ -1360,14 +1309,10 @@ msgstr "" msgid "" "We're in the initial stages of desiging major changes to strengthen our \n" "crypto. Stronger crypto will use more CPU and it may possibly \n" -"require a Java 7 JRE at a minimum. We understand your desire to run I2P " -"on low-power \n" -"and/or older hardware. We're working hard to minimize the impacts, but " -"some \n" -"loss of performance is inevitable. In addition, Java 5 and 6 are no " -"longer \n" -"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " -"in \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n" "minimum requirements will be announced well in advance." msgstr "" @@ -1394,8 +1339,7 @@ msgid "" "Last weekend, echelon attended the CTS IV conference in Berlin and\n" "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" "Several of us will be at 30C3 in Hamburg late this year.\n" -"It's great to see people participating at these events and representing " -"I2P." +"It's great to see people participating at these events and representing I2P." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106 @@ -1423,7 +1367,8 @@ msgid "Fix occasional runtime exception in NTCP" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 -msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgid "" +"Big rework of transport code to accommodate multiple addresses and IPv6" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 @@ -1431,13 +1376,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 -msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgid "" +"Use Transifex for translation of initial news and HTTP proxy error pages" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 msgid "" -"Translation updates: Chinese, French, German, Portuguese, Russian, " -"Swedish, Turkish" +"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, " +"Turkish" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125 @@ -1455,9 +1401,9 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9 msgid "" -"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some " -"people. New installs and non-Windows platforms are not affected, however " -"all platforms will automatically update even if running 0.9.8." +"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. " +"New installs and non-Windows platforms are not affected, however all " +"platforms will automatically update even if running 0.9.8." msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11 @@ -1468,10 +1414,8 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20 msgid "" -"Due to recent attacks, logins are disabled on `Trac`_ and new " -"registrations are\n" -"disabled on `zzz.i2p`_. Until those services are restored, please report " -"all\n" +"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n" +"disabled on `zzz.i2p`_. Until those services are restored, please report all\n" "bugs on IRC freenode or IRC2P #i2p-dev." msgstr "" @@ -1484,9 +1428,9 @@ msgstr "" msgid "" "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and " "starts work on a year-long plan to increase the strength of the " -"cryptographic signing algorithms used in the router, and support multiple" -" algorithms and key lengths simultaneously. Automatic update files will " -"now be signed with 4096-bit RSA keys." +"cryptographic signing algorithms used in the router, and support multiple " +"algorithms and key lengths simultaneously. Automatic update files will now " +"be signed with 4096-bit RSA keys." msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11 @@ -1498,8 +1442,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release.\n" +"The best way to maintain security and help the network is to run the latest release.\n" "Several members of the I2P team will be at 30C3 in Hamburg this year.\n" "Come say hello and ask for an I2P sticker.\n" "Thanks to everyone for their support this year." @@ -1615,8 +1558,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62 msgid "" -"Extend router info expiration and other changes to reduce load on " -"floodfills" +"Extend router info expiration and other changes to reduce load on floodfills" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63 @@ -1653,8 +1595,8 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71 msgid "" -"Translation updates: French, German, Italian, Romanian, Russian, Spanish," -" Swedish, and others" +"Translation updates: French, German, Italian, Romanian, Russian, Spanish, " +"Swedish, and others" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73 @@ -1693,19 +1635,15 @@ msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26 msgid "" "If you have a large database or an identity you wish to preserve,\n" -"you may wish to back up your entire ~/.syndie directory before you start." -"\n" -"The upgrade process does make its own backup, however you may find it " -"easier to use your own backup if the upgrade fails." +"you may wish to back up your entire ~/.syndie directory before you start.\n" +"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32 msgid "" -"Upgrades from 1.103b may fail for some people due to database corruption " -"due to bugs in the old HSQLDB.\n" +"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n" "Unfortunately, we don't know how to fix it.\n" -"Your alternatives are to start over with a clean database, or stay with " -"1.103b forever.\n" +"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n" "Sorry about that." msgstr "" @@ -1713,8 +1651,7 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release." +"The best way to maintain security and help the network is to run the latest release." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57 @@ -1794,19 +1731,15 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12 msgid "" -"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more " -"difficult for an attacker\n" -"to correlate a Destination with a Router. It also fixes character " -"encoding bugs in susimail,\n" +"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n" +"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n" "and includes lots of other bug fixes and translation updates.\n" -"Most of you will update via torrent, using the new \"su3\" update format " -"with stronger keys." +"Most of you will update via torrent, using the new \"su3\" update format with stronger keys." msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19 msgid "" -"We recently attended `30C3`__ and `Real World Crypto`__, making several " -"new\n" +"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n" "connections and formulating `big plans`__ for 2014. Thanks to those who\n" "supported our attendance with their `donations`__!" msgstr "" @@ -1817,8 +1750,8 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43 msgid "" -"Flood netdb stores to new location before midnight to prevent lookup " -"fails after midnight" +"Flood netdb stores to new location before midnight to prevent lookup fails " +"after midnight" msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44 @@ -1895,24 +1828,19 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12 #, python-format msgid "" -"0.9.11 continues improving LeaseSet lookup and storage to prevent an " -"attacker\n" +"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n" "from correlating a Destination with a Router. It adds support for the\n" "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n" -"reduction in memory usage due to fixes in the transports. We have some " -"I2CP\n" +"reduction in memory usage due to fixes in the transports. We have some I2CP\n" "protocol improvements that will provide better lookup facilities and\n" -"authorization protection for external clients. Of course, there's also " -"the\n" +"authorization protection for external clients. Of course, there's also the\n" "usual collection of bug fixes. All users should update." msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22 msgid "" -"This may be the last release that works with Java 5, which is very old " -"and\n" -"unsupported. If you are using a Java 5 or 6 runtime, we strongly " -"recommend that\n" +"This may be the last release that works with Java 5, which is very old and\n" +"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n" "you upgrade to Java 7." msgstr "" @@ -1959,10 +1887,7 @@ msgstr "" msgid "" "As usual, we recommend that you update to this release. The best way to\n" "maintain security and help the network is to run the latest release." -msgstr "" -"Jak zwykle, zalecamy aktualizacjÄ™ programu do niniejszej wersji. Nie " -"musimy dodawać, że sÅ‚uży to zachowaniu bezpieczeÅ„stwa sieci oraz jej " -"uczestników." +msgstr "Jak zwykle, zalecamy aktualizacjÄ™ programu do niniejszej wersji. Nie musimy dodawać, że sÅ‚uży to zachowaniu bezpieczeÅ„stwa sieci oraz jej uczestników." #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40 msgid "More leaseset handling improvements" @@ -1994,8 +1919,8 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53 msgid "" -"Stricter I2CP authorization enforcement of external clients (incompatible" -" change)" +"Stricter I2CP authorization enforcement of external clients (incompatible " +"change)" msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54 @@ -2019,23 +1944,21 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9 msgid "" -"The site i2pbrowser.net is a fake I2P website mirror serving up malware " -"for Windows." +"The site i2pbrowser.net is a fake I2P website mirror serving up malware for " +"Windows." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11 msgid "" -"We have recently been made aware of the existence of i2pbrowser.net. This" -"\n" -"website copies our homepage and download page, and attempts to trick " -"users into\n" +"We have recently been made aware of the existence of i2pbrowser.net. This\n" +"website copies our homepage and download page, and attempts to trick users into\n" "downloading Windows malware." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17 msgid "" -"There are several indicators that point to i2pbrowser.net being a malware" -" site:" +"There are several indicators that point to i2pbrowser.net being a malware " +"site:" msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21 @@ -2044,29 +1967,26 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22 msgid "" -"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to " -"the same .exe file." +"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the " +"same .exe file." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23 -msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." +msgid "" +"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25 msgid "" -"We have not examined the malware ourselves, but it does not appear to be " -"very\n" -"sophisticated; it is not integrated into or bundled with the I2P " -"software.\n" -"Information security expert `Lance James`__ posted `a tweet`__ labelling " -"it as\n" +"We have not examined the malware ourselves, but it does not appear to be very\n" +"sophisticated; it is not integrated into or bundled with the I2P software.\n" +"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n" "\"a standard dark comet rat\"." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35 msgid "" -"Spread the word. The only official download locations for I2P are linked " -"on our\n" +"Spread the word. The only official download locations for I2P are linked on our\n" "`download page`__. All I2P download packages are GPG-signed by the\n" "`release signing key`__." msgstr "" @@ -2087,31 +2007,21 @@ msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12 msgid "" "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n" -"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly" -" open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" -"on the DuckDuckGo community portal. With an emphasis on privacy, " -"DuckDuckGo provides a search\n" -"engine which does not track its users or store personal data. I2P is an " -"anonymous network intended to\n" -"protect individuals from dragnet surveillance regularly performed by ISPs" -" and governments." +"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" +"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n" +"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n" +"protect individuals from dragnet surveillance regularly performed by ISPs and governments." msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46 msgid "" -"This marks the single largest donation ever received by I2P and reflects " -"a growing interest in\n" -"privacy and security by the Internet community. The funding will help I2P" -" to reach more users, expand\n" -"development, and audit the code. It will also enable I2P developers to " -"attend conferences, such\n" -"as the `Real-World Cryptography`__ conference in New York City, where the" -" developers met and\n" -"collaborated with cryptography experts pursuant to I2P's goals of " -"providing anonymity to the\n" +"This marks the single largest donation ever received by I2P and reflects a growing interest in\n" +"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n" +"development, and audit the code. It will also enable I2P developers to attend conferences, such\n" +"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n" +"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n" "public." msgstr "" @@ -2142,34 +2052,28 @@ msgstr "" msgid "" "I2P now requires Java 6 or higher.\n" "We strongly recommend that you upgrade to Java 7.\n" -"If you are still using Java 5, you must upgrade your Java before " -"installing I2P 0.9.12." +"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19 msgid "" "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n" -"It contains several fixes for the handling of Delivery Status Messages " -"(acknowledgements)\n" +"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n" "and those messages are now end-to-end encrypted for increased security." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24 msgid "" "We have upgraded to Jetty 8.\n" -"Jetty 8 is almost identical to Jetty 7, so there are no complex " -"configuration file conversions as there have been in past Jetty upgrades." -"\n" +"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n" "No manual changes should be necessary." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35 msgid "" "In early March, Internet search company `DuckDuckGo`__ `donated`__\n" -"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly " -"open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" +"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" "on the DuckDuckGo community portal." msgstr "" @@ -2224,7 +2128,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88 -msgid "Reduce target connection count again to reduce tunnel reject rate further" +msgid "" +"Reduce target connection count again to reduce tunnel reject rate further" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89 @@ -2272,10 +2177,8 @@ msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13 msgid "" -"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, " -"and a big SusiMail update.\n" -"Of course, there's also the usual collection of bug fixes and translation" -" updates." +"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n" +"Of course, there's also the usual collection of bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23 @@ -2373,30 +2276,24 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13 msgid "" -"0.9.14 includes critical fixes for XSS and remote execution " -"vulnerabilities reported by Exodus Intelligence.\n" -"As an added precaution, we have disabled several advanced configuration " -"features in the router console,\n" +"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n" +"As an added precaution, we have disabled several advanced configuration features in the router console,\n" "including installation of new plugins.\n" "We plan to re-enable these in a future release after additional review." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20 msgid "" -"Due to I2P library changes, I2P-Bote users must upgrade their plugin to " -"version 0.2.10 to work with I2P 0.9.14.\n" -"Your router should update the plugin automatically after the router " -"restarts." +"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n" +"Your router should update the plugin automatically after the router restarts." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25 msgid "" -"The release also contains several bug fixes in i2ptunnel, i2psnark, and " -"other areas,\n" +"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n" "and updates to the latest Jetty, Tomcat, and Wrapper.\n" "We've also implemented a faster and more secure method for reseeding.\n" -"Of course, there's also the usual collection of minor bug fixes and " -"translation updates." +"Of course, there's also the usual collection of minor bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32 @@ -2447,14 +2344,14 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55 msgid "" -"Several i2psnark improvements and fixes (GUI and DHT), including changes " -"for better compatibility with Vuze" +"Several i2psnark improvements and fixes (GUI and DHT), including changes for" +" better compatibility with Vuze" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60 msgid "" -"Reseeding now fetches a signed zip file containing router infos for " -"security and speed" +"Reseeding now fetches a signed zip file containing router infos for security" +" and speed" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61 @@ -2467,8 +2364,8 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63 msgid "" -"Per-message reliabilitiy settings in I2CP and error propagation back from" -" router to client" +"Per-message reliabilitiy settings in I2CP and error propagation back from " +"router to client" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64 @@ -2500,33 +2397,23 @@ msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13 msgid "" -"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some" -" other web forms.\n" -"We've restored the ability to install plugins via the console, but you " -"must first edit your router.config file\n" -"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the " -"line routerconsole.enablePluginInstall=true.\n" -"Other rarely-used advanced features that were removed in 0.9.14 may be " -"restored by adding the line routerconsole.advanced=true." +"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n" +"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n" +"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n" +"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20 msgid "" -"As usual, if configured with the default \"Download and Verify\", the " -"router will automatically download the update and display a button to " -"restart.\n" -"However, due to a bug in 0.9.14, if your update is configured for " -"\"Notify only\", the download button will not be displayed.\n" -"You must change your configuration to \"Download and Verify\" or " -"\"Download, Verify, and Restart\" to update." +"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n" +"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n" +"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26 msgid "" -"If you are still running 0.9.13 or older, we recommend that you update to" -" this release as soon as possible.\n" -"If you don't often check your router console, please consider changing " -"your configuration to \"Download, Verify, and Restart\"\n" +"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n" +"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n" "to ensure you are always running the latest release." msgstr "" @@ -2580,10 +2467,7 @@ msgstr "" msgid "" "Hello all!\n" "\n" -"Today we announce the Privacy Solutions project, a new organization that " -"develops and maintains I2P software. Privacy Solutions includes several " -"new development efforts designed to enhance the privacy, security, and " -"anonymity for users, based on I2P protocols and technology.\n" +"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n" "\n" "These efforts include\n" "\n" @@ -2593,40 +2477,23 @@ msgid "" "4) The Anoncoin crypto-coin project.\n" "5) The Monero crypto-coin project.\n" "\n" -"Privacy Solutions' initial funding was provided by the supporters of the " -"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-" -"profit type of organization registered within the Norwegian government " -"registers. ( Kind of like US 501(c)3. )\n" +"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n" "\n" -"Privacy Solutions plans to apply for funding from the Norwegian goverment" -" for network research, because of BigBrother (We'll get back to what that" -" is) and the coins that are planned to use low-latency networks as " -"primary transport layer. Our research will support advances in software " -"technology for anonymity, security, and privacy.\n" +"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n" "\n" "\n" -"First a little bit about the Abscond Browser Bundle. This was first a " -"one-man project by Meeh, but later on friends started sending patches, " -"the project is now trying to create the same easy access to I2P as Tor " -"has with their browser bundle. Our first release isn't far away, it's " -"just some gitian script tasks left, including setup of the Apple " -"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C" -" struct keeping vital proces information about an process) from the Java " -"instance to check on I2P before we declare it stable. I2pd will also " -"switch with the Java version once it's ready, and there is no point in " -"shipping a JRE in the bundle anymore. You can read more about the Abscond" -" Browser Bundle at https://hideme.today/dev" +"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev" msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35 msgid "" -"We would also like to inform of the current status of i2pd. I2pd supports" -" bi-directional streaming now, that allows to use not only HTTP but long-" -"lived communication channels. Instant IRC support has been added. I2pd " -"users are able to use it same way as Java I2P for access to I2P IRC " -"network. I2PTunnel is one of key features of I2P network, allowing non-" -"I2P applications communicate transparently. That's why it's vital feature" -" for i2pd and one of key milestones." +"We would also like to inform of the current status of i2pd. I2pd supports " +"bi-directional streaming now, that allows to use not only HTTP but long-" +"lived communication channels. Instant IRC support has been added. I2pd users" +" are able to use it same way as Java I2P for access to I2P IRC network. " +"I2PTunnel is one of key features of I2P network, allowing non-I2P " +"applications communicate transparently. That's why it's vital feature for " +"i2pd and one of key milestones." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39 @@ -2635,18 +2502,17 @@ msgid "" "Bigbrother.i2p, which is a metrics system Meeh made over a year back. " "Recently we noticed that Meeh actually have 100Gb of non-duplicated data " "from nodes reporting in since initial launch. This will also be moved to " -"Privacy Solutions and be rewritten with a NSPOF backend. With this we " -"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-" -"shots ). This will give us a great overview over the network without " -"privacy issues for our end users. The clients filter all data except " -"country, router hash and success rate on tunnel buildings. The name of " -"this service is as always a little joke from Meeh." +"Privacy Solutions and be rewritten with a NSPOF backend. With this we will " +"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). " +"This will give us a great overview over the network without privacy issues " +"for our end users. The clients filter all data except country, router hash " +"and success rate on tunnel buildings. The name of this service is as always " +"a little joke from Meeh." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46 msgid "" -"We have shorted down a bit of the news here, if you're interested in more" -" information please visit https://blog.privacysolutions.no/\n" +"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n" "We're still under construction and more content will come!\n" "\n" "\n" @@ -2670,67 +2536,50 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11 msgid "" -"I2P Android and Bote have been released on Google Play in Norway, as a " -"test run for a future worldwide release." +"I2P Android and Bote have been released on Google Play in Norway, as a test " +"run for a future worldwide release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13 msgid "" -"I2P Android has existed for over three years. In that time, it has " -"evolved from\n" -"a simple test project into a usable, useful Android port of the I2P " -"router. Our\n" -"eventual goal has been to release I2P Android on Google Play, to make it " -"easier\n" -"for users to discover, install and use I2P on their Android devices. " -"After much\n" -"work improving the user interface, fixing bugs and testing, we think that" -" I2P\n" +"I2P Android has existed for over three years. In that time, it has evolved from\n" +"a simple test project into a usable, useful Android port of the I2P router. Our\n" +"eventual goal has been to release I2P Android on Google Play, to make it easier\n" +"for users to discover, install and use I2P on their Android devices. After much\n" +"work improving the user interface, fixing bugs and testing, we think that I2P\n" "Android is finally ready to go where the users are." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22 msgid "" -"Initially, we are only releasing to Android users in Norway, as a test " -"run. I2P\n" -"Android will have far more exposure on Google Play than it has ever had " -"before,\n" -"and there will be bugs and usability issues that we need to fix. It will " -"be much\n" -"easier (and less stressful!) to respond to feedback if we only need to " -"deal with\n" -"reports from hundreds of users instead of thousands (already orders of " -"magnitude\n" +"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n" +"Android will have far more exposure on Google Play than it has ever had before,\n" +"and there will be bugs and usability issues that we need to fix. It will be much\n" +"easier (and less stressful!) to respond to feedback if we only need to deal with\n" +"reports from hundreds of users instead of thousands (already orders of magnitude\n" "more feedback than we have ever had)." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31 msgid "" -"Simultaneously we are making the first public release of Bote, an Android" -" port\n" -"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. " -"It runs\n" -"on top of the I2P network, and while it works as a standalone app, it " -"will use\n" +"Simultaneously we are making the first public release of Bote, an Android port\n" +"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n" +"on top of the I2P network, and while it works as a standalone app, it will use\n" "the I2P Android app by default if installed. As with I2P Android, we are\n" "initially only releasing Bote to Android users in Norway." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41 msgid "" -"The apps are being released on Google Play by `The Privacy Solutions " -"Project`__.\n" -"See their `blog post`__ for further information, and links to the Google " -"Play\n" +"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n" +"See their `blog post`__ for further information, and links to the Google Play\n" "page for Norway users." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50 msgid "" -"As lead developer for I2P Android and Bote, I look forward to your " -"comments. You\n" -"are the people who will be using them, and your perspectives will help me" -" craft\n" +"As lead developer for I2P Android and Bote, I look forward to your comments. You\n" +"are the people who will be using them, and your perspectives will help me craft\n" "simple, intuitive apps that make privacy accessible to everyone." msgstr "" @@ -2740,28 +2589,22 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59 msgid "" -"We have also updated I2P Android on the website to match the release " -"candidate\n" -"deployed in Norway. This version will be updated with changes as we " -"respond to\n" +"We have also updated I2P Android on the website to match the release candidate\n" +"deployed in Norway. This version will be updated with changes as we respond to\n" "feedback from Norwegian users, heading towards our next stable release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65 msgid "" -"Please note that we have upgraded the Android API to 9. This means that " -"Froyo\n" -"Android 2.2 will not be supported anymore; the minimum requirement is now" -"\n" +"Please note that we have upgraded the Android API to 9. This means that Froyo\n" +"Android 2.2 will not be supported anymore; the minimum requirement is now\n" "Gingerbread Android 2.3." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71 msgid "" -"Also note that if you have an earlier version of I2P Android, you will " -"need to\n" -"uninstall and reinstall because we have changed the release keys. Further" -"\n" +"Also note that if you have an earlier version of I2P Android, you will need to\n" +"uninstall and reinstall because we have changed the release keys. Further\n" "information about this will be provided in a subsequent blog post." msgstr "" @@ -2779,31 +2622,23 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13 msgid "" "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n" -"It includes a new persistent configuration backend for i2psnark and fixes" -" several issues with i2psnark's handling of file names.\n" +"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n" "There are several improvements to speed up SAM.\n" "Plugins now support stronger signatures in the su3 file format.\n" -"Plugin installation via the console, which was disabled in 0.9.14, is re-" -"enabled." +"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21 msgid "" -"We have supported ECDSA signatures since 0.9.12, and we would like to " -"start using ECDSA by default.\n" -"Unfortunately, some of you are still running older I2P versions, and for " -"others,\n" +"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n" +"Unfortunately, some of you are still running older I2P versions, and for others,\n" "their distribution or Java runtime does not support ECDSA. Red Hat\n" "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n" "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n" -"others have had success with installing the \"unlimited strength policy " -"files\".\n" -"We've added information about missing crypto to the log file and the " -"/logs page in the console.\n" -"After you update to 0.9.15, please check if you are missing ECDSA " -"support, and attempt to fix it if necessary.\n" -"This is particularly important for those that run popular eepsites and " -"services." +"others have had success with installing the \"unlimited strength policy files\".\n" +"We've added information about missing crypto to the log file and the /logs page in the console.\n" +"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n" +"This is particularly important for those that run popular eepsites and services." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42 @@ -2913,8 +2748,8 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68 msgid "" -"i2ptunnel add support for local SSL connections for standard and IRC " -"client tunnels" +"i2ptunnel add support for local SSL connections for standard and IRC client " +"tunnels" msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69 @@ -2951,26 +2786,21 @@ msgid "" "0.9.16 is a significant step forward in our plan to migrate\n" "from DSA to ECDSA and then EdDSA cryptographic signatures,\n" "and makes several other changes to increase your anonymity and security.\n" -"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures" -" by default.\n" -"In addition, we've fixed a large number of serious bugs, including " -"console lockups." +"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n" +"In addition, we've fixed a large number of serious bugs, including console lockups." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21 msgid "" -"Changes in router data structures will require i2pcontrol plugin users to" -" update to version 0.0.9." +"Changes in router data structures will require i2pcontrol plugin users to " +"update to version 0.0.9." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25 msgid "" -"If you run an eepsite or a service and you are not running a recent " -"release,\n" -"or your Java or OS does not support ECDSA (as noted in the logs and on " -"the /logs page in the console),\n" -"please fix the issue as soon as possible or your users will soon be " -"unable to connect." +"If you run an eepsite or a service and you are not running a recent release,\n" +"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n" +"please fix the issue as soon as possible or your users will soon be unable to connect." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42 @@ -2983,8 +2813,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44 msgid "" -"Require I2CP authorization for all messages when enabled (requires 0.9.11" -" or higher client)" +"Require I2CP authorization for all messages when enabled (requires 0.9.11 or" +" higher client)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45 @@ -3003,8 +2833,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48 msgid "" -"New column sorting, set-all priority buttons, and upload ratio display in" -" i2psnark" +"New column sorting, set-all priority buttons, and upload ratio display in " +"i2psnark" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49 @@ -3065,14 +2895,14 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71 msgid "" -"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol" -" plugin)" +"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol " +"plugin)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72 msgid "" -"New router keys now stored in router.keys.dat (eepPriv.dat format) " -"instead of router.keys" +"New router keys now stored in router.keys.dat (eepPriv.dat format) instead " +"of router.keys" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73 @@ -3107,8 +2937,7 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80 msgid "" -"Change eepsite Jetty threadpool and queue configuration (new installs " -"only)" +"Change eepsite Jetty threadpool and queue configuration (new installs only)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81 @@ -3128,39 +2957,34 @@ msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13 msgid "" -"0.9.17 is primarily a bugfix release, but it also continues our migration" -" to stronger cryptographic signatures." +"0.9.17 is primarily a bugfix release, but it also continues our migration to" +" stronger cryptographic signatures." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17 msgid "" -"We have moved the news feed system used for the news on your console and " -"the latest router version indication\n" +"We have moved the news feed system used for the news on your console and the latest router version indication\n" "to a signed format using RSA 4096-bit keys for enhanced security." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22 msgid "" -"New eepsites and servers will be ECDSA-signed by default, if ECDSA is " -"available.\n" +"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n" "There is now a warning in the console sidebar if ECDSA is not available.\n" -"For RedHat users, we have reports of successful installs of the " -"BouncyCastle Provider (bcprov) jar to add ECDSA support." +"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28 msgid "" -"We've fixed several serious bugs, including an SSU packet corruption " -"problem,\n" +"We've fixed several serious bugs, including an SSU packet corruption problem,\n" "and a SAM bug affecting i2p-messenger and other SAM applications.\n" -"There are several fixes for the preliminary ECDSA router signatures added" -" in the last release but not yet enabled." +"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34 msgid "" -"Many of us will be attending 31C3 in Hamburg in December. Stop by our " -"table and say hi!" +"Many of us will be attending 31C3 in Hamburg in December. Stop by our table " +"and say hi!" msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49 @@ -3260,16 +3084,14 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11 msgid "" -"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google" -" Play and F-Droid." +"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google " +"Play and F-Droid." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13 msgid "" -"It has been some time since I last posted updates about our Android " -"development,\n" -"and several I2P releases have gone by without any matching Android " -"releases.\n" +"It has been some time since I last posted updates about our Android development,\n" +"and several I2P releases have gone by without any matching Android releases.\n" "At last, the wait is over!" msgstr "" @@ -3281,47 +3103,31 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24 msgid "" -"New versions of I2P Android and Bote have been released! They can be " -"downloaded\n" +"New versions of I2P Android and Bote have been released! They can be downloaded\n" "from these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35 msgid "" -"The main change in these releases is the transition to Android's new " -"Material\n" -"design system. Material has made it much easier for app developers with, " -"shall\n" -"we say, \"minimalist\" design skills (like myself) to create apps that " -"are nicer\n" -"to use. I2P Android also updates its underlying I2P router to the just-" -"released\n" -"version 0.9.17. Bote brings in several new features along with many " -"smaller\n" -"improvements; for example, you can now add new email destinations via QR " -"codes." +"The main change in these releases is the transition to Android's new Material\n" +"design system. Material has made it much easier for app developers with, shall\n" +"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n" +"to use. I2P Android also updates its underlying I2P router to the just-released\n" +"version 0.9.17. Bote brings in several new features along with many smaller\n" +"improvements; for example, you can now add new email destinations via QR codes." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44 msgid "" -"As I mentioned in `my last update`__, the release key that signs the apps" -" has\n" -"changed. The reason for this was because we needed to change the package " -"name\n" -"of I2P Android. The old package name (``net.i2p.android.router``) had " -"already\n" -"been taken on Google Play (we still don't know who was using it), and we " -"wanted\n" -"to use the same package name and signing key for all distributions of I2P" -"\n" -"Android. Doing so means that a user could initially install the app from " -"the I2P\n" -"website, and then later if the website was blocked they could upgrade it " -"using\n" -"Google Play. Android OS considers an application to be completely " -"different when\n" -"its package name changes, so we took the opportunity to increase the " -"strength of\n" +"As I mentioned in `my last update`__, the release key that signs the apps has\n" +"changed. The reason for this was because we needed to change the package name\n" +"of I2P Android. The old package name (``net.i2p.android.router``) had already\n" +"been taken on Google Play (we still don't know who was using it), and we wanted\n" +"to use the same package name and signing key for all distributions of I2P\n" +"Android. Doing so means that a user could initially install the app from the I2P\n" +"website, and then later if the website was blocked they could upgrade it using\n" +"Google Play. Android OS considers an application to be completely different when\n" +"its package name changes, so we took the opportunity to increase the strength of\n" "the signing key." msgstr "" @@ -3337,25 +3143,18 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73 msgid "" -"A few months ago we `released`__ both I2P Android and Bote on Google Play" -" in\n" -"Norway, to test the release process there. We are pleased to announce " -"that both\n" -"apps are now being released globally by `Privacy Solutions`__. The apps " -"can be\n" +"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n" +"Norway, to test the release process there. We are pleased to announce that both\n" +"apps are now being released globally by `Privacy Solutions`__. The apps can be\n" "found at these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89 msgid "" -"The global release is being done in several stages, starting with the " -"countries\n" -"for which we have translations. The notable exception to this is France; " -"due to\n" -"import regulations on cryptographic code, we are unable yet to distribute" -" these\n" -"apps on Google Play France. This is the same issue that has affected " -"other apps\n" +"The global release is being done in several stages, starting with the countries\n" +"for which we have translations. The notable exception to this is France; due to\n" +"import regulations on cryptographic code, we are unable yet to distribute these\n" +"apps on Google Play France. This is the same issue that has affected other apps\n" "like TextSecure and Orbot." msgstr "" @@ -3367,39 +3166,28 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103 msgid "" -"Don't think we have forgotten about you, F-Droid users! In addition to " -"the two\n" -"locations above, we have set up our own F-Droid repository. If you are " -"reading\n" -"this post on your phone, `click here`__ to add it to F-Droid (this only " -"works in\n" -"some Android browsers). Or, you can manually add the URL below to your " -"F-Droid\n" +"Don't think we have forgotten about you, F-Droid users! In addition to the two\n" +"locations above, we have set up our own F-Droid repository. If you are reading\n" +"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n" +"some Android browsers). Or, you can manually add the URL below to your F-Droid\n" "repository list:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115 msgid "" -"If you would like to manually verify the fingerprint (SHA-256) of the " -"repository\n" +"If you would like to manually verify the fingerprint (SHA-256) of the repository\n" "signing key, or type it in when adding the repository, here it is:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124 msgid "" -"Unfortunately the I2P app in the main F-Droid repository has not been " -"updated\n" -"because our F-Droid maintainer has disappeared. We hope that by " -"maintaining this\n" +"Unfortunately the I2P app in the main F-Droid repository has not been updated\n" +"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n" "binary repository, we can better support our F-Droid users and keep them\n" -"up-to-date. If you have already installed I2P from the main F-Droid " -"repository,\n" -"you will need to uninstall it if you want to upgrade, because the signing" -" key\n" -"will be different. The apps in our F-Droid repository are the same APKs " -"that are\n" -"provided on our website and on Google Play, so in future you will be able" -" to\n" +"up-to-date. If you have already installed I2P from the main F-Droid repository,\n" +"you will need to uninstall it if you want to upgrade, because the signing key\n" +"will be different. The apps in our F-Droid repository are the same APKs that are\n" +"provided on our website and on Google Play, so in future you will be able to\n" "upgrade using any of these sources." msgstr "" @@ -3418,25 +3206,18 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21 msgid "" -"We were, for the second year in a row, at a great location in the " -"Congress, in\n" -"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square " -"has\n" -"really increased our visibility and helped many people find us. Thanks to" -" Noisy\n" +"We were, for the second year in a row, at a great location in the Congress, in\n" +"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n" +"really increased our visibility and helped many people find us. Thanks to Noisy\n" "Square and the 31C3 organizers for a great Congress." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30 msgid "" -"We also thank Gabriel Weinberg and his fabulous search engine " -"`DuckDuckGo`__ for\n" -"their support of open source anonymity tools and their `generous " -"contribution`__\n" -"to I2P in 2014. Funding from DuckDuckGo and others helped support our " -"attendance\n" -"at CCC. This is the primary annual meetup for I2P developers and it is " -"critical\n" +"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n" +"their support of open source anonymity tools and their `generous contribution`__\n" +"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n" +"at CCC. This is the primary annual meetup for I2P developers and it is critical\n" "to our success." msgstr "" @@ -3448,127 +3229,88 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49 msgid "" -"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved " -"himself\n" -"and the project from TU Munich to `Inria`__ in France. He has a large " -"number of\n" -"`open positions`__. This is a great opportunity to get paid to work on " -"open\n" +"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n" +"and the project from TU Munich to `Inria`__ in France. He has a large number of\n" +"`open positions`__. This is a great opportunity to get paid to work on open\n" "source anonymity tools, we encourage everybody to contact him about it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60 msgid "" -"The prospect of an invigorated GNUnet with a large amount of new funding " -"is\n" -"quite interesting. We discussed more ways to work together. In early " -"2014, we\n" -"worked hard to understand the GnuNet DNS replacement, but we were unable " -"to\n" -"figure out a good fit for it in I2P. One of his new ideas is a " -"distributed,\n" -"anonymous statistics gathering subsystem, for detecting problems or " -"attacks on\n" +"The prospect of an invigorated GNUnet with a large amount of new funding is\n" +"quite interesting. We discussed more ways to work together. In early 2014, we\n" +"worked hard to understand the GnuNet DNS replacement, but we were unable to\n" +"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n" +"anonymous statistics gathering subsystem, for detecting problems or attacks on\n" "the network. We'd definitely be interested in that." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69 msgid "" -"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems " -"draft`__.\n" -"A new, greatly simplified version 3 was posted in December. The prospects" -" for\n" +"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n" +"A new, greatly simplified version 3 was posted in December. The prospects for\n" "approval remain unclear. The best way to monitor or participate in the\n" -"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to " -"do so\n" +"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n" "on our side, and also give Hellekin a new point-of-contact for this topic." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80 msgid "" -"We apologized to Christian for not being organized enough to have a talk " -"at his\n" -"`We Fix The Net assembly`__. One of our biggest failures as a project is " -"our\n" -"seeming inability to submit talks at conferences. We'll have to do better" -" in the\n" +"We apologized to Christian for not being organized enough to have a talk at his\n" +"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n" +"seeming inability to submit talks at conferences. We'll have to do better in the\n" "new year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92 msgid "" -"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in " -"with\n" -"other anonymity tools into this new Debian \"superpackage\" of some sort," -" and\n" -"would love to get I2P into Debian in 2015. He claims the process is now " -"easy,\n" +"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n" +"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n" +"would love to get I2P into Debian in 2015. He claims the process is now easy,\n" "just `follow the instructions`__. We said that's funny, we've been\n" "`stuck in the process for over 7 years`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103 msgid "" -"He said, well, try the new process, it works great, should be no problem " -"at all\n" -"if your package is in good shape. The people in Debian that run this " -"process are\n" -"eager volunteers who want nothing more than to get more packages in. We " -"said our\n" -"package is indeed in fantastic shape, and we would try out the new " -"process as\n" -"soon as possible. If all this is true, we will be in the next Debian " -"release in\n" +"He said, well, try the new process, it works great, should be no problem at all\n" +"if your package is in good shape. The people in Debian that run this process are\n" +"eager volunteers who want nothing more than to get more packages in. We said our\n" +"package is indeed in fantastic shape, and we would try out the new process as\n" +"soon as possible. If all this is true, we will be in the next Debian release in\n" "late 2015. This would be very very cool." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115 msgid "" -"We had a nice discussion with BitingBird of Tails. They are very happy " -"with our\n" -"rapid response to the `vulnerability disclosure`__ last summer, resulting" -" in our\n" -"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and " -"they\n" -"took `great offense`__ to that and the lack of private notification. We " -"thanked\n" +"We had a nice discussion with BitingBird of Tails. They are very happy with our\n" +"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n" +"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n" +"took `great offense`__ to that and the lack of private notification. We thanked\n" "them for taking the heat and fighting back." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127 msgid "" -"BitingBird also handles support, and she tells us the number one issue is" -" how\n" -"long I2P takes to start up and be useful for browsing I2P sites. Her " -"standard\n" -"answer is \"wait ten more minutes\" and that seems to be effective. I2P " -"is\n" -"particularly slow to startup on Tails since it does not persist peer data" -" by\n" -"default. It would be nice to change that, but there's also things we can " -"do on\n" -"the I2P side to make things start faster. Expect some improvement in our " -"0.9.18\n" +"BitingBird also handles support, and she tells us the number one issue is how\n" +"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n" +"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n" +"particularly slow to startup on Tails since it does not persist peer data by\n" +"default. It would be nice to change that, but there's also things we can do on\n" +"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n" "release." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140 msgid "" -"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The " -"upcoming\n" -"Tor Hidden Services changes mean that their keys will no longer fit into " -"a\n" -"portion of an IPv6 address, and he was working on a solution. We reminded" -" him\n" -"that this has always been the case for I2P (with \"GarliCat\"), that it's" -" not a\n" -"new problem. He pointed us to `a presentation`__ of his proposal. It " -"involves\n" +"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n" +"Tor Hidden Services changes mean that their keys will no longer fit into a\n" +"portion of an IPv6 address, and he was working on a solution. We reminded him\n" +"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n" +"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n" "storing an extra record in the hidden service directory (equivalent of a\n" -"leaseset I2P's network database). It wasn't completely clear how this " -"would\n" -"work, or if we would consider it abuse of the netDb. We'll follow up with" -" him\n" +"leaseset I2P's network database). It wasn't completely clear how this would\n" +"work, or if we would consider it abuse of the netDb. We'll follow up with him\n" "as he gets further." msgstr "" @@ -3580,23 +3322,15 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160 msgid "" -"We spent hours and hours explaining I2P to people stopping by our table. " -"Some\n" -"had heard of I2P before, some had not; everybody had heard of Tor and had" -" at\n" -"least a vague idea of what hidden services are. As usual, introducing " -"people to\n" -"I2P was a struggle. By the end of the Congress, we became convinced that " -"a part\n" -"of the problem was a difference in terminology. Back 12 years ago, when " -"I2P and\n" -"Tor were both getting started, we each came up with terms for the various" -" parts\n" +"We spent hours and hours explaining I2P to people stopping by our table. Some\n" +"had heard of I2P before, some had not; everybody had heard of Tor and had at\n" +"least a vague idea of what hidden services are. As usual, introducing people to\n" +"I2P was a struggle. By the end of the Congress, we became convinced that a part\n" +"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n" +"Tor were both getting started, we each came up with terms for the various parts\n" "of our systems. Today, the Tor terminology such as \"hidden service\" is\n" -"well-understood and commonplace. The I2P terminology such as \"eepsite\" " -"is\n" -"neither. We agreed to review our documentation, router console, and other" -" places\n" +"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n" +"neither. We agreed to review our documentation, router console, and other places\n" "for opportunities to simplify it and use common terms." msgstr "" @@ -3615,66 +3349,65 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182 msgid "" -"* *Toronto meetup:* CCC is such a productive time for us, and it seems " -"that a second meetup in the year would be quite helpful. We have proposed" -" it for August 2015 in Toronto, Canada, in conjunction with `Toronto " -"Crypto`__. It would include developer meetings together with " -"presentations and tutorials, all open to the public. We are attempting to" -" gauge interest and research possible venues. If you are considering " -"attending, please let us know by `tweeting @i2p`__ or posting `on the dev" -" forum thread`__." +"* *Toronto meetup:* CCC is such a productive time for us, and it seems that " +"a second meetup in the year would be quite helpful. We have proposed it for " +"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It " +"would include developer meetings together with presentations and tutorials, " +"all open to the public. We are attempting to gauge interest and research " +"possible venues. If you are considering attending, please let us know by " +"`tweeting @i2p`__ or posting `on the dev forum thread`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190 msgid "" -"* We discussed Meeh's workload and the state of the various services he " -"is running. We made some plans to reduce his load and have some other " -"people help out." +"* We discussed Meeh's workload and the state of the various services he is " +"running. We made some plans to reduce his load and have some other people " +"help out." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194 msgid "" -"* We reviewed our critieria for placing links to `i2pd`__ on our download" -" page. We agreed that the only remaining item is to have a nice page on " -"the `Privacy Solutions web site`__ or elsewhere with binary packages for " +"* We reviewed our critieria for placing links to `i2pd`__ on our download " +"page. We agreed that the only remaining item is to have a nice page on the " +"`Privacy Solutions web site`__ or elsewhere with binary packages for " "Windows, Linux, and Mac, and source packages. It's not clear who is " -"responsible for building the packages and where the \"official\" version " -"is. Once there's an established process for building and signing packages" -" and an official place to put them, we're ready to link to it. If it is " -"not feasible to host it on the Privacy Solutions website, we will discuss" -" alternatives with orignal, including possible migration to our download " +"responsible for building the packages and where the \"official\" version is." +" Once there's an established process for building and signing packages and " +"an official place to put them, we're ready to link to it. If it is not " +"feasible to host it on the Privacy Solutions website, we will discuss " +"alternatives with orignal, including possible migration to our download " "servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201 msgid "" -"* Lots of people coming by the table asked if we had a non-Java version. " -"It was great to finally answer \"yes\" and we're eager to get the word " -"out and get more users, testers, and developers on it." +"* Lots of people coming by the table asked if we had a non-Java version. It " +"was great to finally answer \"yes\" and we're eager to get the word out and " +"get more users, testers, and developers on it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205 msgid "" -"* `Vuze`__ continues to make good progress on their I2P integration. We " -"look forward to working with them in the new year on a managed rollout to" -" more users." +"* `Vuze`__ continues to make good progress on their I2P integration. We look" +" forward to working with them in the new year on a managed rollout to more " +"users." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211 msgid "" "* We discussed the state of Meeh's and Sindu's reseed servers. They made " -"several improvements while at the congress and are investigating " -"migration to `Matt Drollette's Go implementation`__. The security and " -"reliability of our reseed servers is vital to new users and network " -"operation. `User 'backup'`__ is doing a great job monitoring and managing" -" the pool of reseed servers." +"several improvements while at the congress and are investigating migration " +"to `Matt Drollette's Go implementation`__. The security and reliability of " +"our reseed servers is vital to new users and network operation. `User " +"'backup'`__ is doing a great job monitoring and managing the pool of reseed " +"servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218 msgid "" -"* We agreed to purchase a second root server for development, testing, " -"and services. Echelon will be adminstering it. Contact him if you would " -"like a VM." +"* We agreed to purchase a second root server for development, testing, and " +"services. Echelon will be adminstering it. Contact him if you would like a " +"VM." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222 @@ -3685,26 +3418,26 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226 msgid "" -"* We met with Welterde about the state of his services including his " -"`open tracker`__. These services are not being adequately maintained and " -"will soon become inaccessible due to crypto changes if they are not " -"upgraded. He committed to upgrading them soon." +"* We met with Welterde about the state of his services including his `open " +"tracker`__. These services are not being adequately maintained and will soon" +" become inaccessible due to crypto changes if they are not upgraded. He " +"committed to upgrading them soon." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232 msgid "" -"* We met lots of people interested in our `Android app`__. We passed " -"several ideas and bug reports back to str4d. We plan to make a big push " -"to give the app some development love early in the year." +"* We met lots of people interested in our `Android app`__. We passed several" +" ideas and bug reports back to str4d. We plan to make a big push to give the" +" app some development love early in the year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238 msgid "" -"* Regrettably, we didn't get to see too many talks at the Congress, as we" -" were so busy meeting with people. We plan to catch up and `watch them " -"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and" -" Jacob's talk was great. We hear that the cryptography talks were good as" -" well." +"* Regrettably, we didn't get to see too many talks at the Congress, as we " +"were so busy meeting with people. We plan to catch up and `watch them " +"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and " +"Jacob's talk was great. We hear that the cryptography talks were good as " +"well." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1 @@ -3721,13 +3454,11 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13 msgid "" "0.9.18 contains several bug fixes and performance improvements.\n" -"We have shortened the startup time, and reduced latency throughout our " -"network protocols.\n" +"We have shortened the startup time, and reduced latency throughout our network protocols.\n" "We've increased the default connection limits for the fastest routers,\n" "and reduced the thread usage in i2ptunnel.\n" "UPnP fixes should improve handling of external device changes.\n" -"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP " -"fixes." +"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33 @@ -3735,7 +3466,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34 -msgid "Fix news last-modified processing which prevented notification of update" +msgid "" +"Fix news last-modified processing which prevented notification of update" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35 @@ -3772,8 +3504,7 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46 msgid "" -"Add startup browser configuration with advanced config " -"routerconsole.browser" +"Add startup browser configuration with advanced config routerconsole.browser" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47 @@ -3835,21 +3566,16 @@ msgstr "" msgid "" "0.9.19 has several fixes and improvements for floodfill performance.\n" "Many of you saw high CPU usage after 0.9.18 was released.\n" -"This was caused by a combination of increased encryption usage, the big " -"influx of Vuze users into the network,\n" -"reduced floodfills due to tighter performance requirements, and some " -"longstanding bugs.\n" +"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n" +"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n" "Things should be a lot better after most of the network has updated.\n" -"As always, the best way to reduce CPU usage is to lower your bandwidth " -"limits." +"As always, the best way to reduce CPU usage is to lower your bandwidth limits." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21 msgid "" -"We've also added new ways to reseed manually, and to generate a reseed " -"file you can easily share with others who need it.\n" -"See the reseed configuration page in the router console for more " -"information." +"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n" +"See the reseed configuration page in the router console for more information." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35 @@ -3915,7 +3641,8 @@ msgid "Increase min and default bandwidth for i2psnark" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58 -msgid "Improved strategies for dropping jobs on high job lag to prevent overload" +msgid "" +"Improved strategies for dropping jobs on high job lag to prevent overload" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59 @@ -3955,35 +3682,28 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13 msgid "" -"0.9.20 contains many important bug fixes, and several changes to increase" -" floodfill capacity in the network." +"0.9.20 contains many important bug fixes, and several changes to increase " +"floodfill capacity in the network." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17 msgid "" -"Routers configured for 32-64 KB of shared bandwidth may now become " -"floodfill,\n" -"and routers configured for 512 KB or more of shared bandwidth will have " -"higher connection limits.\n" +"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n" +"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n" "These changes may cause your router to use more resources.\n" -"If the router becomes too busy, the best way to reduce usage is to lower " -"the bandwidth settings in your console.\n" -"If that doesn't help, you may now disable automatic floodfill on the " -"advanced configuration page in the console." +"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n" +"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25 msgid "" -"We're hopeful that these changes will increase network capacity and " -"performance,\n" -"and reduce the congestion that's been affecting the network the last " -"three months." +"We're hopeful that these changes will increase network capacity and performance,\n" +"and reduce the congestion that's been affecting the network the last three months." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35 msgid "" -"Finally, we're excited to announce our first-ever I2P meetup, in Toronto " -"August 15-16.\n" +"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n" "There will be lots of presentations and tutorials. All are welcome.\n" "For more information, see the `announcement`_." msgstr "" @@ -4002,8 +3722,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53 msgid "" -"Raise connection limits for new classes 'P' (512-2000 KBps share " -"bandwidth) and 'X' (over 2000 KBps)" +"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) " +"and 'X' (over 2000 KBps)" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54 @@ -4015,7 +3735,8 @@ msgid "Clock skew fixes" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62 -msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works" +msgid "" +"Fixes and configuration for when IPv4 is firewalled but IPv6 still works" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63 @@ -4088,8 +3809,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86 msgid "" -"Add Bloom filter warning when configured for high bandwidth but not " -"enough memory" +"Add Bloom filter warning when configured for high bandwidth but not enough " +"memory" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87 @@ -4102,8 +3823,7 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89 msgid "" -"Better error handling and user feedback when HTTP client tunnel is " -"disabled" +"Better error handling and user feedback when HTTP client tunnel is disabled" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90 @@ -4136,19 +3856,13 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13 msgid "" -"The I2P team is proud to announce that we are going to host a meetup in " -"Toronto on August 15-16.\n" -"A number of members of our community will be attending and are going to " -"host talks, workshops and discussions about and relating to I2P. This " -"event is not just for I2P people though, it's meant for everyone." +"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n" +"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18 msgid "" -"If you're curious about I2P, interested in privacy/cryptography/anonymity" -" or just want to come by and talk to us, please do. This is an event for " -"everyone. If you're not familiar with any of these topics, come by anyway" -" and we'll show you how I2P works and what you can do with it.\n" +"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n" "\n" "The event is entirely free, you don't need to sign up or register." msgstr "" @@ -4156,9 +3870,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24 msgid "" "The meetup couldn't have been arranged without our friends at `Toronto " -"Crypto <https://torontocrypto.org/>`_ which have been helping us organize" -" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are" -" providing us with a very nice space." +"Crypto <https://torontocrypto.org/>`_ which have been helping us organize " +"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are " +"providing us with a very nice space." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28 @@ -4186,9 +3900,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55 msgid "" -"The focus will be on an introduction to topics surrounding I2P, privacy " -"and anonymity online. People of all backgrounds and knowledge levels are " -"welcome to attend." +"The focus will be on an introduction to topics surrounding I2P, privacy and " +"anonymity online. People of all backgrounds and knowledge levels are welcome" +" to attend." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59 @@ -4205,9 +3919,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63 msgid "" -"The crypto party will contain a number of stations where " -"privacy/anonymity software will be demoed. The goal is to provide people " -"with the tools they need to communicate securely." +"The crypto party will contain a number of stations where privacy/anonymity " +"software will be demoed. The goal is to provide people with the tools they " +"need to communicate securely." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67 @@ -4228,11 +3942,10 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72 msgid "" -"We're currently looking for help staffing the stations. If you want to " -"help out, you can! Bring a monitor/laptop and run a station. The station " -"could be any of the ones listed above, or any other privacy/anonymity " -"related one you would like to run. Please contact us at `@geti2p`_ if " -"you're interested." +"We're currently looking for help staffing the stations. If you want to help " +"out, you can! Bring a monitor/laptop and run a station. The station could be" +" any of the ones listed above, or any other privacy/anonymity related one " +"you would like to run. Please contact us at `@geti2p`_ if you're interested." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81 @@ -4242,8 +3955,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86 msgid "" "The focus will be on in-depth topics surrounding I2P, the roadmap and " -"development. Anyone is welcome to attend, but the content will be " -"somewhat technical." +"development. Anyone is welcome to attend, but the content will be somewhat " +"technical." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90 @@ -4279,35 +3992,26 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:14 msgid "" -"I2PCon is the first event of its kind. It has two short term goals. Where" -" the\n" -"first one is to provide the general public with an event where knowledge " -"about\n" -"privacy and privacy concerns can be obtained. The second goal is to " -"further the\n" -"I2P project and its community. This will take the shape of technical " -"discussions\n" +"I2PCon is the first event of its kind. It has two short term goals. Where the\n" +"first one is to provide the general public with an event where knowledge about\n" +"privacy and privacy concerns can be obtained. The second goal is to further the\n" +"I2P project and its community. This will take the shape of technical discussions\n" "about cryptography, anonymity and I2P centric topics." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:22 msgid "" -"There is a larger and more long-term goal of this event, and it is to " -"build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we would like to provide a forum where this " -"community\n" +"There is a larger and more long-term goal of this event, and it is to build a\n" +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we would like to provide a forum where this community\n" "can grow." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:29 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" -"`Toronto Crypto`_. The venue and everything relating to it is provided by" -"\n" -"`Hacklab`_. Without either of them this event would not have been " -"possible, so\n" +"`Toronto Crypto`_. The venue and everything relating to it is provided by\n" +"`Hacklab`_. Without either of them this event would not have been possible, so\n" "thank you both." msgstr "" @@ -4317,12 +4021,9 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:49 msgid "" -"I2PCon is entirely free to attend! We ask you to register `here`__, to " -"give us\n" -"an estimate of how many people will be attending. No identifying " -"information has\n" -"to be given in order to register, but if you have any concerns, please " -"let us\n" +"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n" +"an estimate of how many people will be attending. No identifying information has\n" +"to be given in order to register, but if you have any concerns, please let us\n" "know." msgstr "" @@ -4367,24 +4068,15 @@ msgstr "" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13 msgid "" -"0.9.21 contains several changes to add capacity to the network, increase " -"the efficiency of the floodfills,\n" +"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n" "and use bandwidth more effectively.\n" -"We have migrated the shared clients tunnels to ECDSA signatures and added" -" a DSA fallback\n" -"using the new \"multisession\" capability for those sites that don't " -"support ECDSA." -msgstr "" -"Wersja 0.9.21 zawiera kilka istotnych zmian zwiÄ™kszajÄ…cych przepustowość " -"sieci, zwiÄ™ksza efektywność floodfilów, i używa transferu sieciowego " -"bardziej efektywnie. PrzeszliÅ›my na sygnatury ECDSA dla tuneli " -"współdzielonych klientów i dodaliÅ›my wsparcie \"na zapas\" dla DSA " -"używajÄ…c \"wielo-sesyjnoÅ›ci\" dla stron nie wspierajÄ…cych ECDSA." +"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n" +"using the new \"multisession\" capability for those sites that don't support ECDSA." +msgstr "Wersja 0.9.21 zawiera kilka istotnych zmian zwiÄ™kszajÄ…cych przepustowość sieci, zwiÄ™ksza efektywność floodfilów, i używa transferu sieciowego bardziej efektywnie. PrzeszliÅ›my na sygnatury ECDSA dla tuneli współdzielonych klientów i dodaliÅ›my wsparcie \"na zapas\" dla DSA używajÄ…c \"wielo-sesyjnoÅ›ci\" dla stron nie wspierajÄ…cych ECDSA." #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20 msgid "" -"The speakers and the schedule of the I2PCon in Toronto 2015 have been " -"announced.\n" +"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n" "Have a look on the `I2PCon page`_ for details.\n" "Reserve your seat on `Eventbrite`_." msgstr "" @@ -4496,21 +4188,15 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14 msgid "" -"I2PCon has been a giant success. For us, the I2P contributors, it " -"represents a\n" -"leap forward in terms of what we're capable of pulling off as a " -"community, how we\n" -"communicate the usecases of I2P and reach out to privacy conscious " -"individuals.\n" +"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n" +"leap forward in terms of what we're capable of pulling off as a community, how we\n" +"communicate the usecases of I2P and reach out to privacy conscious individuals.\n" "\n" -"By arranging this event, we've also grown our community. People who've " -"previously\n" -"only lurked on our irc channels, or run our software or possibly hadn't " -"even heard\n" +"By arranging this event, we've also grown our community. People who've previously\n" +"only lurked on our irc channels, or run our software or possibly hadn't even heard\n" "of I2P are now a part of our comminuty.\n" "\n" -"This event has been our first active step towards building a large and " -"inclusive\n" +"This event has been our first active step towards building a large and inclusive\n" "community, and as such it's been great success." msgstr "" @@ -4518,11 +4204,9 @@ msgstr "" msgid "" "Minutiae\n" "========\n" -"On day 2 we had two short discussion sessions. A more general discussion " -"and a roadmapping discussion.\n" +"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n" "\n" -"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P " -"Discussion session minutiae`_." +"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37 @@ -4551,32 +4235,25 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62 msgid "" -"We've had some wonderful speakers, from both inside- and outside of our " -"community.\n" +"We've had some wonderful speakers, from both inside- and outside of our community.\n" "\n" -"`David Dagon`_ talked to us about the way forward and how I2P could " -"handle potential abuse.\n" +"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n" "\n" -"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us" -" his thoughts about how far I2P has come.\n" +"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n" "\n" -"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and " -"why you should care." +"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72 msgid "" -"I would also like to thank the speakers from our community. `psi`_, " -"`@str4d`_ and `zzz`_ who all had\n" -"wonderful talks. Improving our ability to inform people about I2P is " -"something that\n" +"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_ who all had\n" +"wonderful talks. Improving our ability to inform people about I2P is something that\n" "is going to be important for us going forward." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78 msgid "" -"I would like to thank `Sadie`_ and Siew for helping us out with marketing" -" and graphics.\n" +"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n" "Without you I2PCon would've been a very different event." msgstr "" @@ -4588,43 +4265,39 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87 msgid "" -"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto " -"Crypto`_ for their help during the event." +"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ " +"for their help during the event." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91 msgid "" -"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV " -"and doing all of the post-production\n" +"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n" "work for the videos of all the talks." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96 msgid "" -"I would like to thank `@killyourtv_i2p`_ for hosting a very popular " -"crypto party station." +"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto " +"party station." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100 msgid "" -"Thanks to our new favorite journalist `@robinlevinson`_, for showing an " -"interest in our cause and\n" +"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n" "educating yourself about the technologies involved." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105 msgid "" -"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very " -"much made this event better." +"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much " +"made this event better." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109 msgid "" -"Finally I would like to thank everyone else who just showed up to the " -"event and helped out in any way\n" +"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n" "they could.\n" -"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was " -"most excellent to hang out\n" +"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n" "with you." msgstr "" @@ -4641,27 +4314,11 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13 msgid "" -"0.9.22 contains fixes for i2psnark getting stuck before completion, and " -"begins the migration of router infos to new, stronger Ed25519 signatures." -"\n" -"To reduce network churn, your router will have only a small probability " -"of converting to Ed25519 at each restart.\n" -"When it does rekey, expect to see lower bandwidth usage for a couple of " -"days as it reintegrates into the network with its new identity.\n" -"If all goes well, we will accelerate the rekeying process in the next " -"release." -msgstr "" -"0.9.22 poprawia bÅ‚Ä…d polegajÄ…cy na zacinaniu siÄ™ i2psnark, zanim zakoÅ„czy" -" pracÄ™, oraz wprowadza nowy i silniejszy rodzaj sygnatur cyfrowych dla " -"routerów - Ed25519.\n" -"Aby zredukować potencjalny chaos w sieci, sygnatury wymieniane sÄ… " -"stopniowo - Twój router bÄ™dzie miaÅ‚ niedużą szansÄ™, że zmieni swój typ " -"sygnatury podczas każdego uruchomienia.\n" -"Gdy router wymienia swój klucz, operator może spodziewać siÄ™ mniejszego " -"wykorzystania zasobów sieciowych na kilka nastÄ™pnych dni. Wynika to " -"oczywiÅ›cie z koniecznoÅ›ci ponownej integracji z caÅ‚Ä… sieciÄ….\n" -"Jeżeli wszystko pójdzie po naszej myÅ›li, przyspieszymy proces wymiany " -"kluczy w nastÄ™pnym wydaniu." +"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n" +"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n" +"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n" +"If all goes well, we will accelerate the rekeying process in the next release." +msgstr "0.9.22 poprawia bÅ‚Ä…d polegajÄ…cy na zacinaniu siÄ™ i2psnark, zanim zakoÅ„czy pracÄ™, oraz wprowadza nowy i silniejszy rodzaj sygnatur cyfrowych dla routerów - Ed25519.\nAby zredukować potencjalny chaos w sieci, sygnatury wymieniane sÄ… stopniowo - Twój router bÄ™dzie miaÅ‚ niedużą szansÄ™, że zmieni swój typ sygnatury podczas każdego uruchomienia.\nGdy router wymienia swój klucz, operator może spodziewać siÄ™ mniejszego wykorzystania zasobów sieciowych na kilka nastÄ™pnych dni. Wynika to oczywiÅ›cie z koniecznoÅ›ci ponownej integracji z caÅ‚Ä… sieciÄ….\nJeżeli wszystko pójdzie po naszej myÅ›li, przyspieszymy proces wymiany kluczy w nastÄ™pnym wydaniu." #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20 msgid "" @@ -4679,14 +4336,13 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46 msgid "" -"Fix i2psnark getting stuck before download complete, and not deleting " -"temp files" +"Fix i2psnark getting stuck before download complete, and not deleting temp " +"files" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47 msgid "" -"Fix starting of torrents added by copying torrent file to i2psnark " -"directory" +"Fix starting of torrents added by copying torrent file to i2psnark directory" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48 @@ -4715,10 +4371,8 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15 msgid "" "Greetings!\n" -"This is the first in a long series of blogs to help the community see " -"what is happening in the I2P community.\n" -"Since many awesome events are happening *inside* the network, we think it" -" will be worthwhile to talk about some of activities here." +"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n" +"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21 @@ -4729,16 +4383,14 @@ msgstr "" msgid "" "Let's face it -- our console needs improvement.\n" "Our site could use an update as well.\n" -"We are looking for feedback on how to improve the usability of I2P for " -"new and existing users!" +"We are looking for feedback on how to improve the usability of I2P for new and existing users!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29 msgid "" "Any and all feedback is welcome.\n" "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n" -"If you don't feel comfortable using Twitter, we are always available via " -"the in-network IRC channel.\n" +"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n" "You don't have to be a long time user.\n" "We want to hear from all sorts of people!" msgstr "" @@ -4750,36 +4402,27 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43 msgid "" "On 03 November there was an I2P developer meeting (`log`_).\n" -"This meeting focused on adding new links to the router console, " -"preparation for CCC, finding a replacement for forum.i2p, and website " -"improvements." +"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50 msgid "" "The consensus was to not add dogecoindark.i2p.\n" -"There are concerns about usability due to many images being included on " -"the page.\n" -"Exchanged.i2p is conditionally added, as long as the maintainer adds a " -"disclaimer on the site.\n" -"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was " -"lenta.i2p (a russian news site)." +"There are concerns about usability due to many images being included on the page.\n" +"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n" +"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57 msgid "" -"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used" -" for developer's services.\n" -"He also suggested a more formalized technical proposal system, with more " -"prominence on the main website." +"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n" +"He also suggested a more formalized technical proposal system, with more prominence on the main website." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62 msgid "" -"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos " -"Computer Congress.\n" -"More details are to come on this, but we can promise there will be " -"stickers." +"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n" +"More details are to come on this, but we can promise there will be stickers." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67 @@ -4787,13 +4430,14 @@ msgid "General Announcements" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69 -msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" +msgid "" +"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75 msgid "" -"Translation deadline Thursday, 12 November, translators please update. " -"All translations are done via `Transifex`_ ." +"Translation deadline Thursday, 12 November, translators please update. All " +"translations are done via `Transifex`_ ." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1 @@ -4807,21 +4451,14 @@ msgstr "" msgid "" "0.9.23 contains a variety of bug fixes, and some minor improvements in " "I2PSnark" -msgstr "" -"Wersja 0.9.23 zawiera rozmaite poprawki bÅ‚Ä™dów oraz niewielkie ulepszenia" -" w I2PSnark" +msgstr "Wersja 0.9.23 zawiera rozmaite poprawki bÅ‚Ä™dów oraz niewielkie ulepszenia w I2PSnark" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13 msgid "" -"Hello I2P! This is the first release signed by me (str4d), after 49 " -"releases\n" -"signed by zzz. This is an important test of our redundancy for all " -"things,\n" +"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n" +"signed by zzz. This is an important test of our redundancy for all things,\n" "including people." -msgstr "" -"Witaj l2P! Jest to pierwsze wydanie podpisane przeze mnie (str4d), po " -"wydaniach w wersji 49 podpisanej przez zzz. Jest to ważny test naszego " -"nadmiaru wszytkich rzeczy, wliczajÄ…c ludzi." +msgstr "Witaj l2P! Jest to pierwsze wydanie podpisane przeze mnie (str4d), po wydaniach w wersji 49 podpisanej przez zzz. Jest to ważny test naszego nadmiaru wszytkich rzeczy, wliczajÄ…c ludzi." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19 msgid "Housekeeping" @@ -4829,29 +4466,20 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24 msgid "" -"My signing key has been in router updates for over two years (since " -"0.9.9), so\n" -"if you are on a recent version of I2P this update should be just as easy " -"as\n" -"every other update. However, if you are running an older version than " -"0.9.9, you\n" -"will first need to manually update to a recent version. Update files for " -"recent\n" -"versions `can be downloaded here`__, and instructions on how to manually " -"update\n" -"`are provided here`__. Once you have manually updated, your router will " -"then find\n" +"My signing key has been in router updates for over two years (since 0.9.9), so\n" +"if you are on a recent version of I2P this update should be just as easy as\n" +"every other update. However, if you are running an older version than 0.9.9, you\n" +"will first need to manually update to a recent version. Update files for recent\n" +"versions `can be downloaded here`__, and instructions on how to manually update\n" +"`are provided here`__. Once you have manually updated, your router will then find\n" "and download the 0.9.23 update as usual." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38 msgid "" -"If you installed I2P via a package manager, you are not affected by the " -"change,\n" +"If you installed I2P via a package manager, you are not affected by the change,\n" "and can update as usual." -msgstr "" -"Jeżeli zainstalowaÅ‚eÅ› l2P za pomocÄ… menadżera pakietów, zmiana nie ma na " -"ciebie wpÅ‚ywu, i możesz dokonać aktualizacji tak jak zazwyczaj." +msgstr "Jeżeli zainstalowaÅ‚eÅ› l2P za pomocÄ… menadżera pakietów, zmiana nie ma na ciebie wpÅ‚ywu, i możesz dokonać aktualizacji tak jak zazwyczaj." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:43 msgid "" @@ -4861,46 +4489,26 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48 msgid "" -"The migration of RouterInfos to new, stronger Ed25519 signatures is going" -" well,\n" -"with at least half of the network already estimated to have rekeyed. This" -"\n" -"release accelerates the rekeying process. To reduce network churn, your " -"router\n" -"will have a small probability of converting to Ed25519 at each restart. " -"When it\n" -"does rekey, expect to see lower bandwidth usage for a couple of days as " -"it\n" +"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n" +"with at least half of the network already estimated to have rekeyed. This\n" +"release accelerates the rekeying process. To reduce network churn, your router\n" +"will have a small probability of converting to Ed25519 at each restart. When it\n" +"does rekey, expect to see lower bandwidth usage for a couple of days as it\n" "reintegrates into the network with its new identity." -msgstr "" -"Migracja identyfikatorów wÄ™złów do nowszych, mocniejszych sygnatur " -"Ed25519 idzie sprawnie, co najmniej poÅ‚owa sieci wymieniÅ‚a swoje klucze. " -"To wydanie przyspiesza proces wymiany kluczy, Aby zapobiec paraliżowi " -"sieci Twój ruter ma niewielkie prawdopodobieÅ„stwo przejÅ›cia na Ed25519 " -"przy każdym restarcie. Po zmianie klucza spodziewaj siÄ™ mniejszego ruchu " -"przez klika dni, aż wÄ™zeÅ‚ zintegruje siÄ™ do sieci z nowÄ… sygnaturÄ…." +msgstr "Migracja identyfikatorów wÄ™złów do nowszych, mocniejszych sygnatur Ed25519 idzie sprawnie, co najmniej poÅ‚owa sieci wymieniÅ‚a swoje klucze. To wydanie przyspiesza proces wymiany kluczy, Aby zapobiec paraliżowi sieci Twój ruter ma niewielkie prawdopodobieÅ„stwo przejÅ›cia na Ed25519 przy każdym restarcie. Po zmianie klucza spodziewaj siÄ™ mniejszego ruchu przez klika dni, aż wÄ™zeÅ‚ zintegruje siÄ™ do sieci z nowÄ… sygnaturÄ…." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57 msgid "" -"Note that this will be the last release to support Java 6. Please update " -"to\n" -"Java 7 or 8 as soon as possible. We are already working to make I2P " -"compatible\n" +"Note that this will be the last release to support Java 6. Please update to\n" +"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n" "with the upcoming Java 9, and some of that work is in this release." -msgstr "" -"Zwróć proszÄ™ uwagÄ™, że bÄ™dzie to ostatnie wydanie, które wspiera JavÄ™ 6. " -"Wskazana jest jak najszybsza aktualizacja Javy do wersji 7 lub 8. W " -"chwili obecnej pracujemy również nad wsparciem I2P dla Javy 9. Część " -"efektów naszych dziaÅ‚aÅ„ znajduje siÄ™ już w niniejszej wersji." +msgstr "Zwróć proszÄ™ uwagÄ™, że bÄ™dzie to ostatnie wydanie, które wspiera JavÄ™ 6. Wskazana jest jak najszybsza aktualizacja Javy do wersji 7 lub 8. W chwili obecnej pracujemy również nad wsparciem I2P dla Javy 9. Część efektów naszych dziaÅ‚aÅ„ znajduje siÄ™ już w niniejszej wersji." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63 msgid "" -"We have also made some minor improvements in I2PSnark, and added a new " -"page in\n" +"We have also made some minor improvements in I2PSnark, and added a new page in\n" "the routerconsole for viewing older news items." -msgstr "" -"WprowadziliÅ›my również parÄ™ udoskonaleÅ„ w I2PSnark, a także dodaliÅ›my " -"nowÄ… stronÄ™ w konsoli routera z przeglÄ…darkÄ… starszych aktualnoÅ›ci." +msgstr "WprowadziliÅ›my również parÄ™ udoskonaleÅ„ w I2PSnark, a także dodaliÅ›my nowÄ… stronÄ™ w konsoli routera z przeglÄ…darkÄ… starszych aktualnoÅ›ci." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78 msgid "Accelerate transition to Ed25519" @@ -4908,14 +4516,13 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83 msgid "" -"Fix some bugs soft restarting after a large clock shift (e.g. resume) " -"(but more to do)" +"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but " +"more to do)" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84 msgid "" -"Fix streaming retransmission timers that were dying, and related timer " -"bugs" +"Fix streaming retransmission timers that were dying, and related timer bugs" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85 @@ -4959,7 +4566,8 @@ msgid "Detect for broken ECDSA support in Gentoo" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98 -msgid "Console: Add a Java 6 warning, this is the last release to support Java 6" +msgid "" +"Console: Add a Java 6 warning, this is the last release to support Java 6" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99 @@ -4968,8 +4576,8 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100 msgid "" -"Pass Accept-Encoding header through client and server proxies, to allow " -"end-to-end compression" +"Pass Accept-Encoding header through client and server proxies, to allow end-" +"to-end compression" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103 @@ -4985,7 +4593,8 @@ msgid "Save magnet parameters across restart" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106 -msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD" +msgid "" +"Don't delete .torrent file on errors at startup, rename to .torrent.BAD" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107 @@ -5017,8 +4626,7 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:13 msgid "" -"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and " -"eche|on." +"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:17 @@ -5026,21 +4634,15 @@ msgid "" "Start\n" "=====\n" "The project has had another successful year at CCC.\n" -"We would like to thank the volunteers at `32C3`__ for all of their help " -"in organizing this event and for being accommodating hosts for us.\n" -"Many I2P contributors were able to attend this year's Congress due to " -"many of the generous donations from supporters like you to the project.\n" -"If you would like to fund I2P, please see `our donation page`__ for more " -"information." +"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n" +"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n" +"If you would like to fund I2P, please see `our donation page`__ for more information." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:29 msgid "" -"Just like previous years we were located in Noisy Square, located near " -"the EFF's table.\n" -"This proved to be an ideal spot for us as our table was almost always " -"busy with current and new users who were interested in I2P, many of whom " -"we wouldn't have otherwise had the ability to talk to." +"Just like previous years we were located in Noisy Square, located near the EFF's table.\n" +"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:63 @@ -5055,13 +4657,10 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:72 msgid "" -"If you don't know what a reseed server is, it is first the connection new" -" routers use to find peers.\n" -"There was a lot of discussion around the current status of the reseed " -"network right now.\n" +"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n" +"There was a lot of discussion around the current status of the reseed network right now.\n" "As always, more reseed operators are needed!\n" -"If you would like to strengthen the reseed infrastructure, (or if you're " -"talented with Go) email `backup -at- i2pmail.org`__." +"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:81 @@ -5072,16 +4671,11 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:86 msgid "" -"Due to the decentralized nature of I2P detecting Sybil attacks is not as " -"straight forward as on other networks (i.e. Tor).\n" -"To mitigate this zzz has been working on a new router-based Sybil " -"detection tool.\n" -"To be brief, the tool runs in the router, and collects information on " -"floodfills your router is currently aware of.\n" -"Currently the tool is mainly collecting a baseline and does not act on " -"any of the information it is collecting.\n" -"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as " -"it is still in active development" +"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n" +"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n" +"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n" +"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n" +"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:94 @@ -5093,21 +4687,15 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:99 msgid "" "On the 30th we held an in person `meeting`__ at our table.\n" -"The meeting focused on organizationally preparing for more project " -"management, and public relations (both from Sadie)." +"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:106 msgid "" -"We discussed how much of the work done on I2P is lost in the commits and " -"there is not much to see for our users.\n" -"To remedy this lazygravy plans on preparing a series of posts explaining " -"some technical topics in I2P.\n" -"The initial ideas that we discussed writing posts on are what encrypted " -"lease sets are, why different tunnel types are needed, and some " -"observations seen in `I2Spy`__.\n" -"But these are just the start and we would like to hear feedback on topics" -" we should write about!" +"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n" +"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n" +"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n" +"But these are just the start and we would like to hear feedback on topics we should write about!" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:115 @@ -5181,37 +4769,25 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18 msgid "" -"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and " -"efficiency improvements.\n" +"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n" "Note that this release is the first to require Java 7.\n" "Please update to Java 7 or 8 as soon as possible.\n" "Your router will not automatically update if you are using Java 6." -msgstr "" -"Wersja 0.9.24 wprowadza nowÄ… wersjÄ™ mostka SAM (v3.2) i rozmaite poprawki" -" bÅ‚Ä™dów i ulepszenia wydajnoÅ›ciowe.\n" -"Zauważ, że to wydanie jest pierwszym, które wymaga Javy 7.\n" -"ProszÄ™ zaktualizuj JavÄ™ do wersji 7 lub 8 jak najszybciej.\n" -"Twój wÄ™zeÅ‚ nie zaktualizuje siÄ™ automatycznie jeżeli wciąż używasz Javy 6." +msgstr "Wersja 0.9.24 wprowadza nowÄ… wersjÄ™ mostka SAM (v3.2) i rozmaite poprawki bÅ‚Ä™dów i ulepszenia wydajnoÅ›ciowe.\nZauważ, że to wydanie jest pierwszym, które wymaga Javy 7.\nProszÄ™ zaktualizuj JavÄ™ do wersji 7 lub 8 jak najszybciej.\nTwój wÄ™zeÅ‚ nie zaktualizuje siÄ™ automatycznie jeżeli wciąż używasz Javy 6." #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25 msgid "" -"To prevent the problems caused by the ancient commons-logging library, we" -" have removed it.\n" -"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by " -"HungryHobo) to crash if they have IMAP enabled.\n" -"The recommended fix is to replace your old I2P-Bote plugin with the " -"current one signed by str4d.\n" +"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n" +"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n" +"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n" "For more details, see `this post`__." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34 msgid "" -"We had a great `32C3 Congress`__ and are making good progress on our 2016" -" project plans.\n" -"Echelon gave a talk on I2P's history and current status, and his slides " -"are `available here`__ (pdf).\n" -"Str4d attended `Real World Crypto`__ and gave a talk on our crypto " -"migration, his slides are `here`__ (pdf)." +"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n" +"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n" +"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58 @@ -5220,8 +4796,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59 msgid "" -"SAM 3.2, with several new advanced features, command parser improvements," -" and lots of bug fixes" +"SAM 3.2, with several new advanced features, command parser improvements, " +"and lots of bug fixes" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60 @@ -5246,8 +4822,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69 msgid "" -"Don't remove tunnel on next-hop failure indication from transport, it " -"isn't reliable" +"Don't remove tunnel on next-hop failure indication from transport, it isn't " +"reliable" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70 @@ -5255,13 +4831,13 @@ msgid "Fix formatting in summary bar to prevent overflow" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71 -msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port" +msgid "" +"Fix console links in i2ptunnel error pages when on nonstandard host/port" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72 msgid "" -"Don't query floodfills whose version is too old to support encrypted " -"replies" +"Don't query floodfills whose version is too old to support encrypted replies" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73 @@ -5308,8 +4884,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87 msgid "" -"Don't offer to introduce unless requested, to introduce only those that " -"need it" +"Don't offer to introduce unless requested, to introduce only those that need" +" it" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88 @@ -5392,29 +4968,17 @@ msgstr "Wersja 0.9.25 zawiera mostek SAM 3.3, kody QR i poprawki bÅ‚Ä™dów" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18 msgid "" -"0.9.25 contains a major new version of SAM, v3.3, to support " -"sophisticated multiprotocol applications.\n" +"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n" "It adds QR codes for sharing hidden service addresses with others,\n" "and \"identicon\" images for visually distinguishing addresses." -msgstr "" -"Wersja 0.9.25 zawiera przede wszystkim nowÄ… wersjÄ™ mostka SAM: 3.3, która" -" zawiera wsparcie dla aplikacji wieloprotokoÅ‚owych. \n" -"Dodano też obsÅ‚ugÄ™ kodów QR, co pozwala na dzielenie siÄ™ adresami " -"ukrytych usÅ‚ug z innymi, i \"identicony\" dla Å‚atwej wizualizacji i " -"odróżniania adresów." +msgstr "Wersja 0.9.25 zawiera przede wszystkim nowÄ… wersjÄ™ mostka SAM: 3.3, która zawiera wsparcie dla aplikacji wieloprotokoÅ‚owych. \nDodano też obsÅ‚ugÄ™ kodów QR, co pozwala na dzielenie siÄ™ adresami ukrytych usÅ‚ug z innymi, i \"identicony\" dla Å‚atwej wizualizacji i odróżniania adresów." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24 msgid "" "We've added a new \"router family\" configuration page in the console,\n" -"to make it easier to declare that your group of routers is run by a " -"single person.\n" -"There are several changes to increase the capacity of the network and " -"hopefully improve tunnel build success." -msgstr "" -"Dodano do konsoli stronÄ™ konfiguracji \"Rodzina WÄ™złów\", która pozwala " -"na Å‚atwÄ… deklaracjÄ™, że Twoja grupa wÄ™złów należy do jednej osoby. " -"Wprowadzono kilka poprawek zwiÄ™kszajÄ…cych przepustowość sieci i miejmy " -"nadziejÄ™ zwiÄ™kszajÄ…cych niezawodność tworzenia tuneli." +"to make it easier to declare that your group of routers is run by a single person.\n" +"There are several changes to increase the capacity of the network and hopefully improve tunnel build success." +msgstr "Dodano do konsoli stronÄ™ konfiguracji \"Rodzina WÄ™złów\", która pozwala na Å‚atwÄ… deklaracjÄ™, że Twoja grupa wÄ™złów należy do jednej osoby. Wprowadzono kilka poprawek zwiÄ™kszajÄ…cych przepustowość sieci i miejmy nadziejÄ™ zwiÄ™kszajÄ…cych niezawodność tworzenia tuneli." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40 msgid "Display of identicons and QR codes in address book and i2ptunnel" @@ -5506,34 +5070,26 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a " -"development program aimed at improving the privacy software ecosystem for" -" both developers and users." +"development program aimed at improving the privacy software ecosystem for " +"both developers and users." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13 msgid "" -"Over the last few years, the need for users to be in control of their own" -" data\n" -"has become increasingly apparent. Some excellent progress had been made " -"in this\n" -"regard with the rise of messaging apps like Signal_, and file storage " -"systems\n" -"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to " -"the\n" +"Over the last few years, the need for users to be in control of their own data\n" +"has become increasingly apparent. Some excellent progress had been made in this\n" +"regard with the rise of messaging apps like Signal_, and file storage systems\n" +"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n" "whole world is steadily gaining traction." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21 msgid "" -"But building privacy and anonymity into applications is not trivial. Much" -" of the\n" -"software people use every day was not designed to be privacy-preserving, " -"and the\n" +"But building privacy and anonymity into applications is not trivial. Much of the\n" +"software people use every day was not designed to be privacy-preserving, and the\n" "tools developers have available are generally not easy to work with. The\n" -"recently-published OnionScan_ survey gives some insight into just how " -"easy it is\n" -"for even technical users to mis-configure their services, completely " -"undermining\n" +"recently-published OnionScan_ survey gives some insight into just how easy it is\n" +"for even technical users to mis-configure their services, completely undermining\n" "their intentions." msgstr "" @@ -5546,16 +5102,14 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a\n" -"development program aimed at improving the privacy software ecosystem. " -"Our goal\n" -"is to make life easier both for developers wanting to leverage I2P in " -"their\n" -"applications, and for users trying to configure and run their apps " -"through I2P." +"development program aimed at improving the privacy software ecosystem. Our goal\n" +"is to make life easier both for developers wanting to leverage I2P in their\n" +"applications, and for users trying to configure and run their apps through I2P." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48 -msgid "We will be focusing our time this summer into three complementary areas:" +msgid "" +"We will be focusing our time this summer into three complementary areas:" msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52 @@ -5566,19 +5120,15 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57 msgid "" -"In June, we will be updating the various libraries that exist for " -"interfacing\n" -"with I2P. We have made significant progress this year on extending our " -"SAM_ API\n" -"with additional features, such as support for datagrams and ports. We " -"plan to\n" +"In June, we will be updating the various libraries that exist for interfacing\n" +"with I2P. We have made significant progress this year on extending our SAM_ API\n" +"with additional features, such as support for datagrams and ports. We plan to\n" "make these features easily accessible in our C++ and Python libraries." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64 msgid "" -"We will also soon be making it much easier for Java and Android " -"developers to\n" +"We will also soon be making it much easier for Java and Android developers to\n" "add I2P support to their applications. Stay tuned!" msgstr "" @@ -5590,18 +5140,12 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76 msgid "" -"In July we will be working with applications that have expressed interest" -" in\n" -"adding support for I2P. There are some really neat ideas being developed " -"in the\n" -"privacy space right now, and we want to help their communities leverage " -"over a\n" -"decade of research and development on peer-to-peer anonymity. Extending " -"these\n" -"applications to work natively over I2P is a good step forward for " -"usability, and\n" -"in the process will improve how these applications think about and handle" -" user\n" +"In July we will be working with applications that have expressed interest in\n" +"adding support for I2P. There are some really neat ideas being developed in the\n" +"privacy space right now, and we want to help their communities leverage over a\n" +"decade of research and development on peer-to-peer anonymity. Extending these\n" +"applications to work natively over I2P is a good step forward for usability, and\n" +"in the process will improve how these applications think about and handle user\n" "information." msgstr "" @@ -5613,12 +5157,9 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91 msgid "" -"Finally, in August we will turn out attention to the apps we bundle " -"inside I2P,\n" -"and the wider array of plugins. Some of these are due for some love, to " -"make\n" -"them more user-friendly - as well as fix any outstanding bugs! We hope " -"that\n" +"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n" +"and the wider array of plugins. Some of these are due for some love, to make\n" +"them more user-friendly - as well as fix any outstanding bugs! We hope that\n" "longtime I2P supporters will enjoy the outcome of this work." msgstr "" @@ -5633,14 +5174,10 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -" usable\n" -"websites or interfaces, or writing guides for users: come and chat with " -"us on\n" -"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our " -"community, both\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing usable\n" +"websites or interfaces, or writing guides for users: come and chat with us on\n" +"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n" "inside and outside I2P. We'll be sending I2P stickers out to all new\n" "contributors taking part (or possibly other pending I2P goodies)!" msgstr "" @@ -5648,24 +5185,18 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140 msgid "" -"Likewise, if you are an application developer who wants a hand with " -"integrating\n" -"I2P, or even just to chat about the concepts or details: get in touch! If" -" you\n" -"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ " -"or\n" -"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or " -"FreeNode." +"Likewise, if you are an application developer who wants a hand with integrating\n" +"I2P, or even just to chat about the concepts or details: get in touch! If you\n" +"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n" +"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131 msgid "" -"We'll be posting here as we go, but you can also follow our progress, and" -" share\n" -"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring" -" on the\n" +"We'll be posting here as we go, but you can also follow our progress, and share\n" +"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n" "summer!" msgstr "" @@ -5678,11 +5209,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11 msgid "" -"0.9.26 contains crypto updates, Debian packaging improvements, and bug " -"fixes" -msgstr "" -"Wersja 0.9.26 zawiera ulepszenia algorytmów kryptograficznych, ulepszenia" -" w paczkach Debiana, i poprawki bÅ‚Ä™dów" +"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes" +msgstr "Wersja 0.9.26 zawiera ulepszenia algorytmów kryptograficznych, ulepszenia w paczkach Debiana, i poprawki bÅ‚Ä™dów" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13 msgid "" @@ -5695,37 +5223,22 @@ msgid "" "0.9.26 contains a major upgrade to our native crypto library,\n" "a new addressbook subscription protocol with signatures,\n" "and major improvements to the Debian/Ubuntu packaging." -msgstr "" -"Wersja 0.9.26 dostarcza znaczÄ…ce ulepszenia natywnej biblioteki " -"kryptograficznej, nowy protokół subskrypcji książki adresowej z obsÅ‚ugÄ… " -"sygnatur, i znaczÄ…ce ulepszenia w paczkach Debiana/Ubuntu." +msgstr "Wersja 0.9.26 dostarcza znaczÄ…ce ulepszenia natywnej biblioteki kryptograficznej, nowy protokół subskrypcji książki adresowej z obsÅ‚ugÄ… sygnatur, i znaczÄ…ce ulepszenia w paczkach Debiana/Ubuntu." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31 msgid "" -"For crypto, we have upgraded to GMP 6.0.0, and added support for newer " -"processors,\n" +"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n" "which will speed up crypto operations considerably.\n" -"Also, we are now using constant-time GMP functions to prevent side-" -"channel attacks.\n" -"For caution, the GMP changes are enabled for new installs and " -"Debian/Ubuntu builds only;\n" +"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n" +"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n" "we will include them for in-net updates in the 0.9.27 release." -msgstr "" -"Kryptografia: GMP zostaÅ‚ uaktualniony do 6.0.0, i dodano wsparcie dla " -"nowych procesorów, co znaczÄ…co przyspieszy operacje kryptograficzne. " -"RozpoczÄ™liÅ›my używanie staÅ‚o-czasowych funkcji GMP, aby zapobiec atakom " -"typu \"side-channel\". Jak na razie, zmiany w GMP sÄ… wÅ‚Ä…czone tylko na " -"nowych instalacjach na Debianie/Ubuntu, zostanÄ… one wprowadzone dla " -"wszystkich w wydaniu 0.9.27." +msgstr "Kryptografia: GMP zostaÅ‚ uaktualniony do 6.0.0, i dodano wsparcie dla nowych procesorów, co znaczÄ…co przyspieszy operacje kryptograficzne. RozpoczÄ™liÅ›my używanie staÅ‚o-czasowych funkcji GMP, aby zapobiec atakom typu \"side-channel\". Jak na razie, zmiany w GMP sÄ… wÅ‚Ä…czone tylko na nowych instalacjach na Debianie/Ubuntu, zostanÄ… one wprowadzone dla wszystkich w wydaniu 0.9.27." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39 msgid "" -"For Debian/Ubuntu builds, we have added dependencies on several packages," -"\n" +"For Debian/Ubuntu builds, we have added dependencies on several packages,\n" "including Jetty 8 and geoip, and removed the equivalent bundled code." -msgstr "" -"Dodano kilka zależnoÅ›ci pakietów dla kompilacji Debiana/Ubuntu, takich " -"jak Jetty 8 i geoip, oraz usuniÄ™to równoważny kod w programie." +msgstr "Dodano kilka zależnoÅ›ci pakietów dla kompilacji Debiana/Ubuntu, takich jak Jetty 8 i geoip, oraz usuniÄ™to równoważny kod w programie." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44 msgid "" @@ -5735,10 +5248,10 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59 msgid "" -"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant " -"speedups on newer architectures, and constant-time crypto operations " -"(new installs and Debian/Ubuntu builds only, will include in the updates " -"in the next release, 0.9.27)" +"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups " +"on newer architectures, and constant-time crypto operations (new installs " +"and Debian/Ubuntu builds only, will include in the updates in the next " +"release, 0.9.27)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60 @@ -5751,8 +5264,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62 msgid "" -"Enhance hosts blockfile format to allow for multiple destinations per " -"entry" +"Enhance hosts blockfile format to allow for multiple destinations per entry" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63 @@ -5761,8 +5273,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64 msgid "" -"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu " -"packages" +"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65 @@ -5780,8 +5291,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67 msgid "" -"Enhancements to the desktopgui system tray feature, to be enabled by " -"default in next release" +"Enhancements to the desktopgui system tray feature, to be enabled by default" +" in next release" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68 @@ -5796,8 +5307,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75 msgid "" -"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual" -" fix)" +"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual " +"fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76 @@ -5806,8 +5317,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77 msgid "" -"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 " -"for manual fix)" +"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for " +"manual fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78 @@ -5828,8 +5339,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87 msgid "" -"Rework resource bundle generation for 20x speedup in build time (requires" -" gettext version 0.19)" +"Rework resource bundle generation for 20x speedup in build time (requires " +"gettext version 0.19)" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1 @@ -5845,10 +5356,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13 msgid "" -"We're nearly half-way into the APIs month of Summer Dev, and making great" -"\n" -"progress on a number of fronts. I'm happy to announce that the first of " -"these is\n" +"We're nearly half-way into the APIs month of Summer Dev, and making great\n" +"progress on a number of fronts. I'm happy to announce that the first of these is\n" "complete: the I2P client libraries are now available on Maven Central!" msgstr "" @@ -5856,10 +5365,8 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51 msgid "" "This should make it much simpler for Java developers to use I2P in their\n" -"applications. Instead of needing to obtain the libraries from a current " -"install,\n" -"they can simply add I2P to their dependencies. Upgrading to new versions " -"will\n" +"applications. Instead of needing to obtain the libraries from a current install,\n" +"they can simply add I2P to their dependencies. Upgrading to new versions will\n" "similarly be much easier." msgstr "" @@ -5883,25 +5390,21 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39 msgid "" -"Add one or both of these to your project's dependencies, and you're good " -"to go!" +"Add one or both of these to your project's dependencies, and you're good to " +"go!" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67 msgid "" -"For other build systems, see the Maven Central pages for the `core`__ and" -"\n" +"For other build systems, see the Maven Central pages for the `core`__ and\n" "`streaming`__ libraries." msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72 msgid "" -"Android developers should use the `I2P Android client library`__, which " -"contains\n" -"the same libraries along with Android-specific helpers. I'll be updating " -"it soon\n" -"to depend on the new I2P libraries, so that cross-platform applications " -"can work\n" +"Android developers should use the `I2P Android client library`__, which contains\n" +"the same libraries along with Android-specific helpers. I'll be updating it soon\n" +"to depend on the new I2P libraries, so that cross-platform applications can work\n" "natively with either I2P Android or desktop I2P." msgstr "" @@ -5913,10 +5416,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89 msgid "" -"See our `application development`__ guide for help getting started with " -"these\n" -"libraries. You can also chat with us about them in #i2p-dev on IRC. And " -"if you\n" +"See our `application development`__ guide for help getting started with these\n" +"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n" "do start using them, let us know what you're working on with the hashtag\n" "`#I2PSummer`__ on Twitter!" msgstr "" @@ -5930,26 +5431,22 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11 msgid "" -"In the first month of Summer Dev, we have improved the usability of our " -"APIs for Java, Android, and Python developers." +"In the first month of Summer Dev, we have improved the usability of our APIs" +" for Java, Android, and Python developers." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13 msgid "" -"Summer Dev is in full swing: we've been busy greasing wheels, sanding " -"edges, and\n" -"tidying the place up. Now it's time for our first roundup, where we bring" -" you up\n" +"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n" +"tidying the place up. Now it's time for our first roundup, where we bring you up\n" "to speed on the progress we are making!" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19 msgid "" "\n" -"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us" -" the\n" -"fantastic logo you see above. It adds a cheerful personality to our " -"development\n" +"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n" +"fantastic logo you see above. It adds a cheerful personality to our development\n" "program (and is going to look great on t-shirts)." msgstr "" @@ -5961,48 +5458,37 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33 msgid "" -"Our goal for this month was to \"blend in\" - to make our APIs and " -"libraries work\n" -"within the existing infrastructure of various communities, so that " -"application\n" -"developers can work with I2P more efficiently, and users don't need to " -"worry\n" +"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n" +"within the existing infrastructure of various communities, so that application\n" +"developers can work with I2P more efficiently, and users don't need to worry\n" "about the details." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43 msgid "" -"The I2P client libraries are now available on `Maven Central`__ ! See our" -"\n" +"The I2P client libraries are now available on `Maven Central`__ ! See our\n" "`previous blog post`__ for full details.\n" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58 msgid "" -"The `I2P Android client library`__ has also been updated to use the new " -"I2P\n" -"libraries. This means that cross-platform applications can work natively " -"with\n" +"The `I2P Android client library`__ has also been updated to use the new I2P\n" +"libraries. This means that cross-platform applications can work natively with\n" "either I2P Android or desktop I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71 msgid "" -"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work" -"\n" +"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n" "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n" -"`documentation`__ for usage instructions, and report any issues on " -"`GitHub`__." +"`documentation`__ for usage instructions, and report any issues on `GitHub`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84 msgid "" -"The first (beta) version of ``i2psocket`` has been released! This is a " -"direct\n" -"replacement for the standard Python ``socket`` library that extends it " -"with I2P\n" -"support over the SAM API. See its `GitHub page`__ for usage instructions," -" and\n" +"The first (beta) version of ``i2psocket`` has been released! This is a direct\n" +"replacement for the standard Python ``socket`` library that extends it with I2P\n" +"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n" "to report any issues." msgstr "" @@ -6014,15 +5500,15 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98 msgid "" -"zzz has been hard at work on Syndie, getting a headstart on Plugins " -"month. You can follow his progress on `the development forum thread`__." +"zzz has been hard at work on Syndie, getting a headstart on Plugins month. " +"You can follow his progress on `the development forum thread`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100 msgid "" -"psi has been creating an I2P test network using i2pd, and in the process " -"has found and fixed several i2pd bugs that will improve its compatibility" -" with Java I2P." +"psi has been creating an I2P test network using i2pd, and in the process has" +" found and fixed several i2pd bugs that will improve its compatibility with " +"Java I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104 @@ -6033,21 +5519,16 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109 msgid "" -"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a " -"long time\n" -"been home to one of the `largest public grids`__, using a patched version" -" of\n" -"Tahoe-LAFS. During Apps month we will be helping them with their ongoing " -"work to\n" -"add native support for I2P and Tor, so that I2P users can benefit from " -"all of\n" +"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n" +"been home to one of the `largest public grids`__, using a patched version of\n" +"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n" +"add native support for I2P and Tor, so that I2P users can benefit from all of\n" "the improvements upstream." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117 msgid "" -"There are several other projects that we will be talking with about their" -" plans\n" +"There are several other projects that we will be talking with about their plans\n" "for I2P integration, and helping with design. Stay tuned!" msgstr "" @@ -6065,19 +5546,9 @@ msgstr "0.9.27 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18 msgid "" "0.9.27 contains a number of bug fixes.\n" -"The updated GMP library for crypto acceleration, which was bundled in the" -" 0.9.26 release for new installs and Debian builds only, is now included " -"in the in-network update for 0.9.27.\n" -"There are improvements in IPv6 transports, SSU peer testing, and hidden " -"mode." -msgstr "" -"Wersja 0.9.27 zawiera liczne poprawki bÅ‚Ä™dów.\n" -"Zaktualizowana biblioteka GMP do przyspieszania operacji " -"kryptograficznych, która zostaÅ‚a umieszczona w wydaniu 0.9.26 dla nowych " -"instalacji i w paczkach Debiana, jest teraz dostÄ™pna dla wszystkich w " -"aktualizacji 0.9.27.\n" -"Dokonano ulepszeÅ„ w transportach IPv6, testowaniu użytkowników SSU i " -"trybie ukrytym." +"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n" +"There are improvements in IPv6 transports, SSU peer testing, and hidden mode." +msgstr "Wersja 0.9.27 zawiera liczne poprawki bÅ‚Ä™dów.\nZaktualizowana biblioteka GMP do przyspieszania operacji kryptograficznych, która zostaÅ‚a umieszczona w wydaniu 0.9.26 dla nowych instalacji i w paczkach Debiana, jest teraz dostÄ™pna dla wszystkich w aktualizacji 0.9.27.\nDokonano ulepszeÅ„ w transportach IPv6, testowaniu użytkowników SSU i trybie ukrytym." #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24 msgid "" @@ -6174,31 +5645,17 @@ msgstr "0.9.28 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18 msgid "" -"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number " -"of bundled software packages including Jetty.\n" -"There are fixes for the IPv6 peer testing feature introduced last " -"release.\n" -"We continue improvements to detect and block peers that are potentially " -"malicious.\n" -"There are preliminary fixes for Java 9, although we do not yet recommend " -"Java 9 for general use." -msgstr "" -"Wersja 0.9.28 zawiera poprawki 25 różnych bÅ‚Ä™dów, i aktualizacje " -"przeróżnych doÅ‚Ä…czonych paczek w tym Jetty. Poprawiono bÅ‚Ä™dy zwiÄ…zane z " -"testowaniem użytkowników IPv6 pojawiajÄ…ce siÄ™ w poprzednim wydaniu. W " -"dalszym ciÄ…gu poprawiamy wykrywanie i blokowanie potencjalnie zÅ‚oÅ›liwych " -"użytkowników. Wprowadzono wstÄ™pne poprawki dla Javy 9, jednak nie " -"zalecamy używania Javy 9 na co dzieÅ„. " +"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n" +"There are fixes for the IPv6 peer testing feature introduced last release.\n" +"We continue improvements to detect and block peers that are potentially malicious.\n" +"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "Wersja 0.9.28 zawiera poprawki 25 różnych bÅ‚Ä™dów, i aktualizacje przeróżnych doÅ‚Ä…czonych paczek w tym Jetty. Poprawiono bÅ‚Ä™dy zwiÄ…zane z testowaniem użytkowników IPv6 pojawiajÄ…ce siÄ™ w poprzednim wydaniu. W dalszym ciÄ…gu poprawiamy wykrywanie i blokowanie potencjalnie zÅ‚oÅ›liwych użytkowników. Wprowadzono wstÄ™pne poprawki dla Javy 9, jednak nie zalecamy używania Javy 9 na co dzieÅ„. " #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25 msgid "" -"I2P will be at 33C3, please stop by our table and give us your ideas on " -"how to improve the network.\n" +"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n" "We will review our 2017 roadmap and priorities 2017 at the Congress." -msgstr "" -"I2P bÄ™dzie obecne na 33C3, prosimy zatrzymać siÄ™ przy naszym stoliku i " -"zaproponować idee, co ulepszyć w naszej sieci. Na Kongresie przejrzymy " -"nasze plany dziaÅ‚ania i priorytety na rok 2017." +msgstr "I2P bÄ™dzie obecne na 33C3, prosimy zatrzymać siÄ™ przy naszym stoliku i zaproponować idee, co ulepszyć w naszej sieci. Na Kongresie przejrzymy nasze plany dziaÅ‚ania i priorytety na rok 2017." #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50 msgid "Fix version test for SSU IPv6 peer testing" @@ -6373,21 +5830,13 @@ msgstr "0.9.29 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18 msgid "" -"0.9.29 contains fixes for numerous Trac tickets, including workarounds " -"for corrupt compressed messages.\n" +"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n" "We now support NTP over IPv6.\n" "We've added preliminary Docker support.\n" "We now have translated man pages.\n" "We now pass same-origin Referer headers through the HTTP proxy.\n" -"There are more fixes for Java 9, although we do not yet recommend Java 9 " -"for general use." -msgstr "" -"Wersja 0.9.29 zawiera poprawki różnych bÅ‚Ä™dów, wliczajÄ…c obejÅ›cia dla " -"uszkodzonych skompresowanych wiadomoÅ›ci. Teraz wspieramy NTP przez IPv6. " -"Dodano wstÄ™pne wparcie dla Dockera. Dodano wsparcie jÄ™zykowe dla stron " -"instrukcji. Nagłówki Referer z tego samego źródÅ‚a sÄ… teraz przepuszczane " -"przez proxy HTTP. PojawiÅ‚o siÄ™ wiÄ™cej poprawek dla Javy 9, jednakże nie " -"zalecamy używania Javy 9 do codziennego stosowania." +"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "Wersja 0.9.29 zawiera poprawki różnych bÅ‚Ä™dów, wliczajÄ…c obejÅ›cia dla uszkodzonych skompresowanych wiadomoÅ›ci. Teraz wspieramy NTP przez IPv6. Dodano wstÄ™pne wparcie dla Dockera. Dodano wsparcie jÄ™zykowe dla stron instrukcji. Nagłówki Referer z tego samego źródÅ‚a sÄ… teraz przepuszczane przez proxy HTTP. PojawiÅ‚o siÄ™ wiÄ™cej poprawek dla Javy 9, jednakże nie zalecamy używania Javy 9 do codziennego stosowania." #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37 msgid "BOB database refactor" @@ -6498,11 +5947,9 @@ msgstr "" #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18 msgid "" -"The 0.9.29 Windows installer posted on our website two days ago fails " -"during install with an Exception.\n" +"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n" "We have fixed the bug and posted the new installer to our website.\n" -"This does not affect upgrades from previous releases or non-Windows " -"installers.\n" +"This does not affect upgrades from previous releases or non-Windows installers.\n" "We apologize for the issue." msgstr "" @@ -6520,53 +5967,39 @@ msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18 msgid "" "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n" -"The previous versions are no longer supported, and are not available in " -"the upcoming Debian Stretch and Ubuntu Zesty releases." +"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23 msgid "" -"The router will migrate the jetty.xml configuration file for each Jetty " -"website to the new Jetty 9 setup.\n" -"This should work for recent, unmodified configurations but may not work " -"for modified or very old setups.\n" -"Verify that your Jetty website works after upgrading, and contact us on " -"IRC if you need assistance." +"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n" +"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n" +"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29 msgid "" "Several plugins are not compatible with Jetty 9 and must be updated.\n" -"The following plugins have been updated to work with 0.9.30, and your " -"router should update them after restart:" +"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35 msgid "" -"The following plugins (with current versions listed) will not work with " -"0.9.30.\n" +"The following plugins (with current versions listed) will not work with 0.9.30.\n" "Contact the appropriate plugin developer for the status of new versions:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41 msgid "" -"This release also supports migration of old (2014 and earlier) DSA-SHA1 " -"hidden services to the more-secure EdDSA signature type.\n" -"See http://zzz.i2p/topics/2271 for further information, including a guide" -" and FAQ." +"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n" +"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46 msgid "" -"Note: On non-Android ARM platforms such as the Raspberry Pi, the " -"blockfile database will upgrade on restart, which may take several " -"minutes.\n" +"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n" "Please be patient." -msgstr "" -"Uwaga: na nie-Androidowych platformach ARM takich jak Raspberry PI, baza " -"danych blockfile zostanie zaktualizowana po restarcie, co może zająć " -"kilka minut.\n" -"Prosimy o cierpliwość." +msgstr "Uwaga: na nie-Androidowych platformach ARM takich jak Raspberry PI, baza danych blockfile zostanie zaktualizowana po restarcie, co może zająć kilka minut.\nProsimy o cierpliwość." #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61 msgid "Jetty 9, Tomcat 8" @@ -6677,41 +6110,32 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11 msgid "" -"This year's Summer Dev will be focused on metrics collection and " -"performance improvements for the network." +"This year's Summer Dev will be focused on metrics collection and performance" +" improvements for the network." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13 msgid "" "It's that time of year again! We're embarking on our summer development\n" -"programme, where we focus on a particular aspect of I2P to push it " -"forward. For\n" -"the next three months, we'll be encouraging both new contributors and " -"existing\n" +"programme, where we focus on a particular aspect of I2P to push it forward. For\n" +"the next three months, we'll be encouraging both new contributors and existing\n" "community members to pick a task and have fun with it!" msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20 msgid "" -"`Last year`__, we focused on helping users and developers leverage I2P, " -"by\n" -"improving API tooling and giving some love to applications that run over " -"I2P.\n" -"This year, we want to improve the user experience by working on an aspect" -" that\n" +"`Last year`__, we focused on helping users and developers leverage I2P, by\n" +"improving API tooling and giving some love to applications that run over I2P.\n" +"This year, we want to improve the user experience by working on an aspect that\n" "affects everyone: performance." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29 msgid "" -"Despite onion-routing networks often being called \"low-latency\" " -"networks, there\n" -"is significant overhead created by routing traffic through additional " -"computers.\n" -"I2P's unidirectional tunnel design means that by default, a round trip " -"between\n" -"two Destinations will involve twelve participants! Improving the " -"performance of\n" +"Despite onion-routing networks often being called \"low-latency\" networks, there\n" +"is significant overhead created by routing traffic through additional computers.\n" +"I2P's unidirectional tunnel design means that by default, a round trip between\n" +"two Destinations will involve twelve participants! Improving the performance of\n" "these participants will help to both reduce the latency of end-to-end\n" "connections [1]_, and increase the quality of tunnels network-wide." msgstr "" @@ -6734,11 +6158,9 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52 msgid "" -"We can't tell if we improve performance without a baseline! We'll be " -"creating a\n" +"We can't tell if we improve performance without a baseline! We'll be creating a\n" "metrics system for collecting usage and performance data about I2P in a\n" -"privacy-preserving way, as well as porting various benchmarking tools to " -"run\n" +"privacy-preserving way, as well as porting various benchmarking tools to run\n" "over I2P (e.g. iperf3_)." msgstr "" @@ -6750,10 +6172,8 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66 msgid "" -"There's a lot of scope for improving the performance of our existing " -"code, to\n" -"e.g. reduce the overhead of participating in tunnels. We will be looking " -"at\n" +"There's a lot of scope for improving the performance of our existing code, to\n" +"e.g. reduce the overhead of participating in tunnels. We will be looking at\n" "potential improvements to:" msgstr "" @@ -6783,14 +6203,10 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86 msgid "" -"We have several open proposals for improving the scalability of the I2P " -"network\n" -"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We " -"will be\n" -"working on these proposals, and begin implementing the finalised ones in " -"the\n" -"various network routers. The more feedback these proposals receive, the " -"sooner\n" +"We have several open proposals for improving the scalability of the I2P network\n" +"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n" +"working on these proposals, and begin implementing the finalised ones in the\n" +"various network routers. The more feedback these proposals receive, the sooner\n" "we can roll them out, and the sooner I2P services can start using them!" msgstr "" @@ -6802,46 +6218,36 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106 msgid "" -"I2P is a packet-switched network, like the internet it runs on top of. " -"This\n" -"gives us significant flexibility in how we route packets, both for " -"performance\n" +"I2P is a packet-switched network, like the internet it runs on top of. This\n" +"gives us significant flexibility in how we route packets, both for performance\n" "and privacy. The majority of this flexibility is unexplored! We want to\n" -"encourage research into how various clearnet techniques for improving " -"bandwidth\n" +"encourage research into how various clearnet techniques for improving bandwidth\n" "can be applied to I2P, and how they might affect the privacy of network\n" "participants." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -"\n" -"protocols (cryptographic or otherwise), or researching future ideas - " -"come and\n" -"chat with us on IRC or Twitter! We are always happy to welcome newcomers " -"into\n" -"our community, both inside and outside the I2P network. We'll also be " -"sending\n" -"I2P stickers out to all new contributors taking part! If you want to chat" -" about\n" -"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You" -" can\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing\n" +"protocols (cryptographic or otherwise), or researching future ideas - come and\n" +"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n" +"our community, both inside and outside the I2P network. We'll also be sending\n" +"I2P stickers out to all new contributors taking part! If you want to chat about\n" +"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n" "also find us in #i2p-dev on OFTC or Freenode." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142 msgid "" -"Low-latency onion-routing networks are vulnerable to traffic confirmation" -" attacks, so it would be reasonable to ask whether improved performance " +"Low-latency onion-routing networks are vulnerable to traffic confirmation " +"attacks, so it would be reasonable to ask whether improved performance " "equates to reduced privacy. Some latency can help privacy if applied " "correctly via random delays or batching (neither of which are currently " -"employed by any general-purpose onion-routing network). However, if a " -"tunnel has uniform overall latency, then traffic confirmation attacks " -"should be just as viable with or without that latency; thus there should " -"be little statistical difference when the latency is reduced uniformly." +"employed by any general-purpose onion-routing network). However, if a tunnel" +" has uniform overall latency, then traffic confirmation attacks should be " +"just as viable with or without that latency; thus there should be little " +"statistical difference when the latency is reduced uniformly." msgstr "" #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1 @@ -6861,8 +6267,7 @@ msgid "" "We have refreshed the router console to make it easier to understand,\n" "improve accessibility and cross-browser support,\n" "and generally tidy things up.\n" -"This is the first step in a longer-term plan to make the router console " -"more user-friendly.\n" +"This is the first step in a longer-term plan to make the router console more user-friendly.\n" "We have also added torrent ratings and comments support to i2psnark." msgstr "" @@ -6932,18 +6337,10 @@ msgstr "" #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18 msgid "" -"0.9.32 contains a number of fixes in the router console and associated " -"webapps (addressbook, i2psnark, and susimail).\n" -"We have also changed the way we handle configured hostnames for published" -" router infos, to eliminate some network enumeration attacks via DNS.\n" +"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n" +"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n" "We have added some checks in the console to resist rebinding attacks." -msgstr "" -"Wersja 0.9.32 zawiera liczne poprawki konsoli wÄ™zÅ‚a i powiÄ…zanych " -"webaplikacji (książki adresowej, i2psnarka i susimail'a). Zmieniono także" -" sposób obchodzenia siÄ™ z nazwami hostów dla opublikowanych informacji o " -"wÄ™zÅ‚ach, aby wyeliminować niektóre rodzaje ataków wyliczania (ang. " -"network enumeration) poprzez DNS. Dodano kilka poprawek w konsoli " -"zapobiegajÄ…cych atakom przekierowania (ang rebinding)." +msgstr "Wersja 0.9.32 zawiera liczne poprawki konsoli wÄ™zÅ‚a i powiÄ…zanych webaplikacji (książki adresowej, i2psnarka i susimail'a). Zmieniono także sposób obchodzenia siÄ™ z nazwami hostów dla opublikowanych informacji o wÄ™zÅ‚ach, aby wyeliminować niektóre rodzaje ataków wyliczania (ang. network enumeration) poprzez DNS. Dodano kilka poprawek w konsoli zapobiegajÄ…cych atakom przekierowania (ang rebinding)." #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34 msgid "Disallow hostnames in router addresses (proposal 141)" @@ -6983,20 +6380,11 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17 msgid "" -"0.9.33 contains a large number of bug fixes, including i2psnark, " -"i2ptunnel, streaming, and SusiMail.\n" -"For those who cannot access the reseed sites directly, we now support " -"several types of proxies for reseeding.\n" +"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n" +"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n" "We now set rate limits by default in the hidden services manager.\n" -"For those that run high-traffic servers, please review and adjust the " -"limits as necessary." -msgstr "" -"Wersja 0.9.33 zawiera liczne poprawki bÅ‚Ä™dów m.in. w: i2psnark, " -"i2ptunnel, strumieniowaniu i SusiMail. Dla tych którzy nie mogÄ… " -"bezpoÅ›rednio pobrać plików reseedowania, wspierane sÄ… liczne typy " -"serwerów proxy. W menadżerze ukrytych usÅ‚ug można ustalać limity " -"przepustowoÅ›ci. Posiadacze wyjÄ…tkowo wymagajÄ…cych serwerów powinni " -"przejrzeć i skonfigurować te limity w razie potrzeby." +"For those that run high-traffic servers, please review and adjust the limits as necessary." +msgstr "Wersja 0.9.33 zawiera liczne poprawki bÅ‚Ä™dów m.in. w: i2psnark, i2ptunnel, strumieniowaniu i SusiMail. Dla tych którzy nie mogÄ… bezpoÅ›rednio pobrać plików reseedowania, wspierane sÄ… liczne typy serwerów proxy. W menadżerze ukrytych usÅ‚ug można ustalać limity przepustowoÅ›ci. Posiadacze wyjÄ…tkowo wymagajÄ…cych serwerów powinni przejrzeć i skonfigurować te limity w razie potrzeby." #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34 msgid "DesktopGui: Enable on OSX" @@ -7083,7 +6471,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62 -msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies" +msgid "" +"SusuMail: Fix bugs corrupting text attachments and large message bodies" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63 @@ -7150,8 +6539,7 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83 msgid "" -"Debian: Remove ecj dependency; replace glassfish with libtaglibs where " -"able" +"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84 @@ -7221,12 +6609,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13 msgid "" -"One of the many things we discussed at 34C3 was what we should focus on " -"for the\n" -"coming year. In particular, we wanted a roadmap that was clear about what" -" we\n" -"want to ensure we get done, vs what would be really nice to have, and be " -"able to\n" +"One of the many things we discussed at 34C3 was what we should focus on for the\n" +"coming year. In particular, we wanted a roadmap that was clear about what we\n" +"want to ensure we get done, vs what would be really nice to have, and be able to\n" "help onboard newcomers to either category. Here is what we came up with:" msgstr "" @@ -7238,14 +6623,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25 msgid "" -"Many of the current primitives and protocols still retain their original " -"designs\n" -"from circa 2005, and need improvement. We have had a number of open " -"proposals\n" -"for several years with ideas, but forward progress has been slow. We all " -"agreed\n" -"that this needs to be our top priority for 2018. The core components are:" -"\n" +"Many of the current primitives and protocols still retain their original designs\n" +"from circa 2005, and need improvement. We have had a number of open proposals\n" +"for several years with ideas, but forward progress has been slow. We all agreed\n" +"that this needs to be our top priority for 2018. The core components are:\n" "\n" "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n" "- New onion-encryption protocol for building and using tunnels.\n" @@ -7264,8 +6645,7 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50 msgid "" -"We cannot release new protocol specifications across the entire network " -"without\n" +"We cannot release new protocol specifications across the entire network without\n" "work on all of these areas." msgstr "" @@ -7277,31 +6657,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60 msgid "" -"One of the benefits of starting the above work now, is that over the last" -" few\n" +"One of the benefits of starting the above work now, is that over the last few\n" "years there have been independent efforts to create simple protocols and\n" -"protocol frameworks that achieve many of the aims we have for our own " -"protocols,\n" -"and have gained traction with the wider community. By leveraging this " -"work, we\n" +"protocol frameworks that achieve many of the aims we have for our own protocols,\n" +"and have gained traction with the wider community. By leveraging this work, we\n" "get a \"force multiplier\" effect:\n" "\n" -"- We benefit from protocol designs, security proofs, and code written by " -"others,\n" +"- We benefit from protocol designs, security proofs, and code written by others,\n" " reducing the amount of work we need to do for the same level of\n" " feature-completeness and security assurances.\n" "\n" -"- Work we do can be leveraged by other communities, increasing their " -"interest in\n" +"- Work we do can be leveraged by other communities, increasing their interest in\n" " collaborating with us, and thinking about I2P as a whole." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76 msgid "" -"My proposals in particular will be leveraging the `Noise Protocol " -"Framework`_,\n" -"and the `SPHINX packet format`_. I have collaborations lined up with " -"several\n" +"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n" +"and the `SPHINX packet format`_. I have collaborations lined up with several\n" "people outside I2P for these!" msgstr "" @@ -7313,16 +6686,11 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90 msgid "" -"On that topic, we've been slowly building interest over the last six " -"months or\n" -"so. Across PETS2017, 34C3, and RWC2018, I've had some very good " -"discussions\n" -"about ways in which we can improve collaboration with the wider " -"community. This\n" -"is really important to ensure we can garner as much review as possible " -"for new\n" -"protocols. The biggest blocker I've seen is the fact that the majority of" -" I2P\n" +"On that topic, we've been slowly building interest over the last six months or\n" +"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n" +"about ways in which we can improve collaboration with the wider community. This\n" +"is really important to ensure we can garner as much review as possible for new\n" +"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n" "development collaboration currently happens inside I2P itself, which\n" "significantly increases the effort required to contribute." msgstr "" @@ -7331,8 +6699,7 @@ msgstr "" msgid "" "The two priorities in this area are:\n" "\n" -"- Set up a project-run development forum that is accessible both inside " -"and\n" +"- Set up a project-run development forum that is accessible both inside and\n" " outside I2P.\n" "\n" "- Set up mailing lists for review and discussion of proposals (possibly\n" @@ -7343,21 +6710,17 @@ msgstr "" msgid "" "Other goals which are classed as nice-to-have:\n" "\n" -"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit" -"\n" -" clearnet contributions on GitHub while keeping the canonical dev " -"environment\n" +"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n" +" clearnet contributions on GitHub while keeping the canonical dev environment\n" " on Monotone.\n" "\n" -"- Write a \"position paper\" that accurately explains I2P to academic " -"audiences,\n" +"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n" " and puts it in context with existing literature." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123 msgid "" -"I expect that collaborations with people outside I2P will be done " -"entirely on\n" +"I expect that collaborations with people outside I2P will be done entirely on\n" "GitHub, for minimal friction." msgstr "" @@ -7369,24 +6732,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133 msgid "" -"I2P is now in Debian Sid (their unstable repo) which will stablilise in " -"around a\n" +"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n" "year and a half, and has also been pulled into the Ubuntu repository for\n" -"inclusion in the next LTS release in April. We are going to start having " -"I2P\n" -"versions that end up hanging around for years, and we need to ensure we " -"can\n" +"inclusion in the next LTS release in April. We are going to start having I2P\n" +"versions that end up hanging around for years, and we need to ensure we can\n" "handle their presence in the network." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141 msgid "" -"The primary goal here is to roll out as many of the new protocols as we " -"feasibly\n" -"can in the next year, to hit the next Debian stable release. For those " -"that\n" -"require multi-year rollouts, we should incorporate the forward-" -"compatability\n" +"The primary goal here is to roll out as many of the new protocols as we feasibly\n" +"can in the next year, to hit the next Debian stable release. For those that\n" +"require multi-year rollouts, we should incorporate the forward-compatability\n" "changes as early as we can." msgstr "" @@ -7398,32 +6755,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153 msgid "" -"The Debian model encourages having separate packages for separate " -"components. We\n" -"agreed that decoupling the currently-bundled Java applications from the " -"core\n" +"The Debian model encourages having separate packages for separate components. We\n" +"agreed that decoupling the currently-bundled Java applications from the core\n" "Java router would be beneficial for several reasons:\n" "\n" "- It codifies the boundary between the applications and the router.\n" "\n" -"- It should make it easier to get these apps running with non-Java " -"routers.\n" +"- It should make it easier to get these apps running with non-Java routers.\n" "\n" -"- It would enable third parties to create \"I2P bundles\" containing just" -" the\n" +"- It would enable third parties to create \"I2P bundles\" containing just the\n" " applications they want." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167 msgid "" -"In combination with the earlier priorities, this moves the main I2P " -"project more\n" -"in the direction of e.g. the Linux kernel. We will spend more time " -"focusing on\n" -"the network itself, leaving third-party developers to focus on " -"applications that\n" -"use the network (something that is significantly easier to do after our " -"work in\n" +"In combination with the earlier priorities, this moves the main I2P project more\n" +"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n" +"the network itself, leaving third-party developers to focus on applications that\n" +"use the network (something that is significantly easier to do after our work in\n" "the last few years on APIs and libraries)." msgstr "" @@ -7435,25 +6784,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180 msgid "" -"There are a bunch of app-level improvements that we want to work on, but " -"do not\n" -"currently have the developer time to do so, given our other priorities. " -"This is\n" -"an area we would love to see new contributors for! Once the above " -"decoupling is\n" -"complete, it will be significantly easier for someone to work on a " -"specific\n" +"There are a bunch of app-level improvements that we want to work on, but do not\n" +"currently have the developer time to do so, given our other priorities. This is\n" +"an area we would love to see new contributors for! Once the above decoupling is\n" +"complete, it will be significantly easier for someone to work on a specific\n" "application independently of the main Java router." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188 msgid "" -"One such application we would love to have help with is I2P Android. We " -"will be\n" -"keeping it up-to-date with the core I2P releases, and fixing bugs as we " -"can, but\n" -"there is much that could be done to improve the underlying code as well " -"as the\n" +"One such application we would love to have help with is I2P Android. We will be\n" +"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n" +"there is much that could be done to improve the underlying code as well as the\n" "usability." msgstr "" @@ -7465,14 +6807,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200 msgid "" -"Having said that, we do want to work specifically on Susimail and I2P-" -"Bote fixes\n" -"in the near term (some of which have landed in 0.9.33). They have had " -"less work\n" -"over the last few years than other I2P apps, and so we want to spend some" -" time\n" -"bringing their codebases up to par, and making them easier for new " -"contributors\n" +"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n" +"in the near term (some of which have landed in 0.9.33). They have had less work\n" +"over the last few years than other I2P apps, and so we want to spend some time\n" +"bringing their codebases up to par, and making them easier for new contributors\n" "to jump into!" msgstr "" @@ -7484,14 +6822,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213 msgid "" -"We have a large backlog of tickets in a number of I2P subsystems and " -"apps. As\n" -"part of the above stabilisation effort, we would love to clean up some of" -" our\n" -"older long-standing issues. More importantly, we want to ensure that our " -"tickets\n" -"are correctly organised, so that new contributors can find good tickets " -"to work\n" +"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n" +"part of the above stabilisation effort, we would love to clean up some of our\n" +"older long-standing issues. More importantly, we want to ensure that our tickets\n" +"are correctly organised, so that new contributors can find good tickets to work\n" "on." msgstr "" @@ -7503,12 +6837,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226 msgid "" -"One aspect of the above we will be focusing on is keeping in touch with " -"users\n" -"who take the time to report issues. Thank you! The smaller we can make " -"the\n" -"feedback loop, the quicker we can resolve problems that new users face, " -"and the\n" +"One aspect of the above we will be focusing on is keeping in touch with users\n" +"who take the time to report issues. Thank you! The smaller we can make the\n" +"feedback loop, the quicker we can resolve problems that new users face, and the\n" "more likely it is that they keep participating in the community." msgstr "" @@ -7520,15 +6851,13 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238 msgid "" -"That all looks very ambitious, and it is! But many of the items above " -"overlap,\n" +"That all looks very ambitious, and it is! But many of the items above overlap,\n" "and with careful planning we can make a serious dent in them." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243 msgid "" -"If you are interested in helping with any of the goals above, come chat " -"to us!\n" +"If you are interested in helping with any of the goals above, come chat to us!\n" "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)." msgstr "" @@ -7554,16 +6883,10 @@ msgstr "" #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17 msgid "" "0.9.34 contains a lot of bug fixes!\n" -"It also has improvements in SusiMail, IPv6 handling, and tunnel peer " -"selection.\n" +"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n" "We add support for IGD2 schemas in UPnP.\n" -"There's also preparation for more improvements you will see in future " -"releases." -msgstr "" -"Wersja 0.9.34 zawiera liczne poprawki bÅ‚Ä™dów! Ponadto zawiera ulepszenia " -"dotyczÄ…ce SusiMaila, obsÅ‚ugi IPv6, wyboru użytkowników tuneli. DodaliÅ›my " -"wsparcie dla schematów IGD2 w UPnP. Przygotowujemy siÄ™ na dalsze " -"usprawnienia, które zobaczysz w przyszÅ‚ych wydaniach." +"There's also preparation for more improvements you will see in future releases." +msgstr "Wersja 0.9.34 zawiera liczne poprawki bÅ‚Ä™dów! Ponadto zawiera ulepszenia dotyczÄ…ce SusiMaila, obsÅ‚ugi IPv6, wyboru użytkowników tuneli. DodaliÅ›my wsparcie dla schematów IGD2 w UPnP. Przygotowujemy siÄ™ na dalsze usprawnienia, które zobaczysz w przyszÅ‚ych wydaniach." #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34 msgid "SusiMail: Improved startup and memory management" @@ -7625,27 +6948,20 @@ msgstr "Wersja 0.9.35 zawiera katalogi SusiMaila i kreatora SSL" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16 msgid "" -"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for " -"setting up HTTPS on your Hidden Service website.\n" +"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n" "We also have the usual collection of bug fixes, especially in SusiMail." -msgstr "" -"Wersja 0.9.35 zawiera wsparcie dla folderów w SusiMailu i nowy kreator " -"pozwalajÄ…cy skonfigurować HTTPS na Twojej ukrytej stronie w sieci I2P. " -"Jak zwykle zaÅ‚atano kilkanaÅ›cie bÅ‚Ä™dów, zwÅ‚aszcza w SusiMailu." +msgstr "Wersja 0.9.35 zawiera wsparcie dla folderów w SusiMailu i nowy kreator pozwalajÄ…cy skonfigurować HTTPS na Twojej ukrytej stronie w sieci I2P. Jak zwykle zaÅ‚atano kilkanaÅ›cie bÅ‚Ä™dów, zwÅ‚aszcza w SusiMailu." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21 msgid "" "We're hard at work on several things for 0.9.36, including a new OSX " "installer and a faster, more secure transport protocol called NTCP2." -msgstr "" -"Ciężko pracujemy nad kilkoma funkcjami w wersji 0.9.36, nad instalatorem " -"dla OSX i szybszym i bardziej bezpiecznym transporcie NTCP2." +msgstr "Ciężko pracujemy nad kilkoma funkcjami w wersji 0.9.36, nad instalatorem dla OSX i szybszym i bardziej bezpiecznym transporcie NTCP2." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25 -msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" -msgstr "" -"I2P bÄ™dzie obecne w HOPE w Nowym Jorku, 20-22 lipca. Odwiedź nas i " -"przywitaj!" +msgid "" +"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" +msgstr "I2P bÄ™dzie obecne w HOPE w Nowym Jorku, 20-22 lipca. Odwiedź nas i przywitaj!" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39 msgid "New Hidden Service SSL Wizard" @@ -7664,7 +6980,8 @@ msgid "CPUID: Fix TBM detection" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48 -msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled" +msgid "" +"i2psnark: Fix torrents ignoring priority settings when autostart enabled" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49 @@ -7740,25 +7057,16 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:20 msgid "" -"I2P's transport protocols were originally developed around 15 years ago. " -"Back \n" -"then, the main goal was to hide the transferred data, not to hide the " -"fact that \n" -"one was using the protocol itself. Nobody thought seriously about " -"protecting \n" -"against DPI (deep packets inspection) and protocols censorship. Times " -"change, \n" -"and even though original transport protocols are still providing strong " -"security, \n" -"there was a demand for a new transport protocol. NTCP2 is designed to " -"resist \n" -"current censorship threats. Mainly, DPI analysis of packets length. Plus," -" the new \n" -"protocol uses the most modern cryptography developments. NTCP2 is based " -"on the \n" +"I2P's transport protocols were originally developed around 15 years ago. Back \n" +"then, the main goal was to hide the transferred data, not to hide the fact that \n" +"one was using the protocol itself. Nobody thought seriously about protecting \n" +"against DPI (deep packets inspection) and protocols censorship. Times change, \n" +"and even though original transport protocols are still providing strong security, \n" +"there was a demand for a new transport protocol. NTCP2 is designed to resist \n" +"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n" +"protocol uses the most modern cryptography developments. NTCP2 is based on the \n" "`Noise Protocol Framework`_, with SHA256 \n" -"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) " -"key \n" +"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n" "exchange." msgstr "" @@ -7780,23 +7088,17 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:59 msgid "" -"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of " -"ElGamal \n" -"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, " -"and uses \n" -"SipHash for obfuscating the packet's length information. The key " -"derivation \n" +"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n" +"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n" +"SipHash for obfuscating the packet's length information. The key derivation \n" "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:66 msgid "" -"i2pd (C++) implementation note: All of the algorithms mentioned above, " -"except \n" -"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the " -"coming \n" -"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is " -"used in \n" +"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n" +"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n" +"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n" "most of the current systems, core i2pd developer \n" "`Jeff Becker`_ has contributed standalone \n" "implementations of missing cryptographic algorithms." @@ -7810,40 +7112,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:82 msgid "" -"NTCP2 requires having a third (x25519) key in addition to existing two " -"(the \n" -"encryption and signature keys). It is called a static key and it has to " -"be added \n" -"to any of RouterInfo addresses as an \"s\" parameter. It is required for " -"both \n" -"NTCP2 initiator (Alice) and responder (Bob). If more than one address " -"supports \n" -"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for " -"all of \n" -"them. Alice's address is allowed to have just the \"s\" parameter without" -" \"host\" \n" -"and \"port\" set. Also, a \"v\" parameter is required, that is currently " -"always set \n" +"NTCP2 requires having a third (x25519) key in addition to existing two (the \n" +"encryption and signature keys). It is called a static key and it has to be added \n" +"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n" +"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n" +"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n" +"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n" +"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n" "to \"2\"." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:93 msgid "" -"NTCP2 address can be declared as a separate NTCP2 address or as an old-" -"style \n" -"NTCP address with additional parameters, in which case it will accept " -"both \n" -"NTCP and NTCP2 connections. Java I2P implementation uses the second " -"approach, \n" +"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n" +"NTCP address with additional parameters, in which case it will accept both \n" +"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n" "i2pd (C++ implementation) uses the first." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:100 msgid "" -"If a node accepts NTCP2 connections, it has to publish its RouterInfo " -"with the \n" -"\"i\" parameter, which is used as an initialization vector (IV) for the " -"public \n" +"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n" +"\"i\" parameter, which is used as an initialization vector (IV) for the public \n" "encryption key when that node establishes new connections." msgstr "" @@ -7855,14 +7145,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:111 msgid "" -"To establish a connection both sides need to generate pairs of ephemeral " -"x25519 \n" -"keys. Based on those keys and \"static\" keys they derive a set of keys " -"for data \n" -"transferring. Both parties must verify that the other side actually has a" -" \n" -"private key for that static key, and that static key is the same as in " -"RouterInfo." +"To establish a connection both sides need to generate pairs of ephemeral x25519 \n" +"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n" +"transferring. Both parties must verify that the other side actually has a \n" +"private key for that static key, and that static key is the same as in RouterInfo." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:118 @@ -7871,29 +7157,23 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:131 msgid "" -"A common x25519 key, called «input key material», is computed for each " -"message, \n" -"after which message encryption key is generated with a MixKey function. A" -" value \n" +"A common x25519 key, called «input key material», is computed for each message, \n" +"after which message encryption key is generated with a MixKey function. A value \n" "ck (chaining key) is kept while messages are being exchanged. \n" -"That value is used as a final input when generating keys for data " -"transferring." +"That value is used as a final input when generating keys for data transferring." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:138 msgid "" -"MixKey function looks something like this in the C++ implementation of " -"I2P:" +"MixKey function looks something like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:159 msgid "" -"**SessionRequest** message is made of a public x25519 Alice key (32 " -"bytes), a \n" +"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n" "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n" "(16 bytes) and some random data in the end (padding). Padding length is \n" -"defined in the encrypted block of data. Encrypted block also contains " -"length of \n" +"defined in the encrypted block of data. Encrypted block also contains length of \n" "the second part of the **SessionConfirmed** message. A block of data is \n" "encrypted and signed with a key derived from Alice's ephemeral key and \n" "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n" @@ -7902,38 +7182,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:170 msgid "" -"Since 32 bytes of public x25519 key can be detected by DPI, it is " -"encrypted with \n" -"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" " -"parameter \n" +"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n" +"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n" "from RouterInfo as an initialization vector (IV)." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:176 msgid "" -"**SessionCreated** message has the same structure as **SessionRequest**, " -"except \n" -"the key is computed based on ephemeral keys of both sides. IV generated " -"after \n" -"encrypting/decrypting public key from **SessionRequest** message is used " -"as IV \n" +"**SessionCreated** message has the same structure as **SessionRequest**, except \n" +"the key is computed based on ephemeral keys of both sides. IV generated after \n" +"encrypting/decrypting public key from **SessionRequest** message is used as IV \n" "for encrypting/decrypting ephemeral public key." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:183 msgid "" "**SessionConfirmed** message has 2 parts: public static key and Alice's \n" -"RouterInfo. The difference from previous messages is that ephemeral " -"public key \n" -"is encrypted with AEAD/Chaha20/Poly1305 using the same key as " -"**SessionCreated**. \n" +"RouterInfo. The difference from previous messages is that ephemeral public key \n" +"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n" "It leads to increasing first part of the message from 32 to 48 bytes. \n" -"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a" -" new \n" -"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo" -" part \n" -"can also be appended with random data padding, but it is not required, " -"since \n" +"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n" +"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n" +"can also be appended with random data padding, but it is not required, since \n" "RouterInfo usually has various length." msgstr "" @@ -7945,29 +7215,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:199 msgid "" -"If every hash and key verification has succeeded, a common ck value must " -"be \n" -"present after the last MixKey operation on both sides. This value is used" -" to \n" -"generate two sets of keys <k, sipk, sipiv> for each side of a connection." -" \"k\" is \n" -"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an " -"initial \n" +"If every hash and key verification has succeeded, a common ck value must be \n" +"present after the last MixKey operation on both sides. This value is used to \n" +"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n" +"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n" "value for SipHash IV, that is changed after each use." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:207 msgid "" -"Code used to generate keys looks like this in the C++ implementation of " -"I2P:" +"Code used to generate keys looks like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:246 msgid "" -"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array " -"are a \n" -"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, " -"but i2pd \n" +"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n" +"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n" "handles them as a single 16 bytes key." msgstr "" @@ -7994,28 +7257,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:271 msgid "" -"Message length is obfuscated by applying the XOR function with two first " -"bytes \n" +"Message length is obfuscated by applying the XOR function with two first bytes \n" "of the current SipHash IV." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:276 msgid "" -"Encrypted data part contains blocks of data. Each block is prepended with" -" 3 \n" -"bytes header, that defines block type and block length. Generally, I2NP " -"type \n" -"blocks are transferred, that are I2NP messages with an altered header. " -"One NTCP2 \n" +"Encrypted data part contains blocks of data. Each block is prepended with 3 \n" +"bytes header, that defines block type and block length. Generally, I2NP type \n" +"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n" "frame can transfer multiple I2NP blocks." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:283 msgid "" -"The other important data block type is a random data block. It is " -"recommended to \n" -"add a random data block to every NTCP2 frame. Only one random data block " -"can be \n" +"The other important data block type is a random data block. It is recommended to \n" +"add a random data block to every NTCP2 frame. Only one random data block can be \n" "added and it must be the last block." msgstr "" @@ -8025,12 +7282,8 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:293 msgid "" -"- RouterInfo — usually contains Bob's RouterInfo after the connection " -"has been established, but it can also contain RouterInfo of a random node" -" for the purpose of speeding up floodfills (there is a flags field for " -"that case). \n" -"- Termination — is used when a host explicitly terminates a connection " -"and specifies a reason for that.\n" +"- RouterInfo — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n" +"- Termination — is used when a host explicitly terminates a connection and specifies a reason for that.\n" "- DateTime — a current time in seconds." msgstr "" @@ -8042,14 +7295,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:305 msgid "" -"The new I2P transport protocol NTCP2 provides effective resistance " -"against DPI \n" -"censorship. It also results in reduced CPU load because of the faster, " -"modern \n" -"cryptography used. It makes I2P more likely to run on low-end devices, " -"such as \n" -"smartphones and home routers. Both major I2P implementations have full " -"support \n" +"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n" +"censorship. It also results in reduced CPU load because of the faster, modern \n" +"cryptography used. It makes I2P more likely to run on low-end devices, such as \n" +"smartphones and home routers. Both major I2P implementations have full support \n" "for NTCP2 and it make NTCP2 available for use starting with version \n" "0.9.36 (Java) and 2.20 (i2pd, C++)." msgstr "" @@ -8135,7 +7384,8 @@ msgid "i2psnark: Add icon for comments" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60 -msgid "i2ptunnel: Change read timeout defaults to account for streaming changes" +msgid "" +"i2ptunnel: Change read timeout defaults to account for streaming changes" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61 @@ -8160,7 +7410,8 @@ msgid "0.9.37 with NTCP2 enabled" msgstr "Wersja 0.9.37 wÅ‚Ä…cza NTCP2" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16 -msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2." +msgid "" +"0.9.37 enables the faster, more secure transport protocol called NTCP2." msgstr "" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30 @@ -8201,27 +7452,19 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:18 msgid "" "`Invisible Internet Project`_ (I2P) provides a framework for\n" -"developing privacy-aware applications. It is a virtual network working on" -" top of\n" -"the regular Internet, in which hosts can exchange data without disclosing" -" their\n" -"\"real\" IP addresses. Connections inside I2P network are established " -"between \n" -"virtual addresses called *I2P destinations*. It's possible to have as " -"many\n" -"of destinations as one needs, even use a new destination for each " -"connection,\n" -"they don't disclose any information about the real IP address to the " -"other\n" +"developing privacy-aware applications. It is a virtual network working on top of\n" +"the regular Internet, in which hosts can exchange data without disclosing their\n" +"\"real\" IP addresses. Connections inside I2P network are established between \n" +"virtual addresses called *I2P destinations*. It's possible to have as many\n" +"of destinations as one needs, even use a new destination for each connection,\n" +"they don't disclose any information about the real IP address to the other\n" "side." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:31 msgid "" -"This article describes basic concepts one needs to know when developing " -"I2P\n" -"applications. Code samples are written in Python with the use of built-in" -"\n" +"This article describes basic concepts one needs to know when developing I2P\n" +"applications. Code samples are written in Python with the use of built-in\n" "asynchronous framework asyncio." msgstr "" @@ -8234,15 +7477,11 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:42 msgid "" "I2P provides many different APIs to the client applications. Regular\n" -"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java " -"applications \n" -"usually use I2CP. For developing with other languages, like Python, the " -"best \n" +"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n" +"usually use I2CP. For developing with other languages, like Python, the best \n" "option is `SAM`_. SAM is disabled by \n" -"default in the original Java client implementation, so we need to enable " -"it. \n" -"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run " -"at Startup\" \n" +"default in the original Java client implementation, so we need to enable it. \n" +"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n" "and press \"Start\", then \"Save Client Configuration\"." msgstr "" @@ -8263,12 +7502,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:79 msgid "" -"This library works with the Python's built-in `asynchronous framework " -"asyncio`_,\n" -"so please note that code samples are taken from async functions " -"(coroutines)\n" -"which are running inside the event loop. Additional examples of i2plib " -"usage can\n" +"This library works with the Python's built-in `asynchronous framework asyncio`_,\n" +"so please note that code samples are taken from async functions (coroutines)\n" +"which are running inside the event loop. Additional examples of i2plib usage can\n" "be found in the `source code repository`_." msgstr "" @@ -8280,10 +7516,8 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:94 msgid "" -"I2P destination is literally a set of encryption and cryptographic " -"signature\n" -"keys. Public keys from this set are published to the I2P network and are " -"used to\n" +"I2P destination is literally a set of encryption and cryptographic signature\n" +"keys. Public keys from this set are published to the I2P network and are used to\n" "make connections instead of IP addresses." msgstr "" @@ -8293,28 +7527,22 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:112 msgid "" -"base32 address is a hash which is used by other peers to discover your " -"full\n" -"Destination in the network. If you plan to use this destination as a " -"permanent\n" -"address in your program, save the binary data from " -"*dest.private\\_key.data* \n" +"base32 address is a hash which is used by other peers to discover your full\n" +"Destination in the network. If you plan to use this destination as a permanent\n" +"address in your program, save the binary data from *dest.private\\_key.data* \n" "to a local file." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:119 msgid "" -"Now you can create a SAM session, which literally means to make the " -"Destination\n" +"Now you can create a SAM session, which literally means to make the Destination\n" "online in I2P:" msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:130 msgid "" -"Important note here: Destination will remain online while " -"*session\\_writer* socket\n" -"is kept open. If you wish to switch it off, you can call " -"*session\\_writer.close()*." +"Important note here: Destination will remain online while *session\\_writer* socket\n" +"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:135 @@ -8325,11 +7553,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:140 msgid "" -"Now when the Destination is online, you can use it to connect to other " -"peers.\n" +"Now when the Destination is online, you can use it to connect to other peers.\n" "For example, this is how you connect to\n" -"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send " -"HTTP GET\n" +"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n" "request and read the response (it is \"i2p-projekt.i2p\" web server):" msgstr "" @@ -8341,20 +7567,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:171 msgid "" -"While making outgoing connections is trivial, when you accept connections" -" there\n" -"is one important detail. After a new client is connected, SAM API sends " -"an ASCII\n" -"string with base64-encoded client's Destination to the socket. Since " -"Destination \n" +"While making outgoing connections is trivial, when you accept connections there\n" +"is one important detail. After a new client is connected, SAM API sends an ASCII\n" +"string with base64-encoded client's Destination to the socket. Since Destination \n" "and data can come in one chunk, you should be aware of it." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:178 msgid "" "This is how a simple PING-PONG server looks like. It accepts incoming\n" -"connection, saves client's Destination to a *remote\\_destination* " -"variable and\n" +"connection, saves client's Destination to a *remote\\_destination* variable and\n" "sends back \"PONG\" string:" msgstr "" @@ -8366,21 +7588,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:208 msgid "" -"This article describes the usage of a TCP-like Streaming protocol. SAM " -"API also\n" -"provides a UDP-like protocol to send and receive datagrams. This feature " -"will\n" +"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n" +"provides a UDP-like protocol to send and receive datagrams. This feature will\n" "be added to i2plib later." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:214 msgid "" -"This is just a basic information, but it's enough to start your own " -"project with\n" -"the use of I2P. Invisible Internet is a great tool to develop all kinds " -"of\n" -"privacy-aware applications. There are no design constraints by the " -"network,\n" +"This is just a basic information, but it's enough to start your own project with\n" +"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n" +"privacy-aware applications. There are no design constraints by the network,\n" "those applications can be client-server as well as P2P." msgstr "" @@ -8396,22 +7613,15 @@ msgstr "Wersja 0.9.38 zawiera nowy kreator instalacji" msgid "" "0.9.38 includes a new first-install wizard with a bandwidth tester.\n" "We've added support for the latest GeoIP database format.\n" -"There's a new Firefox profile installer and a new, native Mac OSX " -"installer on our website.\n" +"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n" "Work continues on supporting the new \"LS2\" netdb format." -msgstr "" -"Wersja 0.9.38 zawiera nowy kreator instalacji z testem przepustowoÅ›ci. " -"Dodano wsparcie dla najnowszego formatu bazy danych GeoIP. Jest możliwość" -" instalacji specjalnego profilu Firefoxa i nowy instalator na Mac OSX. " -"Dalej pracujemy nad nowym formatem netdb “LS2â€." +msgstr "Wersja 0.9.38 zawiera nowy kreator instalacji z testem przepustowoÅ›ci. Dodano wsparcie dla najnowszego formatu bazy danych GeoIP. Jest możliwość instalacji specjalnego profilu Firefoxa i nowy instalator na Mac OSX. Dalej pracujemy nad nowym formatem netdb “LS2â€." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23 msgid "" "This release also contains plenty of bug fixes, including several issues " "with susimail attachments, and a fix for IPv6-only routers." -msgstr "" -"Ponadto to wydanie zawiera mnóstwo poprawek bÅ‚Ä™dów, takich jak problem z " -"zaÅ‚Ä…cznikami w susimailu i Å‚atka dla wÄ™złów dziaÅ‚ajÄ…cych tylko na IPv6." +msgstr "Ponadto to wydanie zawiera mnóstwo poprawek bÅ‚Ä™dów, takich jak problem z zaÅ‚Ä…cznikami w susimailu i Å‚atka dla wÄ™złów dziaÅ‚ajÄ…cych tylko na IPv6." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37 msgid "New setup wizard with bandwidth testing" @@ -8495,25 +7705,25 @@ msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:16 msgid "" -"There are many projects in the I2P world that we are excited about, but " -"not all of them are ready for prime-time. We decided to create a place " -"where we can make those available for anyone interested in trying them " -"out, that will serve as proving grounds for projects that may one day " -"become official I2P products. This place is the `I2P Laboratory`_." +"There are many projects in the I2P world that we are excited about, but not " +"all of them are ready for prime-time. We decided to create a place where we" +" can make those available for anyone interested in trying them out, that " +"will serve as proving grounds for projects that may one day become official " +"I2P products. This place is the `I2P Laboratory`_." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:22 msgid "" -"In the lab we will be offering downoads ready for you to try. Keep in " -"mind that they are not going to be \"release\" quality, and some may not " -"even be \"beta\" quality. We do not offer official support for them. " -"Any of the lab projects may get discontinued at any time." +"In the lab we will be offering downoads ready for you to try. Keep in mind " +"that they are not going to be \"release\" quality, and some may not even be " +"\"beta\" quality. We do not offer official support for them. Any of the " +"lab projects may get discontinued at any time." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:26 msgid "" -"If you are feeling adventurous we invite you to try our ideas. We " -"welcome your feedback at the `I2P Lab Forum`_." +"If you are feeling adventurous we invite you to try our ideas. We welcome " +"your feedback at the `I2P Lab Forum`_." msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2 @@ -8526,28 +7736,17 @@ msgstr "Wersja 0.9.39 z poprawkami wydajnoÅ›ci" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16 msgid "" -"0.9.39 includes extensive changes for the new network database types " -"(proposal 123).\n" -"We've bundled the i2pcontrol plugin as a webapp to support development of" -" RPC applications.\n" +"0.9.39 includes extensive changes for the new network database types (proposal 123).\n" +"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n" "There are numerous performance improvements and bug fixes." -msgstr "" -"Wersja 0.9.39 zawiera znaczÄ…ce zmiany nowych typów bazy danych sieci " -"(propozycja 123). WbudowaliÅ›my wtyczkÄ™ i2pcontrol jako webapp (aplikacjÄ™ " -"internetowÄ… wÄ™zÅ‚a), aby wspomóc rozwój aplikacji RPC. Oprócz tego " -"poprawiono liczne bÅ‚Ä™dy i poprawiono wydajność." +msgstr "Wersja 0.9.39 zawiera znaczÄ…ce zmiany nowych typów bazy danych sieci (propozycja 123). WbudowaliÅ›my wtyczkÄ™ i2pcontrol jako webapp (aplikacjÄ™ internetowÄ… wÄ™zÅ‚a), aby wspomóc rozwój aplikacji RPC. Oprócz tego poprawiono liczne bÅ‚Ä™dy i poprawiono wydajność." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22 msgid "" -"We've removed the midnight and classic themes to reduce the maintenance " -"burden;\n" +"We've removed the midnight and classic themes to reduce the maintenance burden;\n" "previous users of those themes will now see the dark or light theme.\n" "There's also new home page icons, a first step in updating the console." -msgstr "" -"UsunÄ™liÅ›my skórki „północ†i „klasycznÄ…â€, aby uproÅ›cić rozwój, " -"użytkownicy tych skórek zobaczÄ… teraz skórkÄ™ jasnÄ… bÄ…dź ciemnÄ…. Strona " -"startowa konsoli zawiera nowe ikony, jest to pierwszy etap przebudowy " -"konsoli." +msgstr "UsunÄ™liÅ›my skórki „północ†i „klasycznÄ…â€, aby uproÅ›cić rozwój, użytkownicy tych skórek zobaczÄ… teraz skórkÄ™ jasnÄ… bÄ…dź ciemnÄ…. Strona startowa konsoli zawiera nowe ikony, jest to pierwszy etap przebudowy konsoli." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38 msgid "I2PControl RPC plugin bundled as a webapp" @@ -8621,18 +7820,12 @@ msgstr "Wersja 0.9.40 zawiera nowe ikony" msgid "" "0.9.40 includes support for the new encrypted leaseset format.\n" "We disabled the old NTCP 1 transport protocol.\n" -"There's a new SusiDNS import feature, and a new scripted filtering " -"mechanism for incoming connections." -msgstr "" -"Wersja 0.9.40 przynosi wsparcie dla nowego formatu szyfrowanego " -"LeaseSetu. WyÅ‚Ä…czyliÅ›my stary protokół transportowy NTCP 1. Dodano " -"możliwość importu w SusiDNS i nowy skryptowy mechanizm filtrujÄ…cy dla " -"poÅ‚Ä…czeÅ„ przychodzÄ…cych." +"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections." +msgstr "Wersja 0.9.40 przynosi wsparcie dla nowego formatu szyfrowanego LeaseSetu. WyÅ‚Ä…czyliÅ›my stary protokół transportowy NTCP 1. Dodano możliwość importu w SusiDNS i nowy skryptowy mechanizm filtrujÄ…cy dla poÅ‚Ä…czeÅ„ przychodzÄ…cych." #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22 msgid "" -"We've made a lot of improvements to the OSX native installer, and we've " -"updated the IzPack installer as well.\n" +"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n" "The work continues on refreshing the console with new icons.\n" "As usual, we've fixed lots of bugs as well!" msgstr "" @@ -8735,24 +7928,16 @@ msgid "" "::\n" "\n" " What is I2P-bote?\n" -" I2P-bote is a private messaging system built on i2p, which has " -"additional\n" -" features to make it even more difficult to discern information " -"about the\n" -" messages that are transmitted. Because of this, it can be used " -"to transmit\n" -" private messages securely while tolerating high latency and not" -" relying on\n" -" a centralized relay to send messages when the sender goes " -"offline. This is\n" -" in contrast to almost every other popular private messaging " -"system, which\n" -" either require both parties to be online or rely on a semi-" -"trusted service\n" +" I2P-bote is a private messaging system built on i2p, which has additional\n" +" features to make it even more difficult to discern information about the\n" +" messages that are transmitted. Because of this, it can be used to transmit\n" +" private messages securely while tolerating high latency and not relying on\n" +" a centralized relay to send messages when the sender goes offline. This is\n" +" in contrast to almost every other popular private messaging system, which\n" +" either require both parties to be online or rely on a semi-trusted service\n" " which transmits messages on behalf of senders who go offline.\n" "\n" -" or, ELI5: It's used similarly to e-mail, but it suffers from " -"none of e-mail's\n" +" or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n" " privacy defects." msgstr "" @@ -8834,11 +8019,9 @@ msgid "" " character set into binary.\n" "2. Second, take bytes 386 and 387 and convert them to a single\n" " Big-Endian integer.\n" -"3. Add the number you computed from the two bytes in step two to 387. " -"This is\n" +"3. Add the number you computed from the two bytes in step two to 387. This is\n" " the length of the base64 destination.\n" -"4. Take that nummber of bytes from the front of the full destination to " -"get\n" +"4. Take that nummber of bytes from the front of the full destination to get\n" " the destination as a range of bytes.\n" "5. Convert back to a base64 representation using i2p's base64 character\n" " set." @@ -8889,8 +8072,7 @@ msgid "" "\n" "::\n" "\n" -" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-" -"config/i2pbote/local_dest.key" +" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149 @@ -8945,8 +8127,7 @@ msgid "" "\n" "Now that you've got the correct destination for your I2P-Bote node, the\n" "final step is to add yourself to the default peers list for `I2P-Bote\n" -"here <https://github.com/i2p/i2p.i2p-" -"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" +"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" "here. You can do this by forking the repository, adding yourself to the\n" "list with your name commented out, and your 516-char destination\n" "directly below it, like this:" @@ -8959,12 +8140,7 @@ msgid "" "::\n" "\n" " # idk\n" -" QuabT3H5ljZyd-PXCQjvDzdfCec-" -"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-" -"bkSo0gEhB-" -"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA" -"~z0Nus-" -"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" +" QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205 @@ -8985,38 +8161,25 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10 msgid "" -"Although the Java I2P router comes pre-configured with a static web " -"server,\n" -"jetty, to provide the user's first eepSite, many require more " -"sophisticated\n" -"functionality from their web server and would rather create an eepSite " -"with a\n" -"different server. This is of course possible, and actually is really easy" -" once\n" +"Although the Java I2P router comes pre-configured with a static web server,\n" +"jetty, to provide the user's first eepSite, many require more sophisticated\n" +"functionality from their web server and would rather create an eepSite with a\n" +"different server. This is of course possible, and actually is really easy once\n" "you've done it one time." msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18 msgid "" -"Although it is easy to do, there are a few things you should consider " -"before\n" -"doing it. You will want to remove identifying characteristics from your " -"web\n" -"server, like potentially identifying headers and default error pages that" -"\n" -"report the server/distro type. More information about threats to " -"anonymity\n" +"Although it is easy to do, there are a few things you should consider before\n" +"doing it. You will want to remove identifying characteristics from your web\n" +"server, like potentially identifying headers and default error pages that\n" +"report the server/distro type. More information about threats to anonymity\n" "posed by improperly configured applications see:\n" -"`Riseup here: <https://riseup.net/en/security/network-security/tor" -"/onionservices-best-practices>`__,\n" +"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n" "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n" -"`This blog article for some opsec fails: " -"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__," -"\n" -"`and the I2P applications page here " -"<https://geti2p.net/en/docs/applications/supported>`__.\n" -"Although much of this information is expressed for Tor Onion Services, " -"the same\n" +"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n" +"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n" +"Although much of this information is expressed for Tor Onion Services, the same\n" "procedures and principles apply to hosting applications over I2P." msgstr "" @@ -9027,8 +8190,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35 msgid "" "Go to the I2P web interface at 127.0.0.1:7657 and open the\n" -"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links" -" to\n" +"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n" "localhost). Click the button that says \"Tunnel Wizard\" to begin." msgstr "" @@ -9038,8 +8200,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48 msgid "" -"The tunnel wizard is very simple. Since we're setting up an http " -"*server*, all\n" +"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n" "we need to do is select a *server* tunnel." msgstr "" @@ -9049,15 +8210,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60 msgid "" -"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP " -"services.\n" +"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n" "It has filtering and rate-limiting features enabled that are tailored\n" -"specifically to that purpose. A standard tunnel may work as well, but if " -"you\n" -"select a atandard tunnel you'll need to take care of those security " -"features\n" -"yourself. A more in-depth dive into the HTTP Tunnel configuration is " -"available\n" +"specifically to that purpose. A standard tunnel may work as well, but if you\n" +"select a atandard tunnel you'll need to take care of those security features\n" +"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n" "in the next tutorial." msgstr "" @@ -9067,12 +8224,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76 msgid "" -"For your own benefit and ability to remeber and distinguish the what you " -"are\n" -"using the tunnel for, give it a good nickname and description. If you " -"need to\n" -"come back and do more management later, then this is how you will " -"identify the\n" +"For your own benefit and ability to remeber and distinguish the what you are\n" +"using the tunnel for, give it a good nickname and description. If you need to\n" +"come back and do more management later, then this is how you will identify the\n" "tunnel in the hidden services manager." msgstr "" @@ -9082,12 +8236,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90 msgid "" -"In this step, you point the web server at the TCP port where your web " -"server is\n" -"listening. Since most web servers listen on port 80 or port 8080, the " -"example\n" -"shows that. If you use alternate ports or virtual machines or containers " -"to\n" +"In this step, you point the web server at the TCP port where your web server is\n" +"listening. Since most web servers listen on port 80 or port 8080, the example\n" +"shows that. If you use alternate ports or virtual machines or containers to\n" "isolate your web services, you may need to adjust the host, port, or both." msgstr "" @@ -9105,12 +8256,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115 msgid "" -"Finally, take a look at the settings you have selected. If you approve, " -"save\n" -"them. If you did not choose to start the tunnel automatically, go to the " -"hidden\n" -"services manager and start it manually when you wish to make your service" -"\n" +"Finally, take a look at the settings you have selected. If you approve, save\n" +"them. If you did not choose to start the tunnel automatically, go to the hidden\n" +"services manager and start it manually when you wish to make your service\n" "available." msgstr "" @@ -9120,10 +8268,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129 msgid "" -"I2P provides a detailed panel for configuring the http server tunnel in " -"custom\n" -"ways. I'll finish this tutorial by walking through all of them. " -"Eventually." +"I2P provides a detailed panel for configuring the http server tunnel in custom\n" +"ways. I'll finish this tutorial by walking through all of them. Eventually." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4 @@ -9136,38 +8282,28 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10 msgid "" -"This blog post is intended as a general guide to running a mirror of a " -"clear-net\n" -"service as an eepSite. It elaborates on the previous blog post about " -"basic\n" +"This blog post is intended as a general guide to running a mirror of a clear-net\n" +"service as an eepSite. It elaborates on the previous blog post about basic\n" "I2PTunnel tunnels." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16 msgid "" -"Unfortunately, it's probably impossible to *completely* cover all " -"possible cases\n" -"of making an existing web site available as an eepSite, there's simply " -"too\n" +"Unfortunately, it's probably impossible to *completely* cover all possible cases\n" +"of making an existing web site available as an eepSite, there's simply too\n" "diverse an array of server-side software, not to mention the in-practice\n" -"peculiarities of any particular deployment of software. Instead, I'm " -"going to\n" -"try and convey, as specifically as possible, the general process " -"preparing a\n" +"peculiarities of any particular deployment of software. Instead, I'm going to\n" +"try and convey, as specifically as possible, the general process preparing a\n" "service for deployment to the eepWeb or other hidden services." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25 msgid "" -"Much of this guide will be treating the reader as a conversational " -"participant,\n" -"in particular If I really mean it I will address the reader directly(i.e." -" using\n" -"\"you\" instead of \"one\") and I'll frequently head sections with " -"questions I think\n" +"Much of this guide will be treating the reader as a conversational participant,\n" +"in particular If I really mean it I will address the reader directly(i.e. using\n" +"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n" "the reader might be asking. This is, after all, a \"process\" that an\n" -"administrator must consider themselves \"involved\" in just like hosting " -"any other\n" +"administrator must consider themselves \"involved\" in just like hosting any other\n" "service." msgstr "" @@ -9177,16 +8313,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37 msgid "" -"While it would be wonderful, it's probably impossible for me to put " -"specific\n" -"instructions for every single kind of software that one might use to host" -" web\n" -"sites. As such, this tutorial requires some assumptions on the part of " -"the\n" -"writer and some critical thinking and common sense on the part of the " -"reader.\n" -"To be clear, **I have assumed that the person following this tutorial " -"is**\n" +"While it would be wonderful, it's probably impossible for me to put specific\n" +"instructions for every single kind of software that one might use to host web\n" +"sites. As such, this tutorial requires some assumptions on the part of the\n" +"writer and some critical thinking and common sense on the part of the reader.\n" +"To be clear, **I have assumed that the person following this tutorial is**\n" "**already operating a clear-web service linkable to a real identity or**\n" "**organization** and thus is simply offering anonymous access and not\n" "anonymizing themselves." @@ -9194,22 +8325,17 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48 msgid "" -"Thus, **it makes no attempt whatsoever to anonymize** a connection from " -"one\n" -"server to another. If you want to run a new, un-linkable hidden service " -"that\n" -"makes server-to-server connections, additional steps will be required and" -" will\n" +"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n" +"server to another. If you want to run a new, un-linkable hidden service that\n" +"makes server-to-server connections, additional steps will be required and will\n" "be covered in another tutorial." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55 msgid "" "That said: If you can be sure that a *brand new service* which is *not*\n" -"*available to the clear-web* will never make a server-to-server " -"connection and\n" -"will not leak server metadata in responses to clients, then services " -"configured\n" +"*available to the clear-web* will never make a server-to-server connection and\n" +"will not leak server metadata in responses to clients, then services configured\n" "in this way will be anonymous." msgstr "" @@ -9223,16 +8349,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68 msgid "" -"In practice, your web service probably uses a number of things to enhance" -" it's\n" -"reliability and security. These things could be proxies, reverse proxies," -"\n" -"containers, tunnels, Intrusion Detection Systems, rate-limiters, load " -"balancers,\n" -"among many other things. When you get started, you should go through your" -"\n" -"deployment and determine which software you are using, and what you are " -"using it\n" +"In practice, your web service probably uses a number of things to enhance it's\n" +"reliability and security. These things could be proxies, reverse proxies,\n" +"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n" +"among many other things. When you get started, you should go through your\n" +"deployment and determine which software you are using, and what you are using it\n" "for." msgstr "" @@ -9242,8 +8363,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80 msgid "" -"These questions should help you evaluate what parts of your software " -"stack are\n" +"These questions should help you evaluate what parts of your software stack are\n" "relevant to your I2P eepSite." msgstr "" @@ -9253,16 +8373,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88 msgid "" -"If you are using software which alters the behavior of traffic based on " -"the IP\n" -"address of the sender, these things will probably not work with I2P, or " -"may work\n" -"in complicated or unexpected ways. This is because the address will " -"usually be\n" -"the localhost, or at least the host where your I2P router is running. " -"Software\n" -"which sometimes does things based on IP addresses could be Fail2Ban, " -"iptables,\n" +"If you are using software which alters the behavior of traffic based on the IP\n" +"address of the sender, these things will probably not work with I2P, or may work\n" +"in complicated or unexpected ways. This is because the address will usually be\n" +"the localhost, or at least the host where your I2P router is running. Software\n" +"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n" "and similar applications." msgstr "" @@ -9272,10 +8387,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100 msgid "" -"Some software may be configured to add information to the traffic it " -"handles.\n" -"Obviously, if this information is identifying it should not be part of " -"the chain\n" +"Some software may be configured to add information to the traffic it handles.\n" +"Obviously, if this information is identifying it should not be part of the chain\n" "of services that is exposed to the I2P network." msgstr "" @@ -9287,37 +8400,27 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109 msgid "" -"Some software may also draw from remote resources, to find up-to-date " -"rules and\n" -"block lists which can be used to prevent attacks. Some of these might be " -"useful\n" -"as part of the service that is exposed to I2P, but you should make sure " -"that the\n" -"rules are applicable and that a rules update cannot be triggered as a " -"result of\n" -"a normal client request. This would create a server-to-server " -"communication\n" +"Some software may also draw from remote resources, to find up-to-date rules and\n" +"block lists which can be used to prevent attacks. Some of these might be useful\n" +"as part of the service that is exposed to I2P, but you should make sure that the\n" +"rules are applicable and that a rules update cannot be triggered as a result of\n" +"a normal client request. This would create a server-to-server communication\n" "which could reveal the timing of an I2P communication to a third party." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118 msgid "" -"Step two: Determine which port to Forward to I2P and Optionally locate " -"your TLS certificate" +"Step two: Determine which port to Forward to I2P and Optionally locate your " +"TLS certificate" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121 msgid "" -"Now you've gathered all the information that you will require to forward " -"your\n" -"service to I2P. Once you've selected the point at which you would like to" -" make\n" -"your site available to I2P, you will need to note the port you wish to " -"foward.\n" -"In simple scenarios, this will probably just be port 80 or port 8080. In " -"more\n" -"sophisticated scenarios, this might be a reverse proxy or something like " -"that.\n" +"Now you've gathered all the information that you will require to forward your\n" +"service to I2P. Once you've selected the point at which you would like to make\n" +"your site available to I2P, you will need to note the port you wish to foward.\n" +"In simple scenarios, this will probably just be port 80 or port 8080. In more\n" +"sophisticated scenarios, this might be a reverse proxy or something like that.\n" "Make a note of the port." msgstr "" @@ -9327,18 +8430,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133 msgid "" -"Should you be a non-anonymous organization that wishes to provide " -"enhanced\n" -"privacy to your users by providing a hidden service, you may wish to " -"establish\n" -"a common identity between versions of your site. However, since we can't " -"add\n" -"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we " -"have to do\n" -"this in another way. To do this, **even if you are forwarding the HTTP " -"port**\n" -"**and not HTTPS**, make a note of the location of your TLS certificate " -"for use\n" +"Should you be a non-anonymous organization that wishes to provide enhanced\n" +"privacy to your users by providing a hidden service, you may wish to establish\n" +"a common identity between versions of your site. However, since we can't add\n" +"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n" +"this in another way. To do this, **even if you are forwarding the HTTP port**\n" +"**and not HTTPS**, make a note of the location of your TLS certificate for use\n" "in the final step." msgstr "" @@ -9348,10 +8445,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146 msgid "" -"Congratulations! You've completed the most difficult part. From here on, " -"the\n" -"decisions you must make, and the consequences that they will have, are " -"much\n" +"Congratulations! You've completed the most difficult part. From here on, the\n" +"decisions you must make, and the consequences that they will have, are much\n" "more straightforward and easy to enumerate. Such is the beauty of a\n" "cryptographically secure network layer like I2P!" msgstr "" @@ -9363,20 +8458,13 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158 msgid "" "For eepSites, you will need to create an HTTP Server Tunnel. This is\n" -"an I2P destination with a few special features for hosting HTTP services " -"to\n" -"enable things like rate-limiting, filtering, and the inclusion of headers" -" to\n" -"identify the destination of the client to the server. These enable " -"flexibility\n" -"in how you handle connections in terms of load-balancing and rate-" -"limiting on\n" -"a case-by-case basis, among other things. Explore these options and how " -"they\n" -"relate to the applications which you considered in step one, even though " -"a very\n" -"simple setup is easy, larger sites may benefit from taking advantage of " -"these\n" +"an I2P destination with a few special features for hosting HTTP services to\n" +"enable things like rate-limiting, filtering, and the inclusion of headers to\n" +"identify the destination of the client to the server. These enable flexibility\n" +"in how you handle connections in terms of load-balancing and rate-limiting on\n" +"a case-by-case basis, among other things. Explore these options and how they\n" +"relate to the applications which you considered in step one, even though a very\n" +"simple setup is easy, larger sites may benefit from taking advantage of these\n" "features." msgstr "" @@ -9386,98 +8474,70 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173 msgid "" -"If you've configured a reverse proxy or an SSH tunnel before, then the " -"general\n" +"If you've configured a reverse proxy or an SSH tunnel before, then the general\n" "idea here should be very familiar to you. I2PTunnel, in essence, is just\n" -"forwarding ports from the host to the I2P Network. To set this up using " -"the web\n" +"forwarding ports from the host to the I2P Network. To set this up using the web\n" "interface, go to the I2PTunnel configuration page." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180 msgid "" -"At the bottom of the \"I2P Hidden Services\" section of the page, select " -"an HTTP\n" +"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n" "Service from the drop-down and click \"Create.\"" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189 msgid "" -"It will immediately drop you into the granular tunnel configuration page," -" which\n" -"we're about to explore from top-to-bottom. The first, most essential " -"settings\n" -"are the tunnel name and the target host:port. **The target host:port is**" -"\n" -"**the place where you input the address of the service you are forwarding" -" to**\n" -"**I2P**. Once you've configured that, your web site will become available" -" over\n" +"It will immediately drop you into the granular tunnel configuration page, which\n" +"we're about to explore from top-to-bottom. The first, most essential settings\n" +"are the tunnel name and the target host:port. **The target host:port is**\n" +"**the place where you input the address of the service you are forwarding to**\n" +"**I2P**. Once you've configured that, your web site will become available over\n" "i2p. However, there are probably a few things that we can improve." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202 msgid "" -"Next, you may want to pick a hostname to use for your eepSite. This " -"hostname\n" -"doesn't need to be universally unique, for now, it will only be used " -"locally.\n" -"We'll publish it to an address helper later. **If** the *Local " -"Destination*\n" -"field isn't populated with your Base64 Destination yet, you should scroll" -" down\n" +"Next, you may want to pick a hostname to use for your eepSite. This hostname\n" +"doesn't need to be universally unique, for now, it will only be used locally.\n" +"We'll publish it to an address helper later. **If** the *Local Destination*\n" +"field isn't populated with your Base64 Destination yet, you should scroll down\n" "to the bottom, save the tunnel configuration, and return to the tunnel\n" "configuration." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215 msgid "" -"A little further down the configuration page, the tunnel options are " -"available.\n" -"Since you've got a site which is not intended to be anonymous, but rather" -" to\n" -"provide anonymous access to others by an alternate gateway, it may be " -"good to\n" +"A little further down the configuration page, the tunnel options are available.\n" +"Since you've got a site which is not intended to be anonymous, but rather to\n" +"provide anonymous access to others by an alternate gateway, it may be good to\n" "reduce the number of hops the tunnel takes on the I2P network." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226 msgid "" -"Next are the encrypted leaseset options. You can probably leave these as " -"the\n" -"defaults, since your site isn't anonymous it probably doesn't need " -"features like\n" -"blinding or encrypted leasesets. If you were to choose encrypted " -"leasesets, you\n" -"would not be accessible to anyone unless you shared a key with them in " -"advance." +"Next are the encrypted leaseset options. You can probably leave these as the\n" +"defaults, since your site isn't anonymous it probably doesn't need features like\n" +"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n" +"would not be accessible to anyone unless you shared a key with them in advance." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237 msgid "" -"The next few parts may be especially useful to you if you run a high-" -"traffic\n" -"site or find yourself subject to DDOS attacks. Here you can configure " -"various\n" +"The next few parts may be especially useful to you if you run a high-traffic\n" +"site or find yourself subject to DDOS attacks. Here you can configure various\n" "kinds of connection limits." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247 msgid "" -"After that, there are a few other ways of filtering connections by client" -"\n" -"characteristics. First, you can block access via inproxies like I2P.to " -"and\n" -"similar. Since you have a clearnet presence already, changing this may be" -" better\n" -"if you want to encourage I2P users to only use your eepSite. You can also" -" block\n" -"accesses via specific user-agents, for instance blocking wget may be " -"helpful if\n" -"you want to prevent spidering. Finally, and of particular interest to " -"Fail2Ban\n" -"users, the \"Unique local address per client\" will give each client it's" -" own\n" +"After that, there are a few other ways of filtering connections by client\n" +"characteristics. First, you can block access via inproxies like I2P.to and\n" +"similar. Since you have a clearnet presence already, changing this may be better\n" +"if you want to encourage I2P users to only use your eepSite. You can also block\n" +"accesses via specific user-agents, for instance blocking wget may be helpful if\n" +"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n" +"users, the \"Unique local address per client\" will give each client it's own\n" "local IP address instead of them all appearing to the server to be from\n" "127.0.0.1." msgstr "" @@ -9488,10 +8548,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271 msgid "" -"Lastly, you can set up an advanced filter definition. Writing filters is " -"beyond\n" -"what I'm prepared to do in this document, for more information see the " -"format\n" +"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n" +"what I'm prepared to do in this document, for more information see the format\n" "specification for now." msgstr "" @@ -9501,22 +8559,16 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284 msgid "" -"One interesting thing that I2P can do is host the same site on multiple " -"servers\n" -"at the same time transparently, which is referred to as \"Multihoming.\" " -"In order\n" -"to multihome your application, you will need to return to the tunnel menu" -" and\n" -"change the location of your private key file to it's own, non-shared " -"location." +"One interesting thing that I2P can do is host the same site on multiple servers\n" +"at the same time transparently, which is referred to as \"Multihoming.\" In order\n" +"to multihome your application, you will need to return to the tunnel menu and\n" +"change the location of your private key file to it's own, non-shared location." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295 msgid "" -"When you're done, copy the new key file for your new multihomed service " -"to a\n" -"storage device. Now, you can re-produce your service/tunnel configuration" -" with\n" +"When you're done, copy the new key file for your new multihomed service to a\n" +"storage device. Now, you can re-produce your service/tunnel configuration with\n" "those same keys on any I2P router and increase your service's redundancy." msgstr "" @@ -9526,11 +8578,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304 msgid "" -"Since you're running an anonymously accessible instance of an existing " -"clear-net\n" +"Since you're running an anonymously accessible instance of an existing clear-net\n" "service, you'll probably want to leverage some existing form of trust to\n" -"distribute your eepSite URL, like a TLS Certificate signed by a " -"recognized and\n" +"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n" "reputable authority. What can I say we live in an imperfect world." msgstr "" @@ -9540,29 +8590,23 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316 msgid "" -"The simplest way to provide a link to your eepSite using an existing site" -" to\n" -"distribute the link is to distribute a so-called \"Base32\" address. The " -"Base32\n" -"address is the hash of the public key of your I2P destination, so it " -"cannot be\n" -"forged if it is provided by a reliable source. In the case of a clear-net" -" site\n" +"The simplest way to provide a link to your eepSite using an existing site to\n" +"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n" +"address is the hash of the public key of your I2P destination, so it cannot be\n" +"forged if it is provided by a reliable source. In the case of a clear-net site\n" "with a hidden service presence, one of those places is likely to be that\n" "clear-net site." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325 msgid "" -"Your base32 address is visible on the main i2ptunnel configuration page " -"and it\n" +"Your base32 address is visible on the main i2ptunnel configuration page and it\n" "looks like this:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334 msgid "" -"Your users can copy-and-paste this link directly into their I2P browsers " -"and\n" +"Your users can copy-and-paste this link directly into their I2P browsers and\n" "it will just work, no additional configuration required." msgstr "" @@ -9572,17 +8616,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342 msgid "" -"You can also distribute a human-readable link to suggest to your " -"potential users\n" -"by taking advantage of I2P's \"Address Book\" feature, which allows the " -"users to\n" +"You can also distribute a human-readable link to suggest to your potential users\n" +"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n" "decide to assign a human-readable domain name to your cryptographically\n" -"assured identity. You can do this by distributing a specially crafted " -"link\n" -"containing the domain name that you want to suggest, followed by a slash," -"\n" -"followed by ?i2paddresshelper=, followed by the Local Destination of the " -"tunnel\n" +"assured identity. You can do this by distributing a specially crafted link\n" +"containing the domain name that you want to suggest, followed by a slash,\n" +"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n" "you just created, which you can see here:" msgstr "" @@ -9592,14 +8631,10 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364 msgid "" -"I keep saying suggest because when the such a link is visited, I2P asks " -"for the\n" -"user's consent to add this human-readable name to the user's local " -"address book.\n" -"That means there is no expectation that this domain be universally agreed" -" upon\n" -"by all visitors on the I2P network, whereas in the case of base32 " -"addresses,\n" +"I keep saying suggest because when the such a link is visited, I2P asks for the\n" +"user's consent to add this human-readable name to the user's local address book.\n" +"That means there is no expectation that this domain be universally agreed upon\n" +"by all visitors on the I2P network, whereas in the case of base32 addresses,\n" "the opposite is true." msgstr "" @@ -9609,16 +8644,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375 msgid "" -"Nonetheless, there do exist publicly available address subscription " -"feeds, and\n" -"special services for discovering new human-readable addresses, such as " -"no.i2p,\n" -"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or " -"Jump\n" -"Services, and can also be subscribed to automatically. This may be " -"espescially\n" -"helpful to users of your service who wish to acquire the address without " -"leaving\n" +"Nonetheless, there do exist publicly available address subscription feeds, and\n" +"special services for discovering new human-readable addresses, such as no.i2p,\n" +"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n" +"Services, and can also be subscribed to automatically. This may be espescially\n" +"helpful to users of your service who wish to acquire the address without leaving\n" "I2P or visiting your clearnet service." msgstr "" @@ -9636,10 +8666,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405 msgid "" -"Most of the security issues of hosting Tor hidden services also apply to " -"I2P. It\n" -"would be advisable to take advantage of their resources as well as this " -"one:" +"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n" +"would be advisable to take advantage of their resources as well as this one:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410 @@ -9692,27 +8720,19 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10 msgid "" -"This is a tutorial on how to set up and tweak an I2P tunnel in order to " -"use it\n" -"to access an SSH server remotely, using either I2P or i2pd. For now, it " -"assumes\n" -"you will install your SSH server from a package manager and that it's " -"running\n" +"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n" +"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n" +"you will install your SSH server from a package manager and that it's running\n" "as a service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17 msgid "" -"Considerations: In this guide, I'm assuming a few things. They will need " -"to be\n" -"adjusted depending on the complications that arise in your particular " -"setup,\n" -"especially if you use VM's or containers for isolation. This assumes that" -" the\n" -"I2P router and the ssh server are running on the same localhost. You " -"should be\n" -"using newly-generated SSH host keys, either by using a freshly installed " -"sshd,\n" +"Considerations: In this guide, I'm assuming a few things. They will need to be\n" +"adjusted depending on the complications that arise in your particular setup,\n" +"especially if you use VM's or containers for isolation. This assumes that the\n" +"I2P router and the ssh server are running on the same localhost. You should be\n" +"using newly-generated SSH host keys, either by using a freshly installed sshd,\n" "or by deleting old keys and forcing their re-generation. For example:" msgstr "" @@ -9727,9 +8747,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41 msgid "" -"Using java I2P's web interface, navigate to the (Links to your Router " -"Console)\\ `Hidden Services Manager " -"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n" +"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n" "and start the tunnel wizard." msgstr "" @@ -9740,15 +8758,13 @@ msgstr "Kreator Tunelu" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49 msgid "" -"Since you are setting up this tunnel for the SSH server, you need to " -"select the\n" +"Since you are setting up this tunnel for the SSH server, you need to select the\n" "\"Server\" tunnel type." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58 msgid "" -"You should fine-tune it later, but the Standard tunnel type is easiest to" -" start\n" +"You should fine-tune it later, but the Standard tunnel type is easiest to start\n" "with." msgstr "" @@ -9771,23 +8787,17 @@ msgstr "Ustawienia zaawansowane" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92 msgid "" -"Now head back over the the Hidden Services Manager, and look over the " -"available\n" -"advanced settings. One thing you'll definitely want to change is to set " -"it up\n" +"Now head back over the the Hidden Services Manager, and look over the available\n" +"advanced settings. One thing you'll definitely want to change is to set it up\n" "for interactive connections intstead of bulk connections." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102 msgid "" -"Besides that, these other options can affect performance when accessing " -"your SSH\n" -"server. If you aren't that concerned about your anonymity, then you could" -" reduce\n" -"the number of hops you take. If you have trouble with speed, a higher " -"tunnel\n" -"count might help. A few backup tunnels are probably a good idea. You " -"might have\n" +"Besides that, these other options can affect performance when accessing your SSH\n" +"server. If you aren't that concerned about your anonymity, then you could reduce\n" +"the number of hops you take. If you have trouble with speed, a higher tunnel\n" +"count might help. A few backup tunnels are probably a good idea. You might have\n" "to dial-it-in a bit." msgstr "" @@ -9797,10 +8807,8 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118 msgid "" -"Another interesting setting, especially if you choose to run a high " -"number of\n" -"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels " -"that run\n" +"Another interesting setting, especially if you choose to run a high number of\n" +"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n" "when the serve has experienced extended inactivity." msgstr "" @@ -9811,12 +8819,9 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131 msgid "" -"With i2pd, all configuration is done with files instead of via a web " -"interface.\n" -"In order to configure an SSH Service tunnel for i2pd, tweak the following" -"\n" -"example settings to your anonymity and performance needs and copy them " -"into\n" +"With i2pd, all configuration is done with files instead of via a web interface.\n" +"In order to configure an SSH Service tunnel for i2pd, tweak the following\n" +"example settings to your anonymity and performance needs and copy them into\n" "tunnels.conf" msgstr "" @@ -9830,21 +8835,16 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158 msgid "" -"Depending on how you want to access your SSH Server, you may want to make" -" a few\n" -"changes to the settings. Besides the obvious SSH hardening stuff you " -"should do\n" -"on all SSH servers(Public-Key Authentication, no login as root, etc), if " -"you\n" -"don't want your SSH server to listen on any addresses except your server " -"tunnel,\n" +"Depending on how you want to access your SSH Server, you may want to make a few\n" +"changes to the settings. Besides the obvious SSH hardening stuff you should do\n" +"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n" +"don't want your SSH server to listen on any addresses except your server tunnel,\n" "you should change AddressFamily to inet and ListenAddress to 127.0.0.1." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171 msgid "" -"If you choose to use a port other than 22 for your SSH server, you will " -"need to\n" +"If you choose to use a port other than 22 for your SSH server, you will need to\n" "change the port in your I2P tunnel configuration." msgstr "" @@ -9854,27 +8854,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179 msgid "" -"You will need to be able to see the I2P router console of the SSH server " -"in\n" -"order to configure your client connection. One neat thing about this " -"setup is\n" +"You will need to be able to see the I2P router console of the SSH server in\n" +"order to configure your client connection. One neat thing about this setup is\n" "that the initial connection to the I2P tunnel is authenticated, somewhat\n" -"reducing the risk of your initial connection to the SSH server being " -"MITM'ed,\n" +"reducing the risk of your initial connection to the SSH server being MITM'ed,\n" "as is a risk in Trust-On-First-Use scenarios." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197 msgid "" -"First, start the tunnel configuration wizard from the hidden services " -"manager\n" +"First, start the tunnel configuration wizard from the hidden services manager\n" "and select a client tunnel." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206 msgid "" -"Next, select the standard tunnel type. You will fine-tune this " -"configuration\n" +"Next, select the standard tunnel type. You will fine-tune this configuration\n" "later." msgstr "" @@ -9884,27 +8879,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223 msgid "" -"This is the only slightly tricky part. Go to the hidden services manager " -"of the\n" -"I2P router console and find the base64 \"local destination\" of the SSH " -"server\n" -"tunnel. You'll need to find a way to copy this information into the next " -"step.\n" +"This is the only slightly tricky part. Go to the hidden services manager of the\n" +"I2P router console and find the base64 \"local destination\" of the SSH server\n" +"tunnel. You'll need to find a way to copy this information into the next step.\n" "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n" "should be sufficient for most people." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235 msgid "" -"Once you've found the base64 destination you want to connect to " -"transmitted to\n" +"Once you've found the base64 destination you want to connect to transmitted to\n" "your client device, then paste it into the client destination field." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244 msgid "" -"Lastly, set a local port to connect your ssh client to. This will local " -"port\n" +"Lastly, set a local port to connect your ssh client to. This will local port\n" "will be connected to the base64 destination and thus the SSH server." msgstr "" @@ -9914,19 +8904,15 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266 msgid "" -"Like before, you'll want to change the settings to be optimized for " -"interactive\n" -"connections. Additionally, if you want to set up client whiteliting on " -"the\n" -"server, you should check the \"Generate key to enable persistent client " -"tunnel\n" +"Like before, you'll want to change the settings to be optimized for interactive\n" +"connections. Additionally, if you want to set up client whiteliting on the\n" +"server, you should check the \"Generate key to enable persistent client tunnel\n" "identity\" radial button." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282 msgid "" -"You can set this up by adding the following lines to your tunnels.conf " -"and\n" +"You can set this up by adding the following lines to your tunnels.conf and\n" "adjust it for your performance/anonymity needs." msgstr "" @@ -9940,14 +8926,10 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309 msgid "" -"There are lots of ways to set up an SSH client to connect to your server " -"on I2P,\n" -"but there are a few things you should do to secure your SSH client for " -"anonymous\n" -"use. First, you should configure it to only identify itself to SSH server" -" with\n" -"a single, specific key so that you don't risk contaminating your " -"anonymous and\n" +"There are lots of ways to set up an SSH client to connect to your server on I2P,\n" +"but there are a few things you should do to secure your SSH client for anonymous\n" +"use. First, you should configure it to only identify itself to SSH server with\n" +"a single, specific key so that you don't risk contaminating your anonymous and\n" "non-anonymous SSH connections." msgstr "" @@ -9957,8 +8939,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328 msgid "" -"Alternatively, you could make a .bash_alias entry to enforce your options" -" and\n" +"Alternatively, you could make a .bash_alias entry to enforce your options and\n" "automatically connect to I2P. You get the idea, you need to enforce\n" "IdentitiesOnly and provide an identity file." msgstr "" @@ -9969,26 +8950,21 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343 msgid "" -"This is more-or-less optional, but it's pretty cool and will prevent " -"anyone who\n" -"happens to come across your destination from being able to tell you are " -"hosting\n" +"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n" +"happens to come across your destination from being able to tell you are hosting\n" "an SSH service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349 msgid "" -"First, retrieve the persistent client tunnel destination and transmit it " -"to the\n" +"First, retrieve the persistent client tunnel destination and transmit it to the\n" "server." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358 msgid "" -"Add the client's base64 destination to the server's destination " -"whitelist. Now\n" -"you'll only be able to connect to the server tunnel from that specific " -"client\n" +"Add the client's base64 destination to the server's destination whitelist. Now\n" +"you'll only be able to connect to the server tunnel from that specific client\n" "tunnel and no one else will be able to connect to that destination." msgstr "" @@ -10006,28 +8982,19 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12 msgid "" -"One of the best features of I2P, in my opinion, is it's SAM API, which " -"can be\n" -"used to build a bridge between I2P and your application or language of " -"choice.\n" -"Currently, dozens of SAM libraries exist for a variety of languages, " -"including:" +"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n" +"used to build a bridge between I2P and your application or language of choice.\n" +"Currently, dozens of SAM libraries exist for a variety of languages, including:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32 msgid "" -"If you're using any of these languages, you may be able to port your " -"application\n" -"to I2P already, using an existing library. That's not what this tutorial " -"is\n" -"about, though. This tutorial is about what to do if you want to create a " -"SAM\n" -"library in a new language. In this tutorial, I will implement a new SAM " -"library\n" -"in Java. I chose Java because there isn't a Java library that connects " -"you to\n" -"SAM yet, because of Java's use in Android, and because it's a language " -"almost\n" +"If you're using any of these languages, you may be able to port your application\n" +"to I2P already, using an existing library. That's not what this tutorial is\n" +"about, though. This tutorial is about what to do if you want to create a SAM\n" +"library in a new language. In this tutorial, I will implement a new SAM library\n" +"in Java. I chose Java because there isn't a Java library that connects you to\n" +"SAM yet, because of Java's use in Android, and because it's a language almost\n" "everybody has at least a *little* experience with, so hopefully you can\n" "translate it into a language of your choice." msgstr "" @@ -10038,10 +9005,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46 msgid "" -"How you set up your own library will vary depending on the language you " -"wish\n" -"to use. For this example library, we'll be using java so we can create a " -"library\n" +"How you set up your own library will vary depending on the language you wish\n" +"to use. For this example library, we'll be using java so we can create a library\n" "like this:" msgstr "" @@ -10055,10 +9020,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69 msgid "" -"There are a few pieces of data that almost any SAM library should " -"probably\n" -"manage. It will at least need to store the address of the SAM Bridge you " -"intend\n" +"There are a few pieces of data that almost any SAM library should probably\n" +"manage. It will at least need to store the address of the SAM Bridge you intend\n" "to use and the signature type you wish to use." msgstr "" @@ -10068,8 +9031,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78 msgid "" -"I prefer to store the SAM address as a String and an Integer, and re-" -"combine\n" +"I prefer to store the SAM address as a String and an Integer, and re-combine\n" "them in a function at runtime." msgstr "" @@ -10079,15 +9041,11 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94 msgid "" -"The valid signature types for an I2P Tunnel are DSA_SHA1, " -"ECDSA_SHA256_P256,\n" +"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n" "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n" -"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if " -"you\n" -"implement at least SAM 3.1. In java, the 'enum' datastructure lends " -"itself to\n" -"this task, as it is intended to contain a group of constants. Add the " -"enum, and\n" +"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n" +"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n" +"this task, as it is intended to contain a group of constants. Add the enum, and\n" "an instance of the enum, to your java class definition." msgstr "" @@ -10098,8 +9056,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117 msgid "" "That takes care of reliably storing the signature type in use by the SAM\n" -"connection, but you've still got to retrieve it as a string to " -"communicate it\n" +"connection, but you've still got to retrieve it as a string to communicate it\n" "to the bridge." msgstr "" @@ -10109,10 +9066,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156 msgid "" -"Once that's done, begin creating your constructor. Note that we've given " -"our\n" -"library defaults which will be useful in default situations on all " -"existing I2P\n" +"Once that's done, begin creating your constructor. Note that we've given our\n" +"library defaults which will be useful in default situations on all existing I2P\n" "routers so far." msgstr "" @@ -10122,14 +9077,10 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173 msgid "" -"Finally, the good part. Interaction with the SAM bridge is done by " -"sending a\n" -"\"command\" to the address of the SAM bridge, and you can parse the " -"result of the\n" -"command as a set of string-based key-value pairs. So bearing that in " -"mind, let's\n" -"estabish a read-write connection to the SAM Address we defined before, " -"then\n" +"Finally, the good part. Interaction with the SAM bridge is done by sending a\n" +"\"command\" to the address of the SAM bridge, and you can parse the result of the\n" +"command as a set of string-based key-value pairs. So bearing that in mind, let's\n" +"estabish a read-write connection to the SAM Address we defined before, then\n" "write a \"CommandSAM\" Function and a reply parser." msgstr "" @@ -10139,17 +9090,14 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184 msgid "" -"We're communicating with SAM via a Socket, so in order to connect to, " -"read from,\n" -"and write to the socket, you'll need to create the following private " -"variables\n" +"We're communicating with SAM via a Socket, so in order to connect to, read from,\n" +"and write to the socket, you'll need to create the following private variables\n" "in the Jsam class:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196 msgid "" -"You will also want to instantiate those variables in your Constructors by" -"\n" +"You will also want to instantiate those variables in your Constructors by\n" "creating a function to do so." msgstr "" @@ -10159,23 +9107,17 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222 msgid "" -"Now you're all set up to finally start talking to SAM. In order to keep " -"things\n" -"nicely organized, let's create a function which sends a single command to" -" SAM,\n" -"terminated by a newline, and which returns a Reply object, which we will " -"create\n" +"Now you're all set up to finally start talking to SAM. In order to keep things\n" +"nicely organized, let's create a function which sends a single command to SAM,\n" +"terminated by a newline, and which returns a Reply object, which we will create\n" "in the next step:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241 msgid "" -"Note that we are using the writer and reader we created from the socket " -"in the\n" -"previous step as our inputs and outputs to the socket. When we get a " -"reply from\n" -"the reader, we pass the string to the Reply constructor, which parses it " -"and\n" +"Note that we are using the writer and reader we created from the socket in the\n" +"previous step as our inputs and outputs to the socket. When we get a reply from\n" +"the reader, we pass the string to the Reply constructor, which parses it and\n" "returns the Reply object." msgstr "" @@ -10186,37 +9128,29 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253 msgid "" "In order to more easily handle replies, we'll use a Reply object to\n" -"automatically parse the results we get from the SAM bridge. A reply has " -"at least\n" -"a topic, a type, and a result, as well as an arbitrary number of key-" -"value\n" +"automatically parse the results we get from the SAM bridge. A reply has at least\n" +"a topic, a type, and a result, as well as an arbitrary number of key-value\n" "pairs." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268 msgid "" -"As you can see, we will be storing the \"result\" as an enum, " -"REPLY_TYPES. This\n" -"enum contains all the possible reply results which the SAM bridge might " -"respond\n" +"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n" +"enum contains all the possible reply results which the SAM bridge might respond\n" "with." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335 msgid "" -"Now let's create our constructor, which takes the reply string recieved " -"from the\n" -"socket as a parameter, parses it, and uses the information to set up the " -"reply\n" -"object. The reply is space-delimited, with key-value pairs joined by an " -"equal\n" +"Now let's create our constructor, which takes the reply string recieved from the\n" +"socket as a parameter, parses it, and uses the information to set up the reply\n" +"object. The reply is space-delimited, with key-value pairs joined by an equal\n" "sign and terminated by a newline." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364 msgid "" -"Lastly, for the sake of convenience, let's give the reply object a " -"toString()\n" +"Lastly, for the sake of convenience, let's give the reply object a toString()\n" "function which returns a string representation of the Reply object." msgstr "" @@ -10226,30 +9160,21 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379 msgid "" -"Now we're ready to establish communication with SAM by sending a " -"\"Hello\"\n" -"message. If you're writing a new SAM library, you should probably target " -"at\n" -"least SAM 3.1, since it's available in both I2P and i2pd and introduces " -"support\n" +"Now we're ready to establish communication with SAM by sending a \"Hello\"\n" +"message. If you're writing a new SAM library, you should probably target at\n" +"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n" "for the SIGNATURE_TYPE parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397 msgid "" -"As you can see, we use the CommandSAM function we created before to send " -"the\n" -"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This " -"tells\n" -"SAM that you want to start communicating with the API, and that you know " -"how\n" +"As you can see, we use the CommandSAM function we created before to send the\n" +"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n" +"SAM that you want to start communicating with the API, and that you know how\n" "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n" -"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass" -" to\n" -"the Reply constructor to get a valid Reply object. From now on, we can " -"use our\n" -"CommandSAM function and Reply object to deal with all our communication " -"across\n" +"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n" +"the Reply constructor to get a valid Reply object. From now on, we can use our\n" +"CommandSAM function and Reply object to deal with all our communication across\n" "the SAM bridge." msgstr "" @@ -10259,66 +9184,46 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423 msgid "" -"Now that you've negotiated your connection to SAM and agreed on a SAM " -"version\n" -"you both speak, you can set up peer-to-peer connections for your " -"application\n" -"to connect to other i2p applications. You do this by sending a \"SESSION " -"CREATE\"\n" -"command to the SAM Bridge. To do that, we'll use a CreateSession function" -" that\n" +"Now that you've negotiated your connection to SAM and agreed on a SAM version\n" +"you both speak, you can set up peer-to-peer connections for your application\n" +"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n" +"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n" "accepts a session ID and a destination type parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444 msgid "" -"That was easy, right? All we had to do was adapt the pattern we used in " -"our\n" -"HelloSAM function to the ``SESSION CREATE`` command. A good reply from " -"the\n" -"bridge will still return OK, and in that case we return the ID of the " -"newly\n" -"created SAM connection. Otherwise, we return an empty string because " -"that's an\n" -"invalid ID anyway and it failed, so it's easy to check. Let's see if this" -"\n" +"That was easy, right? All we had to do was adapt the pattern we used in our\n" +"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n" +"bridge will still return OK, and in that case we return the ID of the newly\n" +"created SAM connection. Otherwise, we return an empty string because that's an\n" +"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n" "function works by writing a test for it:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461 msgid "" -"Note that in this test, we *must* call HelloSAM first to establish " -"communication\n" -"with SAM before starting our session. If not, the bridge will reply with " -"an\n" +"Note that in this test, we *must* call HelloSAM first to establish communication\n" +"with SAM before starting our session. If not, the bridge will reply with an\n" "error and the test will fail." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472 msgid "" -"Now you have your session established and your local destination, and " -"need to\n" -"decide what you want to do with them. Your session can now be commanded " -"to\n" -"connect to a remote service over I2P, or to wait for incoming connections" -" to\n" -"respond to. However, before you can connect to a remote destination, you " -"may\n" -"need to obtain the base64 of the destination, which is what the API " -"expects. In\n" -"order to do this, we'll create a LookupName function, which will return " -"the\n" +"Now you have your session established and your local destination, and need to\n" +"decide what you want to do with them. Your session can now be commanded to\n" +"connect to a remote service over I2P, or to wait for incoming connections to\n" +"respond to. However, before you can connect to a remote destination, you may\n" +"need to obtain the base64 of the destination, which is what the API expects. In\n" +"order to do this, we'll create a LookupName function, which will return the\n" "base64 in a usable form." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494 msgid "" -"Again, this is almost the same as our HelloSAM and CreateSession " -"functions,\n" -"with one difference. Since we're looking for the VALUE specifically and " -"the NAME\n" -"field will be the same as the ``name`` argument, it simply returns the " -"base64\n" +"Again, this is almost the same as our HelloSAM and CreateSession functions,\n" +"with one difference. Since we're looking for the VALUE specifically and the NAME\n" +"field will be the same as the ``name`` argument, it simply returns the base64\n" "string of the destination requested." msgstr "" @@ -10328,50 +9233,39 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516 msgid "" -"At last, we are going to establish a connection to another service with " -"our new\n" +"At last, we are going to establish a connection to another service with our new\n" "library. This part confused me a bit at first, but the most astute Java\n" "developers were probably wondering why we didn't extend the socket class\n" -"instead of creating a Socket variable inside of the Jsam class. That's " -"because\n" -"until now, we've been communicating with the \"Control Socket\" and we " -"need to\n" -"create a new socket to do the actual communication. So we've waited to " -"extend\n" +"instead of creating a Socket variable inside of the Jsam class. That's because\n" +"until now, we've been communicating with the \"Control Socket\" and we need to\n" +"create a new socket to do the actual communication. So we've waited to extend\n" "the the Socket class with the Jsam class until now:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530 msgid "" -"Also, let's alter our startConnection function so that we can use it to " -"switch\n" -"over from the control socket to the socket we'll be using in our " -"application. It\n" +"Also, let's alter our startConnection function so that we can use it to switch\n" +"over from the control socket to the socket we'll be using in our application. It\n" "will now take a Socket argument." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556 msgid "" -"This allows us to quickly and easily open a new socket to communicate " -"over,\n" +"This allows us to quickly and easily open a new socket to communicate over,\n" "perform the \"Hello SAM\" handshake over again, and connect the stream." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579 msgid "" -"And now you have a new Socket for communicating over SAM! Let's do the " -"same\n" +"And now you have a new Socket for communicating over SAM! Let's do the same\n" "thing for Accepting remote connections:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599 msgid "" -"There you have it. That's how you build a SAM library, step-by-step. In " -"the\n" -"future, I will cross-reference this with the working version of the " -"library,\n" -"Jsam, and the SAM v3 specification but for now I've got to get some other" -" stuff\n" +"There you have it. That's how you build a SAM library, step-by-step. In the\n" +"future, I will cross-reference this with the working version of the library,\n" +"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n" "done." msgstr "" @@ -10389,21 +9283,13 @@ msgid "" "including per-client authentication for encrypted leasesets.\n" "The console has an updated I2P logo and several new icons.\n" "We've updated the Linux installer." -msgstr "" -"SÄ… prowadzone dalsze prace w celu wdrożenia nowych funkcji z propozycji " -"123, takich jak uwierzytelnianie na klienta dla szyfrowanych leasesetów. " -"W konsoli wÄ™zÅ‚a pojawiÅ‚o siÄ™ nowe logo I2P i kilka nowych ikon. " -"Zaktualizowano instalator na Linuksa." +msgstr "SÄ… prowadzone dalsze prace w celu wdrożenia nowych funkcji z propozycji 123, takich jak uwierzytelnianie na klienta dla szyfrowanych leasesetów. W konsoli wÄ™zÅ‚a pojawiÅ‚o siÄ™ nowe logo I2P i kilka nowych ikon. Zaktualizowano instalator na Linuksa." #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23 msgid "" "Startup should be faster on platforms such as Raspberry Pi.\n" -"We've fixed several bugs, including some serious ones affecting low-level" -" network messages." -msgstr "" -"Start na platformach takich jak Raspberry Pi powinien być szybszy. " -"Naprawiono kilka bÅ‚Ä™dów, m.in. dotyczÄ…ce niskopoziomowych wiadomoÅ›ci " -"sieci." +"We've fixed several bugs, including some serious ones affecting low-level network messages." +msgstr "Start na platformach takich jak Raspberry Pi powinien być szybszy. Naprawiono kilka bÅ‚Ä™dów, m.in. dotyczÄ…ce niskopoziomowych wiadomoÅ›ci sieci." #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38 msgid "" @@ -10496,58 +9382,39 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11 msgid "" -"*This post is adapted directly from material originally created for " -"mhatta's*\n" -"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-" -"c08ec9de225d>`__\\ *.*\n" -"*He deserves the credit for the OP. It has been updated in certain places" -" where*\n" -"*it refers to old versions of I2P as current and has undergone some " -"light*\n" +"*This post is adapted directly from material originally created for mhatta's*\n" +"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n" +"*He deserves the credit for the OP. It has been updated in certain places where*\n" +"*it refers to old versions of I2P as current and has undergone some light*\n" "*editing. -idk*" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17 msgid "" -"Right after it starts up, I2P is often seen as a little bit slow. It's " -"true, and\n" -"we all know why, by nature, `garlic routing " -"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n" -"adds overhead to the familiar experience of using the internet so that " -"you can\n" -"have privacy, but this means that for many or most I2P services, your " -"data will\n" +"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n" +"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n" +"adds overhead to the familiar experience of using the internet so that you can\n" +"have privacy, but this means that for many or most I2P services, your data will\n" "need to go through 12 hops by default." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28 msgid "" -"Also, unlike Tor, I2P was primarily designed as a closed network. You can" -"\n" -"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-" -"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources " -"inside I2P, but you are not supposed\n" -"to access `clearnet " -"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" +"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n" +"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n" +"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" "websites through I2P. There exist a few I2P “outproxies†similar to\n" -"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit" -" nodes to\n" -"access clearnet, but most of them are very slow to use as going to the " -"clearnet\n" -"is effectively *another* hop in the already 6 hops in, six hops out " -"connection." +"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n" +"access clearnet, but most of them are very slow to use as going to the clearnet\n" +"is effectively *another* hop in the already 6 hops in, six hops out connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36 msgid "" -"Until a few versions ago, this problem was even harder to deal with " -"because many\n" -"I2P router users were having difficulties configuring the bandwidth " -"settings for\n" -"their routers. If everyone who can takes the time to adjust their " -"bandwidth\n" -"settings properly, they will improve not only your connection but also " -"the I2P\n" +"Until a few versions ago, this problem was even harder to deal with because many\n" +"I2P router users were having difficulties configuring the bandwidth settings for\n" +"their routers. If everyone who can takes the time to adjust their bandwidth\n" +"settings properly, they will improve not only your connection but also the I2P\n" "network as a whole." msgstr "" @@ -10557,8 +9424,7 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45 msgid "" -"Since I2P is a peer-to-peer network, you have to share some of your " -"network\n" +"Since I2P is a peer-to-peer network, you have to share some of your network\n" "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n" "Configuration†(“Configure Bandwidth†button in the “Applications and\n" "Configuration†section of I2P Router Console, or\n" @@ -10567,47 +9433,34 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55 msgid "" -"If you see a shared bandwidth limit of 48 KBps, which is very low, then " -"you\n" -"may not have adjusted your shared bandwidth from the default. As the " -"original\n" -"author of the material this blog post is adapted from noted, I2P has a " -"default\n" -"shared bandwidth limit that is very low until the user adjusts it to " -"avoid\n" +"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n" +"may not have adjusted your shared bandwidth from the default. As the original\n" +"author of the material this blog post is adapted from noted, I2P has a default\n" +"shared bandwidth limit that is very low until the user adjusts it to avoid\n" "causing issues with the user's connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61 msgid "" -"However, since many users may not know exactly which bandwidth settings " -"to\n" -"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ " -"introduced a\n" -"New Install Wizard. It contains a Bandwidth Test, which automatically " -"detects\n" -"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) " -"and adjusts\n" +"However, since many users may not know exactly which bandwidth settings to\n" +"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n" +"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n" +"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n" "I2P’s bandwidth settings accordingly." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67 msgid "" -"If you want to re-run the wizard, for instance following a change in your" -"\n" -"service provider or bcause you installed I2P before version 0.9.38, you " -"can\n" -"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply " -"access\n" +"If you want to re-run the wizard, for instance following a change in your\n" +"service provider or bcause you installed I2P before version 0.9.38, you can\n" +"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n" "the wizard directly at http://localhost:7657/welcome" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76 msgid "" -"Using the Wizard is straightforward, simply keep clicking “Nextâ€. " -"Sometimes\n" -"M-Lab’s chosen measurement servers are down and the test fails. In such " -"case,\n" +"Using the Wizard is straightforward, simply keep clicking “Nextâ€. Sometimes\n" +"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n" "click “Previous†(do not use your web browser’s “back†button), then\n" "try it again." msgstr "" @@ -10618,27 +9471,19 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88 msgid "" -"Even after adjusted the bandwidth, your connection might still be slow As" -" I\n" -"said, I2P is a P2P network. It will take some time for your I2P router to" -" be\n" -"discovered by other peers and integrated into the I2P network. If your " -"router\n" -"not up long enough to become well integrated, or if you shut down un-" -"gracefully\n" -"too often, the network will remain fairly slow. On the other hand, the " -"longer\n" -"you run your I2P router continuously, the faster and more stable your " -"connection\n" +"Even after adjusted the bandwidth, your connection might still be slow As I\n" +"said, I2P is a P2P network. It will take some time for your I2P router to be\n" +"discovered by other peers and integrated into the I2P network. If your router\n" +"not up long enough to become well integrated, or if you shut down un-gracefully\n" +"too often, the network will remain fairly slow. On the other hand, the longer\n" +"you run your I2P router continuously, the faster and more stable your connection\n" "becomes, and more of your bandwidth share will be used in the network." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96 msgid "" -"However, many people might not be able to stay your I2P router up. In " -"such\n" -"case, you can still run the I2P router on a remote server such as VPS, " -"then use\n" +"However, many people might not be able to stay your I2P router up. In such\n" +"case, you can still run the I2P router on a remote server such as VPS, then use\n" "SSH port forwarding." msgstr "" @@ -10654,17 +9499,10 @@ msgstr "Wersja 0.9.42 zawiera poprawki bÅ‚Ä™dów" msgid "" "0.9.42 continues the work to make I2P faster and more reliable.\n" "It includes several changes to speed up our UDP transport.\n" -"We have split up the configuration files to enable future work for more " -"modular packaging.\n" -"We continue work to implement new proposals for faster and more secure " -"encryption.\n" +"We have split up the configuration files to enable future work for more modular packaging.\n" +"We continue work to implement new proposals for faster and more secure encryption.\n" "There are, of course, a lot of bug fixes also." -msgstr "" -"Wersja 0.9.42 sprawia, że sieć I2P pracuje szybciej i sprawniej. Zawiera " -"znaczÄ…ce zmiany przyspieszajÄ…ce transport po UDP. RozdzieliliÅ›my pliki " -"konfiguracyjne, aby w przyszÅ‚oÅ›ci uczynić program bardziej modularnym. " -"Kontynuujemy prace nad propozycjami szybszego i bezpieczniejszego " -"szyfrowania. OczywiÅ›cie naprawiliÅ›my sporo bÅ‚Ä™dów." +msgstr "Wersja 0.9.42 sprawia, że sieć I2P pracuje szybciej i sprawniej. Zawiera znaczÄ…ce zmiany przyspieszajÄ…ce transport po UDP. RozdzieliliÅ›my pliki konfiguracyjne, aby w przyszÅ‚oÅ›ci uczynić program bardziej modularnym. Kontynuujemy prace nad propozycjami szybszego i bezpieczniejszego szyfrowania. OczywiÅ›cie naprawiliÅ›my sporo bÅ‚Ä™dów." #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:34 msgid "Console: Split up help page, tag text for translation" @@ -10691,7 +9529,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40 -msgid "NetDB: Choose alternate gateway for store replies to reduce connections" +msgid "" +"NetDB: Choose alternate gateway for store replies to reduce connections" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41 @@ -10738,134 +9577,91 @@ msgstr "" msgid "Def Con Trip Report- zzz" msgstr "" -#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11 +#: i2p2www/blog/2019/08/30/defcon.rst:11 +#: i2p2www/blog/2019/08/30/defcon2.rst:11 msgid "Def Con Trip Report" msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:14 msgid "" -"idk and I attended DEFCON 27 and presented two workshops on I2P for " -"application\n" -"developers, with support from mhatta and Alex. I gave the workshop at " -"Monero\n" -"Village and idk gave the one at Crypto/Privacy Village. Here, I will " -"summarize\n" -"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will" -" post a\n" +"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n" +"developers, with support from mhatta and Alex. I gave the workshop at Monero\n" +"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n" +"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n" "trip report covering his workshop." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:22 msgid "" -"We had about 8 attendees for the Monero Village workshop, entitled \"I2P " -"for\n" -"Cryptocurrency Developers\". We planned to discuss the particular " -"networking\n" -"needs for each application and work through the various i2ptunnel and SAM" -"\n" -"options available. However, all attendees were relatively unfamiliar with" -" I2P,\n" -"so we pivoted and gave an overview of I2P. As none of the attendees had a" -" laptop\n" -"with them, we helped several of them install I2P on their Android phone " -"and\n" -"walked through some of the features of the app. For all users, the app " -"appeared\n" +"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n" +"Cryptocurrency Developers\". We planned to discuss the particular networking\n" +"needs for each application and work through the various i2ptunnel and SAM\n" +"options available. However, all attendees were relatively unfamiliar with I2P,\n" +"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n" +"with them, we helped several of them install I2P on their Android phone and\n" +"walked through some of the features of the app. For all users, the app appeared\n" "to reseed and build tunnels fairly quickly." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:33 msgid "" -"One common question after installing the app was \"what do I do now?\". " -"The app\n" -"doesn't have a 'hidden services of interest' section or first-run wizard " -"like\n" -"our desktop application does, and most of the default addressbook entries" -" are\n" -"long-dead. There's improvements we could make to the first-run " -"experience.\n" +"One common question after installing the app was \"what do I do now?\". The app\n" +"doesn't have a 'hidden services of interest' section or first-run wizard like\n" +"our desktop application does, and most of the default addressbook entries are\n" +"long-dead. There's improvements we could make to the first-run experience.\n" "Also, some of the more interesting parts of the app are hidden behind an\n" -"advanced setting; we should review those items and consider un-hiding " -"some of\n" +"advanced setting; we should review those items and consider un-hiding some of\n" "them." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:43 msgid "" -"It's always useful to go to Tor talks, not so much to find out what " -"they're\n" -"doing, but to hear how they explain things to people, and what " -"terminology they\n" -"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large " -"room\n" -"attended by about two thousand people. He gave a very brief overview of " -"Tor\n" -"with only three or four slides. He says they now have \"two to eight " -"million\n" -"users a day\". Most of the talk was a review of national blocking " -"attempts over\n" -"the years, starting with Thailand and Iran in '06-'07 through Tunisia, " -"china,\n" -"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He " -"showed a\n" -"new form to be showed to new users, with a checkbox \"Tor is censored in " -"my\n" +"It's always useful to go to Tor talks, not so much to find out what they're\n" +"doing, but to hear how they explain things to people, and what terminology they\n" +"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n" +"attended by about two thousand people. He gave a very brief overview of Tor\n" +"with only three or four slides. He says they now have \"two to eight million\n" +"users a day\". Most of the talk was a review of national blocking attempts over\n" +"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n" +"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n" +"new form to be showed to new users, with a checkbox \"Tor is censored in my\n" "country\"." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:56 msgid "" "Their new pluggable transport \"snowflake\" uses a combination of domain\n" -"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. " -"Roger\n" -"only had one slide on it, and I wasn't familiar with it, so we should do " -"more\n" -"research on what it's all about. He briefly mentioned some things they " -"may be\n" -"working on next, including \"salmon\" distribution of bridges, " -"FTE/Marionette,\n" -"decoy routing, and \"cupcake\" which is an extension of snowflake. While " -"I don't\n" -"have any further information about them, they may be good buzzwords to " -"keep an\n" +"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n" +"only had one slide on it, and I wasn't familiar with it, so we should do more\n" +"research on what it's all about. He briefly mentioned some things they may be\n" +"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n" +"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n" +"have any further information about them, they may be good buzzwords to keep an\n" "eye out for on their mailing lists." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:67 msgid "" "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n" -"handshake is a particular issue and it's been the focus of much of the " -"\"arms\n" -"race\" over the years. In some ways we're in better shape, as we've taken" -"\n" -"several features of their current-best obfs4 pluggable transport and " -"build them\n" -"into NTCP2. However, we do have issues with our website and reseeds being" -"\n" +"handshake is a particular issue and it's been the focus of much of the \"arms\n" +"race\" over the years. In some ways we're in better shape, as we've taken\n" +"several features of their current-best obfs4 pluggable transport and build them\n" +"into NTCP2. However, we do have issues with our website and reseeds being\n" "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:76 msgid "" -"Notes for next time: I do recommend DEFCON, as long as we find a village " -"to\n" -"call our home. It's an enormous conference and the limited general " -"hangout\n" +"Notes for next time: I do recommend DEFCON, as long as we find a village to\n" +"call our home. It's an enormous conference and the limited general hangout\n" "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n" -"Village were fantastic hosts and we had several hours at each spot to " -"meet with\n" -"people. We should find more opportunities to work with both " -"organizations.\n" -"There were also ZCash people at the Monero Village and we should work " -"with them\n" -"also. Any future workshop should be targeted at a more general audience. " -"We do\n" -"need a standard \"Intro to I2P\" slide deck; it would have been helpful " -"at the\n" -"workshops. Don't expect attendees to have laptops with them, focus on " -"Android\n" -"for any hands-on exercises. There's several improvements to be made in " -"our\n" +"Village were fantastic hosts and we had several hours at each spot to meet with\n" +"people. We should find more opportunities to work with both organizations.\n" +"There were also ZCash people at the Monero Village and we should work with them\n" +"also. Any future workshop should be targeted at a more general audience. We do\n" +"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n" +"workshops. Don't expect attendees to have laptops with them, focus on Android\n" +"for any hands-on exercises. There's several improvements to be made in our\n" "Android app. Drink lots of water in Vegas... and stay away from the slot\n" "machines." msgstr "" @@ -10882,95 +9678,67 @@ msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:19 msgid "" -"My workshop went well, we even had a few application developers attend! " -"In\n" -"particular I had a pretty lengthy conversation with a person named Mary " -"about\n" +"My workshop went well, we even had a few application developers attend! In\n" +"particular I had a pretty lengthy conversation with a person named Mary about\n" "how I2P could be used to eliminate centralization and enhance privacy in\n" -"a \"Magic Wormhole\" type of application. While I wasn't totally familiar" -" with\n" -"Magic Wormhole at the time, I think most of my advice was usable. I think" -" Mary\n" -"had some very interesting and workable ideas about sharing information in" -" more\n" -"human-centric ways that could be interesting in I2P applications, and am " -"looking\n" +"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n" +"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n" +"had some very interesting and workable ideas about sharing information in more\n" +"human-centric ways that could be interesting in I2P applications, and am looking\n" "forward to experimenting with some of those." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:30 msgid "" -"The materials I made for the application development workshop are " -"available on\n" -"Github! https://github.com/eyedeekay/defcon Please consider it a living " -"document,\n" -"your input is desired! As it is licensed permissively, you are free to " -"fork it\n" -"and make it your own as well. Share your examples, your hacks, or correct" -" my\n" -"comma use, complain about my document preparation style, or just print " -"off your\n" +"The materials I made for the application development workshop are available on\n" +"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n" +"your input is desired! As it is licensed permissively, you are free to fork it\n" +"and make it your own as well. Share your examples, your hacks, or correct my\n" +"comma use, complain about my document preparation style, or just print off your\n" "own copy in booklet form!" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:39 msgid "" -"I also talked to a guy who gives advice to the government about the " -"differences\n" -"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in " -"which\n" -"peers in a P2P application might want to have enhanced privacy from each-" -"other,\n" +"I also talked to a guy who gives advice to the government about the differences\n" +"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n" +"peers in a P2P application might want to have enhanced privacy from each-other,\n" "and why I2P is perhaps uniquely suited to accomplish that." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:46 msgid "" -"In general, both the application development workshops went well, even " -"though\n" -"they didn't go entirely according to plan in that only a small proportion" -" of the\n" -"audience were application developers. The impression I got was that many " -"people\n" -"are very interested in I2P, but also many people are confused by how " -"interacting\n" -"with I2P works. By re-focusing on their questions and by teaming off with" -" zzz,\n" -"mhatta, and Alex we were fairly successful at dealing with our audience, " -"which\n" +"In general, both the application development workshops went well, even though\n" +"they didn't go entirely according to plan in that only a small proportion of the\n" +"audience were application developers. The impression I got was that many people\n" +"are very interested in I2P, but also many people are confused by how interacting\n" +"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n" +"mhatta, and Alex we were fairly successful at dealing with our audience, which\n" "was more varied in terms of occupation, interest, and I2P knowledge than\n" "expected." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:57 msgid "" -"Besides that, I also talked to Alex about my experimental contextual-" -"identity\n" -"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to" -" talk\n" -"a little about bundling, but not too much, as it was a very busy " -"convention. I'm\n" +"Besides that, I also talked to Alex about my experimental contextual-identity\n" +"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n" +"a little about bundling, but not too much, as it was a very busy convention. I'm\n" "looking forward to following up with him on that soon." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:64 msgid "" "mhatta and I almost won a lobster from a claw machine, but it was a real\n" -"fighter and got away at the last second. Really thought I had it for a " -"moment\n" +"fighter and got away at the last second. Really thought I had it for a moment\n" "though. :)" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:70 msgid "" -"To add to zzz's notes for next time, aside from being more general I " -"believe our\n" -"workshops would not have been as able to adapt to the needs of the " -"audience\n" -"without the support of mhatta and Alex. Having people who can help " -"particpants\n" -"individually or in small groups was immensely helpful, many, many thanks " -"to both\n" +"To add to zzz's notes for next time, aside from being more general I believe our\n" +"workshops would not have been as able to adapt to the needs of the audience\n" +"without the support of mhatta and Alex. Having people who can help particpants\n" +"individually or in small groups was immensely helpful, many, many thanks to both\n" "of them for helping us out." msgstr "" @@ -10981,95 +9749,71 @@ msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:14 msgid "" -"Over the past year I have had the good fortune to participate in the " -"research\n" -"Nguyen Phong Hoang from Stony Brook University has been doing regarding " -"I2P\n" -"censorship. The infrastructure used for this research provided numerous " -"and\n" -"geographically diverse vantage points, and also the ability to conduct " -"in-depth\n" -"measurements across all levels of the network stack. I2P services which " -"were\n" -"measured for availability included official homepage, mirror site, reseed" -"\n" +"Over the past year I have had the good fortune to participate in the research\n" +"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n" +"censorship. The infrastructure used for this research provided numerous and\n" +"geographically diverse vantage points, and also the ability to conduct in-depth\n" +"measurements across all levels of the network stack. I2P services which were\n" +"measured for availability included official homepage, mirror site, reseed\n" "servers and active relays." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:24 msgid "" -"The presentation on Tuesday went very well, and Phong was very busy " -"afterwards\n" -"answering questions about his work. I was busy too answering questions " -"about\n" -"I2P and what it does. The new stickers featuring the updated logo by Ura " -"Design\n" -"got rave reviews! It was a very positive experience and I will be looking" -"\n" -"forward to continuing to work with Phong and monitoring I2P censorship. I" -" would\n" -"encourage anyone who has encountered blocking, or has had success using " -"I2P to\n" +"The presentation on Tuesday went very well, and Phong was very busy afterwards\n" +"answering questions about his work. I was busy too answering questions about\n" +"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n" +"got rave reviews! It was a very positive experience and I will be looking\n" +"forward to continuing to work with Phong and monitoring I2P censorship. I would\n" +"encourage anyone who has encountered blocking, or has had success using I2P to\n" "communicate in restricted environments to reach out if you can. I2P is\n" -"currently working on new solutions to circumvent internet blocking. " -"Having met\n" +"currently working on new solutions to circumvent internet blocking. Having met\n" "people this year who have given me first hand accounts of the effects of\n" -"censorship and the need to stay connected, makes the need for I2P to be " -"more\n" -"resilient where it needs to be and for the team to be creating guides for" -" using\n" +"censorship and the need to stay connected, makes the need for I2P to be more\n" +"resilient where it needs to be and for the team to be creating guides for using\n" "I2P in these situations." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:39 msgid "" -"I will be putting together better resources for researchers interested in" -" I2P,\n" +"I will be putting together better resources for researchers interested in I2P,\n" "as well." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:44 msgid "" "I also had the good fortune to spend time with Mhatta, who is an I2P\n" -"contributor, and to make connections for future funding. A huge thank you" -" to\n" -"the community builders I met in Tunis who I met again and who are " -"offering so\n" -"much support to the project. This has been an exciting year so far, and " -"I2P has\n" -"so much work to do. Please consider donating your time or funding the " -"project\n" +"contributor, and to make connections for future funding. A huge thank you to\n" +"the community builders I met in Tunis who I met again and who are offering so\n" +"much support to the project. This has been an exciting year so far, and I2P has\n" +"so much work to do. Please consider donating your time or funding the project\n" "as it needs to scale quickly to new challenges." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:53 msgid "" -"If you have an opportunity to, you can read the full report Measuring I2P" -"\n" +"If you have an opportunity to, you can read the full report Measuring I2P\n" "Censorship at a Global Scale here\n" "https://www.usenix.org/conference/foci19/presentation/hoang" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:59 msgid "" -"Another great workshop in the measurements workshop was On the Importance" -" of\n" +"Another great workshop in the measurements workshop was On the Importance of\n" "Encrypted-SNI (ESNI) to Censorship Circumvention\n" "https://www.usenix.org/conference/foci19/presentation/chai" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:65 msgid "" -"There are so many great workshops that I attended - anyone who would like" -" too\n" +"There are so many great workshops that I attended - anyone who would like too\n" "can access the program and related materials here:\n" "https://www.usenix.org/conference/foci19/workshop-program" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:71 msgid "" -"I will be attending Our Networks in Toronto next month " -"https://ournetworks.ca/\n" +"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n" "- and so should you! The program can be viewed here\n" "https://ournetworks.ca/program/" msgstr "" @@ -11081,63 +9825,43 @@ msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:14 msgid "" -"This was my first time attending IFF, and what a great experience for I2P" -" this\n" -"was! I met with human rights defenders, people who work on censorship " -"metrics,\n" +"This was my first time attending IFF, and what a great experience for I2P this\n" +"was! I met with human rights defenders, people who work on censorship metrics,\n" "and of course UX and security professionals." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:20 msgid "" "My goal was to connect with people to further support I2P’s UX overhaul,\n" -"keeping in mind security and UX considerations for frontline workers. As " -"it was\n" -"pointed out to me, people see I2P as a very important and powerful " -"resource to\n" -"circumvent censorship and support safe communication, however the " -"interface\n" -"suffers from some usability concerns. People were happy with our initial " -"steps\n" -"to make first time users have a better experience, such as our set up " -"wizard\n" -"and bandwidth detection tool. I also received positive reviews on our " -"changes\n" -"to the website and /home icons. It was very encouraging to hear directly " -"from\n" +"keeping in mind security and UX considerations for frontline workers. As it was\n" +"pointed out to me, people see I2P as a very important and powerful resource to\n" +"circumvent censorship and support safe communication, however the interface\n" +"suffers from some usability concerns. People were happy with our initial steps\n" +"to make first time users have a better experience, such as our set up wizard\n" +"and bandwidth detection tool. I also received positive reviews on our changes\n" +"to the website and /home icons. It was very encouraging to hear directly from\n" "the community that small changes we have made are in the right direction." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:32 msgid "" -"Things like having configuration happen out of the box and not having to " -"put\n" -"people in the position where they need to rely on reading so much " -"documentation\n" -"or chasing documentation were discussed. Also, improved documentation for" -"\n" -"setting up outproxies and and site mirroring were requested and " -"suggested.\n" -"Please see Mikal’s very good instructions on setting up an I2P outproxy " -"that\n" +"Things like having configuration happen out of the box and not having to put\n" +"people in the position where they need to rely on reading so much documentation\n" +"or chasing documentation were discussed. Also, improved documentation for\n" +"setting up outproxies and and site mirroring were requested and suggested.\n" +"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n" "came out of the suggestions this week —\n" -"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to " -"make\n" +"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n" "bug reporting easier." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:43 msgid "" -"To this point, I truly hope that the project will secure resources to " -"continue\n" -"the improvements to its usability that it requires to meet the growing " -"demand\n" -"for I2P services. It is humbling to to be working with such talented " -"people and\n" -"to be able to work together with our community during a time when people " -"all\n" -"over the globe need all of the privacy protecting resources we as people " -"who\n" +"To this point, I truly hope that the project will secure resources to continue\n" +"the improvements to its usability that it requires to meet the growing demand\n" +"for I2P services. It is humbling to to be working with such talented people and\n" +"to be able to work together with our community during a time when people all\n" +"over the globe need all of the privacy protecting resources we as people who\n" "develop, design and educate can offer." msgstr "" @@ -11148,58 +9872,40 @@ msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:14 msgid "" -"The messages from activists in Syria during the Access No\\_! session on " -"the\n" +"The messages from activists in Syria during the Access No\\_! session on the\n" "first day were deeply moving and really drove home why I work in digital\n" -"rights. We listened to the experiences of activists who are unable to " -"travel\n" -"due to lack of status, documentation and active conflict. For these " -"people\n" +"rights. We listened to the experiences of activists who are unable to travel\n" +"due to lack of status, documentation and active conflict. For these people\n" "“the internet is the only passport (they) carry.†Human rights defenders\n" -"spoke of the importance of digital training to keep people protected " -"when they\n" -"are communicating with family inside of the country, as well as with " -"family and\n" -"friends who have left. They had created digital clinics to show people " -"how to\n" +"spoke of the importance of digital training to keep people protected when they\n" +"are communicating with family inside of the country, as well as with family and\n" +"friends who have left. They had created digital clinics to show people how to\n" "use services securely, for instance, how to use features like Signal’s\n" -"disappearing messages so that those messages could not be used against " -"them\n" +"disappearing messages so that those messages could not be used against them\n" "when devices are searched at security check points. Continuing to pursue\n" -"education was also very important, the internet being relied on to access" -"\n" +"education was also very important, the internet being relied on to access\n" "resources." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:30 msgid "" -"The following days we met with people who had both questions about I2P " -"and\n" -"suggestions for potential use cases. We also discussed overhauling the " -"project\n" +"The following days we met with people who had both questions about I2P and\n" +"suggestions for potential use cases. We also discussed overhauling the project\n" "documentation for threat models, improving guides for users with little\n" -"technical background, and ensuring that these guides are easily " -"translatable. I\n" -"made a note that I should go through the proposals and connect then to " -"human\n" -"use cases and solutions. This will be part of the projects’ continued " -"effort\n" +"technical background, and ensuring that these guides are easily translatable. I\n" +"made a note that I should go through the proposals and connect then to human\n" +"use cases and solutions. This will be part of the projects’ continued effort\n" "to improve its user guides and onboarding." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:40 msgid "" -"The opportunity to meet face to face with people who are using I2P and " -"have\n" -"successfully used it to circumvent internet blockages was inspiring. As " -"the\n" +"The opportunity to meet face to face with people who are using I2P and have\n" +"successfully used it to circumvent internet blockages was inspiring. As the\n" "project has began working on its own browser and is examining outproxy\n" -"packaging, it needs as much feedback and testing as possible to create " -"secure\n" -"and frictionless experiences for people. Also, the I2P network needs more" -"\n" -"hosted content and mirrored sites in order to expand resources for its " -"users." +"packaging, it needs as much feedback and testing as possible to create secure\n" +"and frictionless experiences for people. Also, the I2P network needs more\n" +"hosted content and mirrored sites in order to expand resources for its users." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2 @@ -11213,47 +9919,35 @@ msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14 msgid "" -"The weekend of September 20th I traveled to Toronto to meet with Sadie to" -" take\n" -"part in the Our Networks conference. The Our Networks conference " -"encompasses a\n" -"wide variety of topic including many peer-to-peer technologies with an " -"eye\n" +"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n" +"part in the Our Networks conference. The Our Networks conference encompasses a\n" +"wide variety of topic including many peer-to-peer technologies with an eye\n" "toward their potential to make the world a better place." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21 msgid "" -"The conference was fascinating, full of very smart people working on " -"everything\n" -"from physical mesh networks to the distributed web to, of course, " -"anonymity. We\n" -"got to talk to some great people from Tor, Protocol Labs, Parity Labs, " -"the Dat\n" -"Project, as well as a variety of artists and social scientists. Lots of " -"fun too,\n" +"The conference was fascinating, full of very smart people working on everything\n" +"from physical mesh networks to the distributed web to, of course, anonymity. We\n" +"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n" +"Project, as well as a variety of artists and social scientists. Lots of fun too,\n" "and a great environment. Dat in particular presents some pretty cool\n" "opportunities for future co-operation I think." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30 msgid "" -"I hadn't planned on giving a talk, but we were having so much fun that " -"when\n" -"we were asked, Sadie and I put something together and I gave a quick " -"lightning\n" +"I hadn't planned on giving a talk, but we were having so much fun that when\n" +"we were asked, Sadie and I put something together and I gave a quick lightning\n" "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n" -"application development. The talk was recorded and when the video becomes" -"\n" -"available, I'll make sure to add it to this blog. Next year, I'll have " -"some\n" +"application development. The talk was recorded and when the video becomes\n" +"available, I'll make sure to add it to this blog. Next year, I'll have some\n" "submissions for their Zine Library about I2P." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39 msgid "" -"Besides that, I really enjoyed my time visiting Toronto, it was a great " -"place\n" +"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n" "to visit." msgstr "" @@ -11267,20 +9961,11 @@ msgstr "Wersja 0.9.43 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16 msgid "" -"In the 0.9.43 release, we continue work on stronger security and privacy " -"features and performance improvements.\n" -"Our implementation of the new leaseset specification (LS2) is now " -"complete.\n" -"We are beginning our implementation of stronger and faster end-to-end " -"encryption (proposal 144) for a future release.\n" -"Several IPv6 address detection issues have been fixed, and there of " -"course are several other bug fixes." -msgstr "" -"W wersji 0.9.43 kontynuujemy prace zwiÄ™kszajÄ…ce bezpieczeÅ„stwo, " -"prywatność i wydajność. ZakoÅ„czyliÅ›my wdrażanie nowej specyfikacji " -"leasesetów (LS2). Rozpoczynamy wdrażanie mocniejszego i szybszego " -"szyfrowania (propozycja 144). Naprawiono kilka problemów zwiÄ…zanych z " -"wykrywaniem adresów IPv6 i naprawiono kilka innych bÅ‚Ä™dów." +"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n" +"Our implementation of the new leaseset specification (LS2) is now complete.\n" +"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n" +"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes." +msgstr "W wersji 0.9.43 kontynuujemy prace zwiÄ™kszajÄ…ce bezpieczeÅ„stwo, prywatność i wydajność. ZakoÅ„czyliÅ›my wdrażanie nowej specyfikacji leasesetów (LS2). Rozpoczynamy wdrażanie mocniejszego i szybszego szyfrowania (propozycja 144). Naprawiono kilka problemów zwiÄ…zanych z wykrywaniem adresów IPv6 i naprawiono kilka innych bÅ‚Ä™dów." #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33 msgid "Console setup wizard improvements" @@ -11323,7 +10008,8 @@ msgid "i2ptunnel support for quoted custom options" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51 -msgid "i2psnark now starts with reduced tunnel count then increases as necessary" +msgid "" +"i2psnark now starts with reduced tunnel count then increases as necessary" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52 @@ -11354,47 +10040,33 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:11 msgid "" -"Highlighting Research - An Empirical Study of the I2P Anonymity Network " -"and its Censorship Resistance" +"Highlighting Research - An Empirical Study of the I2P Anonymity Network and " +"its Censorship Resistance" msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:16 msgid "" -"The following blog post is authored by Information Controls Fellow Hoà ng " -"Nguyên\n" -"Phong. As an ICFP fellow, Phong's research focused on analyzing different" -"\n" -"aspects of the I2P network, a privacy-enhancing Internet tool that can be" -" used\n" +"The following blog post is authored by Information Controls Fellow Hoà ng Nguyên\n" +"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n" +"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n" "to access online content over an anonymity-enhancing network helpful in\n" -"circumventing state-imposed censorship. Working with his host " -"organization, the\n" -"University of Massachusetts Amherst, Phong studied the I2P network's " -"censorship\n" -"resilience, including identifying what blocking methods a state censor " -"might use\n" -"to inhibit access to I2P and investigating potential solutions to make " -"I2P more\n" +"circumventing state-imposed censorship. Working with his host organization, the\n" +"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n" +"resilience, including identifying what blocking methods a state censor might use\n" +"to inhibit access to I2P and investigating potential solutions to make I2P more\n" "resistant to such blockage." msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:28 msgid "" "Phong found blocking attempts on the I2P network (specifically via DNS\n" -"poisoning, SNI-based blocking, TCP packet injection, and page-specific " -"blocks)\n" -"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. " -"Phong\n" -"posits that because the blocks are usually imposed on the I2P download " -"page and\n" -"reseed servers, such blocking could be mitigated by hosting download " -"links to\n" -"this content on large cloud service providers - raising the collateral " -"cost of\n" -"blocking. Phong also built a metrics portal for the platform so that " -"researchers\n" -"and others can better understand who is using I2P, finding that there are" -" about\n" +"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n" +"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n" +"posits that because the blocks are usually imposed on the I2P download page and\n" +"reseed servers, such blocking could be mitigated by hosting download links to\n" +"this content on large cloud service providers - raising the collateral cost of\n" +"blocking. Phong also built a metrics portal for the platform so that researchers\n" +"and others can better understand who is using I2P, finding that there are about\n" "20,000 relays in the network on a daily basis." msgstr "" @@ -11408,10 +10080,8 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:55 msgid "" -"We thank Phong and his collaborators for their excellent study as we move" -" to\n" -"address the issues that were identified. It's exciting to see more " -"academic\n" +"We thank Phong and his collaborators for their excellent study as we move to\n" +"address the issues that were identified. It's exciting to see more academic\n" "study of I2P and are excited to keep working with him." msgstr "" @@ -11425,30 +10095,18 @@ msgstr "Wersja 0.9.44 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16 msgid "" -"0.9.44 contains an important fix for a denial of service issue in hidden " -"services handling of new encryption types.\n" +"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n" "All users should update as soon as possible." -msgstr "" -"Wersja 0.9.44 naprawia podatność na atak DoS ukrytej usÅ‚ugi obsÅ‚ugujÄ…cej " -"nowe rodzaje szyfrowania. Wszyscy użytkownicy powinni dokonać " -"aktualizacji jak najszybciej." +msgstr "Wersja 0.9.44 naprawia podatność na atak DoS ukrytej usÅ‚ugi obsÅ‚ugujÄ…cej nowe rodzaje szyfrowania. Wszyscy użytkownicy powinni dokonać aktualizacji jak najszybciej." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21 msgid "" -"The release includes initial support for new end-to-end encryption " -"(proposal 144).\n" +"The release includes initial support for new end-to-end encryption (proposal 144).\n" "Work continues on this project, and it is not yet ready for use.\n" -"There are changes to the console home page, and new embedded HTML5 media " -"players in i2psnark.\n" +"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n" "Additional fixes for firewalled IPv6 networks are included.\n" "Tunnel build fixes should result in faster startup for some users." -msgstr "" -"To wydanie wstÄ™pnie wprowadza wsparcie dla nowego rodzaju szyfrowania " -"(propozycja 144), trwajÄ… nad nim dalsze prace, nie jest jeszcze gotowy do" -" użytku. Wprowadzono zmiany do strony głównej konsoli i zagnieżdżono " -"odtwarzacz HTML5 do ip2snarka. Wprowadzono usprawnienia dla sieci IPv6 za" -" zaporÄ…. Poprawki startu tuneli powinny usprawnić start niektórym " -"użytkownikom." +msgstr "To wydanie wstÄ™pnie wprowadza wsparcie dla nowego rodzaju szyfrowania (propozycja 144), trwajÄ… nad nim dalsze prace, nie jest jeszcze gotowy do użytku. Wprowadzono zmiany do strony głównej konsoli i zagnieżdżono odtwarzacz HTML5 do ip2snarka. Wprowadzono usprawnienia dla sieci IPv6 za zaporÄ…. Poprawki startu tuneli powinny usprawnić start niektórym użytkownikom." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39 msgid "Console home page changes" @@ -11528,16 +10186,10 @@ msgstr "Wersja 0.9.45 zawiera poprawki bÅ‚Ä™dów" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16 msgid "" -"0.9.45 contains important fixes for hidden mode and the bandwidth tester." -"\n" +"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n" "There's an update to the console dark theme.\n" -"We continue work on improving performance and the development of new end-" -"to-end encryption (proposal 144)." -msgstr "" -"Wersja 0.9.45 zawiera istotne poprawki dla trybu ukrytego i testera " -"przepustowoÅ›ci. Poprawiono ciemnÄ… skórkÄ™ konsoli. Kontynuujemy prace " -"zwiÄ™kszajÄ…ce wydajnoÅ›ci i opracowujemy nowe szyfrowanie end-to-end " -"(propozycja 144)." +"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)." +msgstr "Wersja 0.9.45 zawiera istotne poprawki dla trybu ukrytego i testera przepustowoÅ›ci. Poprawiono ciemnÄ… skórkÄ™ konsoli. Kontynuujemy prace zwiÄ™kszajÄ…ce wydajnoÅ›ci i opracowujemy nowe szyfrowanie end-to-end (propozycja 144)." #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32 msgid "Dark theme improvements" @@ -11548,7 +10200,8 @@ msgid "Console icon changes" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34 -msgid "Move some translations from console to router and core for embedded uses" +msgid "" +"Move some translations from console to router and core for embedded uses" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37 @@ -11602,24 +10255,20 @@ msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10 msgid "" "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n" -"will act as your access point to a single git service on I2P. It is part " -"of the\n" +"will act as your access point to a single git service on I2P. It is part of the\n" "overall effort to transition I2P from monotone to Git." msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16 msgid "" -"Before anything else: Know the capabilities the service offers to the " -"public" +"Before anything else: Know the capabilities the service offers to the public" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19 msgid "" "Depending on how the git service is configured, it may or may not offer\n" "all services on the same address. In the case of git.idk.i2p, there is a\n" -"public HTTP URL, and an SSH " -"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to " -"configure for your Git SSH client. Either\n" +"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n" "can be used to push or pull, but SSH is recommended." msgstr "" @@ -11670,10 +10319,8 @@ msgid "" "Then, add the address you will be pushing and pulling from. Note that\n" "this example address is for Read-Only HTTP-over-I2P clones, if your\n" "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n" -"need to get the SSH clone base32 from them. Use this Base32 to connect " -"the\n" -"client tunnel to the Git SSH service: " -"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" +"need to get the SSH clone base32 from them. Use this Base32 to connect the\n" +"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109 @@ -11801,7 +10448,8 @@ msgid "Gitlab over I2P Setup" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7 -msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others." +msgid "" +"Mirror I2P Git repositories and Bridge Clearnet repositories for others." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9 @@ -11856,14 +10504,13 @@ msgid "" "images. Since there are no third-party images involved here, updates\n" "should come as soon as they are available in the host images. To review\n" "the Dockerfile for yourself, visit the `Gitlab source\n" -"code <https://gitlab.com/gitlab-org/omnibus-" -"gitlab/-/blob/master/docker/Dockerfile>`__." +"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73 @@ -12092,21 +10739,10 @@ msgid "" "generated for you. A recent, correctly-generated bundle of the mainline\n" "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n" "of I2P at my pastebin\n" -"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also " -"use a\n" -"`magnet link " -"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__," -"\n" +"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n" +"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n" "and if you're a BiglyBT user who wants to bridge the torrent, use \n" -"`this magnet link instead " -"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker" -".leechers-" -"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker" -".lanta-" -"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker" -".tiny-" -"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__" -"\n" +"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n" "to announce to clearnet trackers as well." msgstr "" @@ -12200,40 +10836,29 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16 msgid "" -"0.9.46 contains significant performance improvements in the streaming " -"library.\n" -"We have completed development of ECIES encryption (proposal 144) and " -"there is now an option to enable it for testing." -msgstr "" -"Wersja 0.9.46 wprowadza znaczÄ…ce poprawki wydajnoÅ›ci w bibliotece " -"strumieniowania. ZakoÅ„czyliÅ›my prace nad szyfrowaniem ECIES (propozycja " -"144) i dodaliÅ›my możliwość testowego wÅ‚Ä…czenia go." +"0.9.46 contains significant performance improvements in the streaming library.\n" +"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing." +msgstr "Wersja 0.9.46 wprowadza znaczÄ…ce poprawki wydajnoÅ›ci w bibliotece strumieniowania. ZakoÅ„czyliÅ›my prace nad szyfrowaniem ECIES (propozycja 144) i dodaliÅ›my możliwość testowego wÅ‚Ä…czenia go." #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21 msgid "" "Windows users only:\n" "This release fixes a local privilege escalation vulnerability\n" -"which could be exploited by a local user that has the ability to run " -"programs.\n" +"which could be exploited by a local user that has the ability to run programs.\n" "Please apply the update as soon as possible.\n" "Thanks to Blaze Infosec for their responsible disclosure of the issue." msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29 msgid "" -"This is the last release to support Java 7, Debian packages Wheezy and " -"Stretch, and Ubuntu packages Precise and Trusty.\n" +"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n" "Users on those platforms must upgrade to receive future I2P updates." -msgstr "" -"Jest to ostatnie wydanie wspierajÄ…ce JavÄ™ 7, paczki Debiana Wheezy i " -"Stretch, i paczki Ubuntu Precise i Trusty. Użytkownicy tych platform " -"muszÄ… dokonać uaktualnienia systemu, aby móc dalej otrzymywać " -"aktualizacje I2P." +msgstr "Jest to ostatnie wydanie wspierajÄ…ce JavÄ™ 7, paczki Debiana Wheezy i Stretch, i paczki Ubuntu Precise i Trusty. Użytkownicy tych platform muszÄ… dokonać uaktualnienia systemu, aby móc dalej otrzymywać aktualizacje I2P." #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing " -"(proposal 144)" +"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal " +"144)" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45 @@ -12258,8 +10883,8 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54 msgid "" -"Hidden Services Manager: Fixes for changing shared client options, " -"prevent changing certain options while tunnel is running" +"Hidden Services Manager: Fixes for changing shared client options, prevent " +"changing certain options while tunnel is running" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55 @@ -12420,27 +11045,16 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16 msgid "" -"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by " -"default for some services.\n" +"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n" "The Sybil analysis and blocking tool is now enabled by default." -msgstr "" -"Wersja 0.9.47 domyÅ›lnie wÅ‚Ä…cza nowy protokół szyfrowania end-to-end " -"(propozycja 144) na niektórych usÅ‚ugach. NarzÄ™dzie do analizy i " -"blokowania ataków Sybil jest teraz domyÅ›lnie wÅ‚Ä…czone." +msgstr "Wersja 0.9.47 domyÅ›lnie wÅ‚Ä…cza nowy protokół szyfrowania end-to-end (propozycja 144) na niektórych usÅ‚ugach. NarzÄ™dzie do analizy i blokowania ataków Sybil jest teraz domyÅ›lnie wÅ‚Ä…czone." #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21 msgid "" "Java 8 or higher is now required.\n" -"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and " -"Precise, are no longer supported.\n" -"Users on those platforms should upgrade so you may continue to receive " -"I2P updates." -msgstr "" -"Wymagana jest wersja Javy w wersji 8 lub wyższej. Paczki dla Debiana w " -"wersjach Wheezy i Stretch, oraz paczki dla Ubuntu w wersjach Trusty i " -"Precise nie sÄ… już wspierane. Użytkownicy tych platform powinni dokonać " -"aktualizacji systemu do nowej wersji, aby móc dalej otrzymywać " -"aktualizacje I2P." +"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n" +"Users on those platforms should upgrade so you may continue to receive I2P updates." +msgstr "Wymagana jest wersja Javy w wersji 8 lub wyższej. Paczki dla Debiana w wersjach Wheezy i Stretch, oraz paczki dla Ubuntu w wersjach Trusty i Precise nie sÄ… już wspierane. Użytkownicy tych platform powinni dokonać aktualizacji systemu do nowej wersji, aby móc dalej otrzymywać aktualizacje I2P." #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37 msgid "Java 8 now required" @@ -12448,8 +11062,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared " -"clients, HTTP proxy, and new tunnels" +"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, " +"HTTP proxy, and new tunnels" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43 @@ -12461,7 +11075,8 @@ msgid "Enable Sybil analysis and blocking tool by default" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51 -msgid "Hidden Services Manager: Fix missing server tunnel length configuration" +msgid "" +"Hidden Services Manager: Fix missing server tunnel length configuration" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52 @@ -12510,26 +11125,16 @@ msgstr "Wersja 0.9.48 z poprawkami wydajnoÅ›ci" #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16 msgid "" -"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for " -"most services.\n" -"We have added preliminary support for new tunnel build message encryption" -" (proposal 152).\n" +"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n" +"We have added preliminary support for new tunnel build message encryption (proposal 152).\n" "There are significant performance improvements throughout the router." -msgstr "" -"Wersja 0.9.48 wprowadza nowy protokół szyfrowania (propozycja 144) dla " -"wiÄ™kszoÅ›ci usÅ‚ug. Dodano wstÄ™pne wsparcie dla szyfrowania wiadomoÅ›ci " -"tworzenia nowego tunelu (propozycja 152). Wprowadzono znaczne poprawki " -"wydajnoÅ›ci oprogramowania wÄ™zÅ‚a." +msgstr "Wersja 0.9.48 wprowadza nowy protokół szyfrowania (propozycja 144) dla wiÄ™kszoÅ›ci usÅ‚ug. Dodano wstÄ™pne wsparcie dla szyfrowania wiadomoÅ›ci tworzenia nowego tunelu (propozycja 152). Wprowadzono znaczne poprawki wydajnoÅ›ci oprogramowania wÄ™zÅ‚a." #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22 msgid "" "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n" -"Users on that platform should upgrade so you may continue to receive I2P " -"updates." -msgstr "" -"Porzucono wsparcie dla paczek Ubuntu Xenial (16.04 LTS). Użytkownicy tego" -" systemu powinni dokonać jego aktualizacji, aby móc dalej otrzymywać " -"aktualizacje I2P." +"Users on that platform should upgrade so you may continue to receive I2P updates." +msgstr "Porzucono wsparcie dla paczek Ubuntu Xenial (16.04 LTS). Użytkownicy tego systemu powinni dokonać jego aktualizacji, aby móc dalej otrzymywać aktualizacje I2P." #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37 msgid "Avoid old DSA-SHA1 routers for lookups, stores, and tunnel peers" @@ -12678,33 +11283,25 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21 msgid "" -"For over a decade, I2P has relied on the venerable Monotone service to " -"support\n" -"its version control needs, but during the past few years, most of the " -"world has\n" +"For over a decade, I2P has relied on the venerable Monotone service to support\n" +"its version control needs, but during the past few years, most of the world has\n" "moved on to the now-universal Git version control system. In that same\n" -"time, the I2P Network has become faster and more reliable, and accessible" -"\n" +"time, the I2P Network has become faster and more reliable, and accessible\n" "workarounds to Git's non-resumability have been developed." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29 msgid "" -"Today marks a significant occasion for I2P, as we switched off the old " -"mtn\n" -"i2p.i2p branch, and moved the development of the core Java I2P libraries " -"from\n" +"Today marks a significant occasion for I2P, as we switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n" "Monotone to Git officially." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35 msgid "" -"While our use of mtn has been questioned in the past, and it's not always" -" been a\n" -"popular choice, I'd like to take this moment, as perhaps the very last " -"project to use\n" -"Monotone to thank the Monotone developers, current and former, wherever " -"they are,\n" +"While our use of mtn has been questioned in the past, and it's not always been a\n" +"popular choice, I'd like to take this moment, as perhaps the very last project to use\n" +"Monotone to thank the Monotone developers, current and former, wherever they are,\n" "for the software they created." msgstr "" @@ -12714,12 +11311,9 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49 msgid "" -"Checkins to the I2P Project repositories require you to configure GPG " -"signing for\n" -"your git commits, including Merge Requests and Pull Requests. Please " -"configure\n" -"your git client for GPG signing before you fork i2p.i2p and check " -"anything in." +"Checkins to the I2P Project repositories require you to configure GPG signing for\n" +"your git commits, including Merge Requests and Pull Requests. Please configure\n" +"your git client for GPG signing before you fork i2p.i2p and check anything in." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55 @@ -12728,32 +11322,24 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60 msgid "" -"The official repository is the one hosted at https://i2pgit.org/i2p-" -"hackers/i2p.i2p\n" -"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\"" -" available\n" +"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n" +"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n" "at Github at https://github.com/i2p/i2p.i2p." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66 msgid "" -"Now that we're on git, we can synchronize repositories from our own self-" -"hosted Gitlab\n" -"instance, to Github, and back again. This means that it is possible to " -"create and submit\n" -"a merge request on Gitlab and when it is merged, the result will be " -"synced with Github,\n" +"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n" +"instance, to Github, and back again. This means that it is possible to create and submit\n" +"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n" "and a Pull Request on Github, when merged, will appear on Gitlab." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73 msgid "" -"This means that it's possible to submit code to us through our Gitlab " -"instance or through\n" -"Github depending on what you prefer, however, more of the I2P developers " -"are regularly\n" -"monitoring Gitlab than Github. MR's to Gitlab are more likely to be " -"merged sooner\n" +"This means that it's possible to submit code to us through our Gitlab instance or through\n" +"Github depending on what you prefer, however, more of the I2P developers are regularly\n" +"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n" "than PR's to Github." msgstr "" @@ -12763,14 +11349,10 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85 msgid "" -"Congratulations and thanks to everyone who helped in the git migration, " -"especially\n" -"zzz, eche|on, nextloop, and our site mirror operators! While some of us " -"will miss\n" -"Monotone, it has become a barrier for new and existing participants in " -"I2P development\n" -"and we're excited to join the world of developers using Git to manage " -"their distributed\n" +"Congratulations and thanks to everyone who helped in the git migration, especially\n" +"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n" +"Monotone, it has become a barrier for new and existing participants in I2P development\n" +"and we're excited to join the world of developers using Git to manage their distributed\n" "projects." msgstr "" @@ -12785,55 +11367,28 @@ msgstr "Wersja 0.9.49: poprawki SSU i szybsza kryptografia" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16 msgid "" "0.9.49 continues the work to make I2P faster and more secure.\n" -"We have several improvements and fixes for the SSU (UDP) transport that " -"should result in faster speeds.\n" -"This release also starts the migration to new, faster ECIES-X25519 " -"encryption for routers.\n" +"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n" +"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n" "(Destinations have been using this encryption for a few releases now)\n" -"We've been working on the specifications and protocols for new encryption" -" for several years,\n" -"and we are getting close to the end of it! The migration will take " -"several releases to complete." -msgstr "" -"W wersji 0.9.49 kontynuujemy prace nad polepszeniem szybkoÅ›ci i " -"bezpieczeÅ„stwa sieci I2P. Wprowadzono szereg ulepszeÅ„ i poprawek dla " -"transportu SSU (UDP), co powinno pozwolić osiÄ…gać wiÄ™kszÄ… szybkość " -"dziaÅ‚ania. To wydanie rozpoczyna migracjÄ™ na nowe, szybsze szyfrowanie " -"ECIES-X25519 dla wÄ™złów. (Szyfrowanie to jest już obecnie używane dla " -"adresów celów.) Prace nad specyfikacjami i protokoÅ‚ami nowego szyfrowania" -" prowadzimy od lat i zbliżamy siÄ™ ku koÅ„cowi! Migracja potrwa przez kilka" -" nastÄ™pnych wydaÅ„." +"We've been working on the specifications and protocols for new encryption for several years,\n" +"and we are getting close to the end of it! The migration will take several releases to complete." +msgstr "W wersji 0.9.49 kontynuujemy prace nad polepszeniem szybkoÅ›ci i bezpieczeÅ„stwa sieci I2P. Wprowadzono szereg ulepszeÅ„ i poprawek dla transportu SSU (UDP), co powinno pozwolić osiÄ…gać wiÄ™kszÄ… szybkość dziaÅ‚ania. To wydanie rozpoczyna migracjÄ™ na nowe, szybsze szyfrowanie ECIES-X25519 dla wÄ™złów. (Szyfrowanie to jest już obecnie używane dla adresów celów.) Prace nad specyfikacjami i protokoÅ‚ami nowego szyfrowania prowadzimy od lat i zbliżamy siÄ™ ku koÅ„cowi! Migracja potrwa przez kilka nastÄ™pnych wydaÅ„." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25 msgid "" -"For this release, to minimize disruption, only new installs and a very " -"small percentage of existing installs\n" +"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n" "(randomly selected at restart) will be using the new encryption.\n" -"If your router does \"rekey\" to use the new encryption, it may have " -"lower traffic or less reliability than usual for several days after you " -"restart.\n" +"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n" "This is normal, because your router has generated a new identity.\n" "Your performance should recover after a while." -msgstr "" -"Aby nie spowodować chaosu, nowe szyfrowanie zostanie wÅ‚Ä…czone tylko dla " -"nowych instalacji i niewielkiego procenta obecnych instalacji (z pewnym " -"prawdopodobieÅ„stwem podczas startu wÄ™zÅ‚a). Jeżeli Twój wÄ™zeÅ‚ dokona " -"zmiany klucza na nowe szyfrowanie, przez kilka dni od restartu możesz " -"doÅ›wiadczyć niższego transferu i niezawodnoÅ›ci. Jest to normalne, " -"ponieważ Twój wÄ™zeÅ‚ wygeneruje nowÄ… tożsamość. Wydajność powinna powrócić" -" po pewnym czasie." +msgstr "Aby nie spowodować chaosu, nowe szyfrowanie zostanie wÅ‚Ä…czone tylko dla nowych instalacji i niewielkiego procenta obecnych instalacji (z pewnym prawdopodobieÅ„stwem podczas startu wÄ™zÅ‚a). Jeżeli Twój wÄ™zeÅ‚ dokona zmiany klucza na nowe szyfrowanie, przez kilka dni od restartu możesz doÅ›wiadczyć niższego transferu i niezawodnoÅ›ci. Jest to normalne, ponieważ Twój wÄ™zeÅ‚ wygeneruje nowÄ… tożsamość. Wydajność powinna powrócić po pewnym czasie." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33 msgid "" -"We have \"rekeyed\" the network twice before, when changing the default " -"signature type,\n" +"We have \"rekeyed\" the network twice before, when changing the default signature type,\n" "but this is the first time we've changed the default encryption type.\n" "Hopefully it will all go smoothly, but we're starting slowly to be sure." -msgstr "" -"Zmiana kluczy nastÄ…piÅ‚a w sieci I2P jeż dwa razy podczas zmiany " -"domyÅ›lnego typu podpisu, ale po raz pierwszy zmieniamy domyÅ›lny typ " -"szyfrowania. Miejmy nadziejÄ™, że zmiana przebiegnie bezproblemowo, ale z " -"ostrożnoÅ›ci wprowadzamy jÄ… pomaÅ‚u." +msgstr "Zmiana kluczy nastÄ…piÅ‚a w sieci I2P jeż dwa razy podczas zmiany domyÅ›lnego typu podpisu, ale po raz pierwszy zmieniamy domyÅ›lny typ szyfrowania. Miejmy nadziejÄ™, że zmiana przebiegnie bezproblemowo, ale z ostrożnoÅ›ci wprowadzamy jÄ… pomaÅ‚u." #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:49 msgid "Build: Git migration" @@ -12896,7 +11451,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68 -msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" +msgid "" +"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69 @@ -12965,31 +11521,18 @@ msgstr "Wersja 0.9.50 z usprawnieniami IPv6" #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16 msgid "" -"0.9.50 continues the transition to ECIES-X25519 for router encryption " -"keys.\n" -"We have enabled DNS over HTTPS for reseeding to protect users from " -"passive DNS snooping.\n" -"There are numerous fixes and improvements for IPv6 addresses, including " -"new UPnP support." -msgstr "" -"Wersja 0.9.50 kontynuuje migracjÄ™ kluczy szyfrujÄ…cych wÄ™złów na algorytm " -"ECIES-X25519. WÅ‚Ä…czono DNS przez HTTPS dla operacji reseedowania, aby " -"chronić użytkowników przed nasÅ‚uchem zapytaÅ„ DNS. Wprowadzono szereg " -"poprawek i ulepszeÅ„ dla adresów IPv6, wliczajÄ…c wsparcie dla UPnP." +"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n" +"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n" +"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support." +msgstr "Wersja 0.9.50 kontynuuje migracjÄ™ kluczy szyfrujÄ…cych wÄ™złów na algorytm ECIES-X25519. WÅ‚Ä…czono DNS przez HTTPS dla operacji reseedowania, aby chronić użytkowników przed nasÅ‚uchem zapytaÅ„ DNS. Wprowadzono szereg poprawek i ulepszeÅ„ dla adresów IPv6, wliczajÄ…c wsparcie dla UPnP." #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22 msgid "" "We have finally fixed some longstanding SusiMail corruption bugs.\n" -"Changes to the bandwidth limiter should improve network tunnel " -"performance.\n" +"Changes to the bandwidth limiter should improve network tunnel performance.\n" "There are several improvements in our Docker containers.\n" -"We have improved our defenses for possible malicious and buggy routers in" -" the network." -msgstr "" -"W koÅ„cu naprawiono wystÄ™pujÄ…ce od dawna bÅ‚Ä™dy w SusiMail. Zmiany w " -"ograniczniku przepustowoÅ›ci powinny poprawić wydajność tuneli. " -"Wprowadzono szereg poprawek w kontenerach Dockera. UsprawniliÅ›my ochronÄ™ " -"przed potencjalnie zÅ‚oÅ›liwymi i kÅ‚opotliwymi wÄ™zÅ‚ami w sieci." +"We have improved our defenses for possible malicious and buggy routers in the network." +msgstr "W koÅ„cu naprawiono wystÄ™pujÄ…ce od dawna bÅ‚Ä™dy w SusiMail. Zmiany w ograniczniku przepustowoÅ›ci powinny poprawić wydajność tuneli. Wprowadzono szereg poprawek w kontenerach Dockera. UsprawniliÅ›my ochronÄ™ przed potencjalnie zÅ‚oÅ›liwymi i kÅ‚opotliwymi wÄ™zÅ‚ami w sieci." #: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39 msgid "Docker improvements" @@ -13137,31 +11680,17 @@ msgstr "Wersja 1.5.0 wprowadza nowe wiadomoÅ›ci tworzenia tuneli" #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16 msgid "" -"Yes, that's right, after 9 years of 0.9.x releases, we are going straight" -" from 0.9.50 to 1.5.0.\n" -"This does not signify a major API change, or a claim that development is " -"now complete.\n" -"It is simply a recognition of almost 20 years of work to provide " -"anonymity and security for our users." -msgstr "" -"Zgadza siÄ™ (!) – po 9 latach wydawania wersji 0.9.x przechodzimy prosto z" -" wersji 0.9.50 na 1.5.0. Nie oznacza to jakieÅ› znaczÄ…cej zmiany w API, " -"ani też ukoÅ„czenia prac nad I2P. Jest to po prostu sygnaÅ‚ tego, że od " -"prawie 20 lat zapewniamy anonimowość i bezpieczeÅ„stwo naszym " -"użytkownikom." +"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n" +"This does not signify a major API change, or a claim that development is now complete.\n" +"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users." +msgstr "Zgadza siÄ™ (!) – po 9 latach wydawania wersji 0.9.x przechodzimy prosto z wersji 0.9.50 na 1.5.0. Nie oznacza to jakieÅ› znaczÄ…cej zmiany w API, ani też ukoÅ„czenia prac nad I2P. Jest to po prostu sygnaÅ‚ tego, że od prawie 20 lat zapewniamy anonimowość i bezpieczeÅ„stwo naszym użytkownikom." #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22 msgid "" -"This release finishes implementation of smaller tunnel build messages to " -"reduce bandwidth.\n" -"We continue the transition of the network's routers to X25519 encryption." -"\n" +"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n" +"We continue the transition of the network's routers to X25519 encryption.\n" "Of course there are also numerous bug fixes and performance improvements." -msgstr "" -"W tym wydaniu ukoÅ„czono prace nad mniejszymi wiadomoÅ›ciami tworzenia " -"tuneli, aby zmniejszyć wykorzystywanÄ… przepustowość. Kontynuujemy " -"migracjÄ™ wÄ™złów na szyfrowanie X25519. Jak zwykle poprawiono kilka bÅ‚Ä™dów" -" i poprawiono wydajność." +msgstr "W tym wydaniu ukoÅ„czono prace nad mniejszymi wiadomoÅ›ciami tworzenia tuneli, aby zmniejszyć wykorzystywanÄ… przepustowość. Kontynuujemy migracjÄ™ wÄ™złów na szyfrowanie X25519. Jak zwykle poprawiono kilka bÅ‚Ä™dów i poprawiono wydajność." #: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39 msgid "Tunnels: Finish support for new build messages (proposal 157)" @@ -13221,33 +11750,22 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16 msgid "" -"It's hard to believe, but I2P has been around for nearly 20 years! From " -"its\n" -"beginning as a C project which provided anonymous access to IRC, we've " -"had\n" -"hundreds of contributors, accepted checkins from dozens of coders, used 2" -"\n" -"main languages, 3 version control systems, experienced a migration of its" -"\n" -"crypography, and multiple soft-forks. There have been around 500 " -"registered\n" -"sites on the Invisible Web, and countless unregistered I2P sites that " -"were only\n" +"It's hard to believe, but I2P has been around for nearly 20 years! From its\n" +"beginning as a C project which provided anonymous access to IRC, we've had\n" +"hundreds of contributors, accepted checkins from dozens of coders, used 2\n" +"main languages, 3 version control systems, experienced a migration of its\n" +"crypography, and multiple soft-forks. There have been around 500 registered\n" +"sites on the Invisible Web, and countless unregistered I2P sites that were only\n" "accessible via their cryptographic hostnames." msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26 msgid "" -"Thanks to the participation of users like you, the network has grown from" -" a tiny\n" -"group of power users to over 75,000 nodes operated from all over the " -"world,\n" -"made of I2P routers bundled in perhaps dozens of applications. Today I2P " -"is\n" -"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, " -"OpenBSD, and\n" -"many other systems. I2P can run on phones and even in SOHO routers " -"(thanks to the\n" +"Thanks to the participation of users like you, the network has grown from a tiny\n" +"group of power users to over 75,000 nodes operated from all over the world,\n" +"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n" +"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n" +"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n" "independent C++ implementation of the protocol, i2pd)." msgstr "" @@ -13257,28 +11775,20 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40 msgid "" -"Even before other anonymity projects were providing their own application" -"\n" -"bundles, I2P was a tool for building applications that were configured " -"for\n" -"anonymity. Over the years, we've leaned on this strength, by expanding " -"our\n" +"Even before other anonymity projects were providing their own application\n" +"bundles, I2P was a tool for building applications that were configured for\n" +"anonymity. Over the years, we've leaned on this strength, by expanding our\n" "APIs to support more and more versatile applications. Today, we're still\n" "developing new ways of building I2P into applications." msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48 msgid "" -"Using the power of the Hidden Services Manager or the SAM API, developers" -" of all\n" -"kinds of applications can empower their users with anonymity using I2P. " -"Exciting\n" -"downstream projects like Monero's I2P-Zero have made it very easy for " -"developers\n" -"to help their users get connected to I2P. Today, I2P helps provide " -"anonymity to\n" -"dozens of applications including Bitcoin, IRC, email and multiple file-" -"sharing\n" +"Using the power of the Hidden Services Manager or the SAM API, developers of all\n" +"kinds of applications can empower their users with anonymity using I2P. Exciting\n" +"downstream projects like Monero's I2P-Zero have made it very easy for developers\n" +"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n" +"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n" "protocols." msgstr "" @@ -13288,35 +11798,26 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62 msgid "" -"I2P has always been a decentralized network, because its obvious that " -"providing\n" -"an anonymity network is an intrinsically collaborative process. To " -"illustrate\n" +"I2P has always been a decentralized network, because its obvious that providing\n" +"an anonymity network is an intrinsically collaborative process. To illustrate\n" "with the most extreme example, a single computer cannot provide itself\n" -"with anonymity, nor can it be a useful network, by definiton. However, " -"building\n" +"with anonymity, nor can it be a useful network, by definiton. However, building\n" "I2P in this fully-decentralized manner hasn't always been easy." msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70 msgid "" -"From the beginning, I2P would need to be scalable, and be able to balance" -" itself\n" -"so that high-bandwidth nodes wouldn't be able to easily take over the " -"network.\n" -"Sybil attacks would leave the realm of academia and we would need to " -"develop\n" +"From the beginning, I2P would need to be scalable, and be able to balance itself\n" +"so that high-bandwidth nodes wouldn't be able to easily take over the network.\n" +"Sybil attacks would leave the realm of academia and we would need to develop\n" "new defenses against them." msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77 msgid "" -"We've worked very hard to never compromise on this stance, and today " -"every I2P\n" -"router helps participate in providing the network with bandwidth " -"resources and\n" -"providing the users with anonymity. In doing so, we've learned incredible" -" things\n" +"We've worked very hard to never compromise on this stance, and today every I2P\n" +"router helps participate in providing the network with bandwidth resources and\n" +"providing the users with anonymity. In doing so, we've learned incredible things\n" "and produced a network which at times has seemed inconceivable." msgstr "" @@ -13326,12 +11827,9 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89 msgid "" -"Over the next 2 weeks, we've planned some blog posts where we'll explore " -"the past,\n" -"present, and future of I2P, highlight applications and tools that build " -"on\n" -"and enhance I2P, and showcase the best of our community. Check back here " -"for\n" +"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n" +"present, and future of I2P, highlight applications and tools that build on\n" +"and enhance I2P, and showcase the best of our community. Check back here for\n" "more in the coming days!" msgstr "" @@ -13343,8 +11841,7 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98 msgid "" -"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from " -"Monero)\n" +"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n" " </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_" msgstr "" @@ -13356,8 +11853,8 @@ msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102 msgid "" -"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for" -" End-Users" +"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for " +"End-Users" msgstr "" #: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103 @@ -13377,7 +11874,8 @@ msgid "A history of I2P As We Know It" msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:11 -msgid "Invisibility is the best defense: building an internet within an internet" +msgid "" +"Invisibility is the best defense: building an internet within an internet" msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:16 @@ -13411,17 +11909,14 @@ msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:40 msgid "" "“InvisibleNet is a research & development driven organization whose main\n" -" focus is the innovation of intelligent network technology. Our goal " -"is\n" -" to provide the highest standards in security and privacy on the " -"widely\n" +" focus is the innovation of intelligent network technology. Our goal is\n" +" to provide the highest standards in security and privacy on the widely\n" " used, yet notoriously insecure Internet.\"" msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:45 msgid "" -"\"The InvisibleNet team is comprised of a talented group of developers " -"and\n" +"\"The InvisibleNet team is comprised of a talented group of developers and\n" " architects entirely dedicated to providing its users with both\n" " convenience and the very best in secure communication.\"" msgstr "" @@ -13429,16 +11924,14 @@ msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:49 msgid "" "\"Our technological ideals are reflected in the implementation of a\n" -" framework that is solid in design, and transparent in its " -"application.\"" +" framework that is solid in design, and transparent in its application.\"" msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:52 msgid "" "\"Here at InvisibleNet we strive towards the greatest level of quality\n" " possible by keeping all areas of our research & development open and\n" -" available to the public for peer review, feedback, suggestions and " -"new\n" +" available to the public for peer review, feedback, suggestions and new\n" " ideas.â€" msgstr "" @@ -13463,12 +11956,10 @@ msgstr "" msgid "" "\"This, in essence will be an impenetrable neural-network, that is\n" " self-driven, self-defensed, and completely seamless to already\n" -" applied protocols, specifically client to server (or agents as I call" -"\n" +" applied protocols, specifically client to server (or agents as I call\n" " them). It will be THE next transport layer, a layer on top of the\n" " notoriously insecure Internet, to deliver full anonymity, privacy,\n" -" and security at the highest level possible. Decentralized and peer to" -"\n" +" and security at the highest level possible. Decentralized and peer to\n" " peer Internet, by the way, means no more worrying about your ISP\n" " controlling your traffic. This will allow you to do seamless\n" " activities and change the way we look at security and even the\n" @@ -13833,8 +12324,7 @@ msgid "" "for its users was created in 2013. It was the first coin that provided\n" "built-in support for I2P, as well as Tor that makes it impossible to\n" "determine the IP address of the user. The developers, including meeh,\n" -"also ran organizations like Privacy Solutions, and provided " -"infrastructure\n" +"also ran organizations like Privacy Solutions, and provided infrastructure\n" "support to the I2P network by running services like outproxies and\n" "reseed servers." msgstr "" @@ -13908,11 +12398,9 @@ msgid "" "The new I2P transport protocol provides effective resistance against\n" " DPI censorship. It also results in reduced CPU load because of the\n" " faster, modern cryptography used. It makes I2P more likely to run on\n" -" low-end devices, such as smartphones and home routers. Both major I2P" -"\n" +" low-end devices, such as smartphones and home routers. Both major I2P\n" " implementations have full support for NTCP2 and it make NTCP2\n" -" available for use starting with version 0.9.36 (Java) and 2.20 (i2pd," -"\n" +" available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n" " C++)." msgstr "" @@ -13925,8 +12413,7 @@ msgstr "" #: i2p2www/blog/2021/08/28/History-of-I2P.rst:415 msgid "" "0.9.39 included extensive changes for new network database types\n" -"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support" -"\n" +"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n" "development of RPC applications." msgstr "" @@ -14072,18 +12559,12 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16 msgid "" -"It has been said in the past that I2P emphasizes support for Hidden " -"Services,\n" -"which is true in many ways. However, what this means to users, " -"developers, and\n" -"hidden service administrators isn't always the same. Encrypted LeaseSets " -"and\n" -"their use-cases provide a unique, practical window into how I2P makes " -"hidden\n" -"services more versatile, easier to administer, and how I2P extends on the" -"\n" -"Hidden Service concept to provide security benefits for potentially " -"interesting\n" +"It has been said in the past that I2P emphasizes support for Hidden Services,\n" +"which is true in many ways. However, what this means to users, developers, and\n" +"hidden service administrators isn't always the same. Encrypted LeaseSets and\n" +"their use-cases provide a unique, practical window into how I2P makes hidden\n" +"services more versatile, easier to administer, and how I2P extends on the\n" +"Hidden Service concept to provide security benefits for potentially interesting\n" "use-cases." msgstr "" @@ -14095,33 +12576,22 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31 msgid "" -"When you create a hidden service, you publish something called a " -"\"LeaseSet\" to\n" -"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P" -" users\n" -"need to discover \"where\" your hidden service is on the I2P Network. It " -"contains\n" -"\"Leases\" which identify tunnels that can be used to reach your hidden " -"service,\n" -"and the public key of your destination, which clients will encrypt " -"messages to.\n" -"This type of hidden service is reachable by anyone who has the address, " -"which\n" +"When you create a hidden service, you publish something called a \"LeaseSet\" to\n" +"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n" +"need to discover \"where\" your hidden service is on the I2P Network. It contains\n" +"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n" +"and the public key of your destination, which clients will encrypt messages to.\n" +"This type of hidden service is reachable by anyone who has the address, which\n" "is probably the most common use case for now." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41 msgid "" -"Sometimes, you might not want to allow your hidden services to be " -"accessible by\n" -"anyone, though. Some people use hidden services as a way of accessing an " -"SSH\n" -"server on a home PC, or to stitch together a network of IOT Devices. In " -"these\n" -"cases it's not necessary, and may be counter-productive, to make your " -"hidden\n" -"service accessible to everyone one the I2P Network. This is where " -"\"Encrypted\n" +"Sometimes, you might not want to allow your hidden services to be accessible by\n" +"anyone, though. Some people use hidden services as a way of accessing an SSH\n" +"server on a home PC, or to stitch together a network of IOT Devices. In these\n" +"cases it's not necessary, and may be counter-productive, to make your hidden\n" +"service accessible to everyone one the I2P Network. This is where \"Encrypted\n" "LeaseSets\" come into play." msgstr "" @@ -14134,33 +12604,22 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55 msgid "" "Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n" -"encrypted form, where none of the Leases or public keys are visible " -"unless\n" -"the client has the keys required to decrypt the LeaseSet inside of it. " -"Only\n" -"clients you share keys with(For PSK Encrypted LeaseSets), or who share " -"their\n" -"keys with you(For DH Encrypted LeaseSets), will be able to see the " -"destination\n" +"encrypted form, where none of the Leases or public keys are visible unless\n" +"the client has the keys required to decrypt the LeaseSet inside of it. Only\n" +"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n" +"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n" "and no one else." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64 msgid "" -"I2P Supports several strategies for Encrypted LeaseSets. The key " -"characteristics\n" -"of each strategy are important to understand when deciding which one to " -"use. If\n" -"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the " -"server\n" -"will generate a key(or keys) which the server operator then shares with " -"each\n" -"client. Of course, this exchange must happen out-of-band, possibly via an" -"\n" -"exchange on IRC for example. This version of Encrypted LeaseSets is sort " -"of\n" -"like logging into Wi-Fi with a password. Except, what you're logging into" -" is\n" +"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n" +"of each strategy are important to understand when deciding which one to use. If\n" +"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n" +"will generate a key(or keys) which the server operator then shares with each\n" +"client. Of course, this exchange must happen out-of-band, possibly via an\n" +"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n" +"like logging into Wi-Fi with a password. Except, what you're logging into is\n" "a Hidden Service." msgstr "" @@ -14168,27 +12627,19 @@ msgstr "" msgid "" "If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n" "strategy, then they keys are generated on the client instead. When a\n" -"Diffie-Hellman client connects to a destination with an Encrypted " -"LeaseSet, they\n" -"must first share their keys with the server operator. The server operator" -" then\n" -"decides whether to authorize the DH client. This version of Encrypted " -"LeaseSets\n" -"is sort of like SSH with an `authorized_keys` file. Except, what you're " -"logging\n" +"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n" +"must first share their keys with the server operator. The server operator then\n" +"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n" +"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n" "into is a Hidden Service." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85 msgid "" -"By Encrypting your LeaseSet, you not only make it impossible for " -"unauthorized\n" -"users to connect to your destination, you make it impossible for " -"unauthorized\n" -"visitors to even discover the real destination of the I2P Hidden Service." -" Some\n" -"readers have probably already considered a use-case for their own " -"Encrypted\n" +"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n" +"users to connect to your destination, you make it impossible for unauthorized\n" +"visitors to even discover the real destination of the I2P Hidden Service. Some\n" +"readers have probably already considered a use-case for their own Encrypted\n" "LeaseSet." msgstr "" @@ -14200,50 +12651,35 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98 msgid "" -"As a general rule, the more complex information a service has access to " -"about\n" -"your device, the more dangerous it is to expose that service to the " -"Internet or\n" -"indeed, to a Hidden Service network like I2P. If you want to expose such " -"a\n" -"service, you need to protect it with something like a password, or, in " -"the case\n" -"of I2P, a much more thorough and secure option could be an Encrypted " -"LeaseSet." +"As a general rule, the more complex information a service has access to about\n" +"your device, the more dangerous it is to expose that service to the Internet or\n" +"indeed, to a Hidden Service network like I2P. If you want to expose such a\n" +"service, you need to protect it with something like a password, or, in the case\n" +"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106 msgid "" -"**Before continuing, please read and understand that if you do the " -"following**\n" -"**procedure without an Encrypted LeaseSet, you will be defeating the " -"security of**\n" -"**your I2P router. Do not configure access to your router console over " -"I2P without**\n" -"**an Encrypted LeaseSet. Additionally, do not share your Encrypted " -"LeaseSet PSK's**\n" +"**Before continuing, please read and understand that if you do the following**\n" +"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n" +"**your I2P router. Do not configure access to your router console over I2P without**\n" +"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n" "**with any devices you do not control.**" msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114 msgid "" -"One such service which is useful to share over I2P, but ONLY with an " -"Encrypted\n" -"LeaseSet, is the I2P router console itself. Exposing the I2P router " -"console on\n" -"one machine to I2P with an Encrypted LeaseSet allows another machine with" -" a\n" -"browser to administer the remote I2P instance. I find this useful for " -"remotely\n" -"monitoring my regular I2P Services. It could also be used to monitor a " -"server\n" +"One such service which is useful to share over I2P, but ONLY with an Encrypted\n" +"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n" +"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n" +"browser to administer the remote I2P instance. I find this useful for remotely\n" +"monitoring my regular I2P Services. It could also be used to monitor a server\n" "which is used to seed a torrent long-term as a way to access I2PSnark." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123 msgid "" -"For as long as it takes to explain them, setting up an Encrypted LeaseSet" -" is\n" +"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n" "straightforward to configure via the Hidden Services Manager UI." msgstr "" @@ -14255,23 +12691,17 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137 msgid "" -"Start by opening the Hidden Services Manager at " -"http://127.0.0.1:7657/i2ptunnelmgr\n" -"and scroll to the bottom of the section that says \"I2P Hidden " -"Services.\" Create\n" -"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" " -"with these\n" +"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n" +"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n" +"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n" "\"Tunnel Cryptography Options\" and save the hidden service." msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148 msgid "" -"Then, select your new tunnel from the Hidden Services Manager main page. " -"The\n" -"Tunnel Cryptography Options should now include your first Pre-Shared Key." -" Copy\n" -"this down for the next step, along with the Encrypted Base32 Address of " -"your\n" +"Then, select your new tunnel from the Hidden Services Manager main page. The\n" +"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n" +"this down for the next step, along with the Encrypted Base32 Address of your\n" "tunnel." msgstr "" @@ -14283,16 +12713,11 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164 msgid "" -"Now switch computers to the client which will connect to the hidden " -"service,\n" -"and visit the Keyring Configuration at " -"http://127.0.0.1:7657/configkeyring to\n" -"add the keys from earlier. Start by pasting the Base32 from the Server " -"into\n" -"the field labeled: \"Full destination, name, Base32, or hash.\" Next, " -"paste the\n" -"Pre-Shared Key from the server into the \"Encryption Key\" field. Click " -"save,\n" +"Now switch computers to the client which will connect to the hidden service,\n" +"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n" +"add the keys from earlier. Start by pasting the Base32 from the Server into\n" +"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n" +"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n" "and you're ready to securely visit the Hidden Service using an Encrypted\n" "LeaseSet." msgstr "" @@ -14305,22 +12730,14 @@ msgstr "" #: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183 msgid "" -"As you can see, I2P offers unique capabilities to Hidden Service " -"Administrators\n" -"which empower them to securely manage their I2P connections from anywhere" -" in the\n" -"world. Other Encrypted LeaseSets I keep on the same device for the same " -"reason\n" -"point to the SSH server, the Portainer instance I user to manage my " -"service\n" -"containers, and my personal NextCloud instance. With I2P, truly private, " -"always\n" -"reachable Self-Hosting is an achievable goal, in fact I think it's one of" -" the\n" -"things we're uniquely suited to, because of Encrypted LeaseSets. With " -"them, I2P\n" -"could become the key to securing self-hosted home automation or simply " -"become\n" +"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n" +"which empower them to securely manage their I2P connections from anywhere in the\n" +"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n" +"point to the SSH server, the Portainer instance I user to manage my service\n" +"containers, and my personal NextCloud instance. With I2P, truly private, always\n" +"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n" +"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n" +"could become the key to securing self-hosted home automation or simply become\n" "the backbone of a new more private peer-to-peer web." msgstr "" @@ -14336,36 +12753,24 @@ msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11 msgid "" -"For the majority of I2P's existence, it's been an application that runs " -"with the\n" -"help of a Java Virtual Machine that is already installed on the platform." -" This\n" -"has always been the normal way to distribute Java applications, but it " -"leads to\n" -"a complicated installation procedure for many people. To make things even" -" more\n" -"complicated, the \"right answer\" to making I2P easy to install on any " -"given\n" -"platform might not be the same as any other platform. For example, I2P is" -" quite\n" -"simple to install with standard tools on Debian and Ubuntu based " -"operating\n" -"systems, because we can simply list the required Java components as " -"\"Required\"\n" -"by our package, however on Windows or OSX, there is no such system " -"allowing us to make\n" +"For the majority of I2P's existence, it's been an application that runs with the\n" +"help of a Java Virtual Machine that is already installed on the platform. This\n" +"has always been the normal way to distribute Java applications, but it leads to\n" +"a complicated installation procedure for many people. To make things even more\n" +"complicated, the \"right answer\" to making I2P easy to install on any given\n" +"platform might not be the same as any other platform. For example, I2P is quite\n" +"simple to install with standard tools on Debian and Ubuntu based operating\n" +"systems, because we can simply list the required Java components as \"Required\"\n" +"by our package, however on Windows or OSX, there is no such system allowing us to make\n" "sure that a compatible Java is installed." msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24 msgid "" -"The obvious solution would be to manage the Java installation ourselves, " -"but\n" -"this used to a problem in-and-of-itself, outside of the scope of I2P. " -"However,\n" +"The obvious solution would be to manage the Java installation ourselves, but\n" +"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n" "in recent Java versions, a new set of options has emerged which has the\n" -"potential to solve this problem for many Java software. This exciting " -"tool is\n" +"potential to solve this problem for many Java software. This exciting tool is\n" "called **\"Jpackage.\"**" msgstr "" @@ -14375,31 +12780,21 @@ msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37 msgid "" -"The first very successful effort at building a dependency-free I2P " -"Package was\n" -"I2P-Zero, which was created by the Monero project originally for use with" -" the\n" -"Monero cryptocurrency. This project got us very excited because of it's " -"success\n" -"in creating a general-purpose I2P router which could easily packaged with" -" an\n" -"I2P application. Especially on Reddit, many people express their " -"preference for\n" +"The first very successful effort at building a dependency-free I2P Package was\n" +"I2P-Zero, which was created by the Monero project originally for use with the\n" +"Monero cryptocurrency. This project got us very excited because of it's success\n" +"in creating a general-purpose I2P router which could easily packaged with an\n" +"I2P application. Especially on Reddit, many people express their preference for\n" "the simplicity of setting up an I2P-Zero router." msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46 msgid "" -"This really proved to us that a dependency-free I2P Package which was " -"easy to\n" -"install was possible using modern Java tools, but I2P-Zero's use case was" -" a\n" -"little bit different than ours. It is best for embedded apps that need an" -" I2P\n" -"router that they can easily control using it's convenient control port on" -" port\n" -"\"8051\". Our next step would be to adapt the technology to the general-" -"purpose\n" +"This really proved to us that a dependency-free I2P Package which was easy to\n" +"install was possible using modern Java tools, but I2P-Zero's use case was a\n" +"little bit different than ours. It is best for embedded apps that need an I2P\n" +"router that they can easily control using it's convenient control port on port\n" +"\"8051\". Our next step would be to adapt the technology to the general-purpose\n" "I2P Application." msgstr "" @@ -14409,26 +12804,18 @@ msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60 msgid "" -"The issue became more pressing in recent versions of Mac OSX, where it is" -" no\n" -"longer straightforward to use the \"Classic\" installer which comes in " -"the .jar\n" -"format. This is because the application is not \"Notarized\" by Apple " -"authorities\n" -"and it is deemed a security risk. **However**, Jpackage can produce a " -".dmg file,\n" -"which can be notarized by Apple authorities, conveniently solving our " -"problem." +"The issue became more pressing in recent versions of Mac OSX, where it is no\n" +"longer straightforward to use the \"Classic\" installer which comes in the .jar\n" +"format. This is because the application is not \"Notarized\" by Apple authorities\n" +"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n" +"which can be notarized by Apple authorities, conveniently solving our problem." msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68 msgid "" -"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to " -"install on\n" -"OSX than ever, no longer requiring users to install Java themselves and " -"using\n" -"standard OSX installation tools in their prescribed ways. The new .dmg " -"installer\n" +"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n" +"OSX than ever, no longer requiring users to install Java themselves and using\n" +"standard OSX installation tools in their prescribed ways. The new .dmg installer\n" "makes setting up I2P on Mac OSX easier than it's ever been." msgstr "" @@ -14438,30 +12825,18 @@ msgstr "" #: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84 msgid "" -"One of the things I hear from users the most is that if I2P wants " -"adoption, it\n" -"needs to be easy to use for people. Many of them want a \"Tor Browser " -"Like\" user\n" -"experience, to quote or paraphrase many familiar Redditors. Installation " -"should\n" -"not require complicated and error-prone \"post-installation\" steps. Many" -" new\n" -"users are not prepared to deal with their browser configuration in a " -"thorough\n" -"and complete way. To address this problem, we created the I2P Profile " -"Bundle\n" -"which configured Firefox so that it would automatically \"Just Work\" for" -" I2P.\n" -"As it's developed, it's added security features and improved integration " -"with\n" -"I2P itself. In it's latest version, it **also** bundles a complete, " -"Jpackage\n" -"powered I2P Router. The I2P Firefox Profile is now a fully-fledged " -"distribution\n" -"of I2P for Windows, with the only remaining dependency being Firefox " -"itself.\n" -"This should provide an unprecedented level of convenience for I2P users " -"on\n" +"One of the things I hear from users the most is that if I2P wants adoption, it\n" +"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n" +"experience, to quote or paraphrase many familiar Redditors. Installation should\n" +"not require complicated and error-prone \"post-installation\" steps. Many new\n" +"users are not prepared to deal with their browser configuration in a thorough\n" +"and complete way. To address this problem, we created the I2P Profile Bundle\n" +"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n" +"As it's developed, it's added security features and improved integration with\n" +"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n" +"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n" +"of I2P for Windows, with the only remaining dependency being Firefox itself.\n" +"This should provide an unprecedented level of convenience for I2P users on\n" "Windows." msgstr "" @@ -14475,16 +12850,11 @@ msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11 msgid "" -"An event months in the making, Bitcoin Core has added official support " -"for I2P!\n" -"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin " -"nodes,\n" -"using the help of nodes that operate within both I2P and the clearnet, " -"making\n" -"them first-class participants in the Bitcoin network. It's exciting to " -"see\n" -"large communities like Bitcoin taking notice of the advantages I2P can " -"bring\n" +"An event months in the making, Bitcoin Core has added official support for I2P!\n" +"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n" +"using the help of nodes that operate within both I2P and the clearnet, making\n" +"them first-class participants in the Bitcoin network. It's exciting to see\n" +"large communities like Bitcoin taking notice of the advantages I2P can bring\n" "to them providing privacy and reachability to people all over the world." msgstr "" @@ -14494,13 +12864,10 @@ msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25 msgid "" -"I2P support is automatic, via the SAM API. This is also exciting news, " -"because\n" -"it highlights some of the things I2P is singularly good at, like " -"empowering \n" +"I2P support is automatic, via the SAM API. This is also exciting news, because\n" +"it highlights some of the things I2P is singularly good at, like empowering \n" "application developers to build I2P connections programmatically and\n" -"conveniently. Bitcoin-over-I2P users can use I2P with no manual " -"configuration by\n" +"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n" "enabling the SAM API and running Bitcoin with I2P enabled." msgstr "" @@ -14510,23 +12877,17 @@ msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38 msgid "" -"In order to set up an I2P Router to provide anonymous connectivity to " -"bitcoin,\n" -"the SAM API needs to be enabled. In Java I2P, you should go to " -"`http://127.0.0.1:7657/configclients\n" -"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application " -"Bridge\n" -"with the \"Start\" button. You may also want to enable the SAM " -"Application Bridge\n" -"by default by checking the \"Run at Startup\" box and clicking \"Save " -"Client\n" +"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n" +"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n" +"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n" +"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n" +"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n" "Configuration.\"" msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47 msgid "" -"On i2pd, the SAM API is normally enabled by default, but if it isn't, you" -" should\n" +"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n" "set::\n" "\n" " sam.enabled=true\n" @@ -14540,69 +12901,52 @@ msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61 msgid "" -"Getting Bitcoin itself launched in an anonymous mode still requires " -"editing some\n" -"configuration files in the Bitcoin Data Directory, which is " -"%APPDATA%\\Bitcoin on\n" -"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ " -"on Mac\n" -"OSX. It also requires at least version 22.0.0 for I2P support to be " -"present." +"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n" +"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n" +"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n" +"OSX. It also requires at least version 22.0.0 for I2P support to be present." msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68 msgid "" "After following these instructions, you should have a private Bitcoin\n" "node which uses I2P for I2P connections, and Tor for .onion and clearnet\n" -"connections, so that all your connections are anonymous. For convenience," -"\n" -"Windows users should open their Bitcoin Data Directory by opening the " -"start menu\n" -"and searching for \"Run.\" Inside the run prompt, type " -"\"%APPDATA%\\Bitcoin\" and\n" +"connections, so that all your connections are anonymous. For convenience,\n" +"Windows users should open their Bitcoin Data Directory by opening the start menu\n" +"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n" "press enter." msgstr "" #: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77 msgid "" -"In that directory create a file called \"i2p.conf.\" On Windows, you " -"should make\n" -"sure that you've add quotes around the file when you save it, in order to" -"\n" -"prevent Windows from adding a default file extension to the file. The " -"file\n" +"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n" +"sure that you've add quotes around the file when you save it, in order to\n" +"prevent Windows from adding a default file extension to the file. The file\n" "should contain the following I2P-Related Bitcoin configuration options::\n" "\n" " i2psam=127.0.0.1:7656\n" " i2pacceptincoming=true\n" " onlynet=i2p\n" "\n" -"Next, you should create another file called \"tor.conf.\" The file should" -" contain\n" +"Next, you should create another file called \"tor.conf.\" The file should contain\n" "the following Tor related configuration options::\n" "\n" " proxy=127.0.0.1:9050\n" " onion=127.0.0.1:9050\n" " onlynet=tor\n" "\n" -"Finally, you'll need to \"include\" these configuration options in your " -"Bitcoin\n" -"configuration file, called \"bitcoin.conf\" in the Data Directory. Add " -"these two\n" +"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n" +"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n" "lines to your bitcoin.conf file::\n" "\n" " includeconf=i2p.conf\n" " includeconf=tor.conf\n" "\n" -"Now your Bitcoin node is configured to only use anonymous connections. In" -" order\n" -"to enable direct connections to remote nodes, remove the lines beginning " -"in::\n" +"Now your Bitcoin node is configured to only use anonymous connections. In order\n" +"to enable direct connections to remote nodes, remove the lines beginning in::\n" "\n" " onlynet=\n" "\n" -"You can do this if you do not require your Bitcoin node to be anonymous, " -"and\n" +"You can do this if you do not require your Bitcoin node to be anonymous, and\n" "it helps anonymous users connect to the rest of the Bitcoin network." msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/comparison.po b/i2p2www/translations/pl/LC_MESSAGES/comparison.po index b64039d064bbc82941137021c8acdbd3aba081f9..07bb952fca1a23a3ed8c3618c9c55f4645df4bc2 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/pl/LC_MESSAGES/comparison.po @@ -1,25 +1,24 @@ -# Polish translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# kRkk <krkkx@protonmail.com>, 2018 -# Verdulo :-), 2016 +# Karol Kosek, 2018 +# ☆Verdulo, 2016 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2018-10-04 00:20+0000\n" -"Last-Translator: erinm\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Karol Kosek, 2018\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -27,82 +26,39 @@ msgstr "I2P w porównaniu z Freenetem" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet jest w peÅ‚ni rozproszonÄ…, anonimowÄ…, \"publikujÄ…cÄ…\" sieciÄ… peer-" -"to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i " -"także stara siÄ™ rozwiÄ…zać problem przeciążenia serwerów wynikajÄ…cego z " -"nagÅ‚ego wzrostu zainteresowania danÄ… treÅ›ciÄ…. Podczas gdy Freenet zostaÅ‚ " -"zaprojektowany jako rozproszony magazyn plików, powstaÅ‚y aplikacje " -"pracujÄ…ce na nim i pozwalajÄ…ce na bardziej ogólne sposoby anonimowej " -"komunikacji, takie jak statyczne strony i listy dyskusyjne." +msgstr "Freenet jest w peÅ‚ni rozproszonÄ…, anonimowÄ…, \"publikujÄ…cÄ…\" sieciÄ… peer-to-peer, która umożliwia w bezpieczny sposób na przechowywanie danych, i także stara siÄ™ rozwiÄ…zać problem przeciążenia serwerów wynikajÄ…cego z nagÅ‚ego wzrostu zainteresowania danÄ… treÅ›ciÄ…. Podczas gdy Freenet zostaÅ‚ zaprojektowany jako rozproszony magazyn plików, powstaÅ‚y aplikacje pracujÄ…ce na nim i pozwalajÄ…ce na bardziej ogólne sposoby anonimowej komunikacji, takie jak statyczne strony i listy dyskusyjne." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym " -"magazynem plików w przeciwieÅ„stwie do I2P, co pozwala na dostÄ™p do " -"udostÄ™pnionych treÅ›ci, nawet gdy udostÄ™pniajÄ…cy nie jest już poÅ‚Ä…czony do" -" sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle " -"efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to " -"obciążenie dla tych osób, które chcÄ… po prostu anonimowej komunikacji z " -"innymi poprzez strony, listy dyskusyjne, wymianÄ™ plików, itd. SÄ… próby " -"stworzenia rozproszonego magazynu plików dziaÅ‚ajÄ…cego na sieci I2P, " -"(ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie " -"jest jeszcze gotowy do powszechnego użytku." +msgstr "W porównaniu do I2P, Freenet ma takie zalety jak: jest rozproszonym magazynem plików w przeciwieÅ„stwie do I2P, co pozwala na dostÄ™p do udostÄ™pnionych treÅ›ci, nawet gdy udostÄ™pniajÄ…cy nie jest już poÅ‚Ä…czony do sieci. Dodatkowo pozwala to rozpowszechniać popularne dane niezwykle efektywnie. I2P nie oferuje tej funkcji. Z drugiej strony jest to obciążenie dla tych osób, które chcÄ… po prostu anonimowej komunikacji z innymi poprzez strony, listy dyskusyjne, wymianÄ™ plików, itd. SÄ… próby stworzenia rozproszonego magazynu plików dziaÅ‚ajÄ…cego na sieci I2P, (ostatnio przeportowano <a href=\"%(tahoe)s\">Tahoe-LAFS</a>), ale nie jest jeszcze gotowy do powszechnego użytku." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Jednakże, nawet pomijajÄ…c kwestie implementacji, rozważa siÄ™ problemy " -"dotyczÄ…ce algorytmów Freeneetu majÄ…c na uwadze zarówno skalowalność jak i" -" anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie " -"różnych technik ma za zadanie udaremnić ataki, i być może niektóre " -"aspekty algorytmów trasowania majÄ… dać skalowalność. Niestety niewiele " -"analiz algorytmów daÅ‚o pozytywne wyniki, ale wciąż jest nadzieja. " -"Ostatecznie Freenet zapewnia znaczÄ…cÄ… ochronÄ™ anonimowoÅ›ci, dopóki " -"przeciwnik nie dysponuje zasobami pozwalajÄ…cymi na dalszÄ… analizÄ™." +msgstr "Jednakże, nawet pomijajÄ…c kwestie implementacji, rozważa siÄ™ problemy dotyczÄ…ce algorytmów Freeneetu majÄ…c na uwadze zarówno skalowalność jak i anonimowość, głównie heurestyczne trasowanie Freenetu. Współistnienie różnych technik ma za zadanie udaremnić ataki, i być może niektóre aspekty algorytmów trasowania majÄ… dać skalowalność. Niestety niewiele analiz algorytmów daÅ‚o pozytywne wyniki, ale wciąż jest nadzieja. Ostatecznie Freenet zapewnia znaczÄ…cÄ… ochronÄ™ anonimowoÅ›ci, dopóki przeciwnik nie dysponuje zasobami pozwalajÄ…cymi na dalszÄ… analizÄ™." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -110,15 +66,11 @@ msgstr "Porównywanie I2P do innych projektów" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -133,10 +85,8 @@ msgstr "" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:2 @@ -154,52 +104,38 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." msgstr "" @@ -207,19 +143,15 @@ msgstr "" #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:184 @@ -231,32 +163,20 @@ msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" msgstr "" @@ -265,36 +185,23 @@ msgstr "" msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." msgstr "" @@ -302,10 +209,8 @@ msgstr "" #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." msgstr "" @@ -319,7 +224,7 @@ msgstr "" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" #: i2p2www/pages/site/comparison/other-networks.html:254 @@ -454,7 +359,7 @@ msgstr "Ukryta usÅ‚uga" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" +msgid "I2P Site or Destination" msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 @@ -525,8 +430,7 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" msgstr "" @@ -545,10 +449,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" msgstr "" #: i2p2www/pages/site/comparison/tor.html:93 @@ -556,7 +458,8 @@ msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" msgstr "" #: i2p2www/pages/site/comparison/tor.html:96 @@ -595,8 +498,8 @@ msgstr "" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" msgstr "" #: i2p2www/pages/site/comparison/tor.html:121 @@ -733,4 +636,3 @@ msgid "" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/docs.po b/i2p2www/translations/pl/LC_MESSAGES/docs.po index beac317eaa894de3cdece39ab0fe21648c331967..0632252192b717b15ac6296e303d9d1f5781bc46 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/docs.po +++ b/i2p2www/translations/pl/LC_MESSAGES/docs.po @@ -1,25 +1,24 @@ -# Polish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Karol Kosek, 2018 # Taporpo Ne <taporpone@gmail.com>, 2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-09-13 22:25+0000\n" -"Last-Translator: Giovanni Pellerano <giovanni.pellerano@evilaliv3.org>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Karol Kosek, 2018\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24 msgid "Index to Technical Documentation" @@ -34,16 +33,14 @@ msgid "" "This index is ordered from the highest to lowest layers.\n" "The higher layers are for \"clients\" or applications;\n" "the lower layers are inside the router itself.\n" -"The interface between applications and the router is the I2CP (I2P " -"Control\n" +"The interface between applications and the router is the I2CP (I2P Control\n" "Protocol) API." msgstr "" #: i2p2www/pages/site/docs/index.html:18 #, python-format msgid "" -"The I2P Project is committed to maintaining accurate, current " -"documentation.\n" +"The I2P Project is committed to maintaining accurate, current documentation.\n" "If you find any inaccuracies in the documents linked below, please\n" "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>." msgstr "" @@ -100,8 +97,8 @@ msgstr "Prezentacje, artykuÅ‚y, poradniki, video i wywiady" #: i2p2www/pages/site/docs/index.html:36 #, python-format msgid "" -"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>" -" August 28, 2003 (pdf)" +"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> " +"August 28, 2003 (pdf)" msgstr "" #: i2p2www/pages/site/docs/index.html:39 @@ -130,7 +127,8 @@ msgstr "Specyfikacja wtyczek" msgid "Managed Clients" msgstr "" -#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240 +#: i2p2www/pages/site/docs/index.html:47 +#: i2p2www/pages/site/docs/index.html:240 msgid "Embedding the router in your application" msgstr "" @@ -147,7 +145,8 @@ msgstr "" msgid "hostsdb.blockfile Format" msgstr "" -#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206 +#: i2p2www/pages/site/docs/index.html:51 +#: i2p2www/pages/site/docs/index.html:206 msgid "Configuration File Format" msgstr "Format pliku konfiguracji" @@ -224,8 +223,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:101 msgid "" -"The lowest-level API used for clients (applications) to send and receive " -"traffic to a router.\n" +"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n" "Traditionally used only by Java applications and higher-level APIs." msgstr "" @@ -284,8 +282,7 @@ msgstr "Baza danych sieci" #: i2p2www/pages/site/docs/index.html:127 msgid "" -"Distributed storage and retrieval of information about routers and " -"clients." +"Distributed storage and retrieval of information about routers and clients." msgstr "" #: i2p2www/pages/site/docs/index.html:129 @@ -347,8 +344,8 @@ msgstr "Tunele" #: i2p2www/pages/site/docs/index.html:154 msgid "" -"Selecting peers, requesting tunnels through those peers, and encrypting " -"and routing messages through these tunnels." +"Selecting peers, requesting tunnels through those peers, and encrypting and " +"routing messages through these tunnels." msgstr "" #: i2p2www/pages/site/docs/index.html:156 @@ -403,7 +400,8 @@ msgid "Transport Layer" msgstr "" #: i2p2www/pages/site/docs/index.html:171 -msgid "The protocols for direct (point-to-point) router to router communication." +msgid "" +"The protocols for direct (point-to-point) router to router communication." msgstr "" #: i2p2www/pages/site/docs/index.html:173 @@ -541,31 +539,27 @@ msgstr "" msgid "Bug tracker" msgstr "Tracker bÅ‚Ä™dów" -#: i2p2www/pages/site/docs/index.html:257 -msgid "Viewmtn inside I2P" -msgstr "" - -#: i2p2www/pages/site/docs/index.html:260 +#: i2p2www/pages/site/docs/index.html:256 msgid "I2P Source exported to GitHub" msgstr "" -#: i2p2www/pages/site/docs/index.html:262 +#: i2p2www/pages/site/docs/index.html:258 msgid "I2P Source Git Repo inside I2P" msgstr "" -#: i2p2www/pages/site/docs/index.html:264 +#: i2p2www/pages/site/docs/index.html:260 msgid "Source translation at Transifex" msgstr "" -#: i2p2www/pages/site/docs/index.html:266 +#: i2p2www/pages/site/docs/index.html:262 msgid "Roadmap" msgstr "Plany na przyszÅ‚ość" -#: i2p2www/pages/site/docs/index.html:268 +#: i2p2www/pages/site/docs/index.html:264 msgid "To Do List" msgstr "" -#: i2p2www/pages/site/docs/index.html:268 +#: i2p2www/pages/site/docs/index.html:264 msgid "not current" msgstr "" @@ -573,43 +567,30 @@ msgstr "" msgid "" "I2P ships with a generic naming library and a base implementation \n" "designed to work off a local name to destination mapping, as well as an\n" -"add-on application called the <a href=\"#addressbook\">address book</a>." -" \n" -"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to " -"Tor's .onion addresses." +"add-on application called the <a href=\"#addressbook\">address book</a>. \n" +"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses." msgstr "" #: i2p2www/pages/site/docs/naming.html:15 msgid "" "The address book is a web-of-trust\n" -"driven secure, distributed, and human readable naming system, sacrificing" -" only\n" -"the call for all human readable names to be globally unique by mandating " -"only\n" -"local uniqueness. While all messages in I2P are cryptographically " -"addressed\n" -"by their destination, different people can have local address book " -"entries for\n" -"\"Alice\" which refer to different destinations. People can still " -"discover new\n" -"names by importing published address books of peers specified in their " -"web of trust,\n" -"by adding in the entries provided through a third party, or (if some " -"people organize\n" -"a series of published address books using a first come first serve " -"registration\n" -"system) people can choose to treat these address books as name servers, " -"emulating\n" +"driven secure, distributed, and human readable naming system, sacrificing only\n" +"the call for all human readable names to be globally unique by mandating only\n" +"local uniqueness. While all messages in I2P are cryptographically addressed\n" +"by their destination, different people can have local address book entries for\n" +"\"Alice\" which refer to different destinations. People can still discover new\n" +"names by importing published address books of peers specified in their web of trust,\n" +"by adding in the entries provided through a third party, or (if some people organize\n" +"a series of published address books using a first come first serve registration\n" +"system) people can choose to treat these address books as name servers, emulating\n" "traditional DNS." msgstr "" #: i2p2www/pages/site/docs/naming.html:29 #, python-format msgid "" -"NOTE: For the reasoning behind the I2P naming system, common arguments " -"against it\n" -"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming" -" discussion</a>\n" +"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n" +"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n" "page." msgstr "" @@ -639,34 +620,31 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:55 msgid "" -"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for " -"lookups and points\n" +"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n" "the user to remote jump services to assist with failed lookups." msgstr "" #: i2p2www/pages/site/docs/naming.html:59 msgid "" -"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to " -"add hosts to their local hosts.txt" +"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add " +"hosts to their local hosts.txt" msgstr "" #: i2p2www/pages/site/docs/naming.html:62 msgid "" -"HTTP <a href=\"#jump-services\">jump services</a> which provide their own" -" lookups and redirection." +"HTTP <a href=\"#jump-services\">jump services</a> which provide their own " +"lookups and redirection." msgstr "" #: i2p2www/pages/site/docs/naming.html:65 msgid "" -"The <a href=\"#addressbook\">address book</a> application which merges " -"external\n" +"The <a href=\"#addressbook\">address book</a> application which merges external\n" "host lists, retrieved via HTTP, with the local list." msgstr "" #: i2p2www/pages/site/docs/naming.html:69 msgid "" -"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web " -"front-end\n" +"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n" "for address book configuration and viewing of the local host lists." msgstr "" @@ -678,15 +656,11 @@ msgstr "" #, python-format msgid "" "All destinations in I2P are 516-byte (or longer) keys.\n" -"(To be more precise, it is a 256-byte public key plus a 128-byte signing " -"key\n" -"plus a 3-or-more byte certificate, which in Base64 representation is 516 " -"or more bytes.\n" -"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> " -"are in use now\n" +"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n" +"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n" +"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n" "for signature type indication.\n" -"Therefore, certificates in recently-generated destinations are more than " -"3 bytes." +"Therefore, certificates in recently-generated destinations are more than 3 bytes." msgstr "" #: i2p2www/pages/site/docs/naming.html:87 @@ -705,8 +679,7 @@ msgid "" "The hosts.txt Naming Service does a simple linear search through\n" "text files. This naming service was the default until\n" "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n" -"The hosts.txt format had become too slow after the file grew to thousands" -" of entries." +"The hosts.txt format had become too slow after the file grew to thousands of entries." msgstr "" #: i2p2www/pages/site/docs/naming.html:102 @@ -714,8 +687,7 @@ msgstr "" msgid "" "It does a linear search through three local files, in order, to\n" "look up host names and convert them to a 516-byte destination key.\n" -"Each file is in a simple <a href=\"%(configuration)s\">configuration file" -" format</a>, with hostname=base64, one per line.\n" +"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n" "The files are:" msgstr "" @@ -725,8 +697,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:116 msgid "" -"The Blockfile Naming Service stores multiple \"address books\" in a " -"single\n" +"The Blockfile Naming Service stores multiple \"address books\" in a single\n" "database file named hostsdb.blockfile.\n" "This Naming Service is the default since release 0.8.8." msgstr "" @@ -734,32 +705,22 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:122 #, python-format msgid "" -"A blockfile is simply on-disk storage of multiple sorted maps (key-value " -"pairs),\n" +"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n" "implemented as skiplists.\n" -"The blockfile format is specified on the <a " -"href=\"%(blockfile)s\">Blockfile page</a>.\n" -"It provides fast Destination lookup in a compact format. While the " -"blockfile overhead is substantial,\n" -"the destinations are stored in binary rather than in Base 64 as in the " -"hosts.txt format.\n" -"In addition, the blockfile provides the capability of arbitrary metadata " -"storage\n" -"(such as added date, source, and comments) for each entry to implement " -"advanced address book features.\n" -"The blockfile storage requirement is a modest increase over the hosts.txt" -" format, and the blockfile provides\n" +"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n" +"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n" +"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n" +"In addition, the blockfile provides the capability of arbitrary metadata storage\n" +"(such as added date, source, and comments) for each entry to implement advanced address book features.\n" +"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n" "approximately 10x reduction in lookup times." msgstr "" #: i2p2www/pages/site/docs/naming.html:134 msgid "" -"On creation, the naming service imports entries from the three files used" -" by the hosts.txt Naming Service.\n" -"The blockfile mimics the previous implementation by maintaining three " -"maps that\n" -"are searched in-order, named privatehosts.txt, userhosts.txt, and " -"hosts.txt.\n" +"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n" +"The blockfile mimics the previous implementation by maintaining three maps that\n" +"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n" "It also maintains a reverse-lookup map to implement rapid reverse lookups." msgstr "" @@ -789,31 +750,24 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:158 #, python-format msgid "" -"The naming service is specified with the configuration property " -"<tt>i2p.naming.impl=class</tt>.\n" +"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n" "Other implementations are possible. For example,\n" -"there is an experimental facility for real-time lookups (a la DNS) over " -"the network within the router.\n" -"For more information see the <a " -"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion" -" page</a>." +"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n" +"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:165 msgid "" -"The HTTP proxy does a lookup via the router for all hostnames ending in " -"'.i2p'.\n" +"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n" "Otherwise, it forwards the request to a configured HTTP outproxy.\n" -"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-" -"Top Level Domain '.i2p'." +"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'." msgstr "" #: i2p2www/pages/site/docs/naming.html:171 #, python-format msgid "" "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n" -"following the procedures specified in <a href=\"%(rfc6761)s\">RFC " -"6761</a>." +"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:177 @@ -852,14 +806,11 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:202 msgid "" "For this reason, the only subscription configured by\n" -"default is <code>http://i2p-projekt.i2p/hosts.txt " -"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>," -" \n" +"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n" "which contains a copy of the hosts.txt included\n" "in the I2P release.\n" "Users must configure additional subscriptions in their\n" -"local address book application (via subscriptions.txt or <a " -"href=\"#susidns\">SusiDNS</a>)." +"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)." msgstr "" #: i2p2www/pages/site/docs/naming.html:211 @@ -868,8 +819,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:218 msgid "" -"The operators of these services may have various policies for listing " -"hosts.\n" +"The operators of these services may have various policies for listing hosts.\n" "Presence on this list does not imply endorsement." msgstr "" @@ -880,12 +830,10 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:224 msgid "" -"While there are hopefully not any technical limitations within I2P on " -"host names,\n" +"While there are hopefully not any technical limitations within I2P on host names,\n" "the address book enforces several restrictions on host names\n" "imported from subscriptions.\n" -"It does this for basic typographical sanity and compatibility with " -"browsers,\n" +"It does this for basic typographical sanity and compatibility with browsers,\n" "and for security.\n" "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n" "Any hostnames violating these rules may not be propagated\n" @@ -898,13 +846,13 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:243 msgid "" -"Names are checked for conflict with existing names in the existing " -"userhosts.txt and hosts.txt\n" +"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n" "(but not privatehosts.txt) after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:248 -msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." +msgid "" +"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:252 @@ -940,8 +888,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:280 msgid "" "Certain hostnames reserved for project use are not allowed\n" -"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, " -"*.console.i2p, and others)" +"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)" msgstr "" #: i2p2www/pages/site/docs/naming.html:285 @@ -964,8 +911,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:302 msgid "" -"Any name received via subscription that passes all the checks is added " -"via the local naming service." +"Any name received via subscription that passes all the checks is added via " +"the local naming service." msgstr "" #: i2p2www/pages/site/docs/naming.html:306 @@ -982,19 +929,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:317 msgid "" -"International Domain Names (IDN) also work in i2p (using punycode 'xn--' " -"form).\n" -"To see IDN .i2p domain names rendered correctly in Firefox's location " -"bar,\n" +"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n" +"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n" "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config." msgstr "" #: i2p2www/pages/site/docs/naming.html:323 msgid "" -"As the address book application does not use privatehosts.txt at all, in " -"practice\n" -"this file is the only place where it is appropriate to place private " -"aliases or\n" +"As the address book application does not use privatehosts.txt at all, in practice\n" +"this file is the only place where it is appropriate to place private aliases or\n" "\"pet names\" for sites already in hosts.txt." msgstr "" @@ -1009,16 +952,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:338 msgid "" "Address Book will publish the merged hosts.txt to a location\n" -"(traditionally hosts.txt in the local I2P Site's home directory) to be " -"accessed by others\n" +"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n" "for their subscriptions.\n" "This step is optional and is disabled by default." msgstr "" #: i2p2www/pages/site/docs/naming.html:346 msgid "" -"The address book application, together with eepget, saves the Etag and/or" -" Last-Modified\n" +"The address book application, together with eepget, saves the Etag and/or Last-Modified\n" "information returned by the web server of the subscription.\n" "This greatly reduces the bandwidth required, as the web server will\n" "return a '304 Not Modified' on the next fetch if nothing has changed." @@ -1035,8 +976,7 @@ msgid "" "Hosts serving a static hosts.txt or an equivalent CGI application\n" "are strongly encouraged to deliver\n" "a Content-Length header, and either an Etag or Last-Modified header.\n" -"Also ensure that the server delivers a '304 Not Modified' when " -"appropriate.\n" +"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n" "This will dramatically reduce the network bandwidth, and\n" "reduce chances of corruption." msgstr "" @@ -1047,8 +987,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:368 msgid "" -"A host add service is a simple CGI application that takes a hostname and " -"a Base64 key as parameters\n" +"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n" "and adds that to its local hosts.txt.\n" "If other routers subscribe to that hosts.txt, the new hostname/key\n" "will be propagated through the network." @@ -1056,10 +995,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:375 msgid "" -"It is recommended that host add services impose, at a minimum, the " -"restrictions imposed by the address book application listed above.\n" -"Host add services may impose additional restrictions on hostnames and " -"keys, for example:" +"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n" +"Host add services may impose additional restrictions on hostnames and keys, for example:" msgstr "" #: i2p2www/pages/site/docs/naming.html:380 @@ -1112,10 +1049,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:426 msgid "" -"A jump service is a simple CGI application that takes a hostname as a " -"parameter\n" -"and returns a 301 redirect to the proper URL with a " -"<code>?i2paddresshelper=key</code>\n" +"A jump service is a simple CGI application that takes a hostname as a parameter\n" +"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n" "string appended.\n" "The HTTP proxy will interpret the appended string and\n" "use that key as the actual destination.\n" @@ -1138,16 +1073,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:448 msgid "" -"SusiDNS is simply a web interface front-end to configuring address book " -"subscriptions\n" +"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n" "and accessing the four address book files.\n" "All the real work is done by the 'address book' application." msgstr "" #: i2p2www/pages/site/docs/naming.html:454 msgid "" -"Currently, there is little enforcement of address book naming rules " -"within SusiDNS,\n" +"Currently, there is little enforcement of address book naming rules within SusiDNS,\n" "so a user may enter hostnames locally that would be rejected by\n" "the address book subscription rules." msgstr "" @@ -1161,36 +1094,29 @@ msgid "" "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n" "Base32 addresses are much shorter and easier to handle than the\n" "full 516-character Base64 Destinations or addresshelpers.\n" -"Example: " -"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" +"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" msgstr "" #: i2p2www/pages/site/docs/naming.html:468 #, python-format msgid "" -"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 " -"hash.\n" +"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n" "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n" "The form is {52 chars}.b32.i2p.\n" "Tor has a\n" -"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94" -"-december-4th-2013\">proposal</a>\n" -"to convert to an identical format of {52 chars}.onion for their hidden " -"services.\n" +"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n" +"to convert to an identical format of {52 chars}.onion for their hidden services.\n" "Base32 is implemented in the naming service, which queries the\n" "router over I2CP to lookup the LeaseSet to get the full Destination.\n" -"Base32 lookups will only be successful when the Destination is up and " -"publishing\n" +"Base32 lookups will only be successful when the Destination is up and publishing\n" "a LeaseSet.\n" -"Because resolution may require a network database lookup, it may take " -"significantly\n" +"Because resolution may require a network database lookup, it may take significantly\n" "longer than a local address book lookup." msgstr "" #: i2p2www/pages/site/docs/naming.html:483 msgid "" -"Base32 addresses can be used in most places where hostnames or full " -"destinations\n" +"Base32 addresses can be used in most places where hostnames or full destinations\n" "are used, however there are some exceptions where they may fail if the\n" "name does not immediately resolve. I2PTunnel will fail, for example, if\n" "the name does not resolve to a destination." @@ -1216,8 +1142,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:12 msgid "" -"There are now plugins available that support distributed email, blogs, " -"IRC\n" +"There are now plugins available that support distributed email, blogs, IRC\n" "clients, distributed file storage, wikis, and more." msgstr "" @@ -1237,8 +1162,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:31 msgid "" -"Support large or special-purpose applications that would never be bundled" -"\n" +"Support large or special-purpose applications that would never be bundled\n" "with the I2P installation" msgstr "" @@ -1252,8 +1176,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:44 msgid "" -"Separate initial install and update packages, if desired, for smaller " -"update downloads" +"Separate initial install and update packages, if desired, for smaller update" +" downloads" msgstr "" #: i2p2www/pages/site/docs/plugins.html:48 @@ -1283,7 +1207,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/plugins.html:70 -msgid "Automatic integration and startup of webapps into console Jetty instance" +msgid "" +"Automatic integration and startup of webapps into console Jetty instance" msgstr "" #: i2p2www/pages/site/docs/plugins.html:74 @@ -1323,32 +1248,21 @@ msgstr "Instalacja" #: i2p2www/pages/site/docs/plugins.html:101 msgid "" -"To install and start a plugin, copy the <code>.xpi2p</code> install link " -"to\n" +"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n" "the form at the bottom of\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp" -" in\n" -"your router console</a> and click the \"install plugin\" button. After a" -"\n" -"plugin is installed and started, a link to the plugin will usually appear" -" at\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n" +"your router console</a> and click the \"install plugin\" button. After a\n" +"plugin is installed and started, a link to the plugin will usually appear at\n" "the top of your summary bar." msgstr "" #: i2p2www/pages/site/docs/plugins.html:110 msgid "" -"To update a plugin to the latest version, just click the update button on" -"\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>." -"\n" -"There is also a button to check if the plugin has a more recent version, " -"as\n" -"well as a button to check for updates for all plugins. Plugins will be " -"checked\n" -"for updates automatically when updating to a new I2P release (not " -"including dev\n" +"To update a plugin to the latest version, just click the update button on\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n" +"There is also a button to check if the plugin has a more recent version, as\n" +"well as a button to check for updates for all plugins. Plugins will be checked\n" +"for updates automatically when updating to a new I2P release (not including dev\n" "builds)." msgstr "" @@ -1359,25 +1273,21 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:121 #, python-format msgid "" -"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and " -"the\n" +"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n" "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s." msgstr "" #: i2p2www/pages/site/docs/plugins.html:126 #, python-format msgid "" -"See also the sources for plugins developed by various people. Some " -"plugins, such\n" -"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were " -"developed\n" +"See also the sources for plugins developed by various people. Some plugins, such\n" +"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n" "specifically as examples." msgstr "" #: i2p2www/pages/site/docs/plugins.html:132 msgid "" -"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P" -"\n" +"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n" "or easily add some feature." msgstr "" @@ -1389,8 +1299,7 @@ msgstr "Pierwsze kroki" #, python-format msgid "" "To create a plugin from an existing binary package you will need to get\n" -"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in " -"monotone</a>." +"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:144 @@ -1406,8 +1315,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:151 msgid "" "Updates of a plugin with included jars (not wars) won't be recognized if\n" -"the plugin was already run, as it requires class loader trickery to flush" -" the\n" +"the plugin was already run, as it requires class loader trickery to flush the\n" "class cache; a full router restart is required." msgstr "" @@ -1417,32 +1325,27 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:161 msgid "" -"Plugins running in a separate JVM create a <code>logs/</code> directory " -"in\n" +"Plugins running in a separate JVM create a <code>logs/</code> directory in\n" "<code>$CWD</code>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:166 msgid "" -"No initial keys are present, except for those of jrandom and zzz (using " -"the\n" +"No initial keys are present, except for those of jrandom and zzz (using the\n" "same keys as for router update), so the first key seen for a signer is\n" "automatically accepted—there is no signing key authority." msgstr "" #: i2p2www/pages/site/docs/plugins.html:172 msgid "" -"When deleting a plugin, the directory is not always deleted, especially " -"on\n" +"When deleting a plugin, the directory is not always deleted, especially on\n" "Windows." msgstr "" #: i2p2www/pages/site/docs/plugins.html:177 msgid "" -"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result " -"in a\n" -"\"plugin is corrupt\" message if pack200 compression of the plugin file " -"is used." +"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n" +"\"plugin is corrupt\" message if pack200 compression of the plugin file is used." msgstr "" #: i2p2www/pages/site/docs/plugins.html:182 @@ -1459,8 +1362,7 @@ msgstr "" #: i2p2www/pages/site/docs/ports.html:7 msgid "" -"These are the ports used or reserved by I2P, including those for known " -"plugins,\n" +"These are the ports used or reserved by I2P, including those for known plugins,\n" "common alternates,\n" "and some typical related applications." msgstr "" @@ -1485,8 +1387,8 @@ msgid "Reseed Hosts" msgstr "" #: i2p2www/pages/site/docs/reseed.html:3 -msgid "January 2016" -msgstr "StyczeÅ„ 2016" +msgid "September 2021" +msgstr "" #: i2p2www/pages/site/docs/reseed.html:8 msgid "About Reseed hosts" @@ -1494,49 +1396,57 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:10 msgid "" -"Reseed hosts are needed to for bootstrapping, that is, providing the " -"initial set of I2P nodes for your I2P node to talk to. Depending on the " -"status of your node it may need to bootstrap every now and then if many " -"of the nodes it knows of aren't contactable." +"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n" +"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n" +"it may need to bootstrap every now and then if many of the nodes it knows of\n" +"aren't contactable." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:14 +#: i2p2www/pages/site/docs/reseed.html:17 msgid "" -"Reseeding is done over an encrypted connection and all of the bootstrap " -"information is signed by the reseed host you connect to, making it " -"impossible for an unauthenticated source to provide you with false " -"information." +"Reseeding is done over an encrypted connection and all of the bootstrap\n" +"information is signed by the reseed host you connect to, making it impossible\n" +"for an unauthenticated source to provide you with false information." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:19 +#: i2p2www/pages/site/docs/reseed.html:24 msgid "Running a Reseed host" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:21 +#: i2p2www/pages/site/docs/reseed.html:26 msgid "" -"The more reseed hosts that are run, the more resilient the I2P network " -"becomes, and the harder it is to prevent users of I2P from connecting to " -"the network." +"Operating a reseed server can be accessible to any sysadmin familiar\n" +"with I2P, and we encourage new reseed operators to get in contact with us at\n" +"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n" +"are run, the more resilient the I2P network becomes, and the harder it is to\n" +"prevent users of I2P from connecting to the network." +msgstr "" + +#: i2p2www/pages/site/docs/reseed.html:39 +msgid "Other ways of Reseeding" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:25 +#: i2p2www/pages/site/docs/reseed.html:42 msgid "" -"There have also been cases where the reseed hosts we had, have been under" -" heavy load due to botnet activities." +"In order to make I2P more reslient, other kinds of reseeding are possible. One\n" +"important way of carrying out a reseed is the file-based reseed, where a user\n" +"with a running I2P router generates a reseed file for a friend and transfers it\n" +"to them as a .zip file. Others use cloud-based infrastructure to resist\n" +"censorship. These reseed methods provide functionality which aids people in\n" +"situations where reseeds are restricted." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:33 -msgid "Thank you" +#: i2p2www/pages/site/docs/reseed.html:58 +msgid "Thank you Reseed Operators" msgstr "" -#: i2p2www/pages/site/docs/reseed.html:35 +#: i2p2www/pages/site/docs/reseed.html:60 msgid "" -"If you are running a reseed server, We would like to thank you for " -"helping to\n" +"If you are running a reseed server, We would like to thank you for helping to\n" "make the I2P network stronger and more resilient than ever." msgstr "" -#: i2p2www/pages/site/docs/reseed.html:41 +#: i2p2www/pages/site/docs/reseed.html:66 msgid "Thank you." msgstr "DziÄ™kujemy." @@ -1546,12 +1456,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:12 msgid "" -"At this point, most of the good ideas from BOB have been incorporated " -"into\n" -"SAMv3, which has more features and more real-world use. BOB still works, " -"but it\n" -"is not gaining the advanced features available to SAMv3 and is " -"essentially\n" +"At this point, most of the good ideas from BOB have been incorporated into\n" +"SAMv3, which has more features and more real-world use. BOB still works, but it\n" +"is not gaining the advanced features available to SAMv3 and is essentially\n" "unsupported at this time." msgstr "" @@ -1566,27 +1473,25 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:35 msgid "" "<code>ERROR</code> as is implied returns the message <code>\"ERROR " -"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what" -" went wrong." +"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what " +"went wrong." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:38 msgid "" -"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be " -"returned, it is on the same line. <code>OK</code> means the command is " -"finished." +"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, " +"it is on the same line. <code>OK</code> means the command is finished." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:41 msgid "" -"<code>DATA</code> lines contain information that you requested. There may" -" be multiple <code>DATA</code> lines per request." +"<code>DATA</code> lines contain information that you requested. There may be" +" multiple <code>DATA</code> lines per request." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:45 msgid "" -"<b>NOTE:</b> The help command is the ONLY command that has an exception " -"to\n" +"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n" "the rules... it can actually return nothing! This is intentional, since\n" "help is a HUMAN and not an APPLICATION command." msgstr "" @@ -1597,8 +1502,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:53 msgid "" -"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated," -" depending on the system.\n" +"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n" "On connection, BOB outputs two lines:" msgstr "" @@ -1608,8 +1512,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:67 msgid "" -"Note that previous versions used upper-case hex digits and did not " -"conform to I2P versioning standards.\n" +"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n" "It is recommended that subsequent versions use digits 0-9 only." msgstr "" @@ -1645,16 +1548,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:91 msgid "" "<b>PLEASE NOTE:</b>\n" -"For CURRENT details on the commands PLEASE use the built-in help command." -"\n" -"Just telnet to localhost 2827 and type help and you can get full " -"documentation on each command." +"For CURRENT details on the commands PLEASE use the built-in help command.\n" +"Just telnet to localhost 2827 and type help and you can get full documentation on each command." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:97 msgid "" -"Commands never get obsoleted or changed, however new commands do get " -"added from time to time." +"Commands never get obsoleted or changed, however new commands do get added " +"from time to time." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:102 @@ -1671,36 +1572,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:130 msgid "" -"Once set up, all TCP sockets can and will block as needed, and there is " -"no need for any\n" -"additional messages to/from the command channel. This allows the router " -"to pace the\n" -"stream without exploding with OOM like SAM does as it chokes on " -"attempting to shove\n" -"many streams in or out one socket -- that can't scale when you have alot " -"of connections!" +"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n" +"additional messages to/from the command channel. This allows the router to pace the\n" +"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n" +"many streams in or out one socket -- that can't scale when you have alot of connections!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:137 msgid "" -"What is also nice about this particular interface is that writing " -"anything to interface\n" -"to it, is much much easier than SAM. There is no other processing to do " -"after the set up.\n" -"It's configuration is so simple, that very simple tools, such as nc " -"(netcat) can be used\n" -"to point to some application. The value there is that one could schedule " -"up and down times\n" -"for an application, and not have to change the application to do that, or" -" to even have\n" -"to stop that application. Instead, you can literally \"unplug\" the " -"destination, and\n" -"\"plug it in\" again. As long as the same IP/port addresses and " -"destination keys are used\n" -"when bringing the bridge up, the normal TCP application won't care, and " -"won't notice.\n" -"It will simply be fooled -- the destinations are not reachable, and that " -"nothing is coming in." +"What is also nice about this particular interface is that writing anything to interface\n" +"to it, is much much easier than SAM. There is no other processing to do after the set up.\n" +"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n" +"to point to some application. The value there is that one could schedule up and down times\n" +"for an application, and not have to change the application to do that, or to even have\n" +"to stop that application. Instead, you can literally \"unplug\" the destination, and\n" +"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n" +"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n" +"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:149 @@ -1709,12 +1597,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:151 msgid "" -"For the following example, we'll setup a very simple local loopback " -"connection,\n" -"with two destinations. Destination \"mouth\" will be the CHARGEN service " -"from\n" -"the INET superserver daemon. Destination \"ear\" will be a local port " -"that you\n" +"For the following example, we'll setup a very simple local loopback connection,\n" +"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n" +"the INET superserver daemon. Destination \"ear\" will be a local port that you\n" "can telnet into, and watch the pretty ASCII test puke forth." msgstr "" @@ -1763,30 +1648,28 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:186 msgid "" -"At this point, there was no error, a destination with a nickname of " -"\"mouth\"\n" -"is set up. When you contact the destination provided, you actually " -"connect\n" +"At this point, there was no error, a destination with a nickname of \"mouth\"\n" +"is set up. When you contact the destination provided, you actually connect\n" "to the <code>CHARGEN</code> service on <code>19/TCP</code>." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:192 -msgid "Now for the other half, so that we can actually contact this destination." +msgid "" +"Now for the other half, so that we can actually contact this destination." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:214 msgid "" "Now all we need to do is telnet into 127.0.0.1, port 37337,\n" -"send the destination key or host address from address book we want to " -"contact.\n" +"send the destination key or host address from address book we want to contact.\n" "In this case, we want to contact \"mouth\", all we do is paste in the\n" "key and it goes." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:221 msgid "" -"<b>NOTE:</b> The \"quit\" command in the command channel does NOT " -"disconnect the tunnels like SAM." +"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect" +" the tunnels like SAM." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:238 @@ -1803,14 +1686,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:291 msgid "" -"Pretty cool isn't it? Try some other well known I2P SITES if you like, " -"nonexistent ones,\n" -"etc, to get a feel for what kind of output to expect in different " -"situations.\n" -"For the most part, it is suggested that you ignore any of the error " -"messages.\n" -"They would be meaningless to the application, and are only presented for " -"human debugging." +"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n" +"etc, to get a feel for what kind of output to expect in different situations.\n" +"For the most part, it is suggested that you ignore any of the error messages.\n" +"They would be meaningless to the application, and are only presented for human debugging." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:298 @@ -1827,8 +1706,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:328 msgid "" -"Now to remove \"ear\", note that this is what happens when you type too " -"fast,\n" +"Now to remove \"ear\", note that this is what happens when you type too fast,\n" "and shows you what typical ERROR messages looks like." msgstr "" @@ -1883,16 +1761,11 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:7 #, python-format msgid "" -"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide " -"authenticated\n" -"and repliable messages in a standard format. This lets applications " -"reliably read\n" -"the \"from\" address out of a datagram and know that the address really " -"sent the\n" -"message. This is necessary for some applications since the base I2P " -"message is\n" -"completely raw - it has no \"from\" address (unlike IP packets). In " -"addition, the\n" +"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n" +"and repliable messages in a standard format. This lets applications reliably read\n" +"the \"from\" address out of a datagram and know that the address really sent the\n" +"message. This is necessary for some applications since the base I2P message is\n" +"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n" "message and sender are authenticated by signing the payload." msgstr "" @@ -1901,8 +1774,7 @@ msgstr "" msgid "" "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n" "are an application-level construct.\n" -"These protocols are independent of the low-level <a " -"href=\"%(transports)s\">transports</a>;\n" +"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n" "the protocols are converted to I2NP messages by the router, and\n" "either protocol may be carried by either transport." msgstr "" @@ -1918,8 +1790,7 @@ msgid "" "<a href=\"%(url)s\">datagram API</a>,\n" "while applications in other languages \n" "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n" -"There is also limited support in i2ptunnel in the <a " -"href=\"%(socks)s\">SOCKS proxy</a>,\n" +"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n" "the 'streamr' tunnel types, and udpTunnel classes." msgstr "" @@ -1929,34 +1800,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:38 msgid "" -"The application designer should carefully consider the tradeoff of " -"repliable vs. non-repliable\n" -"datagrams. Also, the datagram size will affect reliability, due to tunnel" -" fragmentation into 1KB\n" -"tunnel messages. The more message fragments, the more likely that one of " -"them will be dropped\n" -"by an intermediate hop. Messages larger than a few KB are not " -"recommended.\n" +"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n" +"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n" +"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n" +"by an intermediate hop. Messages larger than a few KB are not recommended.\n" "Over about 10 KB, the delivery probablility drops dramatically.\n" -"Messages over 16 KB cannot be delivered over NTCP, dropping delivery " -"chances even more." +"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:47 #, python-format msgid "" -"Also note that the various overheads added by lower layers, in particular" -" asymmetric\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on " -"intermittent messages\n" -"such as used by a Kademlia-over-UDP application. The implementations are " -"currently tuned\n" -"for frequent traffic using the streaming library. There are a high number" -"\n" -"of session tags delivered, and a short session tag lifetime, for example." -"\n" -"There are currently no configuration parameters available within I2CP to " -"tune\n" +"Also note that the various overheads added by lower layers, in particular asymmetric\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n" +"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n" +"for frequent traffic using the streaming library. There are a high number\n" +"of session tags delivered, and a short session tag lifetime, for example.\n" +"There are currently no configuration parameters available within I2CP to tune\n" "the ElGamal Session Tag parameters." msgstr "" @@ -1969,38 +1829,30 @@ msgid "" "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n" "Applications may or may not choose to set the\n" "protocol in the I2CP header. It is not set by default.\n" -"It must be set to demultiplex datagram and streaming traffic received on " -"the same Destination." +"It must be set to demultiplex datagram and streaming traffic received on the same Destination." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:65 #, python-format msgid "" "As datagrams are not connection-oriented, the application may require\n" -"port numbers to correlate datagrams with particular peers or " -"communications sessions,\n" +"port numbers to correlate datagrams with particular peers or communications sessions,\n" "as is traditional with UDP over IP.\n" -"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as " -"described in\n" +"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n" "the <a href=\"%(i2cp)s#format\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:73 #, python-format msgid "" -"There is no method within the datagram API to specify whether it is non-" -"repliable (raw)\n" -"or repliable. The application should be designed to expect the " -"appropriate type.\n" +"There is no method within the datagram API to specify whether it is non-repliable (raw)\n" +"or repliable. The application should be designed to expect the appropriate type.\n" "The I2CP protocol number or port should be used by the application to\n" "indicate datagram type.\n" -"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW " -"are defined in the\n" +"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n" "<a href=\"%(i2psession)s\">I2PSession API</a>\n" -"for this purpose. A common design pattern in client/server datagram " -"applications is to\n" -"use signed datagrams for a request which includes a nonce, and use a raw " -"datagram\n" +"for this purpose. A common design pattern in client/server datagram applications is to\n" +"use signed datagrams for a request which includes a nonce, and use a raw datagram\n" "for the reply, returning the nonce from the request." msgstr "" @@ -2034,19 +1886,17 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:107 #, python-format msgid "" -"Each datagram is sent through I2P as a single message (or as an " -"individual clove in a\n" +"Each datagram is sent through I2P as a single message (or as an individual clove in a\n" "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n" "Message encapsulation is implemented in the underlying\n" "<a href=\"%(i2cp)s\">I2CP</a>,\n" "<a href=\"%(i2np)s\">I2NP</a>, and\n" "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n" -"There is no packet delimiter mechanism or length field in the datagram " -"protocol." +"There is no packet delimiter mechanism or length field in the datagram protocol." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:120 -#: i2p2www/pages/site/docs/transport/ssu.html:675 +#: i2p2www/pages/site/docs/transport/ssu.html:680 msgid "Specification" msgstr "" @@ -2061,17 +1911,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:5 #, python-format msgid "" -"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-" -"RPC\">JSONRPC2</a> interface via the plugin <a " -"href=\"%(itoopie)s\">I2PControl</a>.\n" -"The aim of the interface is to provide simple way to interface with a " -"running I2P node. A client, itoopie, has been developed in parallel.\n" -"The JSONRPC2 implementation for the client as well as the plugin is " -"provided by the java libraries <a href=\"http://software.dzhuvinov.com" -"/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" -"A list of implementations of JSON-RPC for various languages can be found " -"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC " -"wiki</a>." +"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n" +"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n" +"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" +"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:12 @@ -2126,8 +1969,8 @@ msgstr "Opis" #: i2p2www/pages/site/docs/api/i2pcontrol.html:48 msgid "" -"Token used for authenticating every request (excluding the 'Authenticate'" -" RPC method)" +"Token used for authenticating every request (excluding the 'Authenticate' " +"RPC method)" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:56 @@ -2136,8 +1979,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:57 msgid "" -"Creates and returns an authentication token used for further " -"communication." +"Creates and returns an authentication token used for further communication." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:59 @@ -2170,8 +2012,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:117 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:73 @@ -2233,7 +2075,8 @@ msgid "Returns true if any changes were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:98 -msgid "Returns true if any changes requiring a restart to take effect were made." +msgid "" +"Returns true if any changes requiring a restart to take effect were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:101 @@ -2306,8 +2149,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:157 msgid "" -"Initiates a router reseed, fetching peers into our NetDB from a remote " -"host." +"Initiates a router reseed, fetching peers into our NetDB from a remote host." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:158 @@ -2316,8 +2158,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:159 msgid "" -"Restarts the router gracefully (waits for participating tunnels to " -"expire)." +"Restarts the router gracefully (waits for participating tunnels to expire)." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:160 @@ -2363,7 +2204,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:175 -msgid "Fetches or sets various network related settings. Ports, addresses etc." +msgid "" +"Fetches or sets various network related settings. Ports, addresses etc." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:177 @@ -2374,8 +2216,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:178 msgid "" -"What hostname is used for the TCP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the TCP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:179 @@ -2392,8 +2234,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:181 msgid "" -"What hostname is used for the UDP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the UDP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:182 @@ -2407,19 +2249,20 @@ msgid "What ip has been detected by the UDP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:184 -msgid "Is UPnP enabled. If null is submitted, current setting will be returned." +msgid "" +"Is UPnP enabled. If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:185 msgid "" -"How many percent of bandwidth is usable for participating tunnels. If " -"null is submitted, current setting will be returned." +"How many percent of bandwidth is usable for participating tunnels. If null " +"is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:186 msgid "" -"How many KB/s of inbound bandwidth is allowed. If null is submitted, " -"current setting will be returned." +"How many KB/s of inbound bandwidth is allowed. If null is submitted, current" +" setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:187 @@ -2430,15 +2273,15 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:188 msgid "" -"Is laptop mode enabled (change router identity and UDP port when IP " -"changes ). If null is submitted, current setting will be returned." +"Is laptop mode enabled (change router identity and UDP port when IP changes " +"). If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:189 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method. If null is submitted, current setting will" -" be returned." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method. If null is submitted, current setting will be " +"returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:192 @@ -2451,8 +2294,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:194 msgid "" -"If requested, returns the method used for automatically detecting ip for " -"the TCP transport." +"If requested, returns the method used for automatically detecting ip for the" +" TCP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:195 @@ -2465,8 +2308,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:197 msgid "" -"If requested, returns methods used for detecting the ip address of the " -"UDP transport." +"If requested, returns methods used for detecting the ip address of the UDP " +"transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:198 @@ -2597,34 +2440,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:237 msgid "" -"The version of the I2PControl API used wasn't specified, but is required " -"to be specified." +"The version of the I2PControl API used wasn't specified, but is required to " +"be specified." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:238 msgid "" -"The version of the I2PControl API specified is not supported by " -"I2PControl." +"The version of the I2PControl API specified is not supported by I2PControl." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:8 #, python-format msgid "" "I2PTunnel is a tool for interfacing with and providing services on I2P.\n" -"Destination of an I2PTunnel can be defined using a <a " -"href=\"%(naming)s\">hostname</a>,\n" -"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination " -"key.\n" -"An established I2PTunnel will be available on your client machine as " -"localhost:port.\n" -"If you wish to provide a service on I2P network, you simply create " -"I2PTunnel to the\n" -"appropriate ip_address:port. A corresponding 516-byte destination key " -"will be generated\n" +"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n" +"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n" +"An established I2PTunnel will be available on your client machine as localhost:port.\n" +"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n" +"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n" "for the service and it will become avaliable throughout I2P.\n" "A web interface for I2PTunnel management is avaliable on\n" -"<a " -"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." +"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:20 @@ -2638,8 +2474,7 @@ msgstr "Tunele serwerów" #: i2p2www/pages/site/docs/api/i2ptunnel.html:23 msgid "" "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n" -"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient " -"and quick hosting on I2P.\n" +"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n" "<br>The document root is:" msgstr "" @@ -2649,10 +2484,8 @@ msgstr "Tunele klienta" #: i2p2www/pages/site/docs/api/i2ptunnel.html:33 msgid "" -"A HTTP proxy used for browsing I2P and the regular internet anonymously " -"through I2P. \n" -"Browsing internet through I2P uses a random proxy specified by the " -"\"Outproxies:\" option." +"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n" +"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:37 @@ -2695,31 +2528,26 @@ msgstr "Standardowy" #: i2p2www/pages/site/docs/api/i2ptunnel.html:56 msgid "" -"Opens a local TCP port that connects to a service (like HTTP, FTP or " -"SMTP) on a destination inside of I2P.\n" -"The tunnel is directed to a random host from the comma seperated (\", \")" -" list of destinations." +"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n" +"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:62 msgid "" -"A HTTP-client tunnel. The tunnel connects to the destination specified by" -" the URL\n" -"in a HTTP request. Supports proxying onto internet if an outproxy is " -"provided. Strips HTTP connections of the following headers:" +"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n" +"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:67 msgid "" "<b>Accept, Accept-Charset, Accept-Language\n" -" and Accept-Ranges</b> as they vary greatly between browsers and can be " -"used as an identifier." +" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:90 msgid "" -"Depending on if the tunnel is using an outproxy or not it will append the" -" following User-Agent:" +"Depending on if the tunnel is using an outproxy or not it will append the " +"following User-Agent:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:94 @@ -2732,10 +2560,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:100 msgid "" -"Creates a connection to a random IRC server specified by the comma " -"seprated (\", \") \n" -"list of destinations. Only a whitelisted subset of IRC commands are " -"allowed due to anonymity concerns." +"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n" +"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:105 @@ -2748,8 +2574,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:144 msgid "" -"Enables using the I2P router as a SOCKS proxy with the command whitelist " -"specified by\n" +"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n" "<a href=\"#client-mode-irc\">IRC</a> client mode." msgstr "" @@ -2761,8 +2586,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:156 msgid "" -"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr " -"client tunnel will \n" +"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n" "subscribe to a streamr server tunnel." msgstr "" @@ -2776,32 +2600,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:171 msgid "" -"Creates a destination to a local HTTP server ip:port. Supports gzip for " -"requests with \n" -"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in" -" such a request." +"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n" +"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:177 msgid "" -"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client " -"with no outproxying\n" -"capabilities. An example application would be a web application that does" -" client-type\n" +"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n" +"capabilities. An example application would be a web application that does client-type\n" "requests, or loopback-testing an I2P Site as a diagnostic tool." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:184 msgid "" -"Creates a destination that filters the reqistration sequence of a client " -"and passes \n" +"Creates a destination that filters the reqistration sequence of a client and passes \n" "the clients destination key as a hostname to the IRC-server." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:190 msgid "" -"A UDP-client that connects to a media server is created. The UDP-Client " -"is coupled with a Streamr server I2PTunnel." +"A UDP-client that connects to a media server is created. The UDP-Client is " +"coupled with a Streamr server I2PTunnel." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:2 @@ -2818,14 +2637,11 @@ msgstr "Uwaga" msgid "" "The ministreaming library has been enhanced and extended by the\n" "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n" -"Ministreaming is deprecated and is incompatible with today's " -"applications.\n" +"Ministreaming is deprecated and is incompatible with today's applications.\n" "The following documentation is old.\n" -"Also note that streaming extends ministreaming in the same Java package " -"(net.i2p.client.streaming),\n" +"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n" "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n" -"Obsolete ministreaming classes and methods are clearly marked as " -"deprecated in the Javadocs." +"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:19 @@ -2833,17 +2649,12 @@ msgstr "" msgid "" "\n" "The ministreaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" @@ -2851,42 +2662,29 @@ msgstr "" #, python-format msgid "" "The ministreaming library was written by mihi as a part of his \n" -"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out" -" and released\n" -"under the BSD license. It is called the \"mini\"streaming library " -"because it makes\n" -"some simplifications in the implementation, while a more robust streaming" -" library\n" -"could be further optimized for operation over I2P. The two main issues " -"with \n" +"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n" +"under the BSD license. It is called the \"mini\"streaming library because it makes\n" +"some simplifications in the implementation, while a more robust streaming library\n" +"could be further optimized for operation over I2P. The two main issues with \n" "the ministreaming library are its use of the traditional TCP two phase \n" -"establishment protocol and the current fixed window size of 1. The " -"establishment\n" -"issue is minor for long lived streams, but for short ones, such as quick " -"HTTP\n" -"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As " -"for the window\n" -"size, the ministreaming library doesn't maintain any ID or ordering " -"within the \n" -"messages sent (or include any application level ACK or SACK), so it must " -"wait \n" -"on average twice the time it takes to send a message before sending " -"another." +"establishment protocol and the current fixed window size of 1. The establishment\n" +"issue is minor for long lived streams, but for short ones, such as quick HTTP\n" +"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As for the window\n" +"size, the ministreaming library doesn't maintain any ID or ordering within the \n" +"messages sent (or include any application level ACK or SACK), so it must wait \n" +"on average twice the time it takes to send a message before sending another." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:45 #, python-format msgid "" -"Even with those issues, the ministreaming library performs quite well in " -"many\n" +"Even with those issues, the ministreaming library performs quite well in many\n" "situations, and its <a href=\"%(api)s\">API</a>\n" -"is both quite simple and capable of remaining unchanged as different " -"streaming\n" +"is both quite simple and capable of remaining unchanged as different streaming\n" "implementations are introduced. The library is deployed in its own \n" "ministreaming.jar.\n" "Developers in Java who would like to use it can\n" -"access the API directly, while developers in other languages can use it " -"through\n" +"access the API directly, while developers in other languages can use it through\n" "<a href=\"%(samv3)s\">SAM</a>'s streaming support." msgstr "" @@ -2925,8 +2723,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:5 msgid "" "\n" -"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are " -"supported.\n" +"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n" "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n" "Both shared-clients and non-shared are supported.\n" "There is no SOCKS outproxy so it is of limited use." @@ -2947,8 +2744,7 @@ msgid "" "information as content, I2P has no way to protect your anonymity. For\n" "example, some mail applications will send the IP address of the machine\n" "they are running on to a mail server. There is no way for I2P to filter\n" -"this, thus using I2P to 'socksify' existing applications is possible, but" -"\n" +"this, thus using I2P to 'socksify' existing applications is possible, but\n" "extremely dangerous." msgstr "" @@ -3027,47 +2823,34 @@ msgstr "" #, python-format msgid "" "The streaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:29 msgid "" "In consideration of the relatively high cost of messages, \n" -"the streaming library's protocol for scheduling and delivering those " -"messages has been optimized to\n" -"allow individual messages passed to contain as much information as is " -"available.\n" -"For instance, a small HTTP transaction proxied through the streaming " -"library can\n" -"be completed in a single round trip - the first messages bundle a SYN, " -"FIN, and\n" +"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n" +"allow individual messages passed to contain as much information as is available.\n" +"For instance, a small HTTP transaction proxied through the streaming library can\n" +"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n" "the small HTTP request payload, and the reply bundles the SYN,\n" "FIN, ACK, and the HTTP response payload. While an additional\n" -"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has " -"been\n" -"received, the local HTTP proxy can often deliver the full response to the" -" browser \n" +"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n" +"received, the local HTTP proxy can often deliver the full response to the browser \n" "immediately." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:42 msgid "" "The streaming library bears much resemblance to an \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms\n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK,\n" +"abstraction of TCP, with its sliding windows, congestion control algorithms\n" +"(both slow start and congestion avoidance), and general packet behavior (ACK,\n" "SYN, FIN, RST, rto calculation, etc)." msgstr "" @@ -3087,29 +2870,21 @@ msgstr "API" #: i2p2www/pages/site/docs/api/streaming.html:60 #, python-format msgid "" -"The streaming library API provides a standard socket paradigm to Java " -"applications.\n" -"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, " -"except that\n" -"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> " -"through the\n" +"The streaming library API provides a standard socket paradigm to Java applications.\n" +"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n" +"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n" "streaming library, to be interpreted by I2CP." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:67 #, python-format msgid "" -"The standard interface to the streaming lib is for the application to use" -" the\n" +"The standard interface to the streaming lib is for the application to use the\n" "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n" -"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks " -"the\n" -"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will " -"cause\n" -"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The " -"application\n" -"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> " -"or\n" +"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n" +"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n" +"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n" +"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n" "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>." msgstr "" @@ -3130,17 +2905,12 @@ msgstr "" #, python-format msgid "" "The options and current default values are listed below.\n" -"Options are case-sensitive and may be set for the whole router, for a " -"particular client, or for an individual socket on a\n" +"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n" "per-connection basis.\n" -"Many values are tuned for HTTP performance over typical I2P conditions. " -"Other applications such\n" +"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n" "as peer-to-peer services are strongly encouraged to\n" -"modify as necessary, by setting the options and passing them via the call" -" to\n" -"<a " -"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost," -" _i2cpPort, opts).\n" +"modify as necessary, by setting the options and passing them via the call to\n" +"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n" "Time values are in ms." msgstr "" @@ -3148,17 +2918,14 @@ msgstr "" #, python-format msgid "" "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n" -"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>," -"\n" +"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" "may override these defaults with their own defaults.\n" -"Also note that many options only apply to servers listening for incoming " -"connections." +"Also note that many options only apply to servers listening for incoming connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:110 msgid "" -"As of release 0.9.1, most, but not all, options may be changed on an " -"active socket manager or session.\n" +"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n" "See the javadocs for details." msgstr "" @@ -3182,8 +2949,8 @@ msgstr "Uwagi" #: i2p2www/pages/site/docs/api/streaming.html:119 msgid "" -"Comma- or space-separated list of Base64 peer Hashes used for either " -"access list or blacklist." +"Comma- or space-separated list of Base64 peer Hashes used for either access " +"list or blacklist." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:121 @@ -3233,24 +3000,21 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes to be\n" "blacklisted for incoming connections to ALL destinations in the context.\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:175 msgid "" -"How much transmit data (in bytes) will be accepted that hasn't been " -"written out yet." +"How much transmit data (in bytes) will be accepted that hasn't been written " +"out yet." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:179 msgid "" "When we're in congestion avoidance, we grow the window size at the rate\n" -"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are" -" in bytes,\n" +"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are in bytes,\n" "while in I2P, window sizes are in messages.\n" "A higher number means slower growth." msgstr "" @@ -3259,16 +3023,15 @@ msgstr "" msgid "" "How long to wait after instantiating a new con \n" "before actually attempting to connect. If this is\n" -"<= 0, connect immediately with no initial data. If greater than 0, " -"wait\n" +"<= 0, connect immediately with no initial data. If greater than 0, wait\n" "until the output stream is flushed, the buffer fills, \n" "or that many milliseconds pass, and include any initial data with the SYN." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:194 msgid "" -"How long to block on connect, in milliseconds. Negative means " -"indefinitely. Default is 5 minutes." +"How long to block on connect, in milliseconds. Negative means indefinitely. " +"Default is 5 minutes." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:198 @@ -3281,30 +3044,24 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes or host names to be\n" "contacted using an alternate DSA destination.\n" -"Only applies if multisession is enabled and the primary session is non-" -"DSA\n" +"Only applies if multisession is enabled and the primary session is non-DSA\n" "(generally for shared clients only).\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:216 msgid "" "Whether to listen only for the streaming protocol.\n" -"Setting to true will prohibit communication with Destinations earlier " -"than release 0.7.1\n" -"(released March 2009). Set to true if running multiple protocols on this " -"Destination." +"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n" +"(released March 2009). Set to true if running multiple protocols on this Destination." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:226 msgid "" "(0=noop, 1=disconnect)\n" -"What to do on an inactivity timeout - do nothing, disconnect, or send a " -"duplicate ack." +"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:232 @@ -3317,8 +3074,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:237 msgid "" -"The initial value of the resend delay field in the packet header, times " -"1000.\n" +"The initial value of the resend delay field in the packet header, times 1000.\n" "Not fully implemented; see below." msgstr "" @@ -3341,8 +3097,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:255 msgid "" -"In standard TCP, window sizes are in bytes, while in I2P, window sizes " -"are in messages." +"In standard TCP, window sizes are in bytes, while in I2P, window sizes are " +"in messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:279 @@ -3384,12 +3140,12 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:333 msgid "" "(2=interactive not supported)\n" -"This doesn't currently do anything, but setting it to a value other than " -"1 will cause an error." +"This doesn't currently do anything, but setting it to a value other than 1 will cause an error." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:338 -msgid "How long to block on read, in milliseconds. Negative means indefinitely." +msgid "" +"How long to block on read, in milliseconds. Negative means indefinitely." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:342 @@ -3432,19 +3188,15 @@ msgstr "Konfiguracja" #: i2p2www/pages/site/docs/api/streaming.html:387 msgid "" -"The initiator sends a packet with the SYNCHRONIZE flag set. This packet " -"may contain the initial data as well.\n" -"The peer replies with a packet with the SYNCHRONIZE flag set. This packet" -" may contain the initial response data as well." +"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n" +"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:392 msgid "" -"The initiator may send additional data packets, up to the initial window " -"size, before receiving the SYNCHRONIZE response.\n" +"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n" "These packets will also have the send Stream ID field set to 0.\n" -"Recipients must buffer packets received on unknown streams for a short " -"period of time, as they may\n" +"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n" "arrive out of order, in advance of the SYNCHRONIZE packet." msgstr "" @@ -3454,33 +3206,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:400 msgid "" -"The maximum message size (also called the MTU / MRU) is negotiated to the" -" lower value supported by\n" -"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection" -" will lead to\n" +"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n" +"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n" "a large amount of overhead.\n" "The MTU is specified by the option i2p.streaming.maxMessageSize.\n" -"The current default MTU of 1730 was chosen to fit precisely into two 1K " -"I2NP tunnel messages,\n" +"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n" "including overhead for the typical case." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:417 msgid "" -"The first message in a connection includes a 387 byte (typical) " -"Destination added by the streaming layer,\n" -"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in " -"the Garlic message by the router.\n" -"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session " -"was previously established).\n" -"Therefore, the goal of fitting a complete HTTP request in a single 1KB " -"I2NP message is not always attainable.\n" -"However, the selection of the MTU, together with careful implementation " -"of fragmentation\n" -"and batching strategies in the tunnel gateway processor, are important " -"factors in network bandwidth,\n" -"latency, reliability, and efficiency, especially for long-lived " -"connections." +"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n" +"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n" +"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n" +"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n" +"However, the selection of the MTU, together with careful implementation of fragmentation\n" +"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n" +"latency, reliability, and efficiency, especially for long-lived connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:428 @@ -3494,14 +3236,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:436 #, python-format msgid "" -"Each packet is sent through I2P as a single message (or as an individual " -"clove in a\n" -"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation " -"is implemented\n" -"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a " -"href=\"%(i2np)s\">I2NP</a>, and\n" -"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no " -"packet delimiter\n" +"Each packet is sent through I2P as a single message (or as an individual clove in a\n" +"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n" +"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n" +"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n" "mechanism or payload length field in the streaming protocol." msgstr "" @@ -3511,17 +3249,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:447 msgid "" -"Data packets may include an optional delay field specifying the requested" -" delay,\n" +"Data packets may include an optional delay field specifying the requested delay,\n" "in ms, before the receiver should ack the packet.\n" "Valid values are 0 to 60000 inclusive.\n" "A value of 0 requests an immediate ack.\n" "This is advisory only, and receivers should delay slightly so that\n" "additional packets may be acknowledged with a single ack.\n" -"Some implementations may include an advisory value of (measured RTT / 2) " -"in this field.\n" -"For nonzero optional delay values, receivers should limit the maximum " -"delay\n" +"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n" +"For nonzero optional delay values, receivers should limit the maximum delay\n" "before sending an ack to a few seconds at most.\n" "Optional delay values greater than 60000 indicate choking, see below." msgstr "" @@ -3533,46 +3268,33 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:462 msgid "" "TCP headers include the receive window in bytes.\n" -"The streaming protocol does not contain a receive window, it uses only a " -"simple choke/unchoke indication.\n" -"Each endpoint must maintain its own estimate of the far-end receive " -"window, in either bytes or packets.\n" -"The recommended minimum buffer size for receiver implementations is 128 " -"packets or 217 KB (approximately 128x1730).\n" -"Because of I2P netowrk latency, packet drops, and the resulting " -"congestion control,\n" +"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n" +"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n" +"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n" +"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n" "a buffer of this size is rarely filled.\n" -"Overflow is, however, likely to occur on high-bandwidth \"local " -"loopback\" (same-router) connections." +"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:471 msgid "" "To quickly indicate and smoothly recover from overflow conditions,\n" "there is a simple mechanism for pushback in the streaming protocol.\n" -"If a packet is received with an optional delay field of value of 60001 or" -" higher,\n" +"If a packet is received with an optional delay field of value of 60001 or higher,\n" "that indicates \"choking\" or a receive window of zero.\n" -"A packet with an optional delay field of value of 60000 or less indicates" -" \"unchoking\".\n" -"Packets without an optional delay field do not affect the choke/unchoke " -"state." +"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n" +"Packets without an optional delay field do not affect the choke/unchoke state." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:479 msgid "" -"After being choked, no more packets with data should be sent until the " -"transmitter is unchoked,\n" -"except for occasional \"probe\" data packets to compensate for possible " -"lost unchoke packets.\n" -"The choked endpoint should start a \"persist timer\" to control the " -"probing, as in TCP.\n" +"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n" +"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n" +"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n" "The unchoking endpoint should send several packets with this field set,\n" -"or continue sending them periodically until data packets are received " -"again.\n" +"or continue sending them periodically until data packets are received again.\n" "Maximum time to wait for unchoking is implementation-dependent.\n" -"Transmitter window size and congestion control strategy after being " -"unchoked is implementation-dependent." +"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:490 @@ -3581,8 +3303,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:491 msgid "" -"The streaming lib uses standard slow-start (exponential window growth) " -"and congestion avoidance (linear window growth)\n" +"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n" "phases, with exponential backoff.\n" "Windowing and acknowledgments use packet count, not byte count." msgstr "" @@ -3593,53 +3314,44 @@ msgstr "Zamknij" #: i2p2www/pages/site/docs/api/streaming.html:499 msgid "" -"Any packet, including one with the SYNCHRONIZE flag set, may have the " -"CLOSE flag sent as well.\n" -"The connection is not closed until the peer responds with the CLOSE flag." -"\n" +"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n" +"The connection is not closed until the peer responds with the CLOSE flag.\n" "CLOSE packets may contain data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:507 msgid "" -"There is no ping function at the I2CP layer (equivalent to ICMP echo) or " -"in datagrams.\n" +"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n" "This function is provided in streaming.\n" "Pings and pongs may not be combined with a standard streaming packet;\n" "if the ECHO option is set, then\n" -"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are " -"ignored." +"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:515 msgid "" -"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED " -"flags set.\n" -"The sendStreamId must be greater than zero, and the receiveStreamId is " -"ignored.\n" +"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n" +"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n" "The sendStreamId may or may not correspond to an existing connection." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:521 msgid "" "A pong packet must have the ECHO flag set.\n" -"The sendStreamId must be zero, and the receiveStreamId is the " -"sendStreamId from the ping.\n" -"Prior to release 0.9.18, the pong packet does not include any payload " -"that was contained in the ping." +"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n" +"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:527 msgid "" "As of release 0.9.18, pings and pongs may contain a payload.\n" -"The payload in the ping, up to a maximum of 32 bytes, is returned in the " -"pong." +"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:532 msgid "" -"Streaming may be configured to disable sending pongs with the " -"configuration i2p.streaming.answerPings=false." +"Streaming may be configured to disable sending pongs with the configuration " +"i2p.streaming.answerPings=false." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:537 @@ -3655,8 +3367,7 @@ msgid "" "This is used for \"temporal\" sharing at connection open/close time,\n" "not \"ensemble\" sharing during a connection (See\n" "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n" -"There is a separate share per ConnectionManager (i.e. per local " -"Destination)\n" +"There is a separate share per ConnectionManager (i.e. per local Destination)\n" "so that there is no information leakage to other Destinations on the\n" "same router.\n" "The share data for a given peer expires after a few minutes.\n" @@ -3669,8 +3380,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:560 msgid "" -"The following parameters are hardcoded, but may be of interest for " -"analysis:" +"The following parameters are hardcoded, but may be of interest for analysis:" msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:579 @@ -3680,25 +3390,16 @@ msgstr "Historia" #: i2p2www/pages/site/docs/api/streaming.html:580 msgid "" -"The streaming library has grown organically for I2P - first mihi " -"implemented the\n" -"\"mini streaming library\" as part of I2PTunnel, which was limited to a " -"window\n" -"size of 1 message (requiring an ACK before sending the next one), and " -"then it was\n" -"refactored out into a generic streaming interface (mirroring TCP sockets)" -" and the\n" -"full streaming implementation was deployed with a sliding window protocol" -" and \n" -"optimizations to take into account the high bandwidth x delay product. " -"Individual\n" -"streams may adjust the maximum packet size and other options. The default" -"\n" -"message size is selected to fit precisely in two 1K I2NP tunnel messages," -"\n" +"The streaming library has grown organically for I2P - first mihi implemented the\n" +"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n" +"size of 1 message (requiring an ACK before sending the next one), and then it was\n" +"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n" +"full streaming implementation was deployed with a sliding window protocol and \n" +"optimizations to take into account the high bandwidth x delay product. Individual\n" +"streams may adjust the maximum packet size and other options. The default\n" +"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n" "and is a reasonable tradeoff between the bandwidth costs of \n" -"retransmitting lost messages, and the latency and overhead of multiple " -"messages." +"retransmitting lost messages, and the latency and overhead of multiple messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:594 @@ -3710,7 +3411,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:975 #: i2p2www/pages/site/docs/protocol/i2np.html:233 #: i2p2www/pages/site/docs/transport/ntcp.html:544 -#: i2p2www/pages/site/docs/transport/ssu.html:610 +#: i2p2www/pages/site/docs/transport/ssu.html:615 #: i2p2www/pages/site/docs/tunnels/implementation.html:506 msgid "Future Work" msgstr "" @@ -3729,20 +3430,16 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:604 #, python-format msgid "" -"Another area for research is the interaction of the streaming lib with " -"the\n" +"Another area for research is the interaction of the streaming lib with the\n" "NTCP and SSU transport layers.\n" "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:609 msgid "" -"The interaction of the routing algorithms with the streaming lib strongly" -" affects performance.\n" -"In particular, random distribution of messages to multiple tunnels in a " -"pool\n" -"leads to a high degree of out-of-order delivery which results in smaller " -"window\n" +"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n" +"In particular, random distribution of messages to multiple tunnels in a pool\n" +"leads to a high degree of out-of-order delivery which results in smaller window\n" "sizes than would otherwise be the case. The router currently routes \n" "messages for a single from/to destination pair through a consistent set \n" "of tunnels, until tunnel expiration or delivery failure. The router's \n" @@ -3777,11 +3474,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:636 msgid "" -"zzz has added debug code to the streaming library to log packets in a " -"wireshark-compatible\n" +"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n" "(pcap) format; Use this to further analyze performance.\n" -"The format may require enhancement to map more streaming lib parameters " -"to TCP fields." +"The format may require enhancement to map more streaming lib parameters to TCP fields." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:641 @@ -3800,18 +3495,15 @@ msgstr "" msgid "" "There are several bittorrent clients and trackers on I2P.\n" "As I2P addressing uses a Destination instead of an IP and port, minor\n" -"changes are required to tracker and client software for operation on I2P." -"\n" +"changes are required to tracker and client software for operation on I2P.\n" "These changes are specified below.\n" -"Note carefully the guidelines for compatibility with older I2P clients " -"and trackers." +"Note carefully the guidelines for compatibility with older I2P clients and trackers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:15 msgid "" "This page specifies protocol details common to all clients and trackers.\n" -"Specific clients and trackers may implement other unique features or " -"protocols." +"Specific clients and trackers may implement other unique features or protocols." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:20 @@ -3824,8 +3516,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:27 msgid "" -"Clients generally include a fake port=6881 parameter in the announce, for" -" compatibility with older trackers.\n" +"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n" "Trackers may ignore the port parameter, and should not require it." msgstr "" @@ -3837,8 +3528,7 @@ msgid "" "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "are 387+ bytes, so the Base 64 is 516+ bytes.\n" -"Clients generally append \".i2p\" to the Base 64 Destination for " -"compatibility with older trackers.\n" +"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n" "Trackers should not require an appended \".i2p\"." msgstr "" @@ -3848,18 +3538,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:46 msgid "" -"Current Destinations for clients are 387 or more bytes (516 or more in " -"Base 64 encoding).\n" +"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n" "A reasonable maximum to assume, for now, is 475 bytes.\n" -"As the tracker must decode the Base64 to deliver compact responses (see " -"below),\n" +"As the tracker must decode the Base64 to deliver compact responses (see below),\n" "the tracker should probably decode and reject bad Base64 when announced." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:53 msgid "" -"The default response type is non-compact. Clients may request a compact " -"response with\n" +"The default response type is non-compact. Clients may request a compact response with\n" "the parameter compact=1. A tracker may, but is not required to, return\n" "a compact response when requested." msgstr "" @@ -3867,10 +3554,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:59 msgid "" "Developers of new I2P clients\n" -"are strongly encouraged to implemenent announces over their own tunnel " -"rather than\n" -"the HTTP client proxy at port 4444. Doing so is both more efficient and " -"it allows\n" +"are strongly encouraged to implemenent announces over their own tunnel rather than\n" +"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n" "destination enforcement by the tracker (see below)." msgstr "" @@ -3892,8 +3577,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:76 msgid "" -"Trackers generally include a fake port key, or use the port from the " -"announce, for compatibility with older clients.\n" +"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n" "Clients must ignore the port parameter, and should not require it." msgstr "" @@ -3901,10 +3585,8 @@ msgstr "" #, python-format msgid "" "The value of the ip key is the base 64 of the client's\n" -"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as " -"described above.\n" -"Trackers generally append \".i2p\" to the Base 64 Destination if it " -"wasn't in the announce ip, for compatibility with older clients.\n" +"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n" +"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n" "Clients should not require an appended \".i2p\" in the responses." msgstr "" @@ -3919,26 +3601,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:95 #, python-format msgid "" -"In the compact response, the value of the \"peers\" dictionary key is a " -"single byte string,\n" +"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n" "whose length is a multiple of 32 bytes.\n" "This string contains the concatenated\n" "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n" "of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This hash must be computed by the tracker, unless destination enforcement" -"\n" -"(see below) is used, in which case the hash delivered in the X-I2P-" -"DestHash\n" +"This hash must be computed by the tracker, unless destination enforcement\n" +"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n" "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n" "The peers key may be absent, or the peers value may be zero-length." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:109 msgid "" -"While compact response support is optional for both clients and trackers," -" it is highly\n" +"While compact response support is optional for both clients and trackers, it is highly\n" "recommended as it reduces the nominal response size by over 90%." msgstr "" @@ -3949,34 +3627,27 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:117 #, python-format msgid "" -"Some, but not all, I2P bittorrent clients announce over their own " -"tunnels.\n" -"Trackers may choose to prevent spoofing by requiring this, and verifying " -"the\n" +"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n" +"Trackers may choose to prevent spoofing by requiring this, and verifying the\n" "client's\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n" -"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which " -"are\n" +"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n" "different formats for the same information.\n" "These headers cannot be spoofed by the client.\n" -"A tracker enforcing destinations need not require the ip announce " -"parameter at all." +"A tracker enforcing destinations need not require the ip announce parameter at all." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:129 msgid "" -"As several clients use the HTTP proxy instead of their own tunnel for " -"announces,\n" -"destination enforcement will prevent usage by those clients unless or " -"until\n" +"As several clients use the HTTP proxy instead of their own tunnel for announces,\n" +"destination enforcement will prevent usage by those clients unless or until\n" "those clients are converted to announcing over their own tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:135 msgid "" -"Unfortunately, as the network grows, so will the amount of maliciousness," -"\n" +"Unfortunately, as the network grows, so will the amount of maliciousness,\n" "so we expect that all trackers will eventually enforce destinations.\n" "Both tracker and client developers should anticipate it." msgstr "" @@ -3990,12 +3661,9 @@ msgstr "" msgid "" "Announce URL host names in torrent files generally follow the\n" "<a href=\"%(naming)s\">I2P naming standards</a>.\n" -"In addition to host names from address books and \".b32.i2p\" Base 32 " -"hostnames,\n" -"the full Base 64 Destination (with [or without?] \".i2p\" appended) " -"should be supported.\n" -"Non-open trackers should recognize their own host name in any of these " -"formats." +"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n" +"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n" +"Non-open trackers should recognize their own host name in any of these formats." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:152 @@ -4017,27 +3685,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:165 #, python-format msgid "" -"I2P uses 387+ byte <a " -"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" +"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "for addresses, as explained above." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:170 msgid "" -"If the client has only the hash of the destination (such as from a " -"compact response or PEX), it must perform a lookup\n" -"by encoding it with Base 32, appending \".b32.i2p\", and querying the " -"Naming Service,\n" +"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n" +"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n" "which will return the full Destination if available." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:176 msgid "" -"If the client has a peer's full Destination it received in a non-compact " -"response, it should use it\n" +"If the client has a peer's full Destination it received in a non-compact response, it should use it\n" "directly in the connection setup.\n" -"Do not convert a Destination back to a Base 32 hash for lookup, this is " -"quite inefficient." +"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:183 @@ -4047,40 +3710,32 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:184 msgid "" "To preserve anonymity,\n" -"I2P bittorrent clients generally do not support non-I2P announces or peer" -" connections.\n" +"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n" "I2P HTTP outproxies often block announces.\n" "There are no known SOCKS outproxies supporting bittorrent traffic." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:191 msgid "" -"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers " -"often\n" +"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n" "block accesses or announces that contain an X-Forwarded-For HTTP header.\n" -"Trackers should reject standard network announces with IPv4 or IPv6 IPs, " -"and not deliver them in responses." +"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:200 #, python-format msgid "" "I2P PEX is based on ut_pex.\n" -"As there does not appear to be a formal specification of ut_pex " -"available,\n" +"As there does not appear to be a formal specification of ut_pex available,\n" "it may be necessary to review the libtorrent source for assistance.\n" "It is an extension message, identified as \"i2p_pex\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with up to 3 keys, \"added\", " -"\"added.f\", and \"dropped\".\n" -"The added and dropped values are each a single byte string, whose length " -"is a multiple of 32 bytes.\n" +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n" +"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n" "These byte strings are the concatenated SHA-256 Hashes of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This is the same format as the peers dictionary value in the i2p compact " -"response format specified above.\n" +"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n" "The added.f value, if present, is the same as in ut_pex." msgstr "" @@ -4095,13 +3750,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:226 msgid "" -"Unlike standard DHT, I2P DHT does not use a bit in the options handshake," -" or the PORT message.\n" +"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n" "It is advertised with an extension message, identified as \"i2p_dht\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", " -"both integers." +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:235 @@ -4135,14 +3787,12 @@ msgstr "" msgid "" "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n" "instead of 4 byte IP + 2 byte port. There is no peer port.\n" -"In a response, the \"values\" key is a list of strings, each containing a" -" single compact peer info." +"In a response, the \"values\" key is a list of strings, each containing a single compact peer info." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:264 msgid "" -"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + " -"2 byte port)\n" +"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n" "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n" "In a response, the \"nodes\" key is a\n" "single byte string with concatenated compact node info." @@ -4151,10 +3801,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:271 msgid "" "Secure node ID requirement: To make various DHT attacks more difficult,\n" -"the first 4 bytes of the Node ID must match the first 4 bytes of the " -"destination Hash,\n" -"and the next two bytes of the Node ID must match the next two bytes of " -"the\n" +"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n" +"and the next two bytes of the Node ID must match the next two bytes of the\n" "destination hash exclusive-ORed with the port." msgstr "" @@ -4179,51 +3827,38 @@ msgid "" "Preliminary differences from\n" "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n" "are described below, and are subject to change.\n" -"Contact the I2P developers if you wish to develop a client or tracker " -"supporting datagram announces." +"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:299 msgid "" "A UDP tracker listens on two ports.\n" -"The \"query port\" is the advertised port, and is used to receive " -"repliable (signed) datagrams, for the connect request only.\n" -"The \"response port\" is used to receive unsigned (raw) datagrams, and is" -" the source port for all replies.\n" +"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n" +"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n" "The response port is arbitrary.\n" "A client sends and receives on a single port only.\n" "It receives only unsigned (raw) datagrams.\n" -"Raw datagrams provides increased efficiency for replies since they " -"contain tokens sent in the query, and need not be signed." +"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:309 msgid "" -"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and" -" the port is still present,\n" +"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n" "although it may be ignored by the tracker.\n" -"In the announce response, each 4-byte IP and 2-byte port is replaced by a" -" 32-byte hash (compact peer info), and no port is present.\n" -"The client sends the announce request and scrape request to the source " -"port in the announce response packet.\n" -"The connect request, connect response, scrape request, scrape response, " -"and error response are the same as in BEP 15." +"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n" +"The client sends the announce request and scrape request to the source port in the announce response packet.\n" +"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:317 msgid "" -"Source addresses in I2P cannot be spoofed, so it is possible to use a " -"simplified protocol\n" +"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n" "with 2 packets instead of 4, omitting the connect request and response.\n" -"In this case, the announce request would be a repliable datagram sent to " -"the tracker's query port,\n" +"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n" "and the tracker would not require a response port.\n" -"While this is more efficient, it would be more difficult to modify an " -"existing tracker to support this mode.\n" -"The URL for the 4-packet-mode tracker would use standard \"udp://\" " -"prefix.\n" -"The URL for a modified 2-packet-mode tracker would require a different " -"prefix if both modes are supported in I2P." +"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n" +"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n" +"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:330 @@ -4263,19 +3898,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:8 msgid "" -"This page is about bundling the entire I2P router binary with your " -"application.\n" -"It is not about writing an application to work with I2P (either bundled " -"or external)." +"This page is about bundling the entire I2P router binary with your application.\n" +"It is not about writing an application to work with I2P (either bundled or external)." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:13 msgid "" -"Lots of projects are bundling, or talking about bundling, I2P. That's " -"great if done right.\n" +"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n" "If done wrong, it could cause real harm to our network.\n" -"The I2P router is complex, and it can be a challenge to hide all the " -"complexity from your users.\n" +"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n" "This page discusses some general guidelines." msgstr "" @@ -4285,10 +3916,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:24 msgid "" -"Start a dialog. We're here to help. Applications that embed I2P are the " -"most promising - and exciting -\n" -"opportunities for us to grow the network and improve anonymity for " -"everyone." +"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n" +"opportunities for us to grow the network and improve anonymity for everyone." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:30 @@ -4297,11 +3926,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:31 msgid "" -"If your application is in Java or Scala, it's an easy choice - use the " -"Java router.\n" +"If your application is in Java or Scala, it's an easy choice - use the Java router.\n" "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n" -"For apps in other languages, best to use SAM or BOB or SOCKS and bundle " -"the Java router as a separate process.\n" +"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n" "Some of the following only applies to the Java router." msgstr "" @@ -4310,7 +3937,8 @@ msgid "Licensing" msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:40 -msgid "Ensure you meet the license requirements of the software you are bundling." +msgid "" +"Ensure you meet the license requirements of the software you are bundling." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:45 @@ -4319,29 +3947,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:46 msgid "" -"A correct default configuration is crucial. Most users will not change " -"the defaults.\n" -"The defaults for your application may need to be different than the " -"defaults for the router you are bundling.\n" +"A correct default configuration is crucial. Most users will not change the defaults.\n" +"The defaults for your application may need to be different than the defaults for the router you are bundling.\n" "Override the router defaults if necessary." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:51 msgid "" -"Some important defaults to review: Max bandwidth, tunnel quantity and " -"length, max participating tunnels.\n" -"A lot of this depends on the expected bandwidth and usage patterns of " -"your app." +"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n" +"A lot of this depends on the expected bandwidth and usage patterns of your app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:55 msgid "" -"Configure enough bandwidth and tunnels to allow your users to contribute " -"to the network.\n" -"Consider disabling external I2CP, as you probably don't need it and it " -"would conflict with any other running I2P instance.\n" -"Also look at the configs for disabling killing of the JVM on exit, for " -"example." +"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n" +"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n" +"Also look at the configs for disabling killing of the JVM on exit, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:62 @@ -4351,32 +3972,25 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:63 msgid "" "It may be tempting for you to disable participating traffic.\n" -"There's several ways to do this (hidden mode, setting max tunnels to 0, " -"setting shared bandwidth below 12 KBytes/sec).\n" -"Without participating traffic, you don't have to worry about graceful " -"shutdown,\n" +"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n" +"Without participating traffic, you don't have to worry about graceful shutdown,\n" "your users don't see bandwidth usage not generated by them, etc.\n" -"However, there's lots of reasons why you should allow participating " -"tunnels." +"However, there's lots of reasons why you should allow participating tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:70 msgid "" -"First of all, the router doesn't work that well if it doesn't have a " -"chance to \"integrate\" with the network,\n" +"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n" "which is helped tremendously by others building tunnels through you." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:74 msgid "" -"Secondly, over 90% of the routers in the current network allow " -"participating traffic.\n" +"Secondly, over 90% of the routers in the current network allow participating traffic.\n" "It's the default in the Java router.\n" -"If your application doesn't route for others and it gets really popular, " -"then it's a leech on the network,\n" +"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n" "and it upsets the balance we have now.\n" -"If it gets really big, then we become Tor, and spend our time begging for" -" people to enable relaying." +"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:81 @@ -4387,10 +4001,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:84 msgid "" -"We strongly discourage you from disabling participating traffic by " -"default.\n" -"If you do this and your application gets hugely popular, it could break " -"the network." +"We strongly discourage you from disabling participating traffic by default.\n" +"If you do this and your application gets hugely popular, it could break the network." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:90 @@ -4399,12 +4011,9 @@ msgstr "Zachowaj" #: i2p2www/pages/site/docs/applications/embedding.html:91 msgid "" -"You must save the router's data (netdb, configuration, etc.) between runs" -" of the router.\n" -"I2P does not work well if you must reseed each startup, and that's a huge" -" load on our reseed servers, and not very good for anonymity either.\n" -"Even if you bundle router infos, I2P needs saved profile data for best " -"performance." +"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n" +"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n" +"Even if you bundle router infos, I2P needs saved profile data for best performance." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:99 @@ -4413,12 +4022,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:100 msgid "" -"Give your users a way to change the configuration of the important " -"settings.\n" -"We understand that you will probably want to hide most of I2P's " -"complexity, but it's important to show some basic settings.\n" -"In addition to the defaults above, some network settings such as UPnP, " -"IP/port may be helpful." +"Give your users a way to change the configuration of the important settings.\n" +"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n" +"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:108 @@ -4427,12 +4033,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:109 msgid "" -"Above a certain bandwidth setting, and meeting other health criteria, " -"your router will become floodfill,\n" -"which may cause a large increase in connections and memory usage (at " -"least with the Java router).\n" -"Think about whether that's OK. You can disable floodfill, but then your " -"fastest users aren't contributing what they could.\n" +"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n" +"which may cause a large increase in connections and memory usage (at least with the Java router).\n" +"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n" "It also depends on the typical uptime for your application." msgstr "" @@ -4443,8 +4046,7 @@ msgstr "Ponowne seedowanie" #: i2p2www/pages/site/docs/applications/embedding.html:120 msgid "" "Decide if you are bundling router infos or using our reseed hosts.\n" -"The Java reseed host list is in the source code, so if you keep your " -"source up to date, the host list will be also.\n" +"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n" "Be aware of possible blocking by hostile governments." msgstr "" @@ -4454,12 +4056,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:130 msgid "" -"Consider setting your application tunnels to delay-open, reduce-on-idle " -"and/or close-on-idle.\n" -"This is straightforward if using i2ptunnel but you'll have to implement " -"some of it yourself if using I2CP directly.\n" -"See i2psnark for code that reduces tunnel count and then closes the " -"tunnel, even in the presence of some background DHT activity." +"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n" +"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n" +"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:138 @@ -4468,16 +4067,11 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:139 msgid "" -"Have an auto-update feature if at all possible, or at least auto-" -"notification of a new version.\n" -"Our biggest fear is a huge number of routers out there that can't be " -"updated.\n" -"We have about 6-8 releases a year of the Java router, and it's critical " -"to the health of the network that the users keep up.\n" -"We usually have over 80% of the network on the latest release within " -"6 weeks after the release, and we'd like to keep it that way.\n" -"You don't need to worry about disabling the router's built-in auto-update" -" function, as that code is in the router console,\n" +"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n" +"Our biggest fear is a huge number of routers out there that can't be updated.\n" +"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n" +"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n" +"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n" "which you presumably are not bundling." msgstr "" @@ -4488,17 +4082,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:151 msgid "" "Have a gradual rollout plan. Don't overwhelm the network all at once.\n" -"We currently have approximately 25K unique users per day and 40K uniques " -"per month.\n" -"We are probably able to handle growth of 2-3X per year without too much " -"issue.\n" -"If you anticipate a faster rampup than that, OR the bandwidth " -"distribution (or uptime distribution,\n" -"or any other significant characteristic) of your userbase is " -"significantly different from our current userbase,\n" +"We currently have approximately 25K unique users per day and 40K uniques per month.\n" +"We are probably able to handle growth of 2-3X per year without too much issue.\n" +"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n" +"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n" "we really need to have a discussion.\n" -"The bigger your growth plans, the more important everthing else in this " -"checklist is." +"The bigger your growth plans, the more important everthing else in this checklist is." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:163 @@ -4508,10 +4097,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:164 msgid "" "Tell your users that I2P works best if it keeps running.\n" -"It may be several minutes after startup before it works well, and even " -"more after first install.\n" -"If your average uptime is less than an hour, I2P is probably the wrong " -"solution." +"It may be several minutes after startup before it works well, and even more after first install.\n" +"If your average uptime is less than an hour, I2P is probably the wrong solution." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:172 @@ -4520,8 +4107,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:173 msgid "" -"Provide some indication to the user that the application tunnels are " -"ready. Encourage patience." +"Provide some indication to the user that the application tunnels are ready. " +"Encourage patience." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:178 @@ -4531,8 +4118,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:179 msgid "" "If possible, delay the shutdown until your participating tunnels expire.\n" -"Don't let your users break tunnels easily, or at least ask them to " -"confirm." +"Don't let your users break tunnels easily, or at least ask them to confirm." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:185 @@ -4541,8 +4127,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:186 msgid "" -"It would be nice if you give your users links to learn more about I2P and" -" to donate." +"It would be nice if you give your users links to learn more about I2P and to" +" donate." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:192 @@ -4552,8 +4138,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:193 msgid "" "Depending on your user base and application,\n" -"it may be helpful to provide an option or a separate package to use an " -"external router." +"it may be helpful to provide an option or a separate package to use an external router." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:200 @@ -4562,8 +4147,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:201 msgid "" -"If you plan to use or link to other common I2P services (news feeds, " -"hosts.txt subscriptions, trackers, outproxies, etc.),\n" +"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n" "make sure you aren't overloading them,\n" "and talk to the people who are running them to make sure it's ok." msgstr "" @@ -4575,10 +4159,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:210 msgid "" "I2P includes an SNTP client. I2P requires correct time to operate.\n" -"It will compensate for a skewed system clock but this may delay startup. " -"You may disable I2P's SNTP queries,\n" -"but this isn't advised unless your application makes sure the system " -"clock is correct." +"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n" +"but this isn't advised unless your application makes sure the system clock is correct." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:218 @@ -4587,41 +4169,30 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:219 msgid "" -"At a minimum you will need i2p.jar, router.jar, streaming.jar, and " -"mstreaming.jar.\n" +"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n" "You may omit the two streaming jars for a datagram-only app.\n" "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n" -"Don't forget jbigi.jar, or a subset of it for the platforms you support, " -"to make the crypto much faster.\n" +"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n" "Java 7 or higher is required to build.\n" -"If you're building Debian / Ubuntu packages, you should require the I2P " -"package from our PPA instead of bundling it.\n" -"You almost certainly do not need susimail, susidns, the router console, " -"and i2psnark, for example." +"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n" +"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:228 msgid "" -"The following files should be included in the I2P installation directory," -" specified with the \"i2p.dir.base\" property.\n" -"Don't forget the certificates/ directory, which is required for " -"reseeding, and blocklist.txt for IP validation.\n" -"The geoip directory is optional, but recommended so the router can make " -"decisions based on location.\n" -"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that" -" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)." -"\n" -"The hosts.txt file may be necessary, you may modify it to include any " -"hosts your application uses.\n" -"You may add a router.config file to the base directory to override " -"initial defaults.\n" +"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n" +"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n" +"The geoip directory is optional, but recommended so the router can make decisions based on location.\n" +"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n" +"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n" +"You may add a router.config file to the base directory to override initial defaults.\n" "Review and edit or remove the clients.config and i2ptunnel.config files." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:237 msgid "" -"License requirements may require you to include the LICENSES.txt file and" -" the licenses directory." +"License requirements may require you to include the LICENSES.txt file and " +"the licenses directory." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:243 @@ -4639,17 +4210,14 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:255 msgid "" "Our Android router app may be shared by multiple clients.\n" -"If it is not installed, the user will be prompted when he starts a client" -" app." +"If it is not installed, the user will be prompted when he starts a client app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:259 msgid "" -"Some developers have expressed concern that this is a poor user " -"experience,\n" +"Some developers have expressed concern that this is a poor user experience,\n" "and they wish to embed the router in their app.\n" -"We do have an Android router service library on our roadmap, which could " -"make embedding easier.\n" +"We do have an Android router service library on our roadmap, which could make embedding easier.\n" "More information needed." msgstr "" @@ -4664,11 +4232,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:272 msgid "" -"We have a limited number of our jars on <a " -"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven" -" Central</a>.\n" -"There are numerous trac tickets for us to address that will improve and " -"expand the released jars on Maven Central." +"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n" +"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:282 @@ -4678,17 +4243,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:283 msgid "" "If your application is using I2P datagrams, e.g. for a DHT,\n" -"there's lots of advanced options available to reduce overhead and " -"increase reliability.\n" +"there's lots of advanced options available to reduce overhead and increase reliability.\n" "This may take some time and experimentation to get working well.\n" "Be aware of size/reliability tradeoffs. Talk to us for help.\n" -"It is possible - and recommended - to use Datagrams and Streaming on the " -"same Destination.\n" +"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n" "Don't create separate Destinations for this.\n" -"Don't try to store your unrelated data in the existing network DHTs " -"(iMule, bote, bittorrent, and router).\n" -"Build your own. If you are hardcoding seed nodes, we recommend that you " -"have several." +"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n" +"Build your own. If you are hardcoding seed nodes, we recommend that you have several." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:296 @@ -4698,8 +4259,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:297 msgid "" "Let's work together. Don't wait until it's done.\n" -"Give us your Twitter handle and start tweeting about it, we will return " -"the favor." +"Give us your Twitter handle and start tweeting about it, we will return the favor." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:303 @@ -4718,8 +4278,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:311 msgid "" -"This may be obvious, but join the community. Run I2P 24/7. Start an I2P " -"Site about your project.\n" +"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n" "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n" "We can help get you users, testers, translators, or even coders." msgstr "" @@ -4730,12 +4289,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:320 msgid "" -"You may wish to install and play with the I2P Android app, and look at " -"its code, for an example of an application that bundles the router.\n" +"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n" "See what we expose to the user and what we hide.\n" "Look at the state machine we use to start and stop the router.\n" -"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak," -" and Monero." +"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:328 @@ -4750,10 +4307,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:359 msgid "" -"This code is for the case where your application starts the router, as in" -" our Android app.\n" -"You could also have the router start the application via the " -"clients.config and i2ptunnel.config files,\n" +"This code is for the case where your application starts the router, as in our Android app.\n" +"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n" "together with Jetty webapps,\n" "as is done in our Java packages.\n" "As always, state management is the difficult part." @@ -4771,13 +4326,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:7 msgid "" -"Cloning large software repositories over I2P can be difficult, and using " -"git can sometimes make this harder. Fortunately, it can also sometimes " -"make it easier. Git has a <code>git bundle</code> command which can be " -"used to turn a git repository into a file which git can then clone, " -"fetch, or import from a location on your local disk. By combining this " -"capability with bittorrent downloads, we can solve our remaining problems" -" with <code>git clone</code>." +"Cloning large software repositories over I2P can be difficult, and using git" +" can sometimes make this harder. Fortunately, it can also sometimes make it " +"easier. Git has a <code>git bundle</code> command which can be used to turn " +"a git repository into a file which git can then clone, fetch, or import from" +" a location on your local disk. By combining this capability with bittorrent" +" downloads, we can solve our remaining problems with <code>git clone</code>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:8 @@ -4786,13 +4340,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:9 msgid "" -"If you intend to generate a git bundle, you <strong>must</strong> already" -" possess a full copy of the <strong>git</strong> repository, not the mtn " -"repository. You can get it from github or from git.idk.i2p, but a shallow" -" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will" -" fail silently, creating what looks like a bundle, but when you try to " -"clone it it will fail. If you are just retrieving a pre-generated git " -"bundle, then this section does not apply to you." +"If you intend to generate a git bundle, you <strong>must</strong> already " +"possess a full copy of the <strong>git</strong> repository, not the mtn " +"repository. You can get it from github or from git.idk.i2p, but a shallow " +"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will " +"fail silently, creating what looks like a bundle, but when you try to clone " +"it it will fail. If you are just retrieving a pre-generated git bundle, then" +" this section does not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:10 @@ -4802,23 +4356,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:11 msgid "" "Someone will need to supply you with a torrent file or a magnet link " -"corresponding to an existing <code>git bundle</code> that they have " -"already generated for you. A recent, correctly-generated bundle of the " -"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be " -"found inside of I2P at my pastebin <a " +"corresponding to an existing <code>git bundle</code> that they have already " +"generated for you. A recent, correctly-generated bundle of the mainline " +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of " +"I2P at my pastebin <a " "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:12 msgid "" "Once you have a bundle, you will need to use git to create a working " -"repository from it. If you’re using GNU/Linux and i2psnark, the git " -"bundle should be located in $HOME/.i2p/i2psnark or, as a service on " -"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on " -"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/†instead. The " -"examples here assume I2PSnark on GNU/Linux, if you use something else, " -"replace the path to the bundle with the download directory preferred by " -"your client and platform." +"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle " +"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, " +"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it " +"is probably at “$HOME/BiglyBT Downloads/†instead. The examples here assume " +"I2PSnark on GNU/Linux, if you use something else, replace the path to the " +"bundle with the download directory preferred by your client and platform." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:13 @@ -4831,8 +4384,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:16 msgid "" -"If you get the following error, try using git init and git fetch manually" -" instead." +"If you get the following error, try using git init and git fetch manually " +"instead." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:18 @@ -4867,10 +4420,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:29 msgid "" -"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you " -"have a successfully <code>--unshallow</code>ed clone of clone of the " -"i2p.i2p repository. If you already have a clone, make sure you run " -"<code>git fetch --unshallow</code> before you generate a torrent bundle." +"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have " +"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p " +"repository. If you already have a clone, make sure you run <code>git fetch " +"--unshallow</code> before you generate a torrent bundle." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:30 @@ -4879,8 +4432,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:32 msgid "" -"and copy the resulting bundle into your I2PSnark downloads directory. For" -" instance:" +"and copy the resulting bundle into your I2PSnark downloads directory. For " +"instance:" msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:34 @@ -4891,14 +4444,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:7 msgid "" -"Tutorial for setting up git access through an I2P Tunnel. This tunnel " -"will act as your access point to a single git service on I2P." +"Tutorial for setting up git access through an I2P Tunnel. This tunnel will " +"act as your access point to a single git service on I2P." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:8 msgid "" -"If you intend to use the service at i2pgit.org/git.idk.i2p, then you " -"probably already have a tunnel configured and much of this\n" +"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n" "tutorial will not apply to you." msgstr "" @@ -4909,22 +4461,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:11 msgid "" "To create your repositories on a remote git service, sign up for a user " -"account at that service. Of course it’s also possible to create " -"repositories locally and push them to a remote git service, but most will" -" require an account and for you to create a space for the repository on " -"the server. Gitlab has a very simple sign-up form:" +"account at that service. Of course it’s also possible to create repositories" +" locally and push them to a remote git service, but most will require an " +"account and for you to create a space for the repository on the server. " +"Gitlab has a very simple sign-up form:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:12 msgid "" -"These are generic instructions for any in-i2p Git instance with HTTP and " -"SSH gateways.\n" -"If you intend to contribute to I2P, you should create an account at the " -"I2P gitlab, which is open to the\n" -"community. Account registration may take a few days to complete, as the " -"admin needs to sort through a large\n" -"number of spam registrations. You can help this by getting in touch with " -"the admin to confirm you are human\n" +"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n" +"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n" +"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n" +"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n" "using the instructions on the home page." msgstr "" @@ -4938,10 +4486,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:27 msgid "" -"To make sure the setup process works, it helps to make a repository to " -"test with from the server, and for the sake of this tutorial, we’re going" -" to use a fork of the I2P router. First, browse to the i2p-" -"hackers/i2p.i2p repository:" +"To make sure the setup process works, it helps to make a repository to test " +"with from the server, and for the sake of this tutorial, we’re going to use " +"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p " +"repository:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:34 @@ -4950,20 +4498,20 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:42 msgid "" -"To have read-write access to my server, you’ll need to set up a tunnel " -"for your SSH client. As an example, we’re going to use the HTTP tunnel " -"instead, but if all you need is read-only, HTTP/S cloning, then you can " -"skip all this and just use the http_proxy environment variable to " -"configure git to use the pre-configured I2P HTTP Proxy. For example:" +"To have read-write access to my server, you’ll need to set up a tunnel for " +"your SSH client. As an example, we’re going to use the HTTP tunnel instead, " +"but if all you need is read-only, HTTP/S cloning, then you can skip all this" +" and just use the http_proxy environment variable to configure git to use " +"the pre-configured I2P HTTP Proxy. For example:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:50 msgid "" -"Then, add the address you will be pushing and pulling from. Note that " -"this example address is for Read-Only HTTP-over-I2P clones, if your admin" -" does not allow the git HTTP(Smart HTTP) protocol, then you will need to " -"get the SSH clone base32 from them. If you have an SSH clone base32, " -"substitute it for the base32 in this step, which will fail." +"Then, add the address you will be pushing and pulling from. Note that this " +"example address is for Read-Only HTTP-over-I2P clones, if your admin does " +"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the " +"SSH clone base32 from them. If you have an SSH clone base32, substitute it " +"for the base32 in this step, which will fail." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:54 @@ -4991,8 +4539,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:68 msgid "" "Git Privacy: Committing to git adds a timestamp to git commit messages, " -"which may be configured to reflect your local time zone. To enforce the " -"use of UTC for all commits, you are advised to use a git alias, such as:" +"which may be configured to reflect your local time zone. To enforce the use " +"of UTC for all commits, you are advised to use a git alias, such as:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:70 @@ -5010,33 +4558,33 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:78 msgid "" "You might get an error where the remote end hangs up unexpectedly. " -"Unfortunately git still doesn’t support resumable cloning. Until it does," -" there are a couple fairly easy ways to handle this. The first and " -"easiest is to try and clone to a shallow depth:" +"Unfortunately git still doesn’t support resumable cloning. Until it does, " +"there are a couple fairly easy ways to handle this. The first and easiest is" +" to try and clone to a shallow depth:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:81 msgid "" -"Once you’ve performed a shallow clone, you can fetch the rest resumably " -"by changing to the repo directory and running:" +"Once you’ve performed a shallow clone, you can fetch the rest resumably by " +"changing to the repo directory and running:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:83 msgid "" -"At this point, you still don’t have all your branches yet. You can get " -"them by running the following commands:" +"At this point, you still don’t have all your branches yet. You can get them " +"by running the following commands:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:86 msgid "" -"Which tells git to alter the repository configuration so that fetching " -"from origin fetches all branches." +"Which tells git to alter the repository configuration so that fetching from " +"origin fetches all branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:87 msgid "" -"If that doesn’t work, you can try opening the tunnel configuration menu " -"and adding some backup tunnels." +"If that doesn’t work, you can try opening the tunnel configuration menu and " +"adding some backup tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:91 @@ -5054,26 +4602,26 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:96 msgid "" -"Revision control can make your life easier, but it works best if you use " -"it well! In light of this, we strongly suggest a fork-first, feature-" -"branch workflow as many are familiar with from Github. In such a " -"workflow, the master branch is used as a sort of “Trunk†for updates and " -"is never touched by the programmmer, instead, all changes to the master " -"are merged from branches. In order to do set up your workspace for this, " -"take the following steps:" +"Revision control can make your life easier, but it works best if you use it " +"well! In light of this, we strongly suggest a fork-first, feature-branch " +"workflow as many are familiar with from Github. In such a workflow, the " +"master branch is used as a sort of “Trunk†for updates and is never touched " +"by the programmmer, instead, all changes to the master are merged from " +"branches. In order to do set up your workspace for this, take the following " +"steps:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:98 msgid "" -"<strong>Never make changes to the Master Branch</strong>. You will be " -"using the master branch to periodially obtain updates to the official " -"source code. All changes should be made in feature branches." +"<strong>Never make changes to the Master Branch</strong>. You will be using " +"the master branch to periodially obtain updates to the official source code." +" All changes should be made in feature branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:101 msgid "" -"Set up a second remote in your local repository using the upstream source" -" code." +"Set up a second remote in your local repository using the upstream source " +"code." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:103 @@ -5082,33 +4630,31 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:105 msgid "" -"Before making any changes to the source code, check out a new feature " -"branch to develop on:" +"Before making any changes to the source code, check out a new feature branch" +" to develop on:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:107 msgid "" -"When you’re done with your changes, commit them and push them to your " -"branch" +"When you’re done with your changes, commit them and push them to your branch" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:110 msgid "" -"Submit a merge request. When the merge request is approved and brought " -"into the upstream master, check out the master locally and pull in the " -"changes:" +"Submit a merge request. When the merge request is approved and brought into " +"the upstream master, check out the master locally and pull in the changes:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:113 msgid "" -"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, " -"you can update your master code using this procedure as well." +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you " +"can update your master code using this procedure as well." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:117 msgid "" -"The git utccommit alias solution to git timestamp issue was arrived at " -"from the information first published here" +"The git utccommit alias solution to git timestamp issue was arrived at from " +"the information first published here" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:6 @@ -5117,22 +4663,21 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:7 msgid "" -"Mirror I2P Git repositories and Bridge Non-private internet.repositories " -"for others." +"Mirror I2P Git repositories and Bridge Non-private internet.repositories for" +" others." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:10 msgid "" -"This is the setup process I use for configuring Gitlab and I2P, with " -"Docker in place to manage the service itself. Gitlab is very easy to host" -" on I2P in this fashion, it can be administered by one person without " -"much difficulty. In my configuration, I use a Debian VM to host docker " -"containers and an I2P router, on a Debian Host system, however, this may " -"be more than necessary for some people. These instructions should work on" -" any Debian-based system, regardless of whether it is in a VM or not, and" -" should easily translate to any system where Docker and an I2P router are" -" available. This guide starts at Docker and does not assume any VM " -"underneath." +"This is the setup process I use for configuring Gitlab and I2P, with Docker " +"in place to manage the service itself. Gitlab is very easy to host on I2P in" +" this fashion, it can be administered by one person without much difficulty." +" In my configuration, I use a Debian VM to host docker containers and an I2P" +" router, on a Debian Host system, however, this may be more than necessary " +"for some people. These instructions should work on any Debian-based system, " +"regardless of whether it is in a VM or not, and should easily translate to " +"any system where Docker and an I2P router are available. This guide starts " +"at Docker and does not assume any VM underneath." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:11 @@ -5141,15 +4686,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:12 msgid "" -"Because Gitlab runs in a container, we only need to install the " -"dependencies required for the container on our main system. Conveniently," -" you can install everything you need with:" +"Because Gitlab runs in a container, we only need to install the dependencies" +" required for the container on our main system. Conveniently, you can " +"install everything you need with:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:14 msgid "" -"on an otherwise unmodified Debian system, or if you have added Docker’s " -"own “Community†Debian repository, you may use:" +"on an otherwise unmodified Debian system, or if you have added Docker’s own " +"“Community†Debian repository, you may use:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:16 @@ -5162,62 +4707,61 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:18 msgid "" -"Once you have docker installed, you can fetch the docker containers " -"required for gitlab. <em>Don’t run them yet.</em>" +"Once you have docker installed, you can fetch the docker containers required" +" for gitlab. <em>Don’t run them yet.</em>" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:20 msgid "" -"For those who are concerned, the gitlab-ce Docker image is built using " -"only Ubuntu Docker images as a parent, which are built from scratch " -"images. Since there are no third-party images involved here, updates " -"should come as soon as they are available in the host images. To review " -"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com" -"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab " -"source code</a>." +"For those who are concerned, the gitlab-ce Docker image is built using only " +"Ubuntu Docker images as a parent, which are built from scratch images. Since" +" there are no third-party images involved here, updates should come as soon " +"as they are available in the host images. To review the Dockerfile for " +"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-" +"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:21 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:22 msgid "" "Gitlab servers inside of I2P can be run with or without the ability to " -"interact with servers on the internet outside of I2P. In the case where " -"the Gitlab server is <em>not allowed</em> to interact with servers " -"outside of I2P, they cannot be de-anonymized by cloning a git repository " -"from a git server on the internet outside of I2P. They can, however, " -"export and mirror repositories from other git services inside of I2P." +"interact with servers on the internet outside of I2P. In the case where the " +"Gitlab server is <em>not allowed</em> to interact with servers outside of " +"I2P, they cannot be de-anonymized by cloning a git repository from a git " +"server on the internet outside of I2P. They can, however, export and mirror " +"repositories from other git services inside of I2P." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:23 msgid "" "In the case where the Gitlab server is <em>allowed</em> to interact with " -"servers outside of I2P, it can act as a “Bridge†for the users, who can " -"use it to mirror content outside I2P to an I2P-accessible source, however" -" it <em>is not anonymous</em> in this case. Git services on the non-" -"anonymous internet will be connected to directly." +"servers outside of I2P, it can act as a “Bridge†for the users, who can use " +"it to mirror content outside I2P to an I2P-accessible source, however it " +"<em>is not anonymous</em> in this case. Git services on the non-anonymous " +"internet will be connected to directly." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:24 msgid "" -"<strong>If you want to have a bridged, non-anonymous Gitlab instance with" -" access to</strong> <strong>web repositories,</strong> no further " +"<strong>If you want to have a bridged, non-anonymous Gitlab instance with " +"access to</strong> <strong>web repositories,</strong> no further " "modification is necessary." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:25 msgid "" -"<strong>If you want to have an I2P-Only Gitlab instance with no access to" -" Web-Only</strong> <strong>Repositories</strong>, you will need to " -"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP " -"proxy only listens on <code>127.0.0.1</code>, you will need to set up a " -"new one for Docker that listens on the Host/Gateway address of the Docker" -" network, which is usually <code>172.17.0.1</code>. I configure mine on " -"port <code>4446</code>." +"<strong>If you want to have an I2P-Only Gitlab instance with no access to " +"Web-Only</strong> <strong>Repositories</strong>, you will need to configure " +"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only " +"listens on <code>127.0.0.1</code>, you will need to set up a new one for " +"Docker that listens on the Host/Gateway address of the Docker network, which" +" is usually <code>172.17.0.1</code>. I configure mine on port " +"<code>4446</code>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:26 @@ -5233,8 +4777,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:37 msgid "" "Visit your Local Gitlab instance and set up your admin account. Choose a " -"strong password, and configure user account limits to match your " -"resources." +"strong password, and configure user account limits to match your resources." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:38 @@ -5245,21 +4788,19 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:39 msgid "" -"It’s also possible to apply your HTTP Proxy settings in a more granular " -"way, so that you can only allow users to mirror repositories from the " -"domains that you choose. Since the domain is presumably operated by an " -"organization, you can use this to ensure that repositories that are " -"mirrorable follow a reasonable set of policies. After all, there is far " -"more abusive content on the non-anonymous internet than there is on I2P, " -"we wouldn’t want to make it too easy to introduce abusive content from " -"such a nefarious place." +"It’s also possible to apply your HTTP Proxy settings in a more granular way," +" so that you can only allow users to mirror repositories from the domains " +"that you choose. Since the domain is presumably operated by an organization," +" you can use this to ensure that repositories that are mirrorable follow a " +"reasonable set of policies. After all, there is far more abusive content on " +"the non-anonymous internet than there is on I2P, we wouldn’t want to make it" +" too easy to introduce abusive content from such a nefarious place." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:40 msgid "" -"Add the following lines to your gitlab.rb file inside the " -"/src/gitlab/config container. These settings will take effect when you " -"restart in a moment." +"Add the following lines to your gitlab.rb file inside the /src/gitlab/config" +" container. These settings will take effect when you restart in a moment." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:56 @@ -5268,10 +4809,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:57 msgid "" -"Once you have Gitlab set up locally, go to the I2P Router console. You " -"will need to set up two server tunnels, one leading to the Gitlab " -"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface" -" on TCP Port 8022." +"Once you have Gitlab set up locally, go to the I2P Router console. You will " +"need to set up two server tunnels, one leading to the Gitlab web(HTTP) " +"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port " +"8022." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:58 @@ -5282,8 +4823,7 @@ msgstr "" msgid "" "For the Web interface, use an “HTTP†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:61 @@ -5301,8 +4841,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:64 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:65 @@ -5321,19 +4861,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:69 msgid "" -"Web services on I2P can register hostnames for themselves by providing an" -" authentication string to a jump service provider like <a " +"Web services on I2P can register hostnames for themselves by providing an " +"authentication string to a jump service provider like <a " "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" again and click on the “Gitlab Web Service†item you just set up. Scroll" -" to the bottom of the “Edit Server Settings†section and click " -"Registration Authentication. Copy the field that says “Authentication for" -" adding Hostname†and visit <a " +" again and click on the “Gitlab Web Service†item you just set up. Scroll to" +" the bottom of the “Edit Server Settings†section and click Registration " +"Authentication. Copy the field that says “Authentication for adding " +"Hostname†and visit <a " "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your " -"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then" -" you will have to use the correct authentication string for your " -"subdomain, which is a little bit more complicated and merits it’s own " -"instructions." +"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then " +"you will have to use the correct authentication string for your subdomain, " +"which is a little bit more complicated and merits it’s own instructions." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:70 @@ -5344,8 +4883,7 @@ msgstr "" msgid "" "For the SSH interface, use a “Standard†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:74 @@ -5358,8 +4896,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:76 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:80 @@ -5368,9 +4906,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:81 msgid "" -"Finally, if you either modified <code>gitlab.rb</code> or you registered " -"a hostname, you will need to re-start the gitlab service for the settings" -" to take effect." +"Finally, if you either modified <code>gitlab.rb</code> or you registered a " +"hostname, you will need to re-start the gitlab service for the settings to " +"take effect." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:2 @@ -5388,20 +4926,16 @@ msgstr "Klienty" #: i2p2www/pages/site/docs/applications/irc.html:15 msgid "" " There are many IRC clients that can be used with I2P. In\n" -"fact, all IRC clients can be connected to the Irc2P Service by connecting" -"\n" +"fact, all IRC clients can be connected to the Irc2P Service by connecting\n" "them to the IRC Tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:28 msgid "" "To configure any IRC client to chat on Irc2P, first, make sure that\n" -"your IRC tunnel is available. Visit the <a " -"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" -"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" " -"indicator on\n" -"the right-hand side is yellow or green, your Irc2P tunnel is ready and " -"you should \n" +"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" +"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n" +"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n" "proceed to the next step." msgstr "" @@ -5418,12 +4952,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:42 msgid "" "Pidgin is a very popular Instant Messaging client with built-in IRC\n" -"support. It is also possible to use it with many other kinds of chat " -"service, and\n" -"it supports using multiple accounts at once and has a variety of plugin-" -"ins. There\n" -"is a similar application for OSX called \"Adium.\" The instructions for " -"Pidgin are\n" +"support. It is also possible to use it with many other kinds of chat service, and\n" +"it supports using multiple accounts at once and has a variety of plugin-ins. There\n" +"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n" "similar in Adium.\n" msgstr "" @@ -5439,8 +4970,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:52 msgid "" "After launching Pidgin, you should see a \"Buddy List\" window. From\n" -"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage" -" Accounts\" to\n" +"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n" "begin configuring your I2P account." msgstr "" @@ -5455,10 +4985,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:59 msgid "" "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n" -"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and" -" password. IRC\n" -"does not require you to register a nickname to join, but you may if you " -"wish, after\n" +"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n" +"does not require you to register a nickname to join, but you may if you wish, after\n" "you connect to Irc2P." msgstr "" @@ -5473,8 +5001,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:67 msgid "" "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n" -"make sure that SSL is <em>disabled</em>, since your tunnel has encryption" -" provided\n" +"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n" "by I2P." msgstr "" @@ -5518,8 +5045,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:87 msgid "" "Change the value in \"Servers\" from the default to `localhost/6669`,\n" -"and configure the default channels you want to join. I suggest #i2p and " -"#i2p-dev\n" +"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n" msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:92 @@ -5619,8 +5145,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:143 msgid "" "Revolution IRC is an easy to use IRC client for Android. It's able to\n" -"handle multiple accounts on multiple services, so you can use it for " -"Irc2P and for\n" +"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n" "your non-I2P IRC networks as well." msgstr "" @@ -5681,15 +5206,13 @@ msgstr "Serwery" #: i2p2www/pages/site/docs/applications/irc.html:196 msgid "" "Eris is an easy-to-configure IRC server with self-configuring support\n" -"for I2P. If you want to run a private IRC server it's one of the easiest " -"ways." +"for I2P. If you want to run a private IRC server it's one of the easiest ways." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:199 msgid "" " This is a valid configuration of the Eris IRC server, but it uses a\n" -"default password for the admin account(admin). You should change the " -"operator.admin.password\n" +"default password for the admin account(admin). You should change the operator.admin.password\n" "and account.admin.password before deploying to a real service." msgstr "" @@ -5714,24 +5237,18 @@ msgstr "" msgid "" "As of release 0.9.4, the router supports managed clients.\n" "Managed clients are instantiated and started by the ClientAppManager.\n" -"The ClientAppManager maintains a reference to the client and receives " -"updates on the client's state.\n" -"Managed clients are preferred, as it is much easier to implement state " -"tracking\n" -"and to start and stop a client. It also is much easier to avoid static " -"references in the client code\n" +"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n" +"Managed clients are preferred, as it is much easier to implement state tracking\n" +"and to start and stop a client. It also is much easier to avoid static references in the client code\n" "which could lead to excessive memory usage after a client is stopped.\n" -"Managed clients may be started and stopped by the user in the router " -"console,\n" +"Managed clients may be started and stopped by the user in the router console,\n" "and are stopped at router shutdown." msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:31 msgid "" -"Managed clients implement either the net.i2p.app.ClientApp or " -"net.i2p.router.app.RouterApp interface.\n" -"Clients implementing the ClientApp interface must provide the following " -"constructor:" +"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n" +"Clients implementing the ClientApp interface must provide the following constructor:" msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:38 @@ -5750,12 +5267,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:49 msgid "" -"If the main class specified in the clients.config file does not implement" -" a managed interface,\n" +"If the main class specified in the clients.config file does not implement a managed interface,\n" "it will be started with main() with the arguments specified,\n" "and stopped with main() with the arguments specified.\n" -"The router does not maintain a reference, since all interactions are via " -"the static main() method.\n" +"The router does not maintain a reference, since all interactions are via the static main() method.\n" "The console cannot provide accurate state information to the user." msgstr "" @@ -5765,8 +5280,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:58 msgid "" -"Clients, whether managed or unmanaged, may register with the " -"ClientAppManager\n" +"Clients, whether managed or unmanaged, may register with the ClientAppManager\n" "so that other clients may retrieve a reference to them.\n" "Registration is by name.\n" "Known registered clients are:" @@ -5778,12 +5292,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:69 msgid "" -"The router also provides a simple mechanism for clients to find an " -"internal socket service,\n" +"The router also provides a simple mechanism for clients to find an internal socket service,\n" "such as the HTTP proxy. This is provided by the Port Mapper.\n" "Registration is by name.\n" -"Clients that register generally provide an internal emulated socket on " -"that port." +"Clients that register generally provide an internal emulated socket on that port." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:2 @@ -5793,8 +5305,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:4 #, python-format msgid "" -"NOTE: The following is a discussion of the reasons behind the I2P naming " -"system,\n" +"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n" "common arguments and possible alternatives.\n" "See <a href=\"%(naming)s\">the naming page</a> for current documentation." msgstr "" @@ -5805,72 +5316,49 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:12 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning " -"with\n" -"advocates across the spectrum of possibilities. However, given I2P's " -"inherent\n" -"demand for secure communication and decentralized operation, the " -"traditional\n" -"DNS-style naming system is clearly out, as are \"majority rules\" voting " -"systems." +"Naming within I2P has been an oft-debated topic since the very beginning with\n" +"advocates across the spectrum of possibilities. However, given I2P's inherent\n" +"demand for secure communication and decentralized operation, the traditional\n" +"DNS-style naming system is clearly out, as are \"majority rules\" voting systems." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:19 msgid "" -"I2P does not promote the use of DNS-like services though, as the damage " -"done\n" -"by hijacking a site can be tremendous - and insecure destinations have no" -"\n" -"value. DNSsec itself still falls back on registrars and certificate " -"authorities,\n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the reply\n" -"spoofed, as they are encrypted to the destination's public keys, and a " -"destination\n" -"itself is just a pair of public keys and a certificate. DNS-style " -"systems on the\n" -"other hand allow any of the name servers on the lookup path to mount " -"simple denial\n" -"of service and spoofing attacks. Adding on a certificate authenticating " -"the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"I2P does not promote the use of DNS-like services though, as the damage done\n" +"by hijacking a site can be tremendous - and insecure destinations have no\n" +"value. DNSsec itself still falls back on registrars and certificate authorities,\n" +"while with I2P, requests sent to a destination cannot be intercepted or the reply\n" +"spoofed, as they are encrypted to the destination's public keys, and a destination\n" +"itself is just a pair of public keys and a certificate. DNS-style systems on the\n" +"other hand allow any of the name servers on the lookup path to mount simple denial\n" +"of service and spoofing attacks. Adding on a certificate authenticating the\n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:33 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness of\n" -"Sybil attacks in anonymous systems - the attacker can simply create an " -"arbitrarily\n" -"high number of peers and \"vote\" with each to take over a given name. " -"Proof-of-work\n" -"methods can be used to make identity non-free, but as the network grows " -"the load\n" -"required to contact everyone to conduct online voting is implausible, or " -"if the\n" +"Voting style naming is dangerous as well, especially given the effectiveness of\n" +"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n" +"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n" +"methods can be used to make identity non-free, but as the network grows the load\n" +"required to contact everyone to conduct online voting is implausible, or if the\n" "full network is not queried, different sets of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:42 msgid "" -"As with the Internet however, I2P is keeping the design and operation of " -"a \n" -"naming system out of the (IP-like) communication layer. The bundled " -"naming library\n" -"includes a simple service provider interface which <a " -"href=\"#alternatives\">alternate naming systems</a> can\n" -"plug into, allowing end users to drive what sort of naming tradeoffs they" -" prefer." +"As with the Internet however, I2P is keeping the design and operation of a \n" +"naming system out of the (IP-like) communication layer. The bundled naming library\n" +"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n" +"plug into, allowing end users to drive what sort of naming tradeoffs they prefer." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:50 msgid "" -"See also <a href=\"https://zooko.com/distnames.html\">Names: " -"Decentralized, Secure, Human-Meaningful: Choose Two</a>." +"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, " +"Secure, Human-Meaningful: Choose Two</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:55 @@ -5881,36 +5369,26 @@ msgstr "" msgid "" "Q:\n" "What to do if some hosts \n" -"do not agree on one address and if some addresses are working, others are" -" not? \n" +"do not agree on one address and if some addresses are working, others are not? \n" "Who is the right source of a name?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:64 msgid "" "A:\n" -"You don't. This is actually a critical difference between names on I2P " -"and how \n" -"DNS works - names in I2P are human readable, secure, but <b>not globally" -" \n" -"unique</b>. This is by design, and an inherent part of our need for " -"security." +"You don't. This is actually a critical difference between names on I2P and how \n" +"DNS works - names in I2P are human readable, secure, but <b>not globally \n" +"unique</b>. This is by design, and an inherent part of our need for security." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:70 msgid "" -"If I could somehow convince you to change the destination associated with" -" some \n" -"name, I'd successfully \"take over\" the site, and under no circumstances" -" is that \n" -"acceptable. Instead, what we do is make names <b>locally unique</b>: " -"they are \n" -"what <i>you</i> use to call a site, just as how you can call things " -"whatever \n" -"you want when you add them to your browser's bookmarks, or your IM " -"client's \n" -"buddy list. Who you call \"Boss\" may be who someone else calls " -"\"Sally\"." +"If I could somehow convince you to change the destination associated with some \n" +"name, I'd successfully \"take over\" the site, and under no circumstances is that \n" +"acceptable. Instead, what we do is make names <b>locally unique</b>: they are \n" +"what <i>you</i> use to call a site, just as how you can call things whatever \n" +"you want when you add them to your browser's bookmarks, or your IM client's \n" +"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:78 @@ -5926,44 +5404,33 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:89 msgid "" "<b>Inefficiency:</b>\n" -"The whole hosts.txt is downloaded (if it has changed, since eepget uses " -"the etag and last-modified headers).\n" +"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n" "It's about 400K right now for almost 800 hosts." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:94 msgid "" -"True, but this isn't a lot of traffic in the context of i2p, which is " -"itself wildly inefficient\n" -"(floodfill databases, huge encryption overhead and padding, garlic " -"routing, etc.).\n" -"If you downloaded a hosts.txt file from someone every 12 hours it " -"averages out to about 10 bytes/sec." +"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n" +"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n" +"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:99 msgid "" -"As is usually the case in i2p, there is a fundamental tradeoff here " -"between anonymity and efficiency.\n" -"Some would say that using the etag and last-modified headers is hazardous" -" because it exposes when you\n" +"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n" +"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n" "last requested the data.\n" -"Others have suggested asking for specific keys only (similar to what jump" -" services do, but\n" +"Others have suggested asking for specific keys only (similar to what jump services do, but\n" "in a more automated fashion), possibly at a further cost in anonymity." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:106 #, python-format msgid "" -"Possible improvements would be a replacement or supplement to address " -"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" -"or something simple like subscribing to http://example.i2p/cgi-" -"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" -"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 " -"hours, for example,\n" -"that could be both more efficient and more anonymous than the current " -"hosts.txt with last-modified and etag." +"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" +"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" +"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n" +"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:112 @@ -5973,17 +5440,14 @@ msgid "" "<a href=\"%(url)s\">%(url)s</a>.\n" "This script returns an Etag with a timestamp.\n" "When a request comes in with the If-None-Match etag,\n" -"the script ONLY returns new hosts since that timestamp, or 304 Not " -"Modified if there are none.\n" -"In this way, the script efficiently returns only the hosts the subscriber" -"\n" +"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n" +"In this way, the script efficiently returns only the hosts the subscriber\n" "does not know about, in an address book-compatible manner." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:121 msgid "" -"So the inefficiency is not a big issue and there are several ways to " -"improve things without\n" +"So the inefficiency is not a big issue and there are several ways to improve things without\n" "radical change." msgstr "" @@ -5997,38 +5461,30 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:132 msgid "" "As far as network traffic see above.\n" -"But unless you're going to do a slow real-time query over the network for" -"\n" -"a key, you need to have the whole set of keys stored locally, at a cost " -"of about 500 bytes per key." +"But unless you're going to do a slow real-time query over the network for\n" +"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:139 msgid "" "<b>Requires configuration and \"trust\":</b>\n" -"Out-of-the-box address book is only subscribed to " -"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" +"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" "leading to poor new-user experience." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:144 msgid "" -"This is very much intentional. jrandom wants a user to \"trust\" a " -"hosts.txt\n" +"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n" "provider, and as he likes to say, \"trust is not a boolean\".\n" -"The configuration step attempts to force users to think about issues of " -"trust in an anonymous network." +"The configuration step attempts to force users to think about issues of trust in an anonymous network." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:149 msgid "" -"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy" -"\n" -"lists some jump services, but doesn't \"recommend\" any one in " -"particular,\n" +"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n" +"lists some jump services, but doesn't \"recommend\" any one in particular,\n" "and it's up to the user to pick one (or not).\n" -"jrandom would say we trust the listed providers enough to list them but " -"not enough to\n" +"jrandom would say we trust the listed providers enough to list them but not enough to\n" "automatically go fetch the key from them." msgstr "" @@ -6045,14 +5501,13 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:166 msgid "" -"Unfortunately real-time lookups over i2p would significantly slow down " -"web browsing." +"Unfortunately real-time lookups over i2p would significantly slow down web " +"browsing." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:169 msgid "" -"Also, DNS is based on lookups with limited caching and time-to-live, " -"while i2p\n" +"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n" "keys are permanent." msgstr "" @@ -6071,26 +5526,21 @@ msgid "" "Yes it depends on a few servers that you have configured.\n" "Within i2p, servers and services come and go.\n" "Any other centralized system (for example DNS root servers) would\n" -"have the same problem. A completely decentralized system (everybody is " -"authoritative)\n" -"is possible by implementing an \"everybody is a root DNS server\" " -"solution, or by\n" -"something even simpler, like a script that adds everybody in your " -"hosts.txt to your address book." +"have the same problem. A completely decentralized system (everybody is authoritative)\n" +"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n" +"something even simpler, like a script that adds everybody in your hosts.txt to your address book." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:190 msgid "" -"People advocating all-authoritative solutions generally haven't thought " -"through\n" +"People advocating all-authoritative solutions generally haven't thought through\n" "the issues of conflicts and hijacking, however." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:196 msgid "" "<b>Awkward, not real-time:</b>\n" -"It's a patchwork of hosts.txt providers, key-add web form providers, jump" -" service providers,\n" +"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n" "I2P Site status reporters.\n" "Jump servers and subscriptions are a pain, it should just work like DNS." msgstr "" @@ -6101,8 +5551,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:207 msgid "" -"So, in summary, the current system is not horribly broken, inefficient, " -"or un-scalable,\n" +"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n" "and proposals to \"just use DNS\" aren't well thought-through." msgstr "" @@ -6112,8 +5561,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:213 msgid "" -"The I2P source contains several pluggable naming systems and supports " -"configuration options\n" +"The I2P source contains several pluggable naming systems and supports configuration options\n" "to enable experimentation with naming systems." msgstr "" @@ -6135,8 +5583,8 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:234 msgid "" -"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/" -" directory." +"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ " +"directory." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:237 @@ -6161,8 +5609,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:253 msgid "" -"The current naming system can be changed with the advanced config option " -"'i2p.naming.impl'\n" +"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n" "(restart required).\n" "See core/java/src/net/i2p/client/naming for details." msgstr "" @@ -6170,8 +5617,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:258 msgid "" "Any new system should be stacked with HostsTxt, or should\n" -"implement local storage and/or the address book subscription functions, " -"since address book\n" +"implement local storage and/or the address book subscription functions, since address book\n" "only knows about the hosts.txt files and format." msgstr "" @@ -6181,50 +5627,40 @@ msgstr "Certyfikaty" #: i2p2www/pages/site/docs/discussions/naming.html:265 msgid "" -"I2P destinations contain a certificate, however at the moment that " -"certificate\n" +"I2P destinations contain a certificate, however at the moment that certificate\n" "is always null.\n" -"With a null certificate, base64 destinations are always 516 bytes ending " -"in \"AAAA\",\n" -"and this is checked in the address book merge mechanism, and possibly " -"other places.\n" -"Also, there is no method available to generate a certificate or add it to" -" a\n" +"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n" +"and this is checked in the address book merge mechanism, and possibly other places.\n" +"Also, there is no method available to generate a certificate or add it to a\n" "destination. So these will have to be updated to implement certificates." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:273 #, python-format msgid "" -"One possible use of certificates is for <a " -"href=\"%(todo)s#hashcash\">proof of work</a>." +"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof " +"of work</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:276 msgid "" -"Another is for \"subdomains\" (in quotes because there is really no such " -"thing,\n" -"i2p uses a flat naming system) to be signed by the 2nd level domain's " -"keys." +"Another is for \"subdomains\" (in quotes because there is really no such thing,\n" +"i2p uses a flat naming system) to be signed by the 2nd level domain's keys." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:280 msgid "" -"With any certificate implementation must come the method for verifying " -"the\n" +"With any certificate implementation must come the method for verifying the\n" "certificates.\n" "Presumably this would happen in the address book merge code.\n" -"Is there a method for multiple types of certificates, or multiple " -"certificates?" +"Is there a method for multiple types of certificates, or multiple certificates?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:286 msgid "" "Adding on a certificate authenticating the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" @@ -6243,91 +5679,58 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:11 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:19 #: i2p2www/pages/site/docs/how/tech-intro.html:508 msgid "" -"The first time a router wants to encrypt a garlic message to another " -"router, \n" -"they encrypt the keying material for an AES256 session key with ElGamal " -"and \n" -"append the AES256/CBC encrypted payload after that encrypted ElGamal " -"block. \n" -"In addition to the encrypted payload, the AES encrypted section contains " -"the \n" -"payload length, the SHA256 hash of the unencrypted payload, as well as a " -"number \n" -"of \"session tags\" - random 32 byte nonces. The next time the sender " -"wants \n" -"to encrypt a garlic message to another router, rather than ElGamal " -"encrypt \n" -"a new session key they simply pick one of the previously delivered " -"session \n" -"tags and AES encrypt the payload like before, using the session key used " -"with \n" -"that session tag, prepended with the session tag itself. When a router " -"receives \n" -"a garlic encrypted message, they check the first 32 bytes to see if it " -"matches \n" -"an available session tag - if it does, they simply AES decrypt the " -"message, \n" +"The first time a router wants to encrypt a garlic message to another router, \n" +"they encrypt the keying material for an AES256 session key with ElGamal and \n" +"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n" +"In addition to the encrypted payload, the AES encrypted section contains the \n" +"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n" +"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n" +"to encrypt a garlic message to another router, rather than ElGamal encrypt \n" +"a new session key they simply pick one of the previously delivered session \n" +"tags and AES encrypt the payload like before, using the session key used with \n" +"that session tag, prepended with the session tag itself. When a router receives \n" +"a garlic encrypted message, they check the first 32 bytes to see if it matches \n" +"an available session tag - if it does, they simply AES decrypt the message, \n" "but if it does not, they ElGamal decrypt the first block." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:35 #: i2p2www/pages/site/docs/how/tech-intro.html:524 msgid "" -"Each session tag can be used only once so as to prevent internal " -"adversaries \n" -"from unnecessarily correlating different messages as being between the " -"same \n" -"routers. The sender of an ElGamal/AES+SessionTag encrypted message " -"chooses \n" -"when and how many tags to deliver, prestocking the recipient with enough " -"tags \n" -"to cover a volley of messages. Garlic messages may detect the successful " -"tag \n" -"delivery by bundling a small additional message as a clove (a \"delivery " -"status \n" -"message\") - when the garlic message arrives at the intended recipient " -"and \n" -"is decrypted successfully, this small delivery status message is one of " -"the \n" -"cloves exposed and has instructions for the recipient to send the clove " -"back \n" -"to the original sender (through an inbound tunnel, of course). When the " -"original \n" -"sender receives this delivery status message, they know that the session " -"tags \n" +"Each session tag can be used only once so as to prevent internal adversaries \n" +"from unnecessarily correlating different messages as being between the same \n" +"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n" +"when and how many tags to deliver, prestocking the recipient with enough tags \n" +"to cover a volley of messages. Garlic messages may detect the successful tag \n" +"delivery by bundling a small additional message as a clove (a \"delivery status \n" +"message\") - when the garlic message arrives at the intended recipient and \n" +"is decrypted successfully, this small delivery status message is one of the \n" +"cloves exposed and has instructions for the recipient to send the clove back \n" +"to the original sender (through an inbound tunnel, of course). When the original \n" +"sender receives this delivery status message, they know that the session tags \n" "bundled in the garlic message were successfully delivered." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:50 msgid "" "Session tags themselves have a short lifetime, after which they are \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption.\n" -"A session will continue to exist until all its tags are exhausted or " -"expire." +"A session will continue to exist until all its tags are exhausted or expire." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:61 @@ -6342,8 +5745,7 @@ msgid "" "between a Router and a Destination.\n" "Each Router and Destination maintains its own Session Key Manager to\n" "keep track of Session Keys and Session Tags.\n" -"Separate Session Key Managers prevents correlation of multiple " -"Destinations\n" +"Separate Session Key Managers prevents correlation of multiple Destinations\n" "to each other or a Router by adversaries." msgstr "" @@ -6364,14 +5766,14 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:85 -msgid "It is for a new session and contains both ElGamal and AES encrypted blocks" +msgid "" +"It is for a new session and contains both ElGamal and AES encrypted blocks" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:88 msgid "" "When a router receives a message, it will first assume it is from\n" -"an existing session and attempt to look up the Session Tag and decrypt " -"the following data using AES.\n" +"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n" "If that fails, it will assume it is for a new session and attempt to\n" "decrypt it using ElGamal." msgstr "" @@ -6382,8 +5784,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:98 msgid "" -"A New Session ElGamal Message contains two parts, an encrypted ElGamal " -"block\n" +"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n" "and an encrypted AES block." msgstr "" @@ -6409,8 +5810,7 @@ msgid "" "The 32-byte\n" "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n" "is the identifier for the session.\n" -"The 32-byte Pre-IV will be used to generate the IV for the AES block that" -" follows;\n" +"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n" "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV." msgstr "" @@ -6439,18 +5839,16 @@ msgstr "" #, python-format msgid "" "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n" -"using the session key and IV (calculated from the pre-IV) from the " -"ElGamal section.\n" -"The encrypted AES Block length is variable but is always a multiple of 16" -" bytes.\n" +"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n" +"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n" "</p>" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:266 #, python-format msgid "" -"Actual max payload length, and max block length, is less than 64 KB; see " -"the <a href=\"%(i2np)s\">I2NP Overview</a>." +"Actual max payload length, and max block length, is less than 64 KB; see the" +" <a href=\"%(i2np)s\">I2NP Overview</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:269 @@ -6479,18 +5877,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:318 msgid "" "The session tag also serves as\n" -"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the " -"sessionTag." +"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:323 msgid "" -"To decode a message from an existing session, a router looks up the " -"Session Tag to find an\n" -"associated Session Key. If the Session Tag is found, the AES block is " -"decrypted using the associated Session Key.\n" -"If the tag is not found, the message is assumed to be a <a " -"href=\"#new\">New Session Message</a>." +"To decode a message from an existing session, a router looks up the Session Tag to find an\n" +"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n" +"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:331 @@ -6500,38 +5894,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:332 #, python-format msgid "" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"For brief streaming connections or datagrams, these options may be used " -"to significantly reduce bandwidth.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:353 msgid "" -"There are many possible areas to tune the Session Key Manager's " -"algorithms;\n" -"some may interact with the streaming library behavior, or have " -"significant\n" +"There are many possible areas to tune the Session Key Manager's algorithms;\n" +"some may interact with the streaming library behavior, or have significant\n" "impact on overall performance." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:360 msgid "" -"The number of tags delivered could depend on message size, keeping in " -"mind\n" +"The number of tags delivered could depend on message size, keeping in mind\n" "the eventual padding to 1KB at the tunnel message layer." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:365 msgid "" -"Clients could send an estimate of session lifetime to the router, as an " -"advisory\n" +"Clients could send an estimate of session lifetime to the router, as an advisory\n" "on the number of tags required." msgstr "" @@ -6543,15 +5929,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:374 msgid "" -"The router may assume delivery of Session Tags, or await acknowledgement " -"before using them;\n" +"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n" "there are tradeoffs for each strategy." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:379 msgid "" -"For very brief messages, almost the full 222 bytes of the pre-IV and " -"padding fields in the ElGamal block\n" +"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n" "could be used for the entire message, instead of establishing a session." msgstr "" @@ -6563,10 +5947,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:389 msgid "" -"Perhaps things could be more efficient if the Session Tag system was " -"bidirectional,\n" -"so tags delivered in the 'forward' path could be used in the 'reverse' " -"path,\n" +"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n" +"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n" "thus avoiding ElGamal in the initial response.\n" "The router currently plays some tricks like this when sending\n" "tunnel test messages to itself." @@ -6584,12 +5966,9 @@ msgstr "" msgid "" "Several of these ideas may require a new I2NP message type, or\n" "set a flag in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery" -" Instructions</a>,\n" +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n" "or set a magic number in the first few bytes of the Session Key field\n" -"and accept a small risk of the random Session Key matching the magic " -"number." +"and accept a small risk of the random Session Key matching the magic number." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:2 @@ -6606,8 +5985,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:7 msgid "" -"The terms \"garlic routing\" and \"garlic encryption\" are often used " -"rather loosely when referring to I2P's technology.\n" +"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n" "Here, we explain the history of the terms, the various meanings, and\n" "the usage of \"garlic\" methods in I2P." msgstr "" @@ -6617,20 +5995,16 @@ msgid "" "\"Garlic routing\" was first coined by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n" "in Roger Dingledine's Free Haven \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"Section 8.1.1 (June 2000), as derived from \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n" "<a href=\"http://www.onion-router.net/\">Onion Routing</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:21 msgid "" -"\"Garlic\" may have been used originally by I2P developers because I2P " -"implements a form of\n" -"bundling as Freedman describes, or simply to emphasize general " -"differences from Tor.\n" +"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n" +"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n" "The specific reasoning may be lost to history.\n" -"Generally, when referring to I2P, the term \"garlic\" may mean one of " -"three things:" +"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:28 @@ -6649,54 +6023,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:33 msgid "" -"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven " -"years has not always been precise; therefore the reader is\n" +"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n" "cautioned when encountering the term.\n" "Hopefully, the explanation below will make things clear." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:40 msgid "" -"Onion routing is a technique for building paths, or tunnels, through a " -"series of peers,\n" +"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n" "and then using that tunnel.\n" -"Messages are repeatedly encrypted by the originator, and then decrypted " -"by each hop.\n" -"During the building phase, only the routing instructions for the next hop" -" are exposed to each peer.\n" -"During the operating phase, messages are passed through the tunnel, and " -"the\n" -"message and its routing instructions are only exposed to the endpoint of " -"the tunnel." +"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n" +"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n" +"During the operating phase, messages are passed through the tunnel, and the\n" +"message and its routing instructions are only exposed to the endpoint of the tunnel." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:49 #, python-format msgid "" "This is similar to the way Mixmaster\n" -"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages " -"- taking a message, encrypting it\n" -"to the recipient's public key, taking that encrypted message and " -"encrypting\n" -"it (along with instructions specifying the next hop), and then taking " -"that\n" -"resulting encrypted message and so on, until it has one layer of " -"encryption\n" +"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n" +"to the recipient's public key, taking that encrypted message and encrypting\n" +"it (along with instructions specifying the next hop), and then taking that\n" +"resulting encrypted message and so on, until it has one layer of encryption\n" "per hop along the path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:58 msgid "" -"In this sense, \"garlic routing\" as a general concept is identical to " -"\"onion routing\".\n" -"As implemented in I2P, of course, there are several differences from the " -"implementation in Tor; see below.\n" -"Even so, there are substantial similarities such that I2P benefits from a" -"\n" -"<a href=\"http://www.onion-router.net/Publications.html\">large amount of" -" academic research on onion routing</a>,\n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar " -"mixnets</a>." +"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n" +"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n" +"Even so, there are substantial similarities such that I2P benefits from a\n" +"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:67 @@ -6705,15 +6064,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:68 msgid "" -"Michael Freedman defined \"garlic routing\" as an extension to onion " -"routing,\n" +"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n" "in which multiple messages are bundled together.\n" "He called each message a \"bulb\".\n" -"All the messages, each with its own delivery instructions, are exposed at" -" the\n" +"All the messages, each with its own delivery instructions, are exposed at the\n" "endpoint.\n" -"This allows the efficient bundling of an onion routing \"reply block\" " -"with the original message." +"This allows the efficient bundling of an onion routing \"reply block\" with the original message." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:77 @@ -6722,10 +6078,8 @@ msgid "" "Our term for garlic \"bulbs\" is \"cloves\".\n" "Any number of messages can be\n" "contained, instead of just a single message.\n" -"This is a significant distinction from the onion routing implemented in " -"Tor.\n" -"However, it is only one of many major architectural differences between " -"I2P and Tor;\n" +"This is a significant distinction from the onion routing implemented in Tor.\n" +"However, it is only one of many major architectural differences between I2P and Tor;\n" "perhaps it is not, by itself, enough to justify a change in terminology." msgstr "" @@ -6733,10 +6087,8 @@ msgstr "" msgid "" "Another difference\n" "from the method described by Freedman\n" -"is that the path is unidirectional - there is no \"turning point\" as " -"seen in onion routing\n" -"or mixmaster reply blocks, which greatly simplifies the algorithm and " -"allows for more flexible\n" +"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n" +"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n" "and reliable delivery." msgstr "" @@ -6770,16 +6122,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:113 msgid "" -"For publishing some network database entries (dampening the probability " -"of a successful traffic analysis attack) (ElGamal/AES)" +"For publishing some network database entries (dampening the probability of a" +" successful traffic analysis attack) (ElGamal/AES)" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:116 msgid "" -"There are also significant ways that this technique can be used to " -"improve the performance of the network, \n" -"exploiting transport latency/throughput tradeoffs, and branching data " -"through redundant paths to increase reliability." +"There are also significant ways that this technique can be used to improve the performance of the network, \n" +"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:122 @@ -6790,8 +6140,7 @@ msgstr "" msgid "" "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n" "one for outbound and one for inbound traffic.\n" -"Therefore, four tunnels are required for a single round-trip message and " -"reply." +"Therefore, four tunnels are required for a single round-trip message and reply." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:129 @@ -6811,12 +6160,10 @@ msgstr "" msgid "" "Tunnels are a general-purpose mechanism to transport all\n" "<a href=\"%(i2np)s\">I2NP messages</a>, and\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to " -"build tunnels.\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n" "We do not bundle multiple\n" "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at " -"the outbound tunnel endpoint;\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n" "the tunnel encryption is sufficient." msgstr "" @@ -6830,14 +6177,12 @@ msgid "" "At the layer above tunnels, I2P delivers end-to-end messages between\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n" "Just as within a single tunnel, we use\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption." -"\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n" "Each client message as delivered to the router through the\n" "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n" "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n" "with its own\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>,\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n" "inside a\n" "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n" "Delivery Instructions may specify a Destination, Router, or Tunnel." @@ -6860,18 +6205,13 @@ msgid "" "A\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n" "with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" -"specifying that it be sent back to the originating router as an " -"acknowledgment.\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" +"specifying that it be sent back to the originating router as an acknowledgment.\n" "This is similar to the \"reply block\" or \"reply onion\"\n" "described in the references.\n" -"It is used for determining the success or failure of end to end message " -"delivery.\n" -"The originating router may, upon failure to receive the Delivery Status " -"Message\n" -"within the expected time period, modify the routing to the far-end " -"Destination,\n" +"It is used for determining the success or failure of end to end message delivery.\n" +"The originating router may, upon failure to receive the Delivery Status Message\n" +"within the expected time period, modify the routing to the far-end Destination,\n" "or take other actions." msgstr "" @@ -6883,16 +6223,12 @@ msgid "" "containing a\n" "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n" "for the originating Destination, with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" "specifying the far-end destination's router.\n" -"By periodically bundling a LeaseSet, the router ensures that the far-end " -"will be able\n" +"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n" "to maintain communications.\n" -"Otherwise the far-end would have to query a floodfill router for the " -"network database entry,\n" -"and all LeaseSets would have to be published to the network database, as " -"explained on the\n" +"Otherwise the far-end would have to query a floodfill router for the network database entry,\n" +"and all LeaseSets would have to be published to the network database, as explained on the\n" "<a href=\"%(netdb)s\">network database page</a>." msgstr "" @@ -6902,31 +6238,24 @@ msgid "" "By default, the Delivery Status and Database Store Messages\n" "are bundled when the local LeaseSet changes, when additional\n" "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n" -"are delivered, or if the messages have not been bundled in the previous " -"minute.\n" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"are delivered, or if the messages have not been bundled in the previous minute.\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:224 msgid "" -"Obviously, the additional messages are currently bundled for specific " -"purposes,\n" +"Obviously, the additional messages are currently bundled for specific purposes,\n" "and not part of a general-purpose routing scheme." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:229 msgid "" -"As of release 0.9.12, the Delivery Status Message is wrapped in another " -"Garlic Message\n" -"by the originator so that the contents are encrypted and not visible to " -"routers on the return path." +"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n" +"by the originator so that the contents are encrypted and not visible to routers on the return path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:235 @@ -6950,35 +6279,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:252 #, python-format msgid "" -"The Garlic Message mechanism is very flexible and provides a structure " -"for\n" +"The Garlic Message mechanism is very flexible and provides a structure for\n" "implementing many types of mixnet delivery methods.\n" "Together with the unused delay option in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel" -" message Delivery Instructions</a>,\n" -"a wide spectrum of batching, delay, mixing, and routing strategies are " -"possible." +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n" +"a wide spectrum of batching, delay, mixing, and routing strategies are possible." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:260 msgid "" -"In particular, there is potential for much more flexibility at the " -"outbound tunnel endpoint.\n" +"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n" "Messages could possibly be routed from there to one of several tunnels\n" -"(thus minimizing point-to-point connections), or multicast to several " -"tunnels\n" +"(thus minimizing point-to-point connections), or multicast to several tunnels\n" "for redundancy, or streaming audio and video." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:267 msgid "" -"Such experiments may conflict with the need to ensure security and " -"anonymity, such\n" -"as limiting certain routing paths, restricting the types of I2NP messages" -" that may\n" -"be forwarded along various paths, and enforcing certain message " -"expiration times." +"Such experiments may conflict with the need to ensure security and anonymity, such\n" +"as limiting certain routing paths, restricting the types of I2NP messages that may\n" +"be forwarded along various paths, and enforcing certain message expiration times." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:273 @@ -6987,11 +6307,9 @@ msgid "" "As a part of\n" "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n" "a garlic message contains a sender\n" -"specified amount of padding data, allowing the sender to take active " -"countermeasures \n" +"specified amount of padding data, allowing the sender to take active countermeasures \n" "against traffic analysis.\n" -"This is not currently used, beyond the requirement to pad to a multiple " -"of 16 bytes." +"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:282 @@ -7008,10 +6326,8 @@ msgstr "Polecane" #: i2p2www/pages/site/docs/how/garlic-routing.html:292 msgid "" -"The term garlic routing was first coined in Roger Dingledine's Free Haven" -" \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"(June 2000),\n" +"The term garlic routing was first coined in Roger Dingledine's Free Haven \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n" "see Section 8.1.1 authored by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>." msgstr "" @@ -7041,8 +6357,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:313 msgid "" -"Onion routing was first described in <a href=\"http://www.onion-" -"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" +"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996." msgstr "" @@ -7052,79 +6367,51 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:4 msgid "" -"I2P is a project to build, deploy, and maintain a network supporting " -"secure and anonymous\n" -"communication. People using I2P are in control of the tradeoffs between " -"anonymity, reliability,\n" -"bandwidth usage, and latency. There is no central point in the network on" -" which pressure can be\n" -"exerted to compromise the integrity, security, or anonymity of the " -"system. The network supports\n" -"dynamic reconfiguration in response to various attacks, and has been " -"designed to make use of\n" -"additional resources as they become available. Of course, all aspects of " -"the network are open and\n" +"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n" +"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n" +"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n" +"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n" +"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n" +"additional resources as they become available. Of course, all aspects of the network are open and\n" "freely available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:14 msgid "" -"Unlike many other anonymizing networks, I2P doesn't try to provide " -"anonymity by hiding the\n" -"originator of some communication and not the recipient, or the other way " -"around. I2P is designed to\n" -"allow peers using I2P to communicate with each other anonymously — " -"both sender and recipient\n" -"are unidentifiable to each other as well as to third parties. For " -"example, today there are both\n" -"in-I2P web sites (allowing anonymous publishing / hosting) as well as " -"HTTP proxies to the normal web\n" -"(allowing anonymous web browsing). Having the ability to run servers " -"within I2P is essential, as it\n" -"is quite likely that any outbound proxies to the normal Internet will be " -"monitored, disabled, or\n" +"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n" +"originator of some communication and not the recipient, or the other way around. I2P is designed to\n" +"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n" +"are unidentifiable to each other as well as to third parties. For example, today there are both\n" +"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n" +"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n" +"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n" "even taken over to attempt more malicious attacks." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:25 #, python-format msgid "" -"The network itself is message oriented - it is essentially a secure and " -"anonymous IP layer, where\n" -"messages are addressed to cryptographic keys (Destinations) and can be " -"significantly larger than IP\n" -"packets. Some example uses of the network include \"I2P Sites\" " -"(webservers hosting normal web\n" -"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a " -"distributed data store. With the\n" -"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are " -"able to stream traditional\n" -"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even " -"streaming audio. Most people\n" -"will not use I2P directly, or even need to know they're using it. Instead" -" their view will be of one\n" -"of the I2P enabled applications, or perhaps as a little controller app to" -" turn on and off various\n" +"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n" +"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n" +"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n" +"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n" +"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n" +"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n" +"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n" +"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n" "proxies to enable the anonymizing functionality." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:37 #, python-format msgid "" -"An essential part of designing, developing, and testing an anonymizing " -"network is to define the <a\n" -"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing " -"as \"true\" anonymity, just\n" -"increasingly expensive costs to identify someone. Briefly, I2P's intent " -"is to allow people to\n" -"communicate in arbitrarily hostile environments by providing good " -"anonymity, mixed in with\n" -"sufficient cover traffic provided by the activity of people who require " -"less anonymity. This way,\n" -"some users can avoid detection by a very powerful adversary, while others" -" will try to evade a weaker\n" -"entity, <i>all on the same network</i>, where each one's messages are " -"essentially indistinguishable\n" +"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n" +"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n" +"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n" +"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n" +"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n" +"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n" +"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n" "from the others." msgstr "" @@ -7135,12 +6422,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:49 #, python-format msgid "" -"There are a multitude of reasons why we need a system to support " -"anonymous communication, and\n" -"everyone has their own personal rationale. There are many <a " -"href=\"%(comparisons)s\">other\n" -"efforts</a> working on finding ways to provide varying degrees of " -"anonymity to people through the\n" +"There are a multitude of reasons why we need a system to support anonymous communication, and\n" +"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n" +"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n" "Internet, but we could not find any that met our needs or threat model." msgstr "" @@ -7151,23 +6435,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:58 #, python-format msgid "" -"The network at a glance is made up of a set of nodes (\"routers\") with a" -" number of unidirectional\n" -"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a " -"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is " -"identified by a cryptographic RouterIdentity which is\n" -"typically long lived. These routers communicate with each other through " -"existing transport\n" -"mechanisms (TCP, UDP, etc), passing various messages. Client applications" -" have their own\n" -"cryptographic identifier (\"Destination\") which enables it to send and " -"receive messages. These\n" -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels\n" -"that will be used for sending and receiving messages through the network." -" I2P has its own internal\n" -"<a href=\"%(netdb)s\">network database</a> (using a modification of the " -"Kademlia algorithm) for\n" +"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n" +"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n" +"typically long lived. These routers communicate with each other through existing transport\n" +"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n" +"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n" +"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n" +"that will be used for sending and receiving messages through the network. I2P has its own internal\n" +"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n" "distributing routing and contact information securely." msgstr "" @@ -7177,91 +6452,62 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:73 msgid "" -"In the above, Alice, Bob, Charlie, and Dave are all running routers with " -"a single Destination on\n" -"their local router. They each have a pair of 2-hop inbound tunnels per " -"destination (labeled 1, 2, 3,\n" -"4, 5 and 6), and a small subset of each of those router's outbound tunnel" -" pool is shown with 2-hop\n" -"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's " -"outbound tunnels are not\n" -"shown, nor are the rest of each router's outbound tunnel pool (typically " -"stocked with a few tunnels\n" -"at a time). When Alice and Bob talk to each other, Alice sends a message " -"out one of her (pink)\n" -"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3" -" or 4). She knows to send\n" -"to those tunnels on the correct router by querying the network database, " -"which is constantly updated\n" +"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n" +"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n" +"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n" +"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n" +"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n" +"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n" +"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n" +"to those tunnels on the correct router by querying the network database, which is constantly updated\n" "as new leases are authorized and old ones expire." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:85 #, python-format msgid "" -"If Bob wants to reply to Alice, he simply goes through the same process -" -" send a message out one of\n" -"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 " -"or 2). To make things\n" -"easier, most messages sent between Alice and Bob are <a " -"href=\"%(garlicrouting)s\">garlic</a>\n" -"wrapped, bundling the sender's own current lease information so that the " -"recipient can reply\n" -"immediately without having to look in the network database for the " -"current data." +"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n" +"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n" +"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n" +"wrapped, bundling the sender's own current lease information so that the recipient can reply\n" +"immediately without having to look in the network database for the current data." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:93 #, python-format msgid "" -"To deal with a wide range of attacks, I2P is fully distributed with no " -"centralized resources - and\n" -"hence there are no directory servers keeping statistics regarding the " -"performance and reliability of\n" -"routers within the network. As such, each router must keep and maintain " -"profiles of various routers\n" -"and is responsible for selecting appropriate peers to meet the anonymity," -" performance, and\n" -"reliability needs of the users, as described in the <a " -"href=\"%(peerselection)s\">peer selection</a>\n" +"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n" +"hence there are no directory servers keeping statistics regarding the performance and reliability of\n" +"routers within the network. As such, each router must keep and maintain profiles of various routers\n" +"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n" +"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n" "page." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:102 #, python-format msgid "" -"The network itself makes use of a significant number of <a " -"href=\"%(cryptography)s\">cryptographic\n" -"techniques and algorithms</a> - a full laundry list includes 2048bit " -"ElGamal encryption, 256bit AES\n" -"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, " -"2048bit Diffie-Hellman\n" -"negotiated connections with station to station authentication, and <a " -"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." +"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n" +"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n" +"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n" +"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:110 msgid "" -"Content sent over I2P is encrypted through three layers garlic encryption" -" (used to verify the\n" -"delivery of the message to the recipient), tunnel encryption (all " -"messages passing through a tunnel\n" -"is encrypted by the tunnel gateway to the tunnel endpoint), and inter " -"router transport layer\n" +"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n" +"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n" +"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n" "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:117 msgid "" "End-to-end (I2CP) encryption (client application to\n" -"server application) was disabled in I2P release 0.6; end-to-end (garlic) " -"encryption (I2P client router\n" -"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" " -"remains. Notice the different use of\n" -"terms! All data from a to h is end-to-end encrypted, but the I2CP " -"connection between the I2P router and\n" -"the applications is not end-to-end encrypted! A and h are the routers of " -"Alice and Bob, while Alice and\n" +"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n" +"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n" +"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n" +"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n" "Bob in following chart are the applications running atop of I2P." msgstr "" @@ -7278,32 +6524,22 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:132 msgid "" -"The two main mechanisms for allowing people who need strong anonymity to " -"use the network are\n" -"explicitly delayed garlic routed messages and more comprehensive tunnels " -"to include support for\n" -"pooling and mixing messages. These are currently planned for release 3.0," -" but garlic routed messages\n" -"with no delays and FIFO tunnels are currently in place. Additionally, the" -" 2.0 release will allow\n" -"people to set up and operate behind restricted routes (perhaps with " -"trusted peers), as well as the\n" +"The two main mechanisms for allowing people who need strong anonymity to use the network are\n" +"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n" +"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n" +"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n" +"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n" "deployment of more flexible and anonymous transports." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:141 #, python-format msgid "" -"Some questions have been raised with regards to the scalability of I2P, " -"and reasonably so. There\n" -"will certainly be more analysis over time, but peer lookup and " -"integration should be bounded by\n" -"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network " -"database</a>'s algorithm, while end\n" -"to end messages should be <code>O(1)</code> (scale free), since messages " -"go out K hops through the\n" -"outbound tunnel and another K hops through the inbound tunnel, with K no " -"longer than 3. The size of\n" +"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n" +"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n" +"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n" +"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n" +"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n" "the network (N) bears no impact." msgstr "" @@ -7315,13 +6551,10 @@ msgstr "" #, python-format msgid "" "I2P initially began in Feb 2003 as a proposed modification to <a\n" -"href=\"http://freenetproject.org\">Freenet</a> to allow it to use " -"alternate transports, such as <a\n" +"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n" "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n" -"'anonCommFramework' in April 2003, turning into I2P in July, with code " -"being written in earnest\n" -"starting in August '03. I2P is currently under development, following the" -" <a href=\"%(roadmap)s\">roadmap</a>." +"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n" +"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:161 @@ -7331,22 +6564,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:162 #, python-format msgid "" -"We have a small <a href=\"%(team)s\">team</a> spread around several " -"continents, working to advance\n" -"different aspects of the project. We are very open to other developers " -"who want to get involved and\n" -"anyone else who would like to contribute in other ways, such as " -"critiques, peer review, testing,\n" -"writing I2P enabled applications, or documentation. The entire system is " -"open source - the router\n" -"and most of the SDK are outright public domain with some BSD and Cryptix " -"licensed code, while some\n" -"applications like I2PTunnel and I2PSnark are GPL. Almost everything is " -"written in Java (1.5+),\n" -"though some third party applications are being written in Python and " -"other languages. The code works\n" -"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual" -" Machines." +"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n" +"different aspects of the project. We are very open to other developers who want to get involved and\n" +"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n" +"writing I2P enabled applications, or documentation. The entire system is open source - the router\n" +"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n" +"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n" +"though some third party applications are being written in Python and other languages. The code works\n" +"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:173 @@ -7356,12 +6581,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:174 #, python-format msgid "" -"Anyone interested should join us on the IRC channel #i2p-dev (hosted " -"concurrently on irc.freenode.net,\n" -"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are" -" currently no\n" -"scheduled development meetings, however <a href=\"%(meetings)s\">archives" -" are available</a>." +"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n" +"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n" +"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:180 @@ -7385,39 +6607,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:8 msgid "" "I2P's netDb is a specialized distributed database, containing \n" -"just two types of data - router contact information (<b>RouterInfos</b>) " -"and destination contact\n" -"information (<b>LeaseSets</b>). Each piece of data is signed by the " -"appropriate party and verified\n" -"by anyone who uses or stores it. In addition, the data has liveliness " -"information\n" -"within it, allowing irrelevant entries to be dropped, newer entries to " -"replace\n" +"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n" +"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n" +"by anyone who uses or stores it. In addition, the data has liveliness information\n" +"within it, allowing irrelevant entries to be dropped, newer entries to replace\n" "older ones, and protection against certain classes of attack." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:17 msgid "" "The netDb is distributed with a simple technique called \"floodfill\",\n" -"where a subset of all routers, called \"floodfill routers\", maintains " -"the distributed database." +"where a subset of all routers, called \"floodfill routers\", maintains the distributed database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:25 msgid "" -"When an I2P router wants to contact another router, they need to know " -"some \n" -"key pieces of data - all of which are bundled up and signed by the router" -" into\n" -"a structure called the \"RouterInfo\", which is distributed with the " -"SHA256 of the router's identity\n" +"When an I2P router wants to contact another router, they need to know some \n" +"key pieces of data - all of which are bundled up and signed by the router into\n" +"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n" "as the key. The structure itself contains:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:32 msgid "" -"The router's identity (an encryption key, a signing key, and a " -"certificate)" +"The router's identity (an encryption key, a signing key, and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:33 @@ -7448,8 +6661,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:47 msgid "" -"Capabilities flags - used to indicate floodfill participation, " -"approximate bandwidth, and perceived reachability" +"Capabilities flags - used to indicate floodfill participation, approximate " +"bandwidth, and perceived reachability" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:49 @@ -7508,23 +6721,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:76 msgid "" -"Always sent as 90m, for compatibility with an older scheme where routers " -"published their actual uptime,\n" +"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n" "and only sent tunnel requests to peers whose uptime was more than 60m" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:82 msgid "" "These values are used by other routers for basic decisions.\n" -"Should we connect to this router? Should we attempt to route a tunnel " -"through this router?\n" -"The bandwidth capability flag, in particular, is used only to determine " -"whether\n" +"Should we connect to this router? Should we attempt to route a tunnel through this router?\n" +"The bandwidth capability flag, in particular, is used only to determine whether\n" "the router meets a minimum threshold for routing tunnels.\n" -"Above the minimum threshold, the advertised bandwidth is not used or " -"trusted anywhere\n" -"in the router, except for display in the user interface and for debugging" -" and network analysis." +"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n" +"in the router, except for display in the user interface and for debugging and network analysis." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:102 @@ -7535,13 +6743,11 @@ msgstr "Dodatkowe Opcje" #, python-format msgid "" "Additional text options include\n" -"a small number of statistics about the router's health, which are " -"aggregated by\n" +"a small number of statistics about the router's health, which are aggregated by\n" "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n" "for network performance analysis and debugging.\n" "These statistics were chosen to provide data crucial to the developers,\n" -"such as tunnel build success rates, while balancing the need for such " -"data\n" +"such as tunnel build success rates, while balancing the need for such data\n" "with the side-effects that could result from revealing this data.\n" "Current statistics are limited to:" msgstr "" @@ -7556,18 +6762,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:119 msgid "" -"Floodfill routers publish additional data on the number of entries in " -"their network database." +"Floodfill routers publish additional data on the number of entries in their " +"network database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:123 msgid "" "The data published can be seen in the router's user interface,\n" "but is not used or trusted within the router.\n" -"As the network has matured, we have gradually removed most of the " -"published\n" -"statistics to improve anonymity, and we plan to remove more in future " -"releases." +"As the network has matured, we have gradually removed most of the published\n" +"statistics to improve anonymity, and we plan to remove more in future releases." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:130 @@ -7576,8 +6780,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:132 msgid "" -"As of release 0.9.24, routers may declare that they are part of a " -"\"family\", operated by the same entity.\n" +"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n" "Multiple routers in the same family will not be used in a single tunnel." msgstr "" @@ -7596,16 +6799,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:159 msgid "" "RouterInfos have no set expiration time.\n" -"Each router is free to maintain its own local policy to trade off the " -"frequency of RouterInfo lookups\n" +"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n" "with memory or disk usage.\n" "In the current implementation, there are the following general policies:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:166 msgid "" -"There is no expiration during the first hour of uptime, as the persistent" -" stored data may be old." +"There is no expiration during the first hour of uptime, as the persistent " +"stored data may be old." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:169 @@ -7614,25 +6816,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:172 msgid "" -"As the number of local RouterInfos grows, the expiration time shrinks, in" -" an attempt to maintain\n" -"a reasonable number RouterInfos. The expiration time with less than 120 " -"routers is 72 hours,\n" +"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n" +"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n" "while expiration time with 300 routers is around 30 hours." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:177 #, python-format msgid "" -"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in " -"about an hour, as\n" +"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n" "the introducer list expires in about that time." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:181 msgid "" -"Floodfills use a short expiration time (1 hour) for all local " -"RouterInfos, as valid RouterInfos will\n" +"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n" "be frequently republished to them." msgstr "" @@ -7648,8 +6846,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:192 msgid "" -"It may be desirable to persistently store Meta LeaseSets with long " -"expirations.\n" +"It may be desirable to persistently store Meta LeaseSets with long expirations.\n" "This is implementation-dependent." msgstr "" @@ -7663,10 +6860,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:212 msgid "" -"The second piece of data distributed in the netDb is a \"LeaseSet\" - " -"documenting\n" -"a group of <b>tunnel entry points (leases)</b> for a particular client " -"destination.\n" +"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n" +"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n" "Each of these leases specify the following information:" msgstr "" @@ -7692,8 +6887,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:454 msgid "" "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n" -"The SHA256 of the type byte (3) followed by the blinded public key is " -"used for the DHT key,\n" +"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n" "and then rotated as usual." msgstr "" @@ -7707,14 +6901,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:239 msgid "" -"The destination itself (an encryption key, a signing key and a " -"certificate)" +"The destination itself (an encryption key, a signing key and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:240 msgid "" -"Additional encryption public key: used for end-to-end encryption of " -"garlic messages" +"Additional encryption public key: used for end-to-end encryption of garlic " +"messages" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:241 @@ -7725,8 +6918,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:242 msgid "" -"Signature of all the LeaseSet data, to make sure the Destination " -"published the LeaseSet." +"Signature of all the LeaseSet data, to make sure the Destination published " +"the LeaseSet." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:246 @@ -7757,13 +6950,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:263 msgid "" -"A LeaseSet for a destination used only for outgoing connections is " -"<i>unpublished</i>.\n" +"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n" "It is never sent for publication to a floodfill router.\n" -"\"Client\" tunnels, such as those for web browsing and IRC clients, are " -"unpublished.\n" -"Servers will still be able to send messages back to those unpublished " -"destinations,\n" +"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n" +"Servers will still be able to send messages back to those unpublished destinations,\n" "because of <a href=\"#lsp\">I2NP storage messages</a>." msgstr "" @@ -7773,24 +6963,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:274 msgid "" -"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero " -"leases.\n" -"Revocations must be signed by the additional signing key in the LeaseSet." -"\n" -"Revocations are not fully implemented, and it is unclear if they have any" -" practical use.\n" -"This is the only planned use for that signing key, so it is currently " -"unused." +"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n" +"Revocations must be signed by the additional signing key in the LeaseSet.\n" +"Revocations are not fully implemented, and it is unclear if they have any practical use.\n" +"This is the only planned use for that signing key, so it is currently unused." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:283 msgid "" "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n" -"This structure is very similar to the old LeaseSet structure, and serves " -"the same purpose.\n" +"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n" "The new structure provides the flexibility required to support new\n" -"encryption types, multiple encryption types, options, offline signing " -"keys,\n" +"encryption types, multiple encryption types, options, offline signing keys,\n" "and other features.\n" "See proposal 123 for details." msgstr "" @@ -7799,15 +6983,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:715 msgid "" "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n" -"This structure provides a tree-like structure in the DHT, to refer to " -"other LeaseSets.\n" -"Using Meta LeaseSets, a site may implement large multihomed services, " -"where several\n" +"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n" +"Using Meta LeaseSets, a site may implement large multihomed services, where several\n" "different Destinations are used to provide a common service.\n" "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n" "and may have long expirations, up to 18.2 hours.\n" -"Using this facility, it should be possible to run hundreds or thousands " -"of Destinations hosting a common service.\n" +"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n" "See proposal 123 for details." msgstr "" @@ -7825,29 +7006,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:313 msgid "" -"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate" -" key.\n" -"The leases may only be decoded, and thus the destination may only be " -"contacted,\n" +"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n" +"The leases may only be decoded, and thus the destination may only be contacted,\n" "by those with the key.\n" -"There is no flag or other direct indication that the LeaseSet is " -"encrypted.\n" -"Encrypted LeaseSets are not widely used, and it is a topic for future " -"work to\n" -"research whether the user interface and implementation of encrypted " -"LeaseSets could be improved." +"There is no flag or other direct indication that the LeaseSet is encrypted.\n" +"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n" +"research whether the user interface and implementation of encrypted LeaseSets could be improved." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:324 msgid "" -"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet " -"structure.\n" -"The Destination is hidden, and only a blinded public key and an " -"expiration\n" +"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n" +"The Destination is hidden, and only a blinded public key and an expiration\n" "are visible to the floodfill.\n" "Only those that have the full Destination may decrypt the structure.\n" -"The structure is stored at a DHT location based on the hash of the " -"blinded public key,\n" +"The structure is stored at a DHT location based on the hash of the blinded public key,\n" "not the hash of the Destination.\n" "See proposal 123 for details." msgstr "" @@ -7858,12 +7031,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:336 msgid "" -"For regular LeaseSets, the expiration is the time of the latest " -"expiration of its leases.\n" -"For the new LeaseSet2 data structures, the expiration is specified in the" -" header.\n" -"For LeaseSet2, the expiration should match the latest expiration of its " -"leases.\n" +"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n" +"For the new LeaseSet2 data structures, the expiration is specified in the header.\n" +"For LeaseSet2, the expiration should match the latest expiration of its leases.\n" "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n" "and maximum expiration may be enforced, to be determined." msgstr "" @@ -7874,8 +7044,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:346 msgid "" -"No persistent storage of LeaseSet data is required, since they expire so " -"quickly.\n" +"No persistent storage of LeaseSet data is required, since they expire so quickly.\n" "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n" "with long expirations may be advisable." msgstr "" @@ -7901,42 +7070,30 @@ msgstr "" msgid "" "The netDb is decentralized, however you do need at\n" "least one reference to a peer so that the integration process\n" -"ties you in. This is accomplished by \"reseeding\" your router with the " -"RouterInfo\n" -"of an active peer - specifically, by retrieving their " -"<code>routerInfo-$hash.dat</code>\n" -"file and storing it in your <code>netDb/</code> directory. Anyone can " -"provide\n" -"you with those files - you can even provide them to others by exposing " -"your own\n" +"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n" +"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n" +"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n" +"you with those files - you can even provide them to others by exposing your own\n" "netDb directory. To simplify the process,\n" -"volunteers publish their netDb directories (or a subset) on the regular " -"(non-i2p) network,\n" +"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n" "and the URLs of these directories are hardcoded in I2P.\n" -"When the router starts up for the first time, it automatically fetches " -"from\n" +"When the router starts up for the first time, it automatically fetches from\n" "one of these URLs, selected at random." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:379 msgid "" -"The floodfill netDb is a simple distributed storage mechanism. The " -"storage\n" -"algorithm is simple: send the data to the closest peer that has " -"advertised\n" -"itself as a floodfill router. When the peer in the floodfill netDb " -"receives a\n" -"netDb store from a peer not in the floodfill netDb, they send it to a " -"subset of\n" -"the floodfill netDb-peers. The peers selected are the ones closest " -"(according\n" +"The floodfill netDb is a simple distributed storage mechanism. The storage\n" +"algorithm is simple: send the data to the closest peer that has advertised\n" +"itself as a floodfill router. When the peer in the floodfill netDb receives a\n" +"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n" +"the floodfill netDb-peers. The peers selected are the ones closest (according\n" "to the <a href=\"#kad\">XOR-metric</a>) to a specific key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:388 msgid "" -"Determining who is part of the floodfill netDb is trivial - it is exposed" -" in each \n" +"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n" "router's published routerInfo as a capability." msgstr "" @@ -7966,15 +7123,13 @@ msgid "" "Routers with high bandwidth limits (which must be manually configured,\n" "as the default is much lower) are presumed to be on lower-latency\n" "connections, and are more likely to be available 24/7.\n" -"The current minimum share bandwidth for a floodfill router is 128 " -"KBytes/sec." +"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:419 msgid "" "In addition, a router must pass several additional tests for health\n" -"(outbound message queue time, job lag, etc.) before floodfill operation " -"is\n" +"(outbound message queue time, job lag, etc.) before floodfill operation is\n" "automatically enabled." msgstr "" @@ -8001,13 +7156,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:441 msgid "" -"A floodfill router's only services that are in addition to those of non-" -"floodfill routers\n" +"A floodfill router's only services that are in addition to those of non-floodfill routers\n" "are in accepting netDb stores and responding to netDb queries.\n" -"Since they are generally high-bandwidth, they are more likely to " -"participate in a high number of tunnels\n" -"(i.e. be a \"relay\" for others), but this is not directly related to " -"their distributed database services." +"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n" +"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:449 @@ -8016,33 +7168,24 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:450 msgid "" -"The netDb uses a simple Kademlia-style XOR metric to determine closeness." -"\n" -"To create a Kademlia key, the SHA256 hash of the RouterIdentity or " -"Destination is computed." +"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n" +"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:459 msgid "" -"A modification to this algorithm is done to increase the costs of <a href" -"=\"#sybil-partial\">Sybil attacks</a>.\n" -"Instead of the SHA256 hash of the key being looked up of stored, the " -"SHA256 hash is taken\n" -"of the 32-byte binary search key appended with the UTC date represented " -"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" -"This is called the \"routing key\", and it changes every day at midnight " -"UTC.\n" -"Only the search key is modified in this way, not the floodfill router " -"hashes.\n" -"The daily transformation of the DHT is sometimes called \"keyspace " -"rotation\",\n" +"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n" +"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n" +"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" +"This is called the \"routing key\", and it changes every day at midnight UTC.\n" +"Only the search key is modified in this way, not the floodfill router hashes.\n" +"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n" "although it isn't strictly a rotation." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:469 msgid "" -"Routing keys are never sent on-the-wire in any I2NP message, they are " -"only used locally for\n" +"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n" "determination of distance." msgstr "" @@ -8057,8 +7200,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:479 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"RouterInfo are exchanged with peers\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n" "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n" "or <a href=\"%(ssu)s\">SSU</a> transport connection." msgstr "" @@ -8070,46 +7212,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:487 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"LeaseSet are periodically exchanged with peers\n" -"by bundling them in a garlic message along with normal traffic from the " -"related Destination.\n" -"This allows an initial response, and later responses, to be sent to an " -"appropriate Lease,\n" -"without requiring any LeaseSet lookups, or requiring the communicating " -"Destinations to have published LeaseSets at all." +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n" +"by bundling them in a garlic message along with normal traffic from the related Destination.\n" +"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n" +"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:495 msgid "" "The DatabaseStoreMessage should be sent to the floodfill that is closest\n" "to the current routing key for the RouterInfo or LeaseSet being stored.\n" -"Currently, the closest floodfill is found by a search in the local " -"database.\n" -"Even if that floodfill is not actually closest, it will flood it " -"\"closer\" by\n" +"Currently, the closest floodfill is found by a search in the local database.\n" +"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n" "sending it to multiple other floodfills.\n" "This provides a high degree of fault-tolerance." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:504 msgid "" -"In traditional Kademlia, a peer would do a \"find-closest\" search before" -" inserting\n" -"an item in the DHT to the closest target. As the verify operation will " -"tend to\n" -"discover closer floodfills if they are present, a router will quickly " -"improve\n" -"its knowledge of the DHT \"neighborhood\" for the RouterInfo and " -"LeaseSets it regularly publishes.\n" -"While I2NP does not define a \"find-closest\" message, if it becomes " -"necessary,\n" -"a router may simply do an iterative search for a key with the least " -"significant bit flipped\n" -"(i.e. key ^ 0x01) until no closer peers are received in the " -"DatabaseSearchReplyMessages.\n" -"This ensures that the true closest peer will be found even if a more-" -"distant peer had\n" +"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n" +"an item in the DHT to the closest target. As the verify operation will tend to\n" +"discover closer floodfills if they are present, a router will quickly improve\n" +"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n" +"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n" +"a router may simply do an iterative search for a key with the least significant bit flipped\n" +"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n" +"This ensures that the true closest peer will be found even if a more-distant peer had\n" "the netdb item." msgstr "" @@ -8120,11 +7248,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:518 #, python-format msgid "" -"A router publishes its own RouterInfo by directly connecting to a " -"floodfill router\n" +"A router publishes its own RouterInfo by directly connecting to a floodfill router\n" "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token. The message is not end-to-end garlic " -"encrypted,\n" +"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n" "as this is a direct connection, so there are no intervening routers\n" "(and no need to hide this data anyway).\n" "The floodfill router replies with a\n" @@ -8138,8 +7264,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:533 msgid "" -"Storage of LeaseSets is much more sensitive than for RouterInfos, as a " -"router\n" +"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n" "must take care that the LeaseSet cannot be associated with the router." msgstr "" @@ -8148,10 +7273,8 @@ msgstr "" msgid "" "A router publishes a local LeaseSet by\n" "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token over an outbound client tunnel for that " -"Destination.\n" -"The message is end-to-end garlic encrypted using the Destination's " -"Session Key Manager,\n" +"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n" +"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n" "to hide the message from the tunnel's outbound endpoint.\n" "The floodfill router replies with a\n" "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n" @@ -8167,17 +7290,12 @@ msgstr "" #, python-format msgid "" "After a floodfill router receives a DatabaseStoreMessage containing a\n" -"valid RouterInfo or LeaseSet which is newer than that previously stored " -"in its\n" +"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n" "local NetDb, it \"floods\" it.\n" -"To flood a NetDb entry, it looks up several (currently %(floodsize)s) " -"floodfill routers closest to the routing key\n" -"of the NetDb entry. (The routing key is the SHA256 Hash of the " -"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" -"By flooding to those closest to the key, not closest to itself, the " -"floodfill ensures that the storage\n" -"gets to the right place, even if the storing router did not have good " -"knowledge of the\n" +"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n" +"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" +"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n" +"gets to the right place, even if the storing router did not have good knowledge of the\n" "DHT \"neighborhood\" for the routing key." msgstr "" @@ -8199,17 +7317,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:574 #, python-format msgid "" -"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to " -"request a netdb entry from a floodfill router.\n" +"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n" "Lookups are sent out one of the router's outbound exploratory tunnels.\n" -"The replies are specified to return via one of the router's inbound " -"exploratory tunnels." +"The replies are specified to return via one of the router's inbound exploratory tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:580 msgid "" -"Lookups are generally sent to the two \"good\" (the connection doesn't " -"fail) floodfill routers closest to the requested key, in parallel." +"Lookups are generally sent to the two \"good\" (the connection doesn't fail)" +" floodfill routers closest to the requested key, in parallel." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:584 @@ -8217,8 +7333,7 @@ msgstr "" msgid "" "If the key is found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n" -"If the key is not found locally by the floodfill router, it responds with" -" a\n" +"If the key is not found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "containing a list of other floodfill routers close to the key." msgstr "" @@ -8226,22 +7341,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:592 msgid "" "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n" -"RouterInfo lookups are not encrypted and thus are vulnerable to snooping " -"by the outbound endpoint\n" -"(OBEP) of the client tunnel. This is due to the expense of the ElGamal " -"encryption.\n" +"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n" +"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n" "RouterInfo lookup encryption may be enabled in a future release." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:599 msgid "" -"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage" -" or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted by including the session key and tag in the lookup.\n" -"This hides the reply from the inbound gateway (IBGW) of the reply tunnel." -"\n" -"Responses to RouterInfo lookups will be encrypted if we enable the lookup" -" encryption." +"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n" +"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:606 @@ -8255,41 +7365,31 @@ msgstr "" msgid "" "Due to the relatively small size of the network and flooding redundancy,\n" "lookups are usually O(1) rather than O(log n).\n" -"A router is highly likely to know a floodfill router close enough to the " -"key to get the answer on the first try.\n" +"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n" "In releases prior to 0.8.9, routers used a lookup redundancy of two\n" -"(that is, two lookups were performed in parallel to different peers), and" -"\n" -"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was " -"implemented.\n" +"(that is, two lookups were performed in parallel to different peers), and\n" +"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n" "Queries were sent through <i>multiple routes simultaneously</i>\n" "to <i>reduce the chance of query failure</i>." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:621 msgid "" -"As of release 0.8.9, <i>iterative lookups</i> are implemented with no " -"lookup redundancy.\n" +"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n" "This is a more efficient and reliable lookup that will work much better\n" "when not all floodfill peers are known, and it removes a serious\n" -"limitation to network growth. As the network grows and each router knows " -"only a small\n" +"limitation to network growth. As the network grows and each router knows only a small\n" "subset of the floodfill peers, lookups will become O(log n).\n" -"Even if the peer does not return references closer to the key, the lookup" -" continues with\n" -"the next-closest peer, for added robustness, and to prevent a malicious " -"floodfill from\n" -"black-holing a part of the key space. Lookups continue until a total " -"lookup timeout is reached,\n" +"Even if the peer does not return references closer to the key, the lookup continues with\n" +"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n" +"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n" "or the maximum number of peers is queried." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:633 msgid "" -"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash " -"directly as both the node ID and the Kademlia key.\n" -"Incorrect responses that are not closer to the search key are generally " -"ignored.\n" +"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n" +"Incorrect responses that are not closer to the search key are generally ignored.\n" "Given the current size of the network, a router has\n" "<i>detailed knowledge of the neighborhood of the destination ID space</i>." msgstr "" @@ -8301,8 +7401,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:643 #, python-format msgid "" -"Note: RouterInfo verification is disabled as of release 0.9.7.1 to " -"prevent\n" +"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n" "the attack described in the paper\n" "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n" "It is not clear if verification can be redesigned to be done safely." @@ -8310,13 +7409,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:650 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" "Lookups sent out one of the router's outbound exploratory tunnels.\n" -"Lookups are end-to-end garlic encrypted to prevent snooping by the " -"outbound endpoint(OBEP)." +"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:658 @@ -8325,22 +7422,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:659 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" -"Lookups sent out one of the outbound client tunnels for the destination " -"of the LeaseSet being verified.\n" +"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n" "To prevent snooping by the OBEP of the outbound tunnel,\n" "lookups are end-to-end garlic encrypted.\n" -"The replies are specified to return via one of the client's inbound " -"tunnels." +"The replies are specified to return via one of the client's inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:669 msgid "" -"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a " -"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted,\n" "to hide the reply from the inbound gateway (IBGW) of the reply tunnel." msgstr "" @@ -8352,23 +7445,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:678 #, python-format msgid "" -"<i>Exploration</i> is a special form of netdb lookup, where a router " -"attempts to learn about\n" +"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n" "new routers.\n" -"It does this by sending a floodfill router a <a " -"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random " -"key.\n" +"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n" "As this lookup will fail, the floodfill would normally respond with a\n" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing " -"hashes of floodfill routers close to the key.\n" -"This would not be helpful, as the requesting router probably already " -"knows those floodfills,\n" -"and it would be impractical to add all floodfill routers to the \"don't " -"include\" field of the DatabaseLookup Message.\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n" +"This would not be helpful, as the requesting router probably already knows those floodfills,\n" +"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n" "For an exploration query, the requesting router sets a special flag in\n" "the DatabaseLookup Message.\n" -"The floodfill will then respond only with non-floodfill routers close to " -"the requested key." +"The floodfill will then respond only with non-floodfill routers close to the requested key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:692 @@ -8377,14 +7463,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:693 msgid "" -"The response to a lookup request is either a Database Store Message (on " -"success) or a\n" -"Database Search Reply Message (on failure). The DSRM contains a 'from' " -"router hash field\n" +"The response to a lookup request is either a Database Store Message (on success) or a\n" +"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n" "to indicate the source of the reply; the DSM does not.\n" "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n" -"There are no other response tags. Therefore, when making multiple " -"requests in parallel, it is\n" +"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n" "difficult to monitor the performance of the various floodfill routers." msgstr "" @@ -8394,19 +7477,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:705 msgid "" -"Destinations may be hosted on multiple routers simultaneously, by using " -"the same\n" +"Destinations may be hosted on multiple routers simultaneously, by using the same\n" "private and public keys (traditionally stored in eepPriv.dat files).\n" -"As both instances will periodically publish their signed LeaseSets to the" -" floodfill peers,\n" -"the most recently published LeaseSet will be returned to a peer " -"requesting a database lookup.\n" -"As LeaseSets have (at most) a 10 minute lifetime, should a particular " -"instance go down,\n" -"the outage will be 10 minutes at most, and generally much less than that." -"\n" -"The multihoming function has been verified and is in use by several " -"services on the network." +"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n" +"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n" +"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n" +"the outage will be 10 minutes at most, and generally much less than that.\n" +"The multihoming function has been verified and is in use by several services on the network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:727 @@ -8436,8 +7513,7 @@ msgstr "" #, python-format msgid "" "There are currently around %(ffcount)s floodfill routers in the network.\n" -"Most of the following attacks will become more difficult, or have less " -"impact,\n" +"Most of the following attacks will become more difficult, or have less impact,\n" "as the network size and number of floodfill routers increase." msgstr "" @@ -8448,8 +7524,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:748 #, python-format msgid "" -"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill" -" routers closest to the key." +"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill " +"routers closest to the key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:753 @@ -8470,8 +7546,7 @@ msgstr "" #, python-format msgid "" "Each router maintains an expanded set of statistics in the\n" -"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router," -"\n" +"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n" "covering various quality metrics for that peer.\n" "The set includes:" msgstr "" @@ -8502,14 +7577,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:775 msgid "" -"Each time a router needs to make a determination on which floodfill " -"router is closest to a key,\n" +"Each time a router needs to make a determination on which floodfill router is closest to a key,\n" "it uses these metrics to determine which floodfill routers are \"good\".\n" -"The methods, and thresholds, used to determine \"goodness\" are " -"relatively new, and\n" +"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n" "are subject to further analysis and improvement.\n" -"While a completely unresponsive router will quickly be identified and " -"avoided,\n" +"While a completely unresponsive router will quickly be identified and avoided,\n" "routers that are only sometimes malicious may be much harder to deal with." msgstr "" @@ -8521,8 +7593,7 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a large number of floodfill routers spread throughout the " -"keyspace." +"by creating a large number of floodfill routers spread throughout the keyspace." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:791 @@ -8530,35 +7601,29 @@ msgstr "" msgid "" "(In a related example, a researcher recently created a\n" "<a href=\"%(url)s\">large number of Tor relays</a>.)\n" -"If successful, this could be an effective DOS attack on the entire " -"network." +"If successful, this could be an effective DOS attack on the entire network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:797 msgid "" -"If the floodfills are not sufficiently misbehaving to be marked as " -"\"bad\" using the peer profile\n" +"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n" "metrics described above, this is a difficult scenario to handle.\n" -"Tor's response can be much more nimble in the relay case, as the " -"suspicious relays\n" +"Tor's response can be much more nimble in the relay case, as the suspicious relays\n" "can be manually removed from the consensus.\n" -"Some possible responses for the I2P network are listed below, however " -"none of them is completely satisfactory:" +"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:805 msgid "" -"Compile a list of bad router hashes or IPs, and announce the list through" -" various means\n" -"(console news, website, forum, etc.); users would have to manually " -"download the list and\n" +"Compile a list of bad router hashes or IPs, and announce the list through various means\n" +"(console news, website, forum, etc.); users would have to manually download the list and\n" "add it to their local \"blacklist\"." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:810 msgid "" -"Ask everyone in the network to enable floodfill manually (fight Sybil " -"with more Sybil)" +"Ask everyone in the network to enable floodfill manually (fight Sybil with " +"more Sybil)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:811 @@ -8567,8 +7632,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:812 msgid "" -"Release a new software version that improves the peer profile metrics and" -" thresholds,\n" +"Release a new software version that improves the peer profile metrics and thresholds,\n" "in an attempt to automatically identify the \"bad\" peers." msgstr "" @@ -8580,12 +7644,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:817 msgid "" -"Implement an automatic subscription-based blacklist controlled by a " -"single individual or group.\n" -"This would essentially implement a portion of the Tor \"consensus\" " -"model.\n" -"Unfortunately it would also give a single individual or group the power " -"to\n" +"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n" +"This would essentially implement a portion of the Tor \"consensus\" model.\n" +"Unfortunately it would also give a single individual or group the power to\n" "block participation of any particular router or IP in the network,\n" "or even to completely shutdown or destroy the entire network." msgstr "" @@ -8602,25 +7663,19 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a small number (8-15) of floodfill routers clustered closely " -"in the keyspace,\n" +"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n" "and distribute the RouterInfos for these routers widely.\n" -"Then, all lookups and stores for a key in that keyspace would be directed" -"\n" +"Then, all lookups and stores for a key in that keyspace would be directed\n" "to one of the attacker's routers.\n" -"If successful, this could be an effective DOS attack on a particular I2P " -"Site, for example." +"If successful, this could be an effective DOS attack on a particular I2P Site, for example." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:842 msgid "" -"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key," -"\n" -"an attacker must use a brute-force method to repeatedly generate router " -"hashes\n" +"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n" +"an attacker must use a brute-force method to repeatedly generate router hashes\n" "until he has enough that are sufficiently close to the key.\n" -"The amount of computational power required for this, which is dependent " -"on network\n" +"The amount of computational power required for this, which is dependent on network\n" "size, is unknown." msgstr "" @@ -8628,14 +7683,10 @@ msgstr "" msgid "" "As a partial defense against this attack,\n" "the algorithm used to determine Kademlia \"closeness\" varies over time.\n" -"Rather than using the Hash of the key (i.e. H(k)) to determine closeness," -"\n" -"we use the Hash of the key appended with the current date string, i.e. " -"H(k + YYYYMMDD).\n" -"A function called the \"routing key generator\" does this, which " -"transforms the original key into a \"routing key\".\n" -"In other words, the entire netdb keyspace \"rotates\" every day at UTC " -"midnight.\n" +"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n" +"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n" +"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n" +"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n" "Any partial-keyspace attack would have to be regenerated every day, for\n" "after the rotation, the attacking routers would no longer be close\n" "to the target key, or to each other." @@ -8644,8 +7695,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:862 msgid "" "This attack becomes more difficult as the network size grows.\n" -"However, recent research demonstrates that the keyspace rotation is not " -"particularly effective.\n" +"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n" "An attacker can precompute numerous router hashes in advance,\n" "and only a few routers are sufficient to \"eclipse\" a portion\n" "of the keyspace within a half hour after rotation." @@ -8653,11 +7703,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:870 msgid "" -"One consequence of daily keyspace rotation is that the distributed " -"network database\n" +"One consequence of daily keyspace rotation is that the distributed network database\n" "may become unreliable for a few minutes after the rotation --\n" -"lookups will fail because the new \"closest\" router has not received a " -"store yet.\n" +"lookups will fail because the new \"closest\" router has not received a store yet.\n" "The extent of the issue, and methods for mitigation\n" "(for example netdb \"handoffs\" at midnight)\n" "are a topic for further study." @@ -8720,24 +7768,19 @@ msgstr "" #, python-format msgid "" "See also <a href=\"#lookup\">lookup</a>\n" -"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections " -"2.2-2.3 for terms below in italics)" +"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:926 msgid "" -"Similar to a bootstrap attack, an attacker using a floodfill router could" -" attempt to \"steer\"\n" -"peers to a subset of routers controlled by him by returning their " -"references." +"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n" +"peers to a subset of routers controlled by him by returning their references." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:931 msgid "" -"This is unlikely to work via exploration, because exploration is a low-" -"frequency task.\n" -"Routers acquire a majority of their peer references through normal tunnel" -" building activity.\n" +"This is unlikely to work via exploration, because exploration is a low-frequency task.\n" +"Routers acquire a majority of their peer references through normal tunnel building activity.\n" "Exploration results are generally limited to a few router hashes,\n" "and each exploration query is directed to a random floodfill router." msgstr "" @@ -8749,18 +7792,13 @@ msgid "" "For floodfill router references returned in a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "response to a lookup,\n" -"these references are followed if they are closer (or the next closest) to" -" the lookup key.\n" +"these references are followed if they are closer (or the next closest) to the lookup key.\n" "The requesting router does not trust that the references are\n" "closer to the key (i.e. they are <i>verifiably correct</i>.\n" -"The lookup also does not stop when no closer key is found, but continues " -"by querying the\n" -"next-closet node, until the timeout or maximum number of queries is " -"reached.\n" -"This prevents a malicious floodfill from black-holing a part of the key " -"space.\n" -"Also, the daily keyspace rotation requires an attacker to regenerate a " -"router info\n" +"The lookup also does not stop when no closer key is found, but continues by querying the\n" +"next-closet node, until the timeout or maximum number of queries is reached.\n" +"This prevents a malicious floodfill from black-holing a part of the key space.\n" +"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n" "within the desired key space region.\n" "This design ensures that the query capture attack described in\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n" @@ -8798,43 +7836,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:973 #, python-format msgid "" -"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used " -"by Torsk and NISAN.\n" -"At first glance, these do not appear to apply to I2P. First, the use of " -"DHT by Torsk and NISAN\n" -"is significantly different from that in I2P. Second, I2P's network " -"database lookups are only\n" -"loosely correlated to the <a href=\"%(peerselection)s\">peer " -"selection</a> and\n" -"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only " -"previously-known peers\n" +"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n" +"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n" +"is significantly different from that in I2P. Second, I2P's network database lookups are only\n" +"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n" +"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n" "are used for tunnels.\n" "Also, peer selection is unrelated to any notion of DHT key-closeness." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:984 msgid "" -"Some of this may actually be more interesting when the I2P network gets " -"much larger.\n" -"Right now, each router knows a large proportion of the network, so " -"looking up a particular\n" -"Router Info in the network database is not strongly indicative of a " -"future intent to use\n" -"that router in a tunnel. Perhaps when the network is 100 times larger, " -"the lookup may be\n" -"more correlative. Of course, a larger network makes a Sybil attack that " -"much harder." +"Some of this may actually be more interesting when the I2P network gets much larger.\n" +"Right now, each router knows a large proportion of the network, so looking up a particular\n" +"Router Info in the network database is not strongly indicative of a future intent to use\n" +"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n" +"more correlative. Of course, a larger network makes a Sybil attack that much harder." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:992 #, python-format msgid "" -"However, the general issue of DHT information leakage in I2P needs " -"further investigation.\n" -"The floodfill routers are in a position to observe queries and gather " -"information.\n" -"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as " -"specifed in the paper)\n" +"However, the general issue of DHT information leakage in I2P needs further investigation.\n" +"The floodfill routers are in a position to observe queries and gather information.\n" +"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as specifed in the paper)\n" "we expect that many of the Sybil threats we describe\n" "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n" "<a href=\"#sybil\">here</a> and\n" @@ -8869,11 +7894,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:10 #, python-format msgid "" -"<b>Peer profiling</b> is the process of collecting data based on the " -"<b>observed</b> performance\n" +"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n" "of other routers or peers, and classifying those peers into groups.\n" -"Profiling does <b>not</b> use any claimed performance data published by " -"the peer itself\n" +"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n" "in the <a href=\"%(netdb)s\">network database</a>." msgstr "" @@ -8888,8 +7911,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:20 #, python-format msgid "" -"Choosing peers from the set of floodfill routers to use for network " -"database storage and queries,\n" +"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n" "which is discussed on the <a href=\"%(netdb)s\">network database</a> page" msgstr "" @@ -8902,11 +7924,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:28 msgid "" "<b>Peer selection</b> is the process of choosing which routers\n" -"on the network we want to relay our messages to go through (which peers " -"will we \n" +"on the network we want to relay our messages to go through (which peers will we \n" "ask to join our tunnels). To accomplish this, we keep track of how each\n" -"peer performs (the peer's \"profile\") and use that data to estimate how" -" \n" +"peer performs (the peer's \"profile\") and use that data to estimate how \n" "fast they are, how often they will be able to accept our requests, and \n" "whether they seem to be overloaded or otherwise unable to perform what\n" "they agree to reliably." @@ -8916,8 +7936,7 @@ msgstr "" #, python-format msgid "" "Unlike some other anonymous networks, in I2P,\n" -"claimed bandwidth is untrusted and is <b>only</b> used to avoid those " -"peers\n" +"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n" "advertising very low bandwidth insufficient for routing tunnels.\n" "All peer selection is done through profiling.\n" "This prevents simple attacks based on peers claiming high bandwidth\n" @@ -8929,10 +7948,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:50 msgid "" -"Peer selection is done quite frequently, as a router may maintain a large" -" number\n" -"of client and exploratory tunnels, and a tunnel lifetime is only 10 " -"minutes." +"Peer selection is done quite frequently, as a router may maintain a large number\n" +"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:56 @@ -8943,11 +7960,9 @@ msgstr "" #, python-format msgid "" "For more information see the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>\n" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n" "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n" -"See <a href=\"#notes\">below</a> for notes on minor changes since the " -"paper was published." +"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:65 @@ -8957,30 +7972,21 @@ msgstr "Profile" #: i2p2www/pages/site/docs/how/peer-selection.html:66 #, python-format msgid "" -"Each peer has a set of data points collected about them, including " -"statistics \n" -"about how long it takes for them to reply to a network database query, " -"how \n" -"often their tunnels fail, and how many new peers they are able to " -"introduce \n" -"us to, as well as simple data points such as when we last heard from them" -" or\n" -"when the last communication error occurred. The specific data points " -"gathered\n" +"Each peer has a set of data points collected about them, including statistics \n" +"about how long it takes for them to reply to a network database query, how \n" +"often their tunnels fail, and how many new peers they are able to introduce \n" +"us to, as well as simple data points such as when we last heard from them or\n" +"when the last communication error occurred. The specific data points gathered\n" "can be found in the <a href=\"%(url)s\">code</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:75 msgid "" -"Profiles are fairly small, a few KB. To control memory usage, the profile" -" expiration time\n" +"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n" "lessens as the number of profiles grows.\n" -"Profiles are kept in memory until router shutdown, when they are written " -"to disk.\n" -"At startup, the profiles are read so the router need not reinitialize all" -" profiles,\n" -"thus allowing a router to quickly re-integrate into the network after " -"startup." +"Profiles are kept in memory until router shutdown, when they are written to disk.\n" +"At startup, the profiles are read so the router need not reinitialize all profiles,\n" +"thus allowing a router to quickly re-integrate into the network after startup." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:85 @@ -8990,10 +7996,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:86 msgid "" "While the profiles themselves can be considered a summary of a peer's \n" -"performance, to allow for effective peer selection we break each summary " -"down \n" -"into four simple values, representing the peer's speed, its capacity, how" -" well \n" +"performance, to allow for effective peer selection we break each summary down \n" +"into four simple values, representing the peer's speed, its capacity, how well \n" "integrated into the network it is, and whether it is failing." msgstr "" @@ -9005,8 +8009,7 @@ msgstr "PrÄ™dkość" msgid "" "The speed calculation\n" "simply goes through the profile and estimates how much data we can\n" -"send or receive on a single tunnel through the peer in a minute. For " -"this estimate it just looks at\n" +"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n" "performance in the previous minute." msgstr "" @@ -9018,13 +8021,11 @@ msgstr "Wydajność" msgid "" "The capacity calculation\n" "simply goes through the profile and estimates how many tunnels the peer\n" -"would agree to participate in over a given time period. For this " -"estimate it looks at \n" +"would agree to participate in over a given time period. For this estimate it looks at \n" "how many tunnel build requests\n" "the peer has accepted, rejected, and dropped, and how many\n" "of the agreed-to tunnels later failed.\n" -"While the calculation is time-weighted so that recent activity counts " -"more than later activity,\n" +"While the calculation is time-weighted so that recent activity counts more than later activity,\n" "statistics up to 48 hours old may be included." msgstr "" @@ -9032,10 +8033,8 @@ msgstr "" msgid "" "Recognizing and avoiding unreliable and unreachable\n" "peers is critically important.\n" -"Unfortunately, as the tunnel building and testing require the " -"participation of several peers,\n" -"it is difficult to positively identify the cause of a dropped build " -"request or test failure.\n" +"Unfortunately, as the tunnel building and testing require the participation of several peers,\n" +"it is difficult to positively identify the cause of a dropped build request or test failure.\n" "The router assigns a probability of failure to each of the\n" "peers, and uses that probability in the capacity calculation.\n" "Drops and test failures are weighted much higher than rejections." @@ -9047,10 +8046,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:124 msgid "" -"As mentioned above, we drill through each peer's profile to come up with " -"a \n" -"few key calculations, and based upon those, we organize each peer into " -"three\n" +"As mentioned above, we drill through each peer's profile to come up with a \n" +"few key calculations, and based upon those, we organize each peer into three\n" "groups - fast, high capacity, and standard." msgstr "" @@ -9060,15 +8057,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:134 msgid "" -"A peer is considered \"high capacity\" if its capacity calculation meets " -"or \n" +"A peer is considered \"high capacity\" if its capacity calculation meets or \n" "exceeds the median of all peers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:138 msgid "" -"A peer is considered \"fast\" if they are already \"high capacity\" and " -"their \n" +"A peer is considered \"fast\" if they are already \"high capacity\" and their \n" "speed calculation meets or exceeds the median of all peers." msgstr "" @@ -9094,25 +8089,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:156 msgid "" "The fast group is limited to 30 peers.\n" -"If there would be more, only the ones with the highest speed rating are " -"placed in the group." +"If there would be more, only the ones with the highest speed rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:160 msgid "" -"The high capacity group is limited to 75 peers (including the fast group)" -"\n" -"If there would be more, only the ones with the highest capacity rating " -"are placed in the group." +"The high capacity group is limited to 75 peers (including the fast group)\n" +"If there would be more, only the ones with the highest capacity rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:164 msgid "" -"The standard group has no fixed limit, but is somewhat smaller than the " -"number of RouterInfos\n" +"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n" "stored in the local network database.\n" -"On an active router in today's network, there may be about 1000 " -"RouterInfos and 500 peer profiles\n" +"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n" "(including those in the fast and high capacity groups)" msgstr "" @@ -9128,16 +8118,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:177 msgid "" -"The groups tend to be fairly stable, that is, there is not much \"churn\"" -" in the rankings\n" +"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n" "at each recalculation.\n" -"Peers in the fast and high capacity groups get more tunnels build through" -" them, which increases their speed and capacity ratings,\n" +"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n" "which reinforces their presence in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:188 -msgid "The router selects peers from the above groups to build tunnels through." +msgid "" +"The router selects peers from the above groups to build tunnels through." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:193 @@ -9146,19 +8135,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:194 msgid "" -"Client tunnels are used for application traffic, such as for HTTP proxies" -" and web servers." +"Client tunnels are used for application traffic, such as for HTTP proxies " +"and web servers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:198 msgid "" -"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog" -"/one-cell-enough\">some attacks</a>,\n" +"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n" "and increase performance,\n" -"peers for building client tunnels are chosen randomly from the smallest " -"group, which is the \"fast\" group.\n" -"There is no bias toward selecting peers that were previously participants" -" in a tunnel for the same client." +"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n" +"There is no bias toward selecting peers that were previously participants in a tunnel for the same client." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:206 @@ -9167,35 +8153,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:207 msgid "" -"Exploratory tunnels are used for router administrative purposes, such as " -"network database traffic\n" +"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n" "and testing client tunnels.\n" -"Exploratory tunnels are also used to contact previously unconnected " -"routers, which is why\n" +"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n" "they are called \"exploratory\".\n" "These tunnels are usually low-bandwidth." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:215 msgid "" -"Peers for building exploratory tunnels are generally chosen randomly from" -" the standard group.\n" -"If the success rate of these build attempts is low compared to the client" -" tunnel build success rate,\n" -"the router will select a weighted average of peers randomly from the high" -" capacity group instead.\n" -"This helps maintain a satisfactory build success rate even when network " -"performance is poor.\n" -"There is no bias toward selecting peers that were previously participants" -" in an exploratory tunnel." +"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n" +"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n" +"the router will select a weighted average of peers randomly from the high capacity group instead.\n" +"This helps maintain a satisfactory build success rate even when network performance is poor.\n" +"There is no bias toward selecting peers that were previously participants in an exploratory tunnel." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:223 msgid "" -"As the standard group includes a very large subset of all peers the " -"router knows about,\n" -"exploratory tunnels are essentially built through a random selection of " -"all peers,\n" +"As the standard group includes a very large subset of all peers the router knows about,\n" +"exploratory tunnels are essentially built through a random selection of all peers,\n" "until the build success rate becomes too low." msgstr "" @@ -9205,8 +8182,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:232 msgid "" -"To prevent some simple attacks, and for performance, there are the " -"following restrictions:" +"To prevent some simple attacks, and for performance, there are the following" +" restrictions:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:236 @@ -9215,8 +8192,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:239 msgid "" -"A peer may participate in a maximum of 33% of all tunnels created by " -"the router." +"A peer may participate in a maximum of 33% of all tunnels created by the" +" router." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:242 @@ -9237,18 +8214,18 @@ msgid "" "Peers are ordered within tunnels to\n" "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n" "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n" -"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel " -"page</a>." +"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:268 -msgid "Continue to analyze an tune speed and capacity calculations as necessary" +msgid "" +"Continue to analyze an tune speed and capacity calculations as necessary" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:271 msgid "" -"Implement a more aggressive ejection strategy if necessary to control " -"memory usage as the network grows" +"Implement a more aggressive ejection strategy if necessary to control memory" +" usage as the network grows" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:274 @@ -9263,10 +8240,8 @@ msgstr "" #, python-format msgid "" "For those reading the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>,\n" -"please keep in mind the following minor changes in I2P since the paper's " -"publication:" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n" +"please keep in mind the following minor changes in I2P since the paper's publication:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:289 @@ -9332,24 +8307,18 @@ msgstr "Kryptografia" #: i2p2www/pages/site/docs/how/tech-intro.html:21 msgid "" "I2P is a scalable, self organizing, resilient packet switched anonymous \n" -"network layer, upon which any number of different anonymity or security " -"conscious \n" -"applications can operate. Each of these applications may make their own " -"anonymity, \n" -"latency, and throughput tradeoffs without worrying about the proper " -"implementation \n" -"of a free route mixnet, allowing them to blend their activity with the " -"larger \n" +"network layer, upon which any number of different anonymity or security conscious \n" +"applications can operate. Each of these applications may make their own anonymity, \n" +"latency, and throughput tradeoffs without worrying about the proper implementation \n" +"of a free route mixnet, allowing them to blend their activity with the larger \n" "anonymity set of users already running on top of I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:30 msgid "" -"Applications available already provide the full range of typical Internet" -" activities -\n" +"Applications available already provide the full range of typical Internet activities -\n" "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n" -"blogging and content syndication, newsgroups, as well as several other " -"applications under development." +"blogging and content syndication, newsgroups, as well as several other applications under development." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:36 @@ -9362,29 +8331,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:38 msgid "" -"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a " -"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" -"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a " -"href=\"#app.i2pbt\">I2P-bt</a>\n" +"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" +"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n" "and others." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:43 msgid "" -"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote" -"\">I2P-Bote</a>." +"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a " +"href=\"#app.i2pbote\">I2P-Bote</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:44 msgid "" -"Blog: using e.g. the pebble plugin or the distributed blogging software " -"<a href=\"#app.syndie\">Syndie</a>." +"Blog: using e.g. the pebble plugin or the distributed blogging software <a " +"href=\"#app.syndie\">Syndie</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:45 msgid "" -"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS " -"cloud over I2P." +"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud " +"over I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:46 @@ -9393,77 +8360,47 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:49 msgid "" -"Unlike web sites hosted within content distribution networks like <a " -"href=\"#similar.freenet\">Freenet</a> \n" -"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services " -"hosted on \n" -"I2P are fully interactive - there are traditional web-style search " -"engines, \n" -"bulletin boards, blogs you can comment on, database driven sites, and " -"bridges \n" -"to query static systems like Freenet without needing to install it " -"locally." +"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n" +"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n" +"I2P are fully interactive - there are traditional web-style search engines, \n" +"bulletin boards, blogs you can comment on, database driven sites, and bridges \n" +"to query static systems like Freenet without needing to install it locally." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:57 msgid "" "With all of these anonymity enabled applications, I2P takes on the role \n" -"of the message oriented middleware - applications say that they want to " -"send \n" -"some data to a cryptographic identifier (a \"destination\") and I2P takes" -" care \n" -"of making sure it gets there securely and anonymously. I2P also bundles a" -" \n" -"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's " -"anonymous \n" -"best-effort messages to transfer as reliable, in-order streams, " -"transparently \n" -"offering a TCP based congestion control algorithm tuned for the high " -"bandwidth \n" -"delay product of the network. While there have been several simple SOCKS " -"proxies \n" -"available to tie existing applications into the network, their value has " -"been \n" -"limited as nearly every application routinely exposes what, in an " -"anonymous \n" -"context, is sensitive information. The only safe way to go is to fully " -"audit \n" -"an application to ensure proper operation and to assist in that we " -"provide \n" -"a series of APIs in various languages which can be used to make the most " -"out \n" +"of the message oriented middleware - applications say that they want to send \n" +"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n" +"of making sure it gets there securely and anonymously. I2P also bundles a \n" +"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n" +"best-effort messages to transfer as reliable, in-order streams, transparently \n" +"offering a TCP based congestion control algorithm tuned for the high bandwidth \n" +"delay product of the network. While there have been several simple SOCKS proxies \n" +"available to tie existing applications into the network, their value has been \n" +"limited as nearly every application routinely exposes what, in an anonymous \n" +"context, is sensitive information. The only safe way to go is to fully audit \n" +"an application to ensure proper operation and to assist in that we provide \n" +"a series of APIs in various languages which can be used to make the most out \n" "of the network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:74 #, python-format msgid "" -"I2P is not a research project - academic, commercial, or governmental, " -"but \n" -"is instead an engineering effort aimed at doing whatever is necessary to " -"provide \n" -"a sufficient level of anonymity to those who need it. It has been in " -"active \n" -"development since early 2003 with one full time developer and a dedicated" -" \n" -"group of part time contributors from all over the world. All of the work " -"done \n" -"on I2P is open source and freely available on the <a " -"href=\"%(site)s\">website</a>, \n" -"with the majority of the code released outright into the public domain, " -"though \n" -"making use of a few cryptographic routines under BSD-style licenses. The " -"people \n" -"working on I2P do not control what people release client applications " -"under, \n" -"and there are several GPL'ed applications available (<a " -"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" -"<a href=\"#app.i2pmail\">susimail</a>, <a " -"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-" -"Bote</a>, \n" +"I2P is not a research project - academic, commercial, or governmental, but \n" +"is instead an engineering effort aimed at doing whatever is necessary to provide \n" +"a sufficient level of anonymity to those who need it. It has been in active \n" +"development since early 2003 with one full time developer and a dedicated \n" +"group of part time contributors from all over the world. All of the work done \n" +"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n" +"with the majority of the code released outright into the public domain, though \n" +"making use of a few cryptographic routines under BSD-style licenses. The people \n" +"working on I2P do not control what people release client applications under, \n" +"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" +"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n" "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n" -"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from " -"donations,\n" +"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n" "and does not receive any tax breaks in any jurisdiction at this time,\n" "as many of the developers are themselves anonymous." msgstr "" @@ -9474,40 +8411,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:94 msgid "" -"To understand I2P's operation, it is essential to understand a few key " -"concepts. \n" -"First, I2P makes a strict separation between the software participating " -"in \n" -"the network (a \"router\") and the anonymous endpoints (\"destinations\")" -" associated \n" -"with individual applications. The fact that someone is running I2P is not" -" \n" -"usually a secret. What is hidden is information on what the user is " -"doing, \n" -"if anything at all, as well as what router a particular destination is " -"connected \n" -"to. End users will typically have several local destinations on their " -"router \n" -"- for instance, one proxying in to IRC servers, another supporting the " -"user's \n" -"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, " -"another for \n" +"To understand I2P's operation, it is essential to understand a few key concepts. \n" +"First, I2P makes a strict separation between the software participating in \n" +"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n" +"with individual applications. The fact that someone is running I2P is not \n" +"usually a secret. What is hidden is information on what the user is doing, \n" +"if anything at all, as well as what router a particular destination is connected \n" +"to. End users will typically have several local destinations on their router \n" +"- for instance, one proxying in to IRC servers, another supporting the user's \n" +"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n" "torrents, etc." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:107 msgid "" "Another critical concept to understand is the \"tunnel\".\n" -"A tunnel is a directed path through an explicitly selected list of " -"routers.\n" -"Layered encryption is used, so each of the routers can only decrypt a " -"single layer.\n" +"A tunnel is a directed path through an explicitly selected list of routers.\n" +"Layered encryption is used, so each of the routers can only decrypt a single layer.\n" "The decrypted information contains the IP of the next router, along with\n" "the encrypted information to be forwarded.\n" -"Each tunnel has a starting point (the first router, also known as " -"\"gateway\")\n" -"and an end point. Messages can be sent only in one way. To send messages " -"back,\n" +"Each tunnel has a starting point (the first router, also known as \"gateway\")\n" +"and an end point. Messages can be sent only in one way. To send messages back,\n" "another tunnel is required." msgstr "" @@ -9527,15 +8451,12 @@ msgid "" "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n" "Combining these two tunnels allows users to send messages to each other.\n" "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n" -"while the receiver (\"Bob\" in the above image) creates an inbound " -"tunnel.\n" -"The gateway of an inbound tunnel can receive messages from any other user" -"\n" +"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n" +"The gateway of an inbound tunnel can receive messages from any other user\n" "and will send them on until the endpoint (\"Bob\").\n" "The endpoint of the outbound tunnel will need to send the message\n" "on to the gateway of the inbound tunnel.\n" -"To do this, the sender (\"Alice\") adds instructions to her encrypted " -"message.\n" +"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n" "Once the endpoint of the outbound tunnel decrypts the message,\n" "it will have instructions to forward the message to the correct\n" "inbound gateway (the gateway to \"Bob\")." @@ -9543,25 +8464,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:140 msgid "" -"A third critical concept to understand is I2P's <b>\"network " -"database\"</b> (or \"netDb\") \n" -"- a pair of algorithms used to share network metadata. The two types of " -"metadata \n" -"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the " -"routerInfo gives routers the \n" -"data necessary for contacting a particular router (their public keys, " -"transport \n" -"addresses, etc), while the leaseSet gives routers the information " -"necessary \n" -"for contacting a particular destination. A leaseSet contains a number of " -"\"leases\".\n" -"Each of this leases specifies a tunnel gateway, which allows reaching a " -"specific destination.\n" +"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n" +"- a pair of algorithms used to share network metadata. The two types of metadata \n" +"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n" +"data necessary for contacting a particular router (their public keys, transport \n" +"addresses, etc), while the leaseSet gives routers the information necessary \n" +"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n" +"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n" "The full information contained in a lease:" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:151 -msgid "Inbound gateway for a tunnel that allows reaching a specific destination." +msgid "" +"Inbound gateway for a tunnel that allows reaching a specific destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:152 @@ -9576,10 +8491,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:155 msgid "" -"Routers themselves send their routerInfo to the netDb directly, while " -"leaseSets are sent through outbound tunnels\n" -"(leaseSets need to be sent anonymously, to avoid correlating a router " -"with his leaseSets)." +"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" +"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:160 @@ -9590,13 +8503,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" -"To build up her own inbound and outbound tunnels, Alice does a lookup in " -"the netDb to collect routerInfo.\n" +"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" -"She can then send a build message to the first hop, requesting the " -"construction of a tunnel and asking\n" -"that router to send the construction message onward, until the tunnel has" -" been constructed." +"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" +"that router to send the construction message onward, until the tunnel has been constructed." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:171 @@ -9613,30 +8523,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" -"When Alice wants to send a message to Bob, she first does a lookup in the" -" \n" -"netDb to find Bob's leaseSet, giving her his current inbound tunnel " -"gateways. \n" -"She then picks one of her outbound tunnels and sends the message down it " -"with \n" -"instructions for the outbound tunnel's endpoint to forward the message on" -" \n" -"to one of Bob's inbound tunnel gateways. When the outbound tunnel " -"endpoint \n" -"receives those instructions, it forwards the message as requested, and " -"when \n" -"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel" -" \n" -"to Bob's router. If Alice wants Bob to be able to reply to the message, " -"she \n" -"needs to transmit her own destination explicitly as part of the message " -"itself.\n" -"This can be done by introducing a higher-level layer, which is done in " -"the\n" +"When Alice wants to send a message to Bob, she first does a lookup in the \n" +"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n" +"She then picks one of her outbound tunnels and sends the message down it with \n" +"instructions for the outbound tunnel's endpoint to forward the message on \n" +"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n" +"receives those instructions, it forwards the message as requested, and when \n" +"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n" +"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n" +"needs to transmit her own destination explicitly as part of the message itself.\n" +"This can be done by introducing a higher-level layer, which is done in the\n" "<a href=\"#app.streaming\">streaming</a> library.\n" "Alice may also cut down on the response time by bundling her most \n" -"recent LeaseSet with the message so that Bob doesn't need to do a netDb " -"lookup \n" +"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." msgstr "" @@ -9654,208 +8553,126 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:200 msgid "" -"While the tunnels themselves have layered encryption to prevent " -"unauthorized \n" -"disclosure to peers inside the network (as the transport layer itself " -"does \n" -"to prevent unauthorized disclosure to peers outside the network), it is " -"necessary \n" -"to add an additional end to end layer of encryption to hide the message " -"from \n" -"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a " -"href=\"#op.garlic\">garlic \n" -"encryption</a>\" lets Alice's router wrap up multiple messages into a " -"single \n" -"\"garlic message\", encrypted to a particular public key so that " -"intermediary \n" -"peers cannot determine either how many messages are within the garlic, " -"what \n" -"those messages say, or where those individual cloves are destined. For " -"typical \n" -"end to end communication between Alice and Bob, the garlic will be " -"encrypted \n" -"to the public key published in Bob's leaseSet, allowing the message to be" -" \n" +"While the tunnels themselves have layered encryption to prevent unauthorized \n" +"disclosure to peers inside the network (as the transport layer itself does \n" +"to prevent unauthorized disclosure to peers outside the network), it is necessary \n" +"to add an additional end to end layer of encryption to hide the message from \n" +"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n" +"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n" +"\"garlic message\", encrypted to a particular public key so that intermediary \n" +"peers cannot determine either how many messages are within the garlic, what \n" +"those messages say, or where those individual cloves are destined. For typical \n" +"end to end communication between Alice and Bob, the garlic will be encrypted \n" +"to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" -"Another important fact to keep in mind is that I2P is entirely message " -"based \n" -"and that some messages may be lost along the way. Applications using I2P " -"can \n" -"use the message oriented interfaces and take care of their own congestion" -" \n" -"control and reliability needs, but most would be best served by reusing " -"the \n" -"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as " -"a streams \n" +"Another important fact to keep in mind is that I2P is entirely message based \n" +"and that some messages may be lost along the way. Applications using I2P can \n" +"use the message oriented interfaces and take care of their own congestion \n" +"control and reliability needs, but most would be best served by reusing the \n" +"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n" "based network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" "Both inbound and outbound tunnels work along similar principles.\n" -"The tunnel gateway accumulates a number of tunnel messages, eventually " -"preprocessing \n" -"them into something for tunnel delivery. Next, the gateway encrypts that " -"preprocessed \n" -"data and forwards it to the first hop. That peer and subsequent tunnel " -"participants \n" -"add on a layer of encryption after verifying that it isn't a duplicate " -"before \n" -"forward it on to the next peer. Eventually, the message arrives at the " -"endpoint \n" -"where the messages are split out again and forwarded on as requested. The" -" \n" -"difference arises in what the tunnel's creator does - for inbound " -"tunnels, \n" -"the creator is the endpoint and they simply decrypt all of the layers " -"added, \n" -"while for outbound tunnels, the creator is the gateway and they pre-" -"decrypt \n" -"all of the layers so that after all of the layers of per-hop encryption " -"are \n" +"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n" +"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n" +"data and forwards it to the first hop. That peer and subsequent tunnel participants \n" +"add on a layer of encryption after verifying that it isn't a duplicate before \n" +"forward it on to the next peer. Eventually, the message arrives at the endpoint \n" +"where the messages are split out again and forwarded on as requested. The \n" +"difference arises in what the tunnel's creator does - for inbound tunnels, \n" +"the creator is the endpoint and they simply decrypt all of the layers added, \n" +"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" +"all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" -"The choice of specific peers to pass on messages as well as their " -"particular \n" -"ordering is important to understanding both I2P's anonymity and " -"performance \n" -"characteristics. While the network database (below) has its own criteria " -"for \n" -"picking what peers to query and store entries on, tunnel creators may use" -" any peers \n" -"in the network in any order (and even any number of times) in a single " -"tunnel. \n" -"If perfect latency and capacity data were globally known, selection and " -"ordering \n" -"would be driven by the particular needs of the client in tandem with " -"their \n" -"threat model. Unfortunately, latency and capacity data is not trivial to " -"gather \n" -"anonymously, and depending upon untrusted peers to provide this " -"information \n" +"The choice of specific peers to pass on messages as well as their particular \n" +"ordering is important to understanding both I2P's anonymity and performance \n" +"characteristics. While the network database (below) has its own criteria for \n" +"picking what peers to query and store entries on, tunnel creators may use any peers \n" +"in the network in any order (and even any number of times) in a single tunnel. \n" +"If perfect latency and capacity data were globally known, selection and ordering \n" +"would be driven by the particular needs of the client in tandem with their \n" +"threat model. Unfortunately, latency and capacity data is not trivial to gather \n" +"anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" -"From an anonymity perspective, the simplest technique would be to pick " -"peers \n" -"randomly from the entire network, order them randomly and use those peers" -" \n" -"in that order for all eternity. From a performance perspective, the " -"simplest \n" -"technique would be to pick the fastest peers with the necessary spare " -"capacity, \n" -"spreading the load across different peers to handle transparent failover," -" \n" -"and to rebuild the tunnel whenever capacity information changes. While " -"the \n" -"former is both brittle and inefficient, the later requires inaccessible " -"information \n" -"and offers insufficient anonymity. I2P is instead working on offering a " -"range \n" -"of peer selection strategies, coupled with anonymity aware measurement " -"code \n" +"From an anonymity perspective, the simplest technique would be to pick peers \n" +"randomly from the entire network, order them randomly and use those peers \n" +"in that order for all eternity. From a performance perspective, the simplest \n" +"technique would be to pick the fastest peers with the necessary spare capacity, \n" +"spreading the load across different peers to handle transparent failover, \n" +"and to rebuild the tunnel whenever capacity information changes. While the \n" +"former is both brittle and inefficient, the later requires inaccessible information \n" +"and offers insufficient anonymity. I2P is instead working on offering a range \n" +"of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" -"As a base, I2P is constantly profiling the peers with which it interacts" -" \n" -"with by measuring their indirect behavior - for instance, when a peer " -"responds \n" -"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in " -"the \n" -"profiles for all of the routers involved in the two tunnels (inbound and " -"outbound) \n" -"through which the request and response passed, as well as the queried " -"peer's \n" -"profile. Direct measurement, such as transport layer latency or " -"congestion, \n" -"is not used as part of the profile, as it can be manipulated and " -"associated \n" -"with the measuring router, exposing them to trivial attacks. While " -"gathering \n" -"these profiles, a series of calculations are run on each to summarize its" -" \n" -"performance - its latency, capacity to handle lots of activity, whether " -"they \n" -"are currently overloaded, and how well integrated into the network they " -"seem \n" -"to be. These calculations are then compared for active peers to organize " -"the \n" -"routers into four tiers - fast and high capacity, high capacity, not " -"failing, \n" -"and failing. The thresholds for those tiers are determined dynamically, " -"and \n" +"As a base, I2P is constantly profiling the peers with which it interacts \n" +"with by measuring their indirect behavior - for instance, when a peer responds \n" +"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n" +"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n" +"through which the request and response passed, as well as the queried peer's \n" +"profile. Direct measurement, such as transport layer latency or congestion, \n" +"is not used as part of the profile, as it can be manipulated and associated \n" +"with the measuring router, exposing them to trivial attacks. While gathering \n" +"these profiles, a series of calculations are run on each to summarize its \n" +"performance - its latency, capacity to handle lots of activity, whether they \n" +"are currently overloaded, and how well integrated into the network they seem \n" +"to be. These calculations are then compared for active peers to organize the \n" +"routers into four tiers - fast and high capacity, high capacity, not failing, \n" +"and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" -"Using this profile data, the simplest reasonable peer selection strategy " -"is to\n" -"pick peers randomly from the top tier (fast and high capacity), and this " -"is\n" -"currently deployed for client tunnels. Exploratory tunnels (used for " -"netDb and\n" -"tunnel management) pick peers randomly from the \"not failing\" tier " -"(which\n" +"Using this profile data, the simplest reasonable peer selection strategy is to\n" +"pick peers randomly from the top tier (fast and high capacity), and this is\n" +"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n" +"tunnel management) pick peers randomly from the \"not failing\" tier (which\n" "includes routers in 'better' tiers as well), allowing the peer to sample\n" -"routers more widely, in effect optimizing the peer selection through " -"randomized\n" -"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill " -"climbing</a>. These\n" +"routers more widely, in effect optimizing the peer selection through randomized\n" +"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n" "strategies alone do however leak information regarding the peers in the\n" -"router's top tier through predecessor and netDb harvesting attacks. In " -"turn,\n" -"several alternatives exist which, while not balancing the load as evenly," -" will\n" +"router's top tier through predecessor and netDb harvesting attacks. In turn,\n" +"several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" -"By picking a random key and ordering the peers according to their XOR " -"distance \n" -"from it, the information leaked is reduced in predecessor and harvesting " -"attacks \n" -"according to the peers' failure rate and the tier's churn. Another simple" -" \n" -"strategy for dealing with netDb harvesting attacks is to simply fix the " -"inbound \n" -"tunnel gateway(s) yet randomize the peers further on in the tunnels. To " -"deal \n" -"with predecessor attacks for adversaries which the client contacts, the " -"outbound \n" -"tunnel endpoints would also remain fixed. The selection of which peer to " -"fix \n" -"on the most exposed point would of course need to have a limit to the " -"duration, \n" -"as all peers fail eventually, so it could either be reactively adjusted " -"or \n" -"proactively avoided to mimic a measured mean time between failures of " -"other \n" -"routers. These two strategies can in turn be combined, using a fixed " -"exposed \n" -"peer and an XOR based ordering within the tunnels themselves. A more " -"rigid \n" -"strategy would fix the exact peers and ordering of a potential tunnel, " -"only \n" -"using individual peers if all of them agree to participate in the same " -"way \n" -"each time. This varies from the XOR based ordering in that the " -"predecessor \n" -"and successor of each peer is always the same, while the XOR only makes " -"sure \n" +"By picking a random key and ordering the peers according to their XOR distance \n" +"from it, the information leaked is reduced in predecessor and harvesting attacks \n" +"according to the peers' failure rate and the tier's churn. Another simple \n" +"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n" +"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n" +"with predecessor attacks for adversaries which the client contacts, the outbound \n" +"tunnel endpoints would also remain fixed. The selection of which peer to fix \n" +"on the most exposed point would of course need to have a limit to the duration, \n" +"as all peers fail eventually, so it could either be reactively adjusted or \n" +"proactively avoided to mimic a measured mean time between failures of other \n" +"routers. These two strategies can in turn be combined, using a fixed exposed \n" +"peer and an XOR based ordering within the tunnels themselves. A more rigid \n" +"strategy would fix the exact peers and ordering of a potential tunnel, only \n" +"using individual peers if all of them agree to participate in the same way \n" +"each time. This varies from the XOR based ordering in that the predecessor \n" +"and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." msgstr "" @@ -9864,10 +8681,8 @@ msgstr "" msgid "" "As mentioned before, I2P currently (release 0.8) includes the tiered \n" "random strategy above, with XOR-based ordering. A \n" -"more detailed discussion of the mechanics involved in tunnel operation, " -"management, \n" -"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel " -"spec</a>." +"more detailed discussion of the mechanics involved in tunnel operation, management, \n" +"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:326 @@ -9881,27 +8696,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" "A percentage of I2P users are appointed as 'floodfill peers'.\n" -"Currently, I2P installations that have a lot of bandwidth and are fast " -"enough,\n" -"will appoint themselves as floodfill as soon as the number of existing " -"floodfill routers\n" +"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" +"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format msgid "" -"Other I2P routers will store their data and lookup data by sending simple" -" 'store' and 'lookup' queries to the floodfills.\n" -"If a floodfill router receives a 'store' query, it will spread the " -"information to other floodfill routers\n" -"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia " -"algorithm</a>.\n" -"The 'lookup' queries currently function differently, to avoid an " -"important\n" +"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n" +"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n" +"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n" +"The 'lookup' queries currently function differently, to avoid an important\n" "<a href=\"%(netdb)s#lookup\">security issue</a>.\n" -"When a lookup is done, the floodfill router will not forward the lookup " -"to other peers,\n" +"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." msgstr "" @@ -9911,8 +8719,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" -"A <b>RouterInfo</b> stores information on a specific I2P router and how " -"to contact it" +"A <b>RouterInfo</b> stores information on a specific I2P router and how to " +"contact it" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:354 @@ -9923,14 +8731,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" -"All of this information is signed by the publishing party and verified by" -" any I2P router using or storing the information.\n" -"In addition, the data contains timing information, to avoid storage of " -"old entries and possible attacks.\n" -"This is also why I2P bundles the necessary code for maintaining the " -"correct time, occasionally querying some SNTP servers \n" -"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by" -" default)\n" +"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n" +"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n" +"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" +"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n" "and detecting skew between routers at the transport layer." msgstr "" @@ -9945,10 +8749,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:370 msgid "" "One could only want specific people to be able to reach a destination.\n" -"This is possible by not publishing the destination in the netDb. You will" -" however have to transmit the destination by other means.\n" -"An alternative are the 'encrypted leaseSets'. These leaseSets can only be" -" decoded by people with access to the decryption key." +"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" +"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:377 @@ -9957,13 +8759,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:378 msgid "" -"Bootstrapping the netDb is quite simple. Once a router manages to receive" -" a single routerInfo of a reachable peer,\n" +"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n" "it can query that router for references to other routers in the network.\n" -"Currently, a number of users post their routerInfo files to a website to " -"make this information available.\n" -"I2P automatically connects to one of these websites to gather routerInfo " -"files and bootstrap." +"Currently, a number of users post their routerInfo files to a website to make this information available.\n" +"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:386 @@ -9973,26 +8772,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:387 msgid "" "Lookups in the I2P network are not forwarded to other netDb routers.\n" -"Currently, this is not a major problem, since the network is not very " -"large.\n" -"However, as the network grows, not all routerInfo and leaseSet files will" -" be present\n" -"on each netDb router. This will cause a deterioration of the percentage " -"of successful lookups.\n" -"Because of this, refinements to the netDb will be done in the next " -"releases." +"Currently, this is not a major problem, since the network is not very large.\n" +"However, as the network grows, not all routerInfo and leaseSet files will be present\n" +"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" +"Because of this, refinements to the netDb will be done in the next releases." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" -"Communication between routers needs to provide confidentiality and " -"integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" -"is the one who should receive a given message. The particulars of how " -"routers \n" -"communicate with other routers aren't critical - three separate protocols" -" \n" +"Communication between routers needs to provide confidentiality and integrity \n" +"against external adversaries while authenticating that the router contacted \n" +"is the one who should receive a given message. The particulars of how routers \n" +"communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." msgstr "" @@ -10000,12 +8791,9 @@ msgstr "" #, python-format msgid "" "I2P started with a TCP-based protocol which \n" -"has since been disabled. Then, to accommodate the need for high degree " -"communication \n" -"(as a number of routers will end up speaking with many others), I2P moved" -" \n" -"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - " -"\"Secure \n" +"has since been disabled. Then, to accommodate the need for high degree communication \n" +"(as a number of routers will end up speaking with many others), I2P moved \n" +"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n" "Semireliable UDP\", or \"SSU\"." msgstr "" @@ -10017,46 +8805,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" "The goal of this protocol is to provide secure, authenticated, \n" -"semireliable and unordered message delivery, exposing only a minimal " -"amount \n" -"of data easily discernible to third parties. It should support high " -"degree \n" -"communication as well as TCP-friendly congestion control and may include" -" \n" -"PMTU detection. It should be capable of efficiently moving bulk data at " -"rates \n" -"sufficient for home users. In addition, it should support techniques for " -"addressing \n" +"semireliable and unordered message delivery, exposing only a minimal amount \n" +"of data easily discernible to third parties. It should support high degree \n" +"communication as well as TCP-friendly congestion control and may include \n" +"PMTU detection. It should be capable of efficiently moving bulk data at rates \n" +"sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format msgid "" -"Following the introduction of SSU, after issues with congestion collapse" -" \n" -"appeared, a new NIO-based TCP transport called <a " -"href=\"%(ntcp)s\">NTCP</a> \n" -"was implemented. It is enabled by default for outbound connections only. " -"Those \n" -"who configure their NAT/firewall to allow inbound connections and specify" -" \n" -"the external host and port (dyndns/etc is ok) on /config.jsp can receive " -"inbound \n" -"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread" -" \n" +"Following the introduction of SSU, after issues with congestion collapse \n" +"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n" +"was implemented. It is enabled by default for outbound connections only. Those \n" +"who configure their NAT/firewall to allow inbound connections and specify \n" +"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" +"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" "I2P supports multiple transports simultaneously. A particular transport \n" -"for an outbound connection is selected with \"bids\". Each transport bids" -" for \n" -"the connection and the relative value of these bids assigns the priority." -" \n" -"Transports may reply with different bids, depending on whether there is " -"already \n" +"for an outbound connection is selected with \"bids\". Each transport bids for \n" +"the connection and the relative value of these bids assigns the priority. \n" +"Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." msgstr "" @@ -10064,38 +8838,25 @@ msgstr "" #, python-format msgid "" "The current implementation ranks NTCP as the highest-priority transport \n" -"for outbound connections in most situations. SSU is enabled for both " -"outbound \n" -"and inbound connections. Your firewall and your I2P router must be " -"configured \n" -"to allow inbound NTCP connections. For further information see the <a " -"href=\"%(ntcp)s\">NTCP \n" +"for outbound connections in most situations. SSU is enabled for both outbound \n" +"and inbound connections. Your firewall and your I2P router must be configured \n" +"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n" "page</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" "A bare minimum set of cryptographic primitives are combined together to \n" -"provide I2P's layered defenses against a variety of adversaries. At the " -"lowest \n" -"level, inter router communication is protected by the transport layer " -"security \n" -"- SSU encrypts each packet with AES256/CBC with both an explicit IV and " -"MAC \n" -"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a " -"2048bit \n" -"Diffie-Hellman exchange, station-to-station authentication with the other" -" \n" -"router's DSA key, plus each network message has their own hash for local " -"integrity \n" -"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the " -"transports \n" -"have their own layered AES256/CBC encryption with an explicit IV and " -"verified \n" -"at the tunnel endpoint with an additional SHA256 hash. Various other " -"messages \n" -"are passed along inside \"garlic messages\", which are encrypted with " -"ElGamal/AES+SessionTags \n" +"provide I2P's layered defenses against a variety of adversaries. At the lowest \n" +"level, inter router communication is protected by the transport layer security \n" +"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n" +"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n" +"Diffie-Hellman exchange, station-to-station authentication with the other \n" +"router's DSA key, plus each network message has their own hash for local integrity \n" +"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n" +"have their own layered AES256/CBC encryption with an explicit IV and verified \n" +"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" +"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." msgstr "" @@ -10105,51 +8866,31 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:471 msgid "" -"Garlic messages are an extension of \"onion\" layered encryption, " -"allowing \n" -"the contents of a single message to contain multiple \"cloves\" - fully " -"formed \n" -"messages alongside their own instructions for delivery. Messages are " -"wrapped \n" -"into a garlic message whenever the message would otherwise be passing in " -"cleartext \n" -"through a peer who should not have access to the information - for " -"instance, \n" -"when a router wants to ask another router to participate in a tunnel, " -"they \n" -"wrap the request inside a garlic, encrypt that garlic to the receiving " -"router's \n" -"2048bit ElGamal public key, and forward it through a tunnel. Another " -"example \n" -"is when a client wants to send a message to a destination - the sender's " -"router \n" -"will wrap up that data message (alongside some other messages) into a " -"garlic, \n" -"encrypt that garlic to the 2048bit ElGamal public key published in the " -"recipient's \n" +"Garlic messages are an extension of \"onion\" layered encryption, allowing \n" +"the contents of a single message to contain multiple \"cloves\" - fully formed \n" +"messages alongside their own instructions for delivery. Messages are wrapped \n" +"into a garlic message whenever the message would otherwise be passing in cleartext \n" +"through a peer who should not have access to the information - for instance, \n" +"when a router wants to ask another router to participate in a tunnel, they \n" +"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n" +"2048bit ElGamal public key, and forward it through a tunnel. Another example \n" +"is when a client wants to send a message to a destination - the sender's router \n" +"will wrap up that data message (alongside some other messages) into a garlic, \n" +"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" -"The \"instructions\" attached to each clove inside the encryption layer " -"includes \n" -"the ability to request that the clove be forwarded locally, to a remote " -"router, \n" -"or to a remote tunnel on a remote router. There are fields in those " -"instructions \n" -"allowing a peer to request that the delivery be delayed until a certain " -"time \n" -"or condition has been met, though they won't be honored until the <a " -"href=\"#future.variablelatency\">nontrivial \n" -"delays</a> are deployed. It is possible to explicitly route garlic " -"messages \n" -"any number of hops without building tunnels, or even to reroute tunnel " -"messages \n" -"by wrapping them in garlic messages and forwarding them a number of hops " -"prior \n" -"to delivering them to the next hop in the tunnel, but those techniques " -"are \n" +"The \"instructions\" attached to each clove inside the encryption layer includes \n" +"the ability to request that the clove be forwarded locally, to a remote router, \n" +"or to a remote tunnel on a remote router. There are fields in those instructions \n" +"allowing a peer to request that the delivery be delayed until a certain time \n" +"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n" +"delays</a> are deployed. It is possible to explicitly route garlic messages \n" +"any number of hops without building tunnels, or even to reroute tunnel messages \n" +"by wrapping them in garlic messages and forwarding them a number of hops prior \n" +"to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." msgstr "" @@ -10159,54 +8900,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:500 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" -"Session tags themselves have a very short lifetime, after which they are" -" \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"Session tags themselves have a very short lifetime, after which they are \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" -"One alternative is to transmit only a single session tag, and from that," -" \n" -"seed a deterministic PRNG for determining what tags to use or expect. By " -"keeping \n" -"this PRNG roughly synchronized between the sender and recipient (the " -"recipient \n" -"precomputes a window of the next e.g. 50 tags), the overhead of " -"periodically \n" -"bundling a large number of tags is removed, allowing more options in the " -"space/time \n" -"tradeoff, and perhaps reducing the number of ElGamal encryptions " -"necessary. \n" -"However, it would depend upon the strength of the PRNG to provide the " -"necessary \n" -"cover against internal adversaries, though perhaps by limiting the amount" -" \n" -"of times each PRNG is used, any weaknesses can be minimized. At the " -"moment, \n" +"One alternative is to transmit only a single session tag, and from that, \n" +"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n" +"this PRNG roughly synchronized between the sender and recipient (the recipient \n" +"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n" +"bundling a large number of tags is removed, allowing more options in the space/time \n" +"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n" +"However, it would depend upon the strength of the PRNG to provide the necessary \n" +"cover against internal adversaries, though perhaps by limiting the amount \n" +"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." msgstr "" @@ -10216,12 +8938,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:563 msgid "" -"While I2P is currently functional and sufficient for many scenarios, " -"there \n" -"are several areas which require further improvement to meet the needs of " -"those \n" -"facing more powerful adversaries as well as substantial user experience " -"optimization." +"While I2P is currently functional and sufficient for many scenarios, there \n" +"are several areas which require further improvement to meet the needs of those \n" +"facing more powerful adversaries as well as substantial user experience optimization." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:569 @@ -10230,106 +8949,64 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:570 msgid "" -"I2P is an overlay network designed to be run on top of a functional " -"packet \n" -"switched network, exploiting the end to end principle to offer anonymity " -"and \n" -"security. While the Internet no longer fully embraces the end to end " -"principle\n" +"I2P is an overlay network designed to be run on top of a functional packet \n" +"switched network, exploiting the end to end principle to offer anonymity and \n" +"security. While the Internet no longer fully embraces the end to end principle\n" "(due to the usage of NAT), \n" -"I2P does require a substantial portion of the network to be reachable - " -"there \n" -"may be a number of peers along the edges running using restricted routes," -" \n" -"but I2P does not include an appropriate routing algorithm for the " -"degenerate \n" -"case where most peers are unreachable. It would, however work on top of a" -" \n" +"I2P does require a substantial portion of the network to be reachable - there \n" +"may be a number of peers along the edges running using restricted routes, \n" +"but I2P does not include an appropriate routing algorithm for the degenerate \n" +"case where most peers are unreachable. It would, however work on top of a \n" "network employing such an algorithm." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:582 msgid "" -"Restricted route operation, where there are limits to what peers are " -"reachable \n" -"directly, has several different functional and anonymity implications, " -"dependent \n" -"upon how the restricted routes are handled. At the most basic level, " -"restricted \n" -"routes exist when a peer is behind a NAT or firewall which does not allow" -" \n" -"inbound connections. This was largely addressed in I2P 0.6.0.6 by " -"integrating \n" -"distributed hole punching into the transport layer, allowing people " -"behind \n" -"most NATs and firewalls to receive unsolicited connections without any " -"configuration. \n" -"However, this does not limit the exposure of the peer's IP address to " -"routers \n" -"inside the network, as they can simply get introduced to the peer through" -" \n" +"Restricted route operation, where there are limits to what peers are reachable \n" +"directly, has several different functional and anonymity implications, dependent \n" +"upon how the restricted routes are handled. At the most basic level, restricted \n" +"routes exist when a peer is behind a NAT or firewall which does not allow \n" +"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n" +"distributed hole punching into the transport layer, allowing people behind \n" +"most NATs and firewalls to receive unsolicited connections without any configuration. \n" +"However, this does not limit the exposure of the peer's IP address to routers \n" +"inside the network, as they can simply get introduced to the peer through \n" "the published introducer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:595 msgid "" -"Beyond the functional handling of restricted routes, there are two levels" -" \n" -"of restricted operation that can be used to limit the exposure of one's " -"IP \n" -"address - using router-specific tunnels for communication, and offering " -"'client \n" -"routers'. For the former, routers can either build a new pool of tunnels " -"or \n" -"reuse their exploratory pool, publishing the inbound gateways to some of " -"them \n" -"as part of their routerInfo in place of their transport addresses. When a" -" \n" -"peer wants to get in touch with them, they see those tunnel gateways in " -"the \n" -"netDb and simply send the relevant message to them through one of the " -"published \n" -"tunnels. If the peer behind the restricted route wants to reply, it may " -"do \n" -"so either directly (if they are willing to expose their IP to the peer) " -"or \n" -"indirectly through their outbound tunnels. When the routers that the peer" -" \n" -"has direct connections to want to reach it (to forward tunnel messages, " -"for \n" -"instance), they simply prioritize their direct connection over the " -"published \n" -"tunnel gateway. The concept of 'client routers' simply extends the " -"restricted \n" -"route by not publishing any router addresses. Such a router would not " -"even \n" -"need to publish their routerInfo in the netDb, merely providing their " -"self \n" -"signed routerInfo to the peers that it contacts (necessary to pass the " -"router's \n" -"public keys). Both levels of restricted route operation are planned for " -"I2P \n" +"Beyond the functional handling of restricted routes, there are two levels \n" +"of restricted operation that can be used to limit the exposure of one's IP \n" +"address - using router-specific tunnels for communication, and offering 'client \n" +"routers'. For the former, routers can either build a new pool of tunnels or \n" +"reuse their exploratory pool, publishing the inbound gateways to some of them \n" +"as part of their routerInfo in place of their transport addresses. When a \n" +"peer wants to get in touch with them, they see those tunnel gateways in the \n" +"netDb and simply send the relevant message to them through one of the published \n" +"tunnels. If the peer behind the restricted route wants to reply, it may do \n" +"so either directly (if they are willing to expose their IP to the peer) or \n" +"indirectly through their outbound tunnels. When the routers that the peer \n" +"has direct connections to want to reach it (to forward tunnel messages, for \n" +"instance), they simply prioritize their direct connection over the published \n" +"tunnel gateway. The concept of 'client routers' simply extends the restricted \n" +"route by not publishing any router addresses. Such a router would not even \n" +"need to publish their routerInfo in the netDb, merely providing their self \n" +"signed routerInfo to the peers that it contacts (necessary to pass the router's \n" +"public keys). Both levels of restricted route operation are planned for I2P \n" "2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:617 msgid "" -"There are tradeoffs for those behind restricted routes, as they would " -"likely \n" -"participate in other people's tunnels less frequently, and the routers " -"which \n" -"they are connected to would be able to infer traffic patterns that would " -"not \n" -"otherwise be exposed. On the other hand, if the cost of that exposure is " -"less \n" -"than the cost of an IP being made available, it may be worthwhile. This, " -"of \n" -"course, assumes that the peers that the router behind a restricted route " -"contacts \n" -"are not hostile - either the network is large enough that the probability" -" \n" -"of using a hostile peer to get connected is small enough, or trusted (and" -" \n" +"There are tradeoffs for those behind restricted routes, as they would likely \n" +"participate in other people's tunnels less frequently, and the routers which \n" +"they are connected to would be able to infer traffic patterns that would not \n" +"otherwise be exposed. On the other hand, if the cost of that exposure is less \n" +"than the cost of an IP being made available, it may be worthwhile. This, of \n" +"course, assumes that the peers that the router behind a restricted route contacts \n" +"are not hostile - either the network is large enough that the probability \n" +"of using a hostile peer to get connected is small enough, or trusted (and \n" "perhaps temporary) peers are used instead." msgstr "" @@ -10339,45 +9016,28 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:630 msgid "" -"Even though the bulk of I2P's initial efforts have been on low latency " -"communication, \n" -"it was designed with variable latency services in mind from the " -"beginning. \n" -"At the most basic level, applications running on top of I2P can offer the" -" \n" -"anonymity of medium and high latency communication while still blending " -"their \n" -"traffic patterns in with low latency traffic. Internally though, I2P can " -"offer \n" -"its own medium and high latency communication through the garlic " -"encryption \n" -"- specifying that the message should be sent after a certain delay, at a " -"certain \n" -"time, after a certain number of messages have passed, or another mix " -"strategy. \n" -"With the layered encryption, only the router that the clove exposed the " -"delay \n" -"request would know that the message requires high latency, allowing the " -"traffic \n" -"to blend in further with the low latency traffic. Once the transmission " -"precondition \n" -"is met, the router holding on to the clove (which itself would likely be " -"a \n" -"garlic message) simply forwards it as requested - to a router, to a " -"tunnel, \n" +"Even though the bulk of I2P's initial efforts have been on low latency communication, \n" +"it was designed with variable latency services in mind from the beginning. \n" +"At the most basic level, applications running on top of I2P can offer the \n" +"anonymity of medium and high latency communication while still blending their \n" +"traffic patterns in with low latency traffic. Internally though, I2P can offer \n" +"its own medium and high latency communication through the garlic encryption \n" +"- specifying that the message should be sent after a certain delay, at a certain \n" +"time, after a certain number of messages have passed, or another mix strategy. \n" +"With the layered encryption, only the router that the clove exposed the delay \n" +"request would know that the message requires high latency, allowing the traffic \n" +"to blend in further with the low latency traffic. Once the transmission precondition \n" +"is met, the router holding on to the clove (which itself would likely be a \n" +"garlic message) simply forwards it as requested - to a router, to a tunnel, \n" "or, most likely, to a remote client destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:647 msgid "" -"There are a substantial number of ways to exploit this capacity for high" -" \n" -"latency comm in I2P, but for the moment, doing so has been scheduled for " -"the \n" -"I2P 3.0 release. In the meantime, those requiring the anonymity that high" -" \n" -"latency comm can offer should look towards the application layer to " -"provide \n" +"There are a substantial number of ways to exploit this capacity for high \n" +"latency comm in I2P, but for the moment, doing so has been scheduled for the \n" +"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n" +"latency comm can offer should look towards the application layer to provide \n" "it." msgstr "" @@ -10411,18 +9071,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:665 msgid "" -"I2P's architecture builds on the concepts of message oriented middleware," -" \n" -"the topology of DHTs, the anonymity and cryptography of free route " -"mixnets, \n" -"and the adaptability of packet switched networking. The value comes not " -"from \n" -"novel concepts of algorithms though, but from careful engineering " -"combining \n" -"the research results of existing systems and papers. While there are a " -"few \n" -"similar efforts worth reviewing, both for technical and functional " -"comparisons, \n" +"I2P's architecture builds on the concepts of message oriented middleware, \n" +"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n" +"and the adaptability of packet switched networking. The value comes not from \n" +"novel concepts of algorithms though, but from careful engineering combining \n" +"the research results of existing systems and papers. While there are a few \n" +"similar efforts worth reviewing, both for technical and functional comparisons, \n" "two in particular are pulled out here - Tor and Freenet." msgstr "" @@ -10439,209 +9093,127 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:682 msgid "" "At first glance, Tor and I2P have many functional and anonymity related \n" -"similarities. While I2P's development began before we were aware of the " -"early \n" -"stage efforts on Tor, many of the lessons of the original onion routing " -"and \n" -"ZKS efforts were integrated into I2P's design. Rather than building an " -"essentially \n" -"trusted, centralized system with directory servers, I2P has a self " -"organizing \n" -"network database with each peer taking on the responsibility of profiling" -" \n" -"other routers to determine how best to exploit available resources. " -"Another \n" -"key difference is that while both I2P and Tor use layered and ordered " -"paths \n" -"(tunnels and circuits/streams), I2P is fundamentally a packet switched " -"network, \n" -"while Tor is fundamentally a circuit switched one, allowing I2P to " -"transparently \n" -"route around congestion or other network failures, operate redundant " -"pathways, \n" -"and load balance the data across available resources. While Tor offers " -"the \n" -"useful outproxy functionality by offering integrated outproxy discovery " -"and \n" -"selection, I2P leaves such application layer decisions up to applications" -" \n" -"running on top of I2P - in fact, I2P has even externalized the TCP-like " -"streaming \n" -"library itself to the application layer, allowing developers to " -"experiment \n" -"with different strategies, exploiting their domain specific knowledge to " -"offer \n" +"similarities. While I2P's development began before we were aware of the early \n" +"stage efforts on Tor, many of the lessons of the original onion routing and \n" +"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n" +"trusted, centralized system with directory servers, I2P has a self organizing \n" +"network database with each peer taking on the responsibility of profiling \n" +"other routers to determine how best to exploit available resources. Another \n" +"key difference is that while both I2P and Tor use layered and ordered paths \n" +"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n" +"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n" +"route around congestion or other network failures, operate redundant pathways, \n" +"and load balance the data across available resources. While Tor offers the \n" +"useful outproxy functionality by offering integrated outproxy discovery and \n" +"selection, I2P leaves such application layer decisions up to applications \n" +"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n" +"library itself to the application layer, allowing developers to experiment \n" +"with different strategies, exploiting their domain specific knowledge to offer \n" "better performance." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:703 msgid "" -"From an anonymity perspective, there is much similarity when the core " -"networks \n" -"are compared. However, there are a few key differences. When dealing with" -" \n" -"an internal adversary or most external adversaries, I2P's simplex tunnels" -" \n" -"expose half as much traffic data than would be exposed with Tor's duplex " -"circuits \n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels. \n" -"While I2P's peer selection and ordering strategies should sufficiently " -"address \n" -"predecessor attacks, should a switch to bidirectional tunnels be " -"necessary,\n" -"we could simply build an inbound and outbound tunnel along the same " -"routers." +"From an anonymity perspective, there is much similarity when the core networks \n" +"are compared. However, there are a few key differences. When dealing with \n" +"an internal adversary or most external adversaries, I2P's simplex tunnels \n" +"expose half as much traffic data than would be exposed with Tor's duplex circuits \n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels. \n" +"While I2P's peer selection and ordering strategies should sufficiently address \n" +"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n" +"we could simply build an inbound and outbound tunnel along the same routers." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:717 msgid "" -"Another anonymity issue comes up in Tor's use of telescopic tunnel " -"creation, \n" -"as simple packet counting and timing measurements as the cells in a " -"circuit \n" -"pass through an adversary's node exposes statistical information " -"regarding \n" -"where the adversary is within the circuit. I2P's unidirectional tunnel " -"creation \n" -"with a single message so that this data is not exposed. Protecting the " -"position \n" -"in a tunnel is important, as an adversary would otherwise be able to " -"mount \n" -"a series of powerful predecessor, intersection, and traffic confirmation " -"attacks." +"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n" +"as simple packet counting and timing measurements as the cells in a circuit \n" +"pass through an adversary's node exposes statistical information regarding \n" +"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n" +"with a single message so that this data is not exposed. Protecting the position \n" +"in a tunnel is important, as an adversary would otherwise be able to mount \n" +"a series of powerful predecessor, intersection, and traffic confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:727 msgid "" -"Tor's support for a second tier of \"onion proxies\" does offer a non-" -"trivial \n" -"degree of anonymity while requiring a low cost of entry, while I2P will " -"not \n" +"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n" +"degree of anonymity while requiring a low cost of entry, while I2P will not \n" "offer this topology until <a href=\"#future.restricted\">2.0</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:733 msgid "" -"On the whole, Tor and I2P complement each other in their focus - Tor " -"works \n" -"towards offering high speed anonymous Internet outproxying, while I2P " -"works \n" -"towards offering a decentralized resilient network in itself. In theory, " -"both \n" -"can be used to achieve both purposes, but given limited development " -"resources, \n" -"they both have their strengths and weaknesses. The I2P developers have " -"considered \n" -"the steps necessary to modify Tor to take advantage of I2P's design, but " -"concerns \n" -"of Tor's viability under resource scarcity suggest that I2P's packet " -"switching \n" +"On the whole, Tor and I2P complement each other in their focus - Tor works \n" +"towards offering high speed anonymous Internet outproxying, while I2P works \n" +"towards offering a decentralized resilient network in itself. In theory, both \n" +"can be used to achieve both purposes, but given limited development resources, \n" +"they both have their strengths and weaknesses. The I2P developers have considered \n" +"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n" +"of Tor's viability under resource scarcity suggest that I2P's packet switching \n" "architecture will be able to exploit scarce resources more effectively." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:747 msgid "" -"Freenet played a large part in the initial stages of I2P's design - " -"giving \n" -"proof to the viability of a vibrant pseudonymous community completely " -"contained \n" -"within the network, demonstrating that the dangers inherent in outproxies" -" \n" -"could be avoided. The first seed of I2P began as a replacement " -"communication \n" -"layer for Freenet, attempting to factor out the complexities of a " -"scalable, \n" -"anonymous and secure point to point communication from the complexities " -"of \n" -"a censorship resistant distributed data store. Over time however, some of" -" \n" -"the anonymity and scalability issues inherent in Freenet's algorithms " -"made \n" -"it clear that I2P's focus should stay strictly on providing a generic " -"anonymous \n" -"communication layer, rather than as a component of Freenet. Over the " -"years, \n" -"the Freenet developers have come to see the weaknesses in the older " -"design, \n" -"prompting them to suggest that they will require a \"premix\" layer to " -"offer \n" -"substantial anonymity. In other words, Freenet needs to run on top of a " -"mixnet \n" -"such as I2P or Tor, with \"client nodes\" requesting and publishing data " -"through \n" -"the mixnet to the \"server nodes\" which then fetch and store the data " -"according \n" +"Freenet played a large part in the initial stages of I2P's design - giving \n" +"proof to the viability of a vibrant pseudonymous community completely contained \n" +"within the network, demonstrating that the dangers inherent in outproxies \n" +"could be avoided. The first seed of I2P began as a replacement communication \n" +"layer for Freenet, attempting to factor out the complexities of a scalable, \n" +"anonymous and secure point to point communication from the complexities of \n" +"a censorship resistant distributed data store. Over time however, some of \n" +"the anonymity and scalability issues inherent in Freenet's algorithms made \n" +"it clear that I2P's focus should stay strictly on providing a generic anonymous \n" +"communication layer, rather than as a component of Freenet. Over the years, \n" +"the Freenet developers have come to see the weaknesses in the older design, \n" +"prompting them to suggest that they will require a \"premix\" layer to offer \n" +"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n" +"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n" +"the mixnet to the \"server nodes\" which then fetch and store the data according \n" "to Freenet's heuristic distributed data storage algorithms." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:766 msgid "" -"Freenet's functionality is very complementary to I2P's, as Freenet " -"natively \n" -"provides many of the tools for operating medium and high latency systems," -" \n" -"while I2P natively provides the low latency mix network suitable for " -"offering \n" -"adequate anonymity. The logic of separating the mixnet from the " -"censorship-\n" -"resistant distributed data store still seems self-evident from an " -"engineering, \n" -"anonymity, security, and resource allocation perspective, so hopefully " -"the \n" -"Freenet team will pursue efforts in that direction, if not simply reusing" -" \n" +"Freenet's functionality is very complementary to I2P's, as Freenet natively \n" +"provides many of the tools for operating medium and high latency systems, \n" +"while I2P natively provides the low latency mix network suitable for offering \n" +"adequate anonymity. The logic of separating the mixnet from the censorship-\n" +"resistant distributed data store still seems self-evident from an engineering, \n" +"anonymity, security, and resource allocation perspective, so hopefully the \n" +"Freenet team will pursue efforts in that direction, if not simply reusing \n" "(or helping to improve, as necessary) existing mixnets like I2P or Tor." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:777 msgid "" "It is worth mentioning that there has recently been discussion and work \n" -"by the Freenet developers on a \"globally scalable darknet\" using " -"restricted \n" -"routes between peers of various trust. While insufficient information has" -" \n" -"been made publicly available regarding how such a system would operate " -"for \n" -"a full review, from what has been said the anonymity and scalability " -"claims \n" -"seem highly dubious. In particular, the appropriateness for use in " -"hostile \n" -"regimes against state level adversaries has been tremendously overstated," -" \n" -"and any analysis on the implications of resource scarcity upon the " -"scalability \n" -"of the network has seemingly been avoided. Further questions regarding " -"susceptibility \n" -"to traffic analysis, trust and other topics do exist, but a more in-depth" -" \n" -"review of this \"globally scalable darknet\" will have to wait until the " -"Freenet \n" +"by the Freenet developers on a \"globally scalable darknet\" using restricted \n" +"routes between peers of various trust. While insufficient information has \n" +"been made publicly available regarding how such a system would operate for \n" +"a full review, from what has been said the anonymity and scalability claims \n" +"seem highly dubious. In particular, the appropriateness for use in hostile \n" +"regimes against state level adversaries has been tremendously overstated, \n" +"and any analysis on the implications of resource scarcity upon the scalability \n" +"of the network has seemingly been avoided. Further questions regarding susceptibility \n" +"to traffic analysis, trust and other topics do exist, but a more in-depth \n" +"review of this \"globally scalable darknet\" will have to wait until the Freenet \n" "team makes more information available." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:793 msgid "" -"I2P itself doesn't really do much - it simply sends messages to remote " -"destinations \n" -"and receives messages targeting local destinations - most of the " -"interesting \n" -"work goes on at the layers above it. By itself, I2P could be seen as an " -"anonymous \n" -"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming" -" library</a> \n" -"as an implementation of an anonymous and secure TCP layer on top of it. " -"Beyond \n" -"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP " -"proxying \n" -"system for either getting into or out of the I2P network, plus a variety " -"of \n" +"I2P itself doesn't really do much - it simply sends messages to remote destinations \n" +"and receives messages targeting local destinations - most of the interesting \n" +"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n" +"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n" +"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n" +"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n" +"system for either getting into or out of the I2P network, plus a variety of \n" "network applications provide further functionality for end users." msgstr "" @@ -10651,51 +9223,34 @@ msgstr "Biblioteka strumieniowania" #: i2p2www/pages/site/docs/how/tech-intro.html:805 msgid "" -"The I2P streaming library can be viewed as a generic streaming interface " -"(mirroring TCP sockets),\n" -"and the implementation supports a <a " -"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding " -"window protocol</a>\n" -"with several optimizations, to take into account the high delay over I2P." -"\n" +"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n" +"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n" +"with several optimizations, to take into account the high delay over I2P.\n" "Individual streams may adjust the maximum packet size and \n" -"other options, though the default of 4KB compressed seems a reasonable " -"tradeoff \n" -"between the bandwidth costs of retransmitting lost messages and the " -"latency \n" +"other options, though the default of 4KB compressed seems a reasonable tradeoff \n" +"between the bandwidth costs of retransmitting lost messages and the latency \n" "of multiple messages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:815 msgid "" "In addition, in consideration of the relatively high cost of subsequent \n" -"messages, the streaming library's protocol for scheduling and delivering " -"messages \n" -"has been optimized to allow individual messages passed to contain as much" -" \n" -"information as is available. For instance, a small HTTP transaction " -"proxied \n" -"through the streaming library can be completed in a single round trip - " -"the \n" -"first message bundles a SYN, FIN and the small payload (an HTTP request " -"typically \n" -"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many" -" \n" -"HTTP responses fit). While an additional ACK must be transmitted to tell " -"the \n" -"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy " -"can \n" +"messages, the streaming library's protocol for scheduling and delivering messages \n" +"has been optimized to allow individual messages passed to contain as much \n" +"information as is available. For instance, a small HTTP transaction proxied \n" +"through the streaming library can be completed in a single round trip - the \n" +"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n" +"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n" +"HTTP responses fit). While an additional ACK must be transmitted to tell the \n" +"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n" "deliver the full response to the browser immediately." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:828 msgid "" -"On the whole, however, the streaming library bears much resemblance to an" -" \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms \n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK, \n" +"On the whole, however, the streaming library bears much resemblance to an \n" +"abstraction of TCP, with its sliding windows, congestion control algorithms \n" +"(both slow start and congestion avoidance), and general packet behavior (ACK, \n" "SYN, FIN, RST, etc)." msgstr "" @@ -10725,227 +9280,142 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:842 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning" -" \n" -"with advocates across the spectrum of possibilities. However, given I2P's" -" \n" -"inherent demand for secure communication and decentralized operation, the" -" \n" -"traditional DNS-style naming system is clearly out, as are \"majority " -"rules\" \n" -"voting systems. Instead, I2P ships with a generic naming library and a " -"base \n" -"implementation designed to work off a local name to destination mapping, " -"as \n" -"well as an optional add-on application called the \"Address Book\". The " -"address book \n" -"is a web-of-trust-driven secure, distributed, and human readable naming " -"system, \n" -"sacrificing only the call for all human readable names to be globally " -"unique \n" -"by mandating only local uniqueness. While all messages in I2P are " -"cryptographically \n" -"addressed by their destination, different people can have local address " -"book \n" -"entries for \"Alice\" which refer to different destinations. People can " -"still \n" -"discover new names by importing published address books of peers " -"specified \n" -"in their web of trust, by adding in the entries provided through a third " -"party, \n" -"or (if some people organize a series of published address books using a " -"first \n" -"come first serve registration system) people can choose to treat these " -"address books \n" +"Naming within I2P has been an oft-debated topic since the very beginning \n" +"with advocates across the spectrum of possibilities. However, given I2P's \n" +"inherent demand for secure communication and decentralized operation, the \n" +"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n" +"voting systems. Instead, I2P ships with a generic naming library and a base \n" +"implementation designed to work off a local name to destination mapping, as \n" +"well as an optional add-on application called the \"Address Book\". The address book \n" +"is a web-of-trust-driven secure, distributed, and human readable naming system, \n" +"sacrificing only the call for all human readable names to be globally unique \n" +"by mandating only local uniqueness. While all messages in I2P are cryptographically \n" +"addressed by their destination, different people can have local address book \n" +"entries for \"Alice\" which refer to different destinations. People can still \n" +"discover new names by importing published address books of peers specified \n" +"in their web of trust, by adding in the entries provided through a third party, \n" +"or (if some people organize a series of published address books using a first \n" +"come first serve registration system) people can choose to treat these address books \n" "as name servers, emulating traditional DNS." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:862 msgid "" "I2P does not promote the use of DNS-like services though, as the damage \n" -"done by hijacking a site can be tremendous - and insecure destinations " -"have \n" -"no value. DNSsec itself still falls back on registrars and certificate " -"authorities, \n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the \n" -"reply spoofed, as they are encrypted to the destination's public keys, " -"and \n" -"a destination itself is just a pair of public keys and a certificate. " -"DNS-style \n" -"systems on the other hand allow any of the name servers on the lookup " -"path \n" -"to mount simple denial of service and spoofing attacks. Adding on a " -"certificate \n" -"authenticating the responses as signed by some centralized certificate " -"authority \n" -"would address many of the hostile nameserver issues but would leave open " -"replay \n" +"done by hijacking a site can be tremendous - and insecure destinations have \n" +"no value. DNSsec itself still falls back on registrars and certificate authorities, \n" +"while with I2P, requests sent to a destination cannot be intercepted or the \n" +"reply spoofed, as they are encrypted to the destination's public keys, and \n" +"a destination itself is just a pair of public keys and a certificate. DNS-style \n" +"systems on the other hand allow any of the name servers on the lookup path \n" +"to mount simple denial of service and spoofing attacks. Adding on a certificate \n" +"authenticating the responses as signed by some centralized certificate authority \n" +"would address many of the hostile nameserver issues but would leave open replay \n" "attacks as well as hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:876 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness \n" -"of Sybil attacks in anonymous systems - the attacker can simply create an" -" \n" -"arbitrarily high number of peers and \"vote\" with each to take over a " -"given \n" -"name. Proof-of-work methods can be used to make identity non-free, but as" -" \n" -"the network grows the load required to contact everyone to conduct online" -" \n" -"voting is implausible, or if the full network is not queried, different " -"sets \n" +"Voting style naming is dangerous as well, especially given the effectiveness \n" +"of Sybil attacks in anonymous systems - the attacker can simply create an \n" +"arbitrarily high number of peers and \"vote\" with each to take over a given \n" +"name. Proof-of-work methods can be used to make identity non-free, but as \n" +"the network grows the load required to contact everyone to conduct online \n" +"voting is implausible, or if the full network is not queried, different sets \n" "of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:886 msgid "" -"As with the Internet however, I2P is keeping the design and operation of" -" \n" -"a naming system out of the (IP-like) communication layer. The bundled " -"naming \n" -"library includes a simple service provider interface which alternate " -"naming \n" -"systems can plug into, allowing end users to drive what sort of naming " -"tradeoffs \n" +"As with the Internet however, I2P is keeping the design and operation of \n" +"a naming system out of the (IP-like) communication layer. The bundled naming \n" +"library includes a simple service provider interface which alternate naming \n" +"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n" "they prefer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:895 msgid "" -"The old Syndie bundled with I2P has been replaced by the new Syndie which" -"\n" -"is distributed separately. For more information see the <a " -"href=\"http://syndie.i2p2.de/\">Syndie</a>\n" +"The old Syndie bundled with I2P has been replaced by the new Syndie which\n" +"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n" "pages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:901 msgid "" -"Syndie is a safe, anonymous blogging / content publication / content " -"aggregation \n" -"system. It lets you create information, share it with others, and read " -"posts \n" -"from those you're interested in, all while taking into consideration your" -" \n" -"needs for security and anonymity. Rather than building its own content " -"distribution \n" -"network, Syndie is designed to run on top of existing networks, " -"syndicating \n" -"content through I2P Sites, Tor hidden services, Freenet freesites, normal" -" websites, \n" -"usenet newsgroups, email lists, RSS feeds, etc. Data published with " -"Syndie \n" -"is done so as to offer pseudonymous authentication to anyone reading or " -"archiving \n" +"Syndie is a safe, anonymous blogging / content publication / content aggregation \n" +"system. It lets you create information, share it with others, and read posts \n" +"from those you're interested in, all while taking into consideration your \n" +"needs for security and anonymity. Rather than building its own content distribution \n" +"network, Syndie is designed to run on top of existing networks, syndicating \n" +"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n" +"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n" +"is done so as to offer pseudonymous authentication to anyone reading or archiving \n" "it." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:916 msgid "" -"I2PTunnel is probably I2P's most popular and versatile client " -"application, \n" -"allowing generic proxying both into and out of the I2P network. I2PTunnel" -" \n" -"can be viewed as four separate proxying applications - a \"client\" which" -" receives \n" -"inbound TCP connections and forwards them to a given I2P destination, an " -"\"httpclient\" \n" -"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the " -"requests to \n" -"the appropriate I2P destination (after querying the naming service if " -"necessary), \n" -"a \"server\" which receives inbound I2P streaming connections on a " -"destination \n" -"and forwards them to a given TCP host+port, and an \"httpserver\" which " -"extends \n" -"the \"server\" by parsing the HTTP request and responses to allow safer " -"operation. \n" -"There is an additional \"socksclient\" application, but its use is not " -"encouraged \n" +"I2PTunnel is probably I2P's most popular and versatile client application, \n" +"allowing generic proxying both into and out of the I2P network. I2PTunnel \n" +"can be viewed as four separate proxying applications - a \"client\" which receives \n" +"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n" +"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n" +"the appropriate I2P destination (after querying the naming service if necessary), \n" +"a \"server\" which receives inbound I2P streaming connections on a destination \n" +"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n" +"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n" +"There is an additional \"socksclient\" application, but its use is not encouraged \n" "for reasons previously mentioned." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:930 msgid "" -"I2P itself is not an outproxy network - the anonymity and security " -"concerns \n" -"inherent in a mix net which forwards data into and out of the mix have " -"kept \n" -"I2P's design focused on providing an anonymous network which capable of " -"meeting \n" -"the user's needs without requiring external resources. However, the " -"I2PTunnel \n" -"\"httpclient\" application offers a hook for outproxying - if the " -"hostname requested \n" -"doesn't end in \".i2p\", it picks a random destination from a user-" -"provided \n" -"set of outproxies and forwards the request to them. These destinations " -"are \n" -"simply I2PTunnel \"server\" instances run by volunteers who have " -"explicitly \n" -"chosen to run outproxies - no one is an outproxy by default, and running " -"an \n" -"outproxy doesn't automatically tell other people to proxy through you. " -"While \n" -"outproxies do have inherent weaknesses, they offer a simple proof of " -"concept \n" -"for using I2P and provide some functionality under a threat model which " -"may \n" +"I2P itself is not an outproxy network - the anonymity and security concerns \n" +"inherent in a mix net which forwards data into and out of the mix have kept \n" +"I2P's design focused on providing an anonymous network which capable of meeting \n" +"the user's needs without requiring external resources. However, the I2PTunnel \n" +"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n" +"doesn't end in \".i2p\", it picks a random destination from a user-provided \n" +"set of outproxies and forwards the request to them. These destinations are \n" +"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n" +"chosen to run outproxies - no one is an outproxy by default, and running an \n" +"outproxy doesn't automatically tell other people to proxy through you. While \n" +"outproxies do have inherent weaknesses, they offer a simple proof of concept \n" +"for using I2P and provide some functionality under a threat model which may \n" "be sufficient for some users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:946 msgid "" -"I2PTunnel enables most of the applications in use. An \"httpserver\" " -"pointing \n" -"at a webserver lets anyone run their own anonymous website (or \"I2P " -"Site\") \n" -"- a webserver is bundled with I2P for this purpose, but any webserver can" -" \n" -"be used. Anyone may run a \"client\" pointing at one of the anonymously " -"hosted \n" -"IRC servers, each of which are running a \"server\" pointing at their " -"local \n" -"IRCd and communicating between IRCds over their own \"client\" tunnels. " -"End \n" -"users also have \"client\" tunnels pointing at <a " -"href=\"#app.i2pmail\">I2Pmail's</a> \n" -"POP3 and SMTP destinations (which in turn are simply \"server\" instances" -" pointing \n" -"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at " -"I2P's CVS \n" -"server, allowing anonymous development. At times people have even run " -"\"client\" \n" +"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n" +"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n" +"- a webserver is bundled with I2P for this purpose, but any webserver can \n" +"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n" +"IRC servers, each of which are running a \"server\" pointing at their local \n" +"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n" +"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n" +"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n" +"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n" +"server, allowing anonymous development. At times people have even run \"client\" \n" "proxies to access the \"server\" instances pointing at an NNTP server." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:963 msgid "" -"i2p-bt is a port of the mainline python BitTorrent client to run both the" -" \n" -"tracker and peer communication over I2P. Tracker requests are forwarded " -"through \n" -"the eepproxy to I2P Sites specified in the torrent file while tracker " -"responses \n" -"refer to peers by their destination explicitly, allowing i2p-bt to open " -"up \n" -"a <a href=\"#app.streaming\">streaming lib</a> connection to query them " -"for \n" +"i2p-bt is a port of the mainline python BitTorrent client to run both the \n" +"tracker and peer communication over I2P. Tracker requests are forwarded through \n" +"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n" +"refer to peers by their destination explicitly, allowing i2p-bt to open up \n" +"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n" "blocks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:972 msgid "" -"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making" -" \n" -"a few modifications as necessary to strip any anonymity-compromising " -"information \n" -"from the application and to take into consideration the fact that IPs " -"cannot \n" +"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n" +"a few modifications as necessary to strip any anonymity-compromising information \n" +"from the application and to take into consideration the fact that IPs cannot \n" "be used for identifying peers." msgstr "" @@ -10958,10 +9428,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:986 msgid "" -"Bundled with the I2P install, I2PSnark offers a simple anonymous " -"BitTorrent \n" -"client with multitorrent capabilities, exposing all of the functionality " -"through \n" +"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n" +"client with multitorrent capabilities, exposing all of the functionality through \n" "a plain HTML web interface." msgstr "" @@ -10969,9 +9437,7 @@ msgstr "" #, python-format msgid "" "Robert is a Bittorrent client written in Python.\n" -"It is hosted on <a " -"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- " -"TODO: expand -->" +"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1003 @@ -10983,12 +9449,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1011 msgid "" -"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to" -" \n" -"run entirely on top of I2P. While it has disabled some of Phex's " -"functionality, \n" -"such as integration with Gnutella webcaches, the basic file sharing and " -"chatting \n" +"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n" +"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n" +"such as integration with Gnutella webcaches, the basic file sharing and chatting \n" "system is fully functional." msgstr "" @@ -11001,62 +9464,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1029 #, python-format msgid "" -"I2Pmail is more a service than an application - postman offers both " -"internal \n" -"and external email with POP3 and SMTP service through I2PTunnel instances" -" \n" -"accessing a series of components developed with mastiejaner, allowing " -"people \n" -"to use their preferred mail clients to send and receive mail " -"pseudonymously. \n" -"However, as most mail clients expose substantial identifying information," -" \n" -"I2P bundles susi23's web based susimail client which has been built " -"specifically \n" -"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers " -"transparent \n" -"virus filtering as well as denial of service prevention with hashcash " -"augmented \n" -"quotas. In addition, each user has control of their batching strategy " -"prior \n" -"to delivery through the mail.i2p outproxies, which are separate from the " -"mail.i2p \n" -"SMTP and POP3 servers - both the outproxies and inproxies communicate " -"with \n" -"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising " -"those \n" -"non-anonymous locations does not give access to the mail accounts or " -"activity \n" -"patterns of the user. At the moment the developers work on a " -"decentralized \n" -"mailsystem, called \"v2mail\". More information can be found on the I2P " -"Site \n" +"I2Pmail is more a service than an application - postman offers both internal \n" +"and external email with POP3 and SMTP service through I2PTunnel instances \n" +"accessing a series of components developed with mastiejaner, allowing people \n" +"to use their preferred mail clients to send and receive mail pseudonymously. \n" +"However, as most mail clients expose substantial identifying information, \n" +"I2P bundles susi23's web based susimail client which has been built specifically \n" +"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n" +"virus filtering as well as denial of service prevention with hashcash augmented \n" +"quotas. In addition, each user has control of their batching strategy prior \n" +"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n" +"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n" +"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n" +"non-anonymous locations does not give access to the mail accounts or activity \n" +"patterns of the user. At the moment the developers work on a decentralized \n" +"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n" "<a href=\"http://%(postman)s/\">%(postman)s</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1051 msgid "" -"I2P-Bote is a distributed e-mail application. It does not use the " -"traditional\n" -"e-mail concept of sending an e-mail to a server and retrieving it from a " -"server.\n" +"I2P-Bote is a distributed e-mail application. It does not use the traditional\n" +"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n" "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n" -"One user can push a mail into the DHT, while another can request the " -"e-mail from the DHT.\n" -"And all the mails sent within the I2P-Bote network are automatically " -"encrypted end-to-end. <br>\n" -"Furthermore, I2P-Bote offers a remailer function on top of I2P, for " -"increased high-latency anonymity." +"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n" +"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n" +"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1061 msgid "" -"I2P-Messenger is an end-to-end encrypted serverless communication " -"application.\n" -"For communication between two users, they need to give each other their " -"destination keys, to allow the other to connect.\n" -"It supports file transfer and has a search for other users, based on " -"Seedless." +"I2P-Messenger is an end-to-end encrypted serverless communication application.\n" +"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n" +"It supports file transfer and has a search for other users, based on Seedless." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:2 @@ -11206,18 +9646,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" -"to find out information you don't want them to know?\" - who you are, " -"where\n" -"you are located, who you communicate with, or even when you communicate." -" \n" -"\"Perfect\" anonymity is not a useful concept here - software will not " -"make \n" -"you indistinguishable from people that don't use computers or who are not" -" on\n" -"the Internet. Instead, we are working to provide sufficient anonymity to" -" meet the\n" -"real needs of whomever we can - from those simply browsing websites, to " -"those exchanging\n" +"to find out information you don't want them to know?\" - who you are, where\n" +"you are located, who you communicate with, or even when you communicate. \n" +"\"Perfect\" anonymity is not a useful concept here - software will not make \n" +"you indistinguishable from people that don't use computers or who are not on\n" +"the Internet. Instead, we are working to provide sufficient anonymity to meet the\n" +"real needs of whomever we can - from those simply browsing websites, to those exchanging\n" "data, to those fearful of discovery by powerful organizations or states." msgstr "" @@ -11225,17 +9659,14 @@ msgstr "" msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" -"answering that question by exploring how I2P operates under various " -"attacks\n" +"answering that question by exploring how I2P operates under various attacks\n" "so that you may decide whether it meets your needs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" -"We welcome further research and analysis on I2P's resistance to the " -"threats described below.\n" -"More review of existing literature (much of it focused on Tor) and " -"original\n" +"We welcome further research and analysis on I2P's resistance to the threats described below.\n" +"More review of existing literature (much of it focused on Tor) and original\n" "work focused on I2P is needed." msgstr "" @@ -11247,69 +9678,52 @@ msgstr "" #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" -"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in" -" mind when \n" +"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n" "reviewing related literature:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:102 msgid "" -"<b>I2P is a free route mixnet</b> - the message creator explicitly " -"defines the\n" -"path that messages will be sent out (the outbound tunnel), and the " -"message \n" -"recipient explicitly defines the path that messages will be received on " -"(the\n" +"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n" +"path that messages will be sent out (the outbound tunnel), and the message \n" +"recipient explicitly defines the path that messages will be received on (the\n" "inbound tunnel)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:108 msgid "" -"<b>I2P has no official entry and exit points</b> - all peers fully " -"participate in the \n" +"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n" "mix, and there are no network layer in- or out-proxies (however, at the \n" "application layer, a few proxies do exist)" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:113 msgid "" -"<b>I2P is fully distributed</b> - there are no central controls or " -"authorities.\n" -"One could modify some routers to operate mix cascades (building tunnels " -"and giving\n" -"out the keys necessary to control the forwarding at the tunnel endpoint) " -"or directory \n" -"based profiling and selection, all without breaking compatibility with " -"the rest of \n" -"the network, but doing so is of course not necessary (and may even harm " -"one's\n" +"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n" +"One could modify some routers to operate mix cascades (building tunnels and giving\n" +"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n" +"based profiling and selection, all without breaking compatibility with the rest of \n" +"the network, but doing so is of course not necessary (and may even harm one's\n" "anonymity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:123 #, python-format msgid "" -"We have documented plans to implement <a " -"href=\"%(todo)s#stop\">nontrivial delays</a>\n" +"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n" "and <a href=\"%(todo)s#batching\">batching strategies</a> \n" -"whose existence is only known to the particular hop or tunnel gateway " -"that \n" -"receives the message, allowing a mostly low latency mixnet to provide " -"cover \n" +"whose existence is only known to the particular hop or tunnel gateway that \n" +"receives the message, allowing a mostly low latency mixnet to provide cover \n" "traffic for higher latency communication (e.g. email).\n" -"However we are aware that significant delays are required to provide " -"meaningful\n" -"protection, and that implementation of such delays will be a significant " -"challenge.\n" -"It is not clear at this time whether we will actually implement these " -"delay features." +"However we are aware that significant delays are required to provide meaningful\n" +"protection, and that implementation of such delays will be a significant challenge.\n" +"It is not clear at this time whether we will actually implement these delay features." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:134 msgid "" "In theory, routers along the message path may inject an \n" -"arbitrary number of hops before forwarding the message to the next peer, " -"though\n" +"arbitrary number of hops before forwarding the message to the next peer, though\n" "the current implementation does not." msgstr "" @@ -11323,8 +9737,7 @@ msgid "" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n" "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n" -"Our design benefits substantially from the research published around that" -" time.\n" +"Our design benefits substantially from the research published around that time.\n" "I2P uses several onion routing techniques, so we continue to benefit\n" "from the significant academic interest in Tor." msgstr "" @@ -11332,12 +9745,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:152 msgid "" "Taking from the attacks and analysis put forth in the \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " -"literature</a> (largely \n" -"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: " -"Protocols, Attacks, Design \n" -"Issues and Open Problems</a>), the following briefly describes a wide " -"variety \n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n" +"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n" +"Issues and Open Problems</a>), the following briefly describes a wide variety \n" "of attacks as well as many of I2Ps defenses. We update\n" "this list to include new attacks as they are identified." msgstr "" @@ -11365,66 +9775,46 @@ msgstr "" msgid "" "The\n" "<a href=\"%(comparisons)s\">network comparisons</a> and\n" -"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also " -"be helpful\n" +"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n" "to review." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:210 msgid "" -"A brute force attack can be mounted by a global passive or active " -"adversary, \n" -"watching all the messages pass between all of the nodes and attempting to" -" correlate\n" -"which message follows which path. Mounting this attack against I2P " -"should be \n" -"nontrivial, as all peers in the network are frequently sending messages " -"(both\n" -"end to end and network maintenance messages), plus an end to end message " -"changes\n" -"size and data along its path. In addition, the external adversary does " -"not have\n" -"access to the messages either, as inter-router communication is both " -"encrypted\n" -"and streamed (making two 1024 byte messages indistinguishable from one " -"2048 byte\n" +"A brute force attack can be mounted by a global passive or active adversary, \n" +"watching all the messages pass between all of the nodes and attempting to correlate\n" +"which message follows which path. Mounting this attack against I2P should be \n" +"nontrivial, as all peers in the network are frequently sending messages (both\n" +"end to end and network maintenance messages), plus an end to end message changes\n" +"size and data along its path. In addition, the external adversary does not have\n" +"access to the messages either, as inter-router communication is both encrypted\n" +"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n" "message)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:222 msgid "" -"However, a powerful attacker can use brute force to detect trends - if " -"they \n" -"can send 5GB to an I2P destination and monitor everyone's network " -"connection,\n" -"they can eliminate all peers who did not receive 5GB of data. Techniques" -" to \n" +"However, a powerful attacker can use brute force to detect trends - if they \n" +"can send 5GB to an I2P destination and monitor everyone's network connection,\n" +"they can eliminate all peers who did not receive 5GB of data. Techniques to \n" "defeat this attack exist, but may be prohibitively expensive (see: \n" -"<a " -"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s " -"mimics\n" -"or constant rate traffic). Most users are not concerned with this " -"attack, as \n" -"the cost of mounting it are extreme (and often require illegal activity)." -" \n" +"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n" +"or constant rate traffic). Most users are not concerned with this attack, as \n" +"the cost of mounting it are extreme (and often require illegal activity). \n" "However, the attack is still possible, for example by an observer at\n" "a large ISP or an Internet exchange point.\n" "Those who want to defend against it \n" "would want to take appropriate countermeasures, such as\n" -"setting low bandwidth limits, and using unpublished or encrypted " -"leasesets for I2P Sites.\n" -"Other countermeasures, such as nontrivial delays and restricted routes, " -"are\n" +"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n" +"Other countermeasures, such as nontrivial delays and restricted routes, are\n" "not currently implemented." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:239 #, python-format msgid "" -"As a partial defense against a single router or group of routers trying " -"to route all the network's traffic,\n" -"routers contain limits as to how many tunnels can be routed through a " -"single peer.\n" +"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n" +"routers contain limits as to how many tunnels can be routed through a single peer.\n" "As the network grows, these limits are subject to further adjustment.\n" "Other mechanisms for peer rating, selection and avoidance\n" "are discussed on the\n" @@ -11433,51 +9823,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:254 msgid "" -"I2P's messages are unidirectional and do not necessarily imply that a " -"reply\n" +"I2P's messages are unidirectional and do not necessarily imply that a reply\n" "will be sent. However, applications on top of I2P will most likely have\n" -"recognizable patterns within the frequency of their messages - for " -"instance, an \n" -"HTTP request will be a small message with a large sequence of reply " -"messages \n" -"containing the HTTP response. Using this data as well as a broad view of" -" the \n" -"network topology, an attacker may be able to disqualify some links as " -"being too \n" +"recognizable patterns within the frequency of their messages - for instance, an \n" +"HTTP request will be a small message with a large sequence of reply messages \n" +"containing the HTTP response. Using this data as well as a broad view of the \n" +"network topology, an attacker may be able to disqualify some links as being too \n" "slow to have passed the message along." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:264 msgid "" -"This sort of attack is powerful, but its applicability to I2P is non " -"obvious,\n" -"as the variation on message delays due to queuing, message processing, " -"and \n" -"throttling will often meet or exceed the time of passing a message along " -"a \n" -"single link - even when the attacker knows that a reply will be sent as " -"soon as\n" -"the message is received. There are some scenarios which will expose " -"fairly \n" -"automatic replies though - the streaming library does (with the SYN+ACK) " -"as does the \n" -"message mode of guaranteed delivery (with the " -"DataMessage+DeliveryStatusMessage)." +"This sort of attack is powerful, but its applicability to I2P is non obvious,\n" +"as the variation on message delays due to queuing, message processing, and \n" +"throttling will often meet or exceed the time of passing a message along a \n" +"single link - even when the attacker knows that a reply will be sent as soon as\n" +"the message is received. There are some scenarios which will expose fairly \n" +"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n" +"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:274 #, python-format msgid "" -"Without protocol scrubbing or higher latency, global active adversaries " -"can \n" -"gain substantial information. As such, people concerned with these " -"attacks could\n" -"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> or \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol " -"scrubbing, or\n" -"other advanced tunnel routing <a " -"href=\"%(todo)s#batching\">techniques</a>,\n" +"Without protocol scrubbing or higher latency, global active adversaries can \n" +"gain substantial information. As such, people concerned with these attacks could\n" +"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n" +"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n" "but these are unimplemented in I2P." msgstr "" @@ -11490,25 +9863,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:291 msgid "" -"Intersection attacks against low latency systems are extremely powerful -" -"\n" -"periodically make contact with the target and keep track of what peers " -"are on\n" +"Intersection attacks against low latency systems are extremely powerful -\n" +"periodically make contact with the target and keep track of what peers are on\n" "the network. Over time, as node churn occurs the attacker will gain \n" -"significant information about the target by simply intersecting the sets " -"of\n" -"peers that are online when a message successfully goes through. The cost" -" of \n" -"this attack is significant as the network grows, but may be feasible in " -"some\n" +"significant information about the target by simply intersecting the sets of\n" +"peers that are online when a message successfully goes through. The cost of \n" +"this attack is significant as the network grows, but may be feasible in some\n" "scenarios." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:301 #, python-format msgid "" -"In summary, if an attacker is at both ends of your tunnel at the same " -"time,\n" +"In summary, if an attacker is at both ends of your tunnel at the same time,\n" "he may be successful.\n" "I2P does not have a full defense to this for low latency communication.\n" "This is an inherent weakness of low-latency onion routing.\n" @@ -11527,8 +9894,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:316 #, python-format msgid "" -"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " -"small group that changes slowly" +"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small " +"group that changes slowly" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:319 @@ -11551,8 +9918,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:332 msgid "" "Even in total, these defenses are not a complete solution.\n" -"Also, we have made some design choices that may significantly increase " -"our vulnerability:" +"Also, we have made some design choices that may significantly increase our vulnerability:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:337 @@ -11561,8 +9927,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" -"We use tunnel pools comprised of several tunnels, and traffic can shift " -"from tunnel to tunnel." +"We use tunnel pools comprised of several tunnels, and traffic can shift from" +" tunnel to tunnel." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:343 @@ -11572,8 +9938,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:346 msgid "" "Tunnel lengths are configurable.\n" -"While 3-hop tunnels are recommended for full protection, several " -"applications and\n" +"While 3-hop tunnels are recommended for full protection, several applications and\n" "services use 2-hop tunnels by default." msgstr "" @@ -11581,14 +9946,10 @@ msgstr "" #, python-format msgid "" "In the future, it could\n" -"for peers who can afford significant delays (per <a " -"href=\"%(todo)s#stop\">nontrivial\n" -"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). " -"In addition,\n" -"this is only relevant for destinations that other people know about - a " -"private\n" -"group whose destination is only known to trusted peers does not have to " -"worry,\n" +"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n" +"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). In addition,\n" +"this is only relevant for destinations that other people know about - a private\n" +"group whose destination is only known to trusted peers does not have to worry,\n" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" @@ -11599,8 +9960,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" -"There are a whole slew of denial of service attacks available against " -"I2P,\n" +"There are a whole slew of denial of service attacks available against I2P,\n" "each with different costs and consequences:" msgstr "" @@ -11623,10 +9983,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:387 msgid "" "Provide easy configuration options so that users may increase their\n" -"contribution (share percentage) to the network. Display easy-to-" -"understand\n" -"metrics such as \"share ratio\" so that users may see what they are " -"contributing." +"contribution (share percentage) to the network. Display easy-to-understand\n" +"metrics such as \"share ratio\" so that users may see what they are contributing." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:392 @@ -11638,29 +9996,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:399 #, python-format msgid "" -"<b>Starvation attack:</b> A hostile user may attempt to harm the network " -"by\n" -"creating a significant number of peers in the network who are not " -"identified as\n" -"being under control of the same entity (as with Sybil). These nodes then" -" \n" -"decide not to provide any resources to the network, causing existing " -"peers \n" -"to search through a larger network database or request more tunnels than" -" \n" +"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n" +"creating a significant number of peers in the network who are not identified as\n" +"being under control of the same entity (as with Sybil). These nodes then \n" +"decide not to provide any resources to the network, causing existing peers \n" +"to search through a larger network database or request more tunnels than \n" "should be necessary. \n" -"Alternatively, the nodes may provide intermittent service by periodically" -"\n" +"Alternatively, the nodes may provide intermittent service by periodically\n" "dropping selected traffic, or refusing connections to certain peers.\n" -"This behavior may be indistinguishable from that of a heavily-loaded or " -"failing node.\n" -"I2P addresses these issues by maintaining <a " -"href=\"%(peerselection)s\">profiles</a> on the \n" +"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n" +"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n" "peers, attempting to identify underperforming ones and simply ignoring \n" "them, or using them rarely.\n" "We have significantly enhanced the\n" -"ability to recognize and avoid troublesome peers; however there are still" -"\n" +"ability to recognize and avoid troublesome peers; however there are still\n" "significant efforts required in this area." msgstr "" @@ -11668,30 +10017,18 @@ msgstr "" #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" -"a peer, a destination, or a tunnel. Network and peer flooding is " -"possible,\n" -"and I2P does nothing to prevent standard IP layer flooding. The flooding" -" of\n" -"a destination with messages by sending a large number to the target's " -"various\n" -"inbound tunnel gateways is possible, but the destination will know this " -"both\n" -"by the contents of the message and because the tunnel's tests will fail." -" The\n" -"same goes for flooding just a single tunnel. I2P has no defenses for a " -"network\n" -"flooding attack. For a destination and tunnel flooding attack, the " -"target\n" -"identifies which tunnels are unresponsive and builds new ones. New code " -"could\n" -"also be written to add even more tunnels if the client wishes to handle " -"the\n" -"larger load. If, on the other hand, the load is more than the client can" -"\n" -"deal with, they can instruct the tunnels to throttle the number of " -"messages or\n" -"bytes they should pass on (once the <a " -"href=\"%(todo)s#batching\">advanced tunnel\n" +"a peer, a destination, or a tunnel. Network and peer flooding is possible,\n" +"and I2P does nothing to prevent standard IP layer flooding. The flooding of\n" +"a destination with messages by sending a large number to the target's various\n" +"inbound tunnel gateways is possible, but the destination will know this both\n" +"by the contents of the message and because the tunnel's tests will fail. The\n" +"same goes for flooding just a single tunnel. I2P has no defenses for a network\n" +"flooding attack. For a destination and tunnel flooding attack, the target\n" +"identifies which tunnels are unresponsive and builds new ones. New code could\n" +"also be written to add even more tunnels if the client wishes to handle the\n" +"larger load. If, on the other hand, the load is more than the client can\n" +"deal with, they can instruct the tunnels to throttle the number of messages or\n" +"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n" "operation</a> is implemented)." msgstr "" @@ -11699,13 +10036,10 @@ msgstr "" msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" -"operation, and a hostile attacker could use these to flood that peer with" -"\n" -"a large number of them in an attempt to overload the CPU. Both using " -"good \n" +"operation, and a hostile attacker could use these to flood that peer with\n" +"a large number of them in an attempt to overload the CPU. Both using good \n" "engineering practices and potentially requiring nontrivial certificates \n" -"(e.g. HashCash) to be attached to these expensive requests should " -"mitigate\n" +"(e.g. HashCash) to be attached to these expensive requests should mitigate\n" "the issue, though there may be room for an attacker to exploit various\n" "bugs in the implementation." msgstr "" @@ -11713,8 +10047,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:451 #, python-format msgid "" -"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " -"network by\n" +"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n" "becoming a floodfill router. The current defenses against unreliable,\n" "intermittent, or malicious floodfill routers are poor.\n" "A floodfill router may provide bad or no response to lookups, and\n" @@ -11729,134 +10062,86 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:470 #, python-format msgid "" -"Tagging attacks - modifying a message so that it can later be identified" -" \n" -"further along the path - are by themselves impossible in I2P, as messages" -" \n" -"passed through tunnels are signed. However, if an attacker is the " -"inbound \n" -"tunnel gateway as well as a participant further along in that tunnel, " -"with\n" -"collusion they can identify the fact that they are in the same tunnel " -"(and \n" -"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and " -"other updates,\n" -"colluding peers within the same tunnel can recognize that fact without " -"any \n" -"effort). An attacker in an outbound tunnel and any part of an inbound " -"tunnel cannot \n" -"collude however, as the tunnel encryption pads and modifies the data " -"separately\n" -"for the inbound and outbound tunnels. External attackers cannot do " -"anything,\n" +"Tagging attacks - modifying a message so that it can later be identified \n" +"further along the path - are by themselves impossible in I2P, as messages \n" +"passed through tunnels are signed. However, if an attacker is the inbound \n" +"tunnel gateway as well as a participant further along in that tunnel, with\n" +"collusion they can identify the fact that they are in the same tunnel (and \n" +"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n" +"colluding peers within the same tunnel can recognize that fact without any \n" +"effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n" +"collude however, as the tunnel encryption pads and modifies the data separately\n" +"for the inbound and outbound tunnels. External attackers cannot do anything,\n" "as the links are encrypted and messages signed." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:488 msgid "" -"Partitioning attacks - finding ways to segregate (technically or " -"analytically)\n" -"the peers in a network - are important to keep in mind when dealing with " -"a \n" -"powerful adversary, since the size of the network plays a key role in " -"determining\n" -"your anonymity. Technical partitioning by cutting links between peers to" -" create\n" -"fragmented networks is addressed by I2P's built in network database, " -"which \n" -"maintains statistics about various peers so as to allow any existing " -"connections\n" -"to other fragmented sections to be exploited so as to heal the network. " -"However,\n" -"if the attacker does disconnect all links to uncontrolled peers, " -"essentially\n" -"isolating the target, no amount of network database healing will fix it." -" At\n" -"that point, the only thing the router can hope to do is notice that a " -"significant\n" -"number of previously reliable peers have become unavailable and alert the" -" client\n" -"that it is temporarily disconnected (this detection code is not " -"implemented at\n" +"Partitioning attacks - finding ways to segregate (technically or analytically)\n" +"the peers in a network - are important to keep in mind when dealing with a \n" +"powerful adversary, since the size of the network plays a key role in determining\n" +"your anonymity. Technical partitioning by cutting links between peers to create\n" +"fragmented networks is addressed by I2P's built in network database, which \n" +"maintains statistics about various peers so as to allow any existing connections\n" +"to other fragmented sections to be exploited so as to heal the network. However,\n" +"if the attacker does disconnect all links to uncontrolled peers, essentially\n" +"isolating the target, no amount of network database healing will fix it. At\n" +"that point, the only thing the router can hope to do is notice that a significant\n" +"number of previously reliable peers have become unavailable and alert the client\n" +"that it is temporarily disconnected (this detection code is not implemented at\n" "the moment)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:504 #, python-format msgid "" -"Partitioning the network analytically by looking for differences in how " -"routers \n" -"and destinations behave and grouping them accordingly is also a very " -"powerful\n" -"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a>" -" the network\n" -"database will know when a particular destination has 5 inbound tunnels in" -" their\n" -"LeaseSet while others have only 2 or 3, allowing the adversary to " -"potentially \n" -"partition clients by the number of tunnels selected. Another partition " -"is \n" -"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> and \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel " -"gateways and the\n" -"particular hops with non-zero delays will likely stand out. However, " -"this data\n" -"is only exposed to those specific hops, so to partition effectively on " -"that \n" -"matter, the attacker would need to control a significant portion of the " -"network\n" -"(and still that would only be a probabilistic partition, as they wouldn't" -" know\n" +"Partitioning the network analytically by looking for differences in how routers \n" +"and destinations behave and grouping them accordingly is also a very powerful\n" +"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n" +"database will know when a particular destination has 5 inbound tunnels in their\n" +"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n" +"partition clients by the number of tunnels selected. Another partition is \n" +"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n" +"particular hops with non-zero delays will likely stand out. However, this data\n" +"is only exposed to those specific hops, so to partition effectively on that \n" +"matter, the attacker would need to control a significant portion of the network\n" +"(and still that would only be a probabilistic partition, as they wouldn't know\n" "which other tunnels or messages have those delays)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:520 #, python-format msgid "" -"Also discussed on the <a href=\"%(netdb)s#threat\">network database " -"page</a> (bootstrap attack)." +"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>" +" (bootstrap attack)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:528 msgid "" -"The predecessor attack is passively gathering statistics in an attempt to" -" see\n" -"what peers are 'close' to the destination by participating in their " -"tunnels and\n" -"keeping track of the previous or next hop (for outbound or inbound " -"tunnels, \n" -"respectively). Over time, using a perfectly random sample of peers and " -"random\n" -"ordering, an attacker would be able to see which peer shows up as " -"'closer' \n" -"statistically more than the rest, and that peer would in turn be where " -"the\n" +"The predecessor attack is passively gathering statistics in an attempt to see\n" +"what peers are 'close' to the destination by participating in their tunnels and\n" +"keeping track of the previous or next hop (for outbound or inbound tunnels, \n" +"respectively). Over time, using a perfectly random sample of peers and random\n" +"ordering, an attacker would be able to see which peer shows up as 'closer' \n" +"statistically more than the rest, and that peer would in turn be where the\n" "target is located." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:538 #, python-format msgid "" -"I2P avoids this in four ways: first, the peers selected to participate in" -"\n" -"tunnels are not randomly sampled throughout the network - they are " -"derived from\n" -"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which " -"breaks them\n" -"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict " -"ordering</a> of peers\n" -"in a tunnel, the fact that a peer shows up more frequently does not mean " -"they're\n" -"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted " -"tunnel length</a>\n" +"I2P avoids this in four ways: first, the peers selected to participate in\n" +"tunnels are not randomly sampled throughout the network - they are derived from\n" +"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n" +"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n" +"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n" +"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n" "(not enabled by default)\n" "even 0 hop tunnels can provide plausible deniability as the occasional \n" "variation of the gateway will look like normal tunnels. Fourth, with \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> " -"(unimplemented), only the peer with\n" -"a restricted connection to the target will ever contact the target, while" -" \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n" +"a restricted connection to the target will ever contact the target, while \n" "attackers will merely run into that gateway." msgstr "" @@ -11894,8 +10179,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" -"Network growth will make it more difficult to obtain a given proportion " -"of the network" +"Network growth will make it more difficult to obtain a given proportion of " +"the network" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:590 @@ -11904,10 +10189,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:593 msgid "" -"\"Hidden mode\", which prevents a router from publishing its information " -"to the netDb,\n" -"(but also prevents it from relaying data) is not widely used now but " -"could be." +"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n" +"(but also prevents it from relaying data) is not widely used now but could be." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:599 @@ -11915,19 +10198,15 @@ msgstr "" msgid "" "In future implementations,\n" "<a href=\"%(todo)s#nat\">basic</a> and \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted " -"routes,\n" -"this attack loses much of its power, as the \"hidden\" peers do not " -"publish their\n" -"contact addresses in the network database - only the tunnels through " -"which \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n" +"this attack loses much of its power, as the \"hidden\" peers do not publish their\n" +"contact addresses in the network database - only the tunnels through which \n" "they can be reached (as well as their public keys, etc)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:608 msgid "" -"In the future, routers could use GeoIP to identify if they are in a " -"particular\n" +"In the future, routers could use GeoIP to identify if they are in a particular\n" "country where identification as an I2P node would be risky.\n" "In that case, the router could automatically enable hidden mode, or\n" "enact other restricted route methods." @@ -11938,10 +10217,8 @@ msgstr "" msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" "or state-level firewall could identify that a computer is running I2P.\n" -"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically " -"designed\n" -"to hide that a computer is running I2P. However, several design decisions" -" made\n" +"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n" +"to hide that a computer is running I2P. However, several design decisions made\n" "in the design of the\n" "<a href=\"%(transport)s\">transport layer and protocols</a>\n" "make it somewhat difficult to identify I2P traffic:" @@ -11957,8 +10234,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:636 msgid "" -"DH key exchange with no protocol bytes or other unencrypted constant " -"fields" +"DH key exchange with no protocol bytes or other unencrypted constant fields" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:639 @@ -11967,14 +10243,13 @@ msgid "" "Simultaneous use of both\n" "<a href=\"%(ntcp)s\">TCP</a> and\n" "<a href=\"%(ssu)s\">UDP</a> transports.\n" -"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to" -" track." +"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:647 msgid "" -"In the near future, we plan to directly address traffic analysis issues " -"by further obfuscation of I2P transport protocols, possibly including:" +"In the near future, we plan to directly address traffic analysis issues by " +"further obfuscation of I2P transport protocols, possibly including:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:651 @@ -11991,20 +10266,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" -"Development of additional transport methods that mimic SSL or other " -"common protocols" +"Development of additional transport methods that mimic SSL or other common " +"protocols" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "" -"Review of padding strategies at higher layers to see how they affect " -"packet sizes at the transport layer" +"Review of padding strategies at higher layers to see how they affect packet " +"sizes at the transport layer" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:663 msgid "" -"Review of methods implemented by various state-level firewalls to block " -"Tor" +"Review of methods implemented by various state-level firewalls to block Tor" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:666 @@ -12020,36 +10294,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:680 msgid "" -"Sybil describes a category of attacks where the adversary creates " -"arbitrarily\n" +"Sybil describes a category of attacks where the adversary creates arbitrarily\n" "large numbers of colluding nodes and uses the increased numbers to help \n" -"mounting other attacks. For instance, if an attacker is in a network " -"where peers\n" -"are selected randomly and they want an 80% chance to be one of those " -"peers, they\n" -"simply create five times the number of nodes that are in the network and " -"roll \n" -"the dice. When identity is free, Sybil can be a very potent technique " -"for a \n" -"powerful adversary. The primary technique to address this is simply to " -"make \n" -"identity 'non free' - <a " -"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" +"mounting other attacks. For instance, if an attacker is in a network where peers\n" +"are selected randomly and they want an 80% chance to be one of those peers, they\n" +"simply create five times the number of nodes that are in the network and roll \n" +"the dice. When identity is free, Sybil can be a very potent technique for a \n" +"powerful adversary. The primary technique to address this is simply to make \n" +"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" "(among others) uses the fact that IP addresses are limited, while \n" "IIP used \n" -"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for " -"creating a new\n" -"identity. We currently have not implemented any particular technique to " -"address\n" +"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n" +"identity. We currently have not implemented any particular technique to address\n" "Sybil, but do include placeholder certificates in the router's and \n" -"destination's data structures which can contain a HashCash certificate of" -" \n" -"appropriate value when necessary (or some other certificate proving " -"scarcity)." +"destination's data structures which can contain a HashCash certificate of \n" +"appropriate value when necessary (or some other certificate proving scarcity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:698 -msgid "Requiring HashCash Certificates in various places has two major problems:" +msgid "" +"Requiring HashCash Certificates in various places has two major problems:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:702 @@ -12059,17 +10323,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:705 msgid "" "The classic HashCash problem -\n" -"selecting HashCash values that are meaningful proofs of work on high-end " -"machines,\n" +"selecting HashCash values that are meaningful proofs of work on high-end machines,\n" "while still being feasible on low-end machines such as mobile devices." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:712 msgid "" -"Various limitations on the number of routers in a given IP range restrict" -"\n" -"the vulnerability to attackers that don't have the ability to put " -"machines\n" +"Various limitations on the number of routers in a given IP range restrict\n" +"the vulnerability to attackers that don't have the ability to put machines\n" "in several IP blocks.\n" "However, this is not a meaningful defense against a powerful adversary." msgstr "" @@ -12091,22 +10352,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:733 #, python-format msgid "" -"By refusing to accept or forward tunnel build requests, except to a " -"colluding peer, a router could ensure\n" +"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n" "that a tunnel is formed wholly from its set of colluding routers.\n" -"The chances of success are enhanced if there is a large number of " -"colluding routers,\n" +"The chances of success are enhanced if there is a large number of colluding routers,\n" "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n" "This is somewhat mitigated by our\n" -"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor " -"the performance\n" +"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n" "of peers.\n" "However, this is a powerful attack as the number of routers approaches\n" "<i>f</i> = 0.2, or 20% malicious nodes, as specifed in the paper.\n" -"The malicous routers could also maintain connections to the target router" -" and provide\n" -"excellent forwarding bandwidth for traffic over those connections, in an " -"attempt\n" +"The malicous routers could also maintain connections to the target router and provide\n" +"excellent forwarding bandwidth for traffic over those connections, in an attempt\n" "to manipulate the profiles managed by the target and appear attractive.\n" "Further research and defenses may be necessary." msgstr "" @@ -12115,38 +10371,29 @@ msgstr "" #, python-format msgid "" "We use strong cryptography with long keys, and\n" -"we assume the security of the industry-standard cryptographic primitives " -"used in I2P, as documented\n" +"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n" "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n" "Security features include the immediate detection of \n" -"altered messages along the path, the inability to decrypt messages not " -"addressed to you,\n" +"altered messages along the path, the inability to decrypt messages not addressed to you,\n" "and defense against man-in-the-middle attacks.\n" -"The key sizes chosen in 2003 were quite conservative at the time, and are" -" still longer than\n" -"those used in <a href=\"https://torproject.org/\">other anonymity " -"networks</a>.\n" +"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n" +"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n" "We don't think the current key lengths are our biggest weakness,\n" "especially for traditional, non-state-level adversaries;\n" "bugs and the small size of the network are much more worrisome.\n" -"Of course, all cryptographic algorithms eventually become obsolete due to" -"\n" -"the advent of faster processors, cryptographic research, and advancements" -" in\n" +"Of course, all cryptographic algorithms eventually become obsolete due to\n" +"the advent of faster processors, cryptographic research, and advancements in\n" "methods such as rainbow tables, clusters of video game hardware, etc.\n" -"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys" -" or change\n" +"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n" "shared secret values while maintaining backward compatibility." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:773 #, python-format msgid "" -"Upgrading the various data structures and protocols to support longer " -"keys\n" +"Upgrading the various data structures and protocols to support longer keys\n" "will have to be tackled eventually, and this will be a\n" -"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be " -"for \n" +"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n" "<a href=\"https://torproject.org/\">others</a>.\n" "Hopefully, through careful planning, we can minimize the disruption, and\n" "implement mechanisms to make it easier for future transitions." @@ -12155,12 +10402,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:782 msgid "" "In the future, several I2P protocols and data structures\n" -"support securely padding messages to arbitrary sizes, so messages could " -"be made constant\n" -"size or garlic messages could be modified randomly so that some cloves " -"appear to contain\n" -"more subcloves than they actually do. At the moment, however, garlic, " -"tunnel, and \n" +"support securely padding messages to arbitrary sizes, so messages could be made constant\n" +"size or garlic messages could be modified randomly so that some cloves appear to contain\n" +"more subcloves than they actually do. At the moment, however, garlic, tunnel, and \n" "end to end messages include simple random padding." msgstr "" @@ -12174,18 +10418,14 @@ msgid "" "In addition to the floodfill DOS attacks described\n" "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n" "to learn about network participants, due to their role\n" -"in the netDb, and the high frequency of communication with those " -"participants.\n" -"This is somewhat mitigated because floodfill routers only manage a " -"portion\n" +"in the netDb, and the high frequency of communication with those participants.\n" +"This is somewhat mitigated because floodfill routers only manage a portion\n" "of the total keyspace, and the keyspace rotates daily, as explained \n" "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n" -"The specific mechanisms by which routers communicate with floodfills have" -" been\n" +"The specific mechanisms by which routers communicate with floodfills have been\n" "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n" "However, these threats should be studied further.\n" -"The specific potential threats and corresponding defenses are a topic for" -" future research." +"The specific potential threats and corresponding defenses are a topic for future research." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:812 @@ -12204,33 +10444,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:826 msgid "" -"There are a few centralized or limited resources (some inside I2P, some " -"not)\n" +"There are a few centralized or limited resources (some inside I2P, some not)\n" "that could be attacked or used as a vector for attacks.\n" -"The absence of jrandom starting November 2007, followed by the loss of " -"the i2p.net hosting service in January 2008,\n" -"highlighted numerous centralized resources in the development and " -"operation of the I2P network,\n" +"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n" +"highlighted numerous centralized resources in the development and operation of the I2P network,\n" "most of which are now distributed.\n" -"Attacks on externally-reachable resources mainly affect the ability of " -"new users to find us,\n" +"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n" "not the operation of the network itself." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:836 #, python-format msgid "" -"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" -" for external public access." +"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin " +"for external public access." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:839 #, python-format msgid "" -"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " -"locations</a>,\n" -"however more reseed hosts may be needed, and the handling of unreliable " -"or malicious\n" +"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n" +"however more reseed hosts may be needed, and the handling of unreliable or malicious\n" "reseed hosts may need improvement." msgstr "" @@ -12246,10 +10480,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:851 msgid "" -"Routers now better handle <a href=\"#ffdos\">multiple unreliable " -"floodfill peers</a>.\n" -"Malicious floodfills <a href=\"#ffdos\">needs</a> <a " -"href=\"#floodfill\">more</a> study." +"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n" +"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:855 @@ -12261,47 +10493,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:858 msgid "" -"Routers rely on a single news host, but there is a hardcoded backup URL " -"pointing to a different host.\n" +"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:862 #, python-format msgid "" -"<a href=\"%(naming)s\">Naming system services</a>, including address book" -" subscription providers, add-host services,\n" -"and jump services, could be malicious. Substantial protections for " -"subscriptions were implemented\n" -"in release 0.6.1.31, with additional enhancements in subsequent releases." -"\n" +"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n" +"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n" +"in release 0.6.1.31, with additional enhancements in subsequent releases.\n" "However, all naming services require some measure of trust, see\n" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:869 msgid "" -"We remain reliant on the DNS service for i2p2.de, losing this would cause" -" substantial\n" +"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n" "disruption in our ability to attract new users,\n" -"and would shrink the network (in the short-to-medium term), just as the " -"loss of i2p.net did." +"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:881 msgid "" -"These attacks aren't directly on the network, but instead go after its " -"development team \n" -"by either introducing legal hurdles on anyone contributing to the " -"development\n" -"of the software, or by using whatever means are available to get the " -"developers to \n" -"subvert the software. Traditional technical measures cannot defeat these" -" attacks, and\n" -"if someone threatened the life or livelihood of a developer (or even just" -" issuing a \n" -"court order along with a gag order, under threat of prison), we would " -"have a big problem." +"These attacks aren't directly on the network, but instead go after its development team \n" +"by either introducing legal hurdles on anyone contributing to the development\n" +"of the software, or by using whatever means are available to get the developers to \n" +"subvert the software. Traditional technical measures cannot defeat these attacks, and\n" +"if someone threatened the life or livelihood of a developer (or even just issuing a \n" +"court order along with a gag order, under threat of prison), we would have a big problem." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:890 @@ -12311,26 +10531,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:894 #, python-format msgid "" -"All components of the network must be open source to enable inspection, " -"verification, \n" -"modification, and improvement. If a developer is compromised, once it is" -" noticed \n" -"the community should demand explanation and cease to accept that " -"developer's work.\n" -"All checkins to our <a href=\"%(monotone)s\">distributed source control " -"system</a>\n" -"are cryptographically signed, and the release packagers use a trust-list " -"system\n" +"All components of the network must be open source to enable inspection, verification, \n" +"modification, and improvement. If a developer is compromised, once it is noticed \n" +"the community should demand explanation and cease to accept that developer's work.\n" +"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n" +"are cryptographically signed, and the release packagers use a trust-list system\n" "to restrict modifications to those previously approved." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:902 #, python-format msgid "" -"Development over the network itself, allowing developers to stay " -"anonymous but still \n" -"secure the development process. All I2P development can occur through " -"I2P - using\n" +"Development over the network itself, allowing developers to stay anonymous but still \n" +"secure the development process. All I2P development can occur through I2P - using\n" "a <a href=\"%(monotone)s\">distributed source control system</a>,\n" "a distributed source control system, IRC chat,\n" "public web servers,\n" @@ -12340,8 +10553,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:913 msgid "" -"We also maintain relationships with various organizations that offer " -"legal advice,\n" +"We also maintain relationships with various organizations that offer legal advice,\n" "should any defense be necessary." msgstr "" @@ -12351,52 +10563,38 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:922 msgid "" -"Try as we might, most nontrivial applications include errors in the " -"design or \n" -"implementation, and I2P is no exception. There may be bugs that could be" -" exploited to \n" -"attack the anonymity or security of the communication running over I2P in" -" unexpected \n" -"ways. To help withstand attacks against the design or protocols in use, " -"we publish \n" +"Try as we might, most nontrivial applications include errors in the design or \n" +"implementation, and I2P is no exception. There may be bugs that could be exploited to \n" +"attack the anonymity or security of the communication running over I2P in unexpected \n" +"ways. To help withstand attacks against the design or protocols in use, we publish \n" "all designs and documentation and solicit review and criticism with \n" "the hope that many eyes will improve the system.\n" "We do not believe in\n" -"<a href=\"http://www.haystacknetwork.com/\">security through " -"obscurity</a>." +"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:933 msgid "" "In addition, the code is being \n" -"treated the same way, with little aversion towards reworking or throwing " -"out \n" -"something that isn't meeting the needs of the software system (including " -"ease of \n" -"modification). Documentation for the design and implementation of the " -"network and \n" -"the software components are an essential part of security, as without " -"them it is \n" -"unlikely that developers would be willing to spend the time to learn the " -"software \n" +"treated the same way, with little aversion towards reworking or throwing out \n" +"something that isn't meeting the needs of the software system (including ease of \n" +"modification). Documentation for the design and implementation of the network and \n" +"the software components are an essential part of security, as without them it is \n" +"unlikely that developers would be willing to spend the time to learn the software \n" "enough to identify shortcomings and bugs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:943 msgid "" -"Our software is likely, in particular, to contain bugs related to denial " -"of service\n" -"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues " -"in the router console,\n" -"and other vulnerabilities to non-standard inputs via the various " -"protocols." +"Our software is likely, in particular, to contain bugs related to denial of service\n" +"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,\n" +"and other vulnerabilities to non-standard inputs via the various protocols." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:949 #, python-format msgid "" -"I2P is still a small network with a small development community and " -"almost no\n" +"I2P is still a small network with a small development community and almost no\n" "interest from academic or research groups.\n" "Therefore we lack the analysis that\n" "<a href=\"https://torproject.org/\">other anonymity networks</a>\n" @@ -12410,18 +10608,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" -"To some extent, I2P could be enhanced to avoid peers operating at IP " -"addresses\n" -"listed in a blocklist. Several blocklists are commonly available in " -"standard formats,\n" -"listing anti-P2P organizations, potential state-level adversaries, and " -"others." +"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n" +"listed in a blocklist. Several blocklists are commonly available in standard formats,\n" +"listing anti-P2P organizations, potential state-level adversaries, and others." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:969 msgid "" -"To the extent that active peers actually do show up in the actual " -"blocklist,\n" +"To the extent that active peers actually do show up in the actual blocklist,\n" "blocking by only a subset of peers would tend to segment the network,\n" "exacerbate reachability problems, and decrease overall reliability.\n" "Therefore we would want to agree on a particular blocklist and\n" @@ -12430,8 +10624,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:977 msgid "" -"Blocklists are only a part (perhaps a small part) of an array of defenses" -"\n" +"Blocklists are only a part (perhaps a small part) of an array of defenses\n" "against maliciousness.\n" "In large part the profiling system does a good job of measuring\n" "router behavior so that we don't need to trust anything in netDb.\n" @@ -12444,8 +10637,7 @@ msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" "<a href=\"#central\">central resource attack</a>.\n" -"Automatic subscription to a list gives the list provider the power to " -"shut\n" +"Automatic subscription to a list gives the list provider the power to shut\n" "the i2p network down. Completely." msgstr "" @@ -12454,8 +10646,7 @@ msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" "There is no automatic update mechanism.\n" -"Should a particular IP range implement serious attacks on the I2P " -"network,\n" +"Should a particular IP range implement serious attacks on the I2P network,\n" "we would have to ask people to update their blocklist manually through\n" "out-of-band mechanisms such as forums, blogs, etc." msgstr "" @@ -12470,30 +10661,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:7 msgid "" -"This page contains an overview of I2P tunnel terminology and operation, " -"with\n" +"This page contains an overview of I2P tunnel terminology and operation, with\n" "links to more technical pages, details, and specifications." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:12 #, python-format msgid "" -"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P " -"builds virtual \"tunnels\" -\n" -"temporary and unidirectional paths through a sequence of routers. These" -" \n" +"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n" +"temporary and unidirectional paths through a sequence of routers. These \n" "tunnels are classified as either inbound tunnels (where everything \n" "given to it goes towards the creator of the tunnel) or outbound tunnels\n" "(where the tunnel creator shoves messages away from them). When Alice\n" "wants to send a message to Bob, she will (typically) send it out one of\n" -"her existing outbound tunnels with instructions for that tunnel's " -"endpoint\n" +"her existing outbound tunnels with instructions for that tunnel's endpoint\n" "to forward it to the gateway router for one of Bob's current inbound \n" "tunnels, which in turn passes it to Bob." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:25 -msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel" +msgid "" +"Alice connecting through her outbound tunnel to Bob via his inbound tunnel" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:27 @@ -12529,8 +10717,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:38 #, python-format msgid "" -"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound " -"tunnels,\n" +"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound tunnels,\n" "this is the one mentioned in the LeaseSet published in the\n" "<a href=\"%(netdb)s\">network database</a>. For outbound tunnels, the\n" "gateway is the originating router. (e.g. both A and D above)" @@ -12538,21 +10725,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:44 msgid "" -"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F" -" above)" +"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F " +"above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:45 msgid "" -"<b>Tunnel participant</b> - all routers in a tunnel except for the " -"gateway or\n" +"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n" "endpoint (e.g. both B and E above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:49 msgid "" -"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router " -"jumps, e.g.:" +"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps," +" e.g.:" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:51 @@ -12567,8 +10753,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:53 msgid "" -"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one " -"intermediate\n" +"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n" "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n" "outbound from Alice, one inbound to Bob)" msgstr "" @@ -12576,10 +10761,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:60 #, python-format msgid "" -"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 " -"byte integer</a>\n" -"different for each hop in a tunnel, and unique among all tunnels on a " -"router.\n" +"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n" +"different for each hop in a tunnel, and unique among all tunnels on a router.\n" "Chosen randomly by the tunnel creator." msgstr "" @@ -12590,8 +10773,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:68 #, python-format msgid "" -"Routers performing the three roles (gateway, participant, endpoint) are " -"given\n" +"Routers performing the three roles (gateway, participant, endpoint) are given\n" "different pieces of data in the initial\n" "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n" "to accomplish their tasks:" @@ -12605,9 +10787,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:97 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the next hop" msgstr "" @@ -12615,9 +10795,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:101 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the next hop" msgstr "" @@ -12625,9 +10803,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:105 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request" msgstr "" @@ -12644,8 +10820,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:91 msgid "" -"<b>next hop</b> - what router is the next one in the path (unless this is" -" a 0-hop tunnel, and the gateway is also the endpoint)" +"<b>next hop</b> - what router is the next one in the path (unless this is a " +"0-hop tunnel, and the gateway is also the endpoint)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:92 @@ -12672,27 +10848,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:117 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:121 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:125 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request (outbound endpoints only)" msgstr "" @@ -12708,8 +10878,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:131 msgid "" -"<b>reply router</b> - the inbound gateway of the tunnel to send the reply" -" through (outbound endpoints only)" +"<b>reply router</b> - the inbound gateway of the tunnel to send the reply " +"through (outbound endpoints only)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:132 @@ -12732,8 +10902,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:143 #, python-format msgid "" -"Several tunnels for a particular purpose may be grouped into a \"tunnel " -"pool\",\n" +"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n" "as described in the\n" "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n" "This provides redundancy and additional bandwidth.\n" @@ -12748,20 +10917,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:155 #, python-format msgid "" -"As mentioned above, each client requests that their router provide " -"tunnels to\n" +"As mentioned above, each client requests that their router provide tunnels to\n" "include at least a certain number of hops.\n" "The decision as to how many routers\n" -"to have in one's outbound and inbound tunnels has an important effect " -"upon the\n" -"latency, throughput, reliability, and anonymity provided by I2P - the " -"more peers\n" -"that messages have to go through, the longer it takes to get there and " -"the more\n" -"likely that one of those routers will fail prematurely. The less routers" -" in a\n" -"tunnel, the easier it is for an adversary to mount traffic analysis " -"attacks and\n" +"to have in one's outbound and inbound tunnels has an important effect upon the\n" +"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n" +"that messages have to go through, the longer it takes to get there and the more\n" +"likely that one of those routers will fail prematurely. The less routers in a\n" +"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n" "pierce someone's anonymity.\n" "Tunnel lengths are specified by clients via\n" "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n" @@ -12775,18 +10938,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:172 msgid "" "With no remote routers in a tunnel, the user has very basic plausible\n" -"deniability (since no one knows for sure that the peer that sent them the" -"\n" -"message wasn't simply just forwarding it on as part of the tunnel). " -"However, it\n" -"would be fairly easy to mount a statistical analysis attack and notice " -"that\n" -"messages targeting a specific destination are always sent through a " -"single\n" -"gateway. Statistical analysis against outbound 0-hop tunnels are more " -"complex,\n" -"but could show similar information (though would be slightly harder to " -"mount)." +"deniability (since no one knows for sure that the peer that sent them the\n" +"message wasn't simply just forwarding it on as part of the tunnel). However, it\n" +"would be fairly easy to mount a statistical analysis attack and notice that\n" +"messages targeting a specific destination are always sent through a single\n" +"gateway. Statistical analysis against outbound 0-hop tunnels are more complex,\n" +"but could show similar information (though would be slightly harder to mount)." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:182 @@ -12797,14 +10954,10 @@ msgstr "" #, python-format msgid "" "With only one remote router in a tunnel, the user has both plausible\n" -"deniability and basic anonymity, as long as they are not up against an " -"internal\n" -"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)." -" However,\n" -"if the adversary ran a sufficient number of routers such that the single " -"remote\n" -"router in the tunnel is often one of those compromised ones, they would " -"be able\n" +"deniability and basic anonymity, as long as they are not up against an internal\n" +"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n" +"if the adversary ran a sufficient number of routers such that the single remote\n" +"router in the tunnel is often one of those compromised ones, they would be able\n" "to mount the above statistical traffic analysis attack." msgstr "" @@ -12814,10 +10967,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:193 msgid "" -"With two or more remote routers in a tunnel, the costs of mounting the " -"traffic\n" -"analysis attack increases, since many remote routers would have to be " -"compromised\n" +"With two or more remote routers in a tunnel, the costs of mounting the traffic\n" +"analysis attack increases, since many remote routers would have to be compromised\n" "to mount it." msgstr "" @@ -12831,8 +10982,7 @@ msgid "" "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n" "3 or more hops are recommended for the highest level of protection.\n" "<a href=\"%(url)s\">Recent studies</a>\n" -"also conclude that more than 3 hops does not provide additional " -"protection." +"also conclude that more than 3 hops does not provide additional protection." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:208 @@ -12856,15 +11006,12 @@ msgstr "" #, python-format msgid "" "All tunnels are periodically tested by their creator by sending a\n" -"DeliveryStatusMessage out an outbound tunnel and bound for another " -"inbound tunnel\n" -"(testing both tunnels at once). If either fails a number of consecutive " -"tests, it is marked as no longer\n" +"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n" +"(testing both tunnels at once). If either fails a number of consecutive tests, it is marked as no longer\n" "functional. If it was used for a client's inbound tunnel, a new leaseSet\n" "is created.\n" "Tunnel test failures are also reflected in the\n" -"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer " -"profile</a>." +"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:230 @@ -12874,14 +11021,10 @@ msgstr "Kreator Tunelu" #: i2p2www/pages/site/docs/how/tunnel-routing.html:231 #, python-format msgid "" -"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic " -"routing</a>\n" -"a Tunnel Build Message to a router, requesting that they participate in " -"the\n" -"tunnel (providing them with all of the appropriate information, as above," -" along\n" -"with a certificate, which right now is a 'null' cert, but will support " -"hashcash\n" +"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n" +"a Tunnel Build Message to a router, requesting that they participate in the\n" +"tunnel (providing them with all of the appropriate information, as above, along\n" +"with a certificate, which right now is a 'null' cert, but will support hashcash\n" "or other non-free certificates when necessary).\n" "That router forwards the message to the next hop in the tunnel.\n" "Details are in the\n" @@ -12891,8 +11034,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:245 #, python-format msgid "" -"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic" -" encryption</a>\n" +"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n" "of tunnel messages.\n" "Details are in the\n" "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n" @@ -12913,8 +11055,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:267 msgid "" "In a distant future release,\n" -"options specifying the pooling, mixing, and chaff generation settings may" -" be implemented." +"options specifying the pooling, mixing, and chaff generation settings may be implemented." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:272 @@ -12957,20 +11098,14 @@ msgstr "Parametry I2CP" #: i2p2www/pages/site/docs/protocol/i2cp.html:6 msgid "" -"The I2P Client Protocol (I2CP) exposes a strong separation of concerns " -"between\n" -"the router and any client that wishes to communicate over the network. " -"It enables\n" -"secure and asynchronous messaging by sending and receiving messages over " -"a \n" +"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n" +"the router and any client that wishes to communicate over the network. It enables\n" +"secure and asynchronous messaging by sending and receiving messages over a \n" "single TCP socket.\n" "With I2CP, a client application tells the\n" -"router who they are (their \"destination\"), what anonymity, reliability," -" and \n" -"latency tradeoffs to make, and where to send messages. In turn the " -"router uses\n" -"I2CP to tell the client when any messages have arrived, and to request " -"authorization\n" +"router who they are (their \"destination\"), what anonymity, reliability, and \n" +"latency tradeoffs to make, and where to send messages. In turn the router uses\n" +"I2CP to tell the client when any messages have arrived, and to request authorization\n" "for some tunnels to be used." msgstr "" @@ -12979,10 +11114,8 @@ msgstr "" msgid "" "The protocol itself is implemented in Java, to provide the\n" "<a href=\"%(url)s\">Client SDK</a>.\n" -"This SDK is exposed in the i2p.jar package, which implements the client-" -"side of I2CP.\n" -"Clients should never need to access the router.jar package, which " -"contains the\n" +"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n" +"Clients should never need to access the router.jar package, which contains the\n" "router itself and the router-side of I2CP.\n" "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n" "A non-Java client would also have to implement the\n" @@ -12993,45 +11126,35 @@ msgstr "" #, python-format msgid "" "Applications can take advantage of the base I2CP plus the \n" -"<a href=\"%(streaming)s\">streaming</a> and <a " -"href=\"%(datagrams)s\">datagram</a> libraries\n" -"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a " -"href=\"%(bob)s\">BOB</a> protocols,\n" +"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n" +"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n" "which do not require clients to deal with any sort of cryptography.\n" "Also, clients may access the network by one of several proxies -\n" "HTTP, CONNECT, and SOCKS 4/4a/5.\n" -"Alternatively, Java clients may access those libraries in " -"ministreaming.jar and streaming.jar.\n" +"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n" "So there are several options for both Java and non-Java applications." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:43 #, python-format msgid "" -"Client-side end-to-end encryption (encrypting the data over the I2CP " -"connection)\n" +"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n" "was disabled in I2P release 0.6,\n" -"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end " -"encryption</a>\n" +"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n" "which is implemented in the router.\n" "The only cryptography that client libraries must still implement is\n" "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n" "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n" -"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and" -" management of those keys." +"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:56 msgid "" -"In a standard I2P installation, port 7654 is used by external java " -"clients to communicate\n" +"In a standard I2P installation, port 7654 is used by external java clients to communicate\n" "with the local router via I2CP.\n" -"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, " -"set the\n" -"router advanced configuration option " -"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" -"Clients in the same JVM as the router pass messages directly to the " -"router\n" +"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n" +"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" +"Clients in the same JVM as the router pass messages directly to the router\n" "through an internal JVM interface." msgstr "" @@ -13039,13 +11162,10 @@ msgstr "" #, python-format msgid "" "The router also supports external connections over SSL.\n" -"While SSL is not the default, it is strongly recommended for any traffic " -"that may\n" -"be exposed to the open Internet. The authorization user/password (if " -"any), the\n" +"While SSL is not the default, it is strongly recommended for any traffic that may\n" +"be exposed to the open Internet. The authorization user/password (if any), the\n" "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n" -"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private " -"Key</a> for the\n" +"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "are all transmitted in-the-clear unless SSL is enabled." msgstr "" @@ -13066,19 +11186,12 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:82 #, python-format msgid "" -"When a client connects to the router, it first sends a single protocol " -"version byte (0x2A).\n" -"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and " -"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> " -"response.\n" -"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession " -"Message</a> containing the session configuration.\n" -"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet" -" Message</a> from the router, indicating that inbound tunnels\n" -"have been built, and responds with a CreateLeaseSetMessage containing the" -" signed LeaseSet.\n" -"The client may now initiate or receive connections from other I2P " -"destinations." +"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n" +"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n" +"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n" +"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n" +"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n" +"The client may now initiate or receive connections from other I2P destinations." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:91 @@ -13094,10 +11207,7 @@ msgstr "" #, python-format msgid "" "The following options are traditionally passed to the router via\n" -"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained " -"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or " -"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession " -"Message</a>." +"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:104 @@ -13130,14 +11240,13 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:167 msgid "" "Number of ElGamal/AES Session Tags to send at a time.\n" -"For clients with relatively low bandwidth per-client-pair (IRC, some UDP " -"apps), this may be set lower." +"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:179 msgid "" -"Comma-separated list of Base 64 Hashes of peers to build tunnels through;" -" for debugging only" +"Comma-separated list of Base 64 Hashes of peers to build tunnels through; " +"for debugging only" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:188 @@ -13154,17 +11263,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:322 msgid "" "Guaranteed is disabled;\n" -"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1," -" the client side default is None as of 0.9.4" +"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:334 msgid "" "For authorization, if required by the router.\n" -"If the client is running in the same JVM as a router, this option is not " -"required.\n" -"Warning - username and password are sent in the clear to the router, " -"unless using SSL (i2cp.SSL=true).\n" +"If the client is running in the same JVM as a router, this option is not required.\n" +"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n" "Authorization is only recommended when using SSL." msgstr "" @@ -13238,8 +11344,7 @@ msgid "" "Random amount to add or subtract to the length of tunnels in.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" @@ -13248,16 +11353,14 @@ msgid "" "Random amount to add or subtract to the length of tunnels out.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:464 msgid "" "Name of tunnel - generally used in routerconsole, which will\n" -"use the first few characters of the Base64 hash of the destination by " -"default." +"use the first few characters of the Base64 hash of the destination by default." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:476 @@ -13273,8 +11376,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:497 msgid "" "Number of tunnels in.\n" -"Limit was increased from 6 to 16 in release 0.9; however, numbers higher " -"than 6 are\n" +"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n" "incompatible with older releases." msgstr "" @@ -13289,32 +11391,27 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:538 msgid "" "Any other options prefixed with \"inbound.\" are stored\n" -"in the \"unknown options\" properties of the inbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the inbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:550 msgid "" "Any other options prefixed with \"outbound.\" are stored\n" -"in the \"unknown options\" properties of the outbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the outbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:562 msgid "" "Set to false to disable ever bundling a reply LeaseSet.\n" "For clients that do not publish their LeaseSet, this option must be true\n" -"for any reply to be possible. \"true\" is also recommended for multihomed" -" servers\n" +"for any reply to be possible. \"true\" is also recommended for multihomed servers\n" "with long connection times." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:569 msgid "" -"Setting to \"false\" may save significant outbound bandwidth, especially " -"if\n" -"the client is configured with a large number of inbound tunnels (Leases)." -"\n" +"Setting to \"false\" may save significant outbound bandwidth, especially if\n" +"the client is configured with a large number of inbound tunnels (Leases).\n" "If replies are still required, this may shift the bandwidth burden to\n" "the far-end client and the floodfill.\n" "There are several cases where \"false\" may be appropriate:" @@ -13330,14 +11427,10 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:579 msgid "" -"LeaseSet is published, client is a \"server\", all connections are " -"inbound\n" -"so the connecting far-end destination obviously has the leaseset already." -"\n" -"Connections are either short, or it is acceptable for latency on a long-" -"lived\n" -"connection to temporarily increase while the other end re-fetches the " -"LeaseSet\n" +"LeaseSet is published, client is a \"server\", all connections are inbound\n" +"so the connecting far-end destination obviously has the leaseset already.\n" +"Connections are either short, or it is acceptable for latency on a long-lived\n" +"connection to temporarily increase while the other end re-fetches the LeaseSet\n" "after expiration.\n" "HTTP servers may fit these requirements." msgstr "" @@ -13351,15 +11444,11 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:596 #, python-format msgid "" -"Note: As of release 0.7.7, option names and values must use UTF-8 " -"encoding.\n" +"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n" "This is primarily useful for nicknames.\n" -"Prior to that release, options with multi-byte characters were corrupted." -"\n" -"Since options are encoded in a <a " -"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" -"all option names and values are limited to 255 bytes (not characters) " -"maximum." +"Prior to that release, options with multi-byte characters were corrupted.\n" +"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" +"all option names and values are limited to 255 bytes (not characters) maximum." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:610 @@ -13370,8 +11459,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:611 msgid "" "The following options are interpreted on the client side,\n" -"and will be interpreted if passed to the I2PSession via the " -"I2PClient.createSession() call.\n" +"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n" "The streaming lib should also pass these options through to I2CP.\n" "Other implementations may have different defaults." msgstr "" @@ -13447,28 +11535,24 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:871 msgid "" "Connect to the router using SSL.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:883 msgid "" "Router hostname.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:895 msgid "" "Router I2CP port.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:902 msgid "" -"Note: All arguments, including numbers, are strings. True/false values " -"are case-insensitive strings.\n" +"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n" "Anything other than case-insensitive \"true\" is interpreted as false.\n" "All option names are case-sensitive." msgstr "" @@ -13480,28 +11564,22 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:909 #, python-format msgid "" -"The end-to-end messages handled by I2CP (i.e. the data sent by the client" -" in a\n" +"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n" "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n" "and received by the client in a\n" "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n" "are gzipped with a standard 10-byte gzip\n" "header beginning with 0x1F 0x8B 0x08 as\n" -"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC " -"1952</a>.\n" -"As of release 0.7.1, I2P uses ignored portions of the gzip header to " -"include\n" -"protocol, from-port, and to-port information, thus supporting streaming " -"and\n" -"datagrams on the same destination, and allowing query/response using " -"datagrams\n" +"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n" +"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n" +"protocol, from-port, and to-port information, thus supporting streaming and\n" +"datagrams on the same destination, and allowing query/response using datagrams\n" "to work reliably in the presence of multiple channels." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:923 msgid "" -"The gzip function cannot be completely turned off, however setting " -"i2cp.gzip=false\n" +"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n" "turns the gzip effort setting to 0, which may save a little CPU." msgstr "" @@ -13535,7 +11613,8 @@ msgid "Gzip xflags" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:960 -msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" +msgid "" +"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:969 @@ -13560,8 +11639,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:987 #, python-format msgid "" -"Some improvements may be able to use messages previously defined but not " -"implemented.\n" +"Some improvements may be able to use messages previously defined but not implemented.\n" "For reference, here is the\n" "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n" "(PDF) dated August 28, 2003.\n" @@ -13580,12 +11658,9 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:6 msgid "" "The I2P Network Protocol (I2NP),\n" -"which is sandwiched between I2CP and the various I2P transport protocols," -" manages the\n" -"routing and mixing of messages between routers, as well as the selection " -"of what\n" -"transports to use when communicating with a peer for which there are " -"multiple\n" +"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n" +"routing and mixing of messages between routers, as well as the selection of what\n" +"transports to use when communicating with a peer for which there are multiple\n" "common transports supported." msgstr "" @@ -13595,20 +11670,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:15 msgid "" -"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-" -"router, point-to-point messages.\n" -"By encrypting and wrapping messages in other messages, they can be sent " -"in a secure way\n" +"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n" +"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n" "through multiple hops to the ultimate destination.\n" -"Priority is only used locally at the origin, i.e. when queuing for " -"outbound delivery." +"Priority is only used locally at the origin, i.e. when queuing for outbound delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:22 #, python-format msgid "" -"The priorities listed below may not be current and are subject to change." -"\n" +"The priorities listed below may not be current and are subject to change.\n" "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n" "for the current priority settings.\n" "Priority queueing implementation may vary." @@ -13620,8 +11691,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:31 msgid "" -"The following table specifies the traditional 16-byte header used in " -"NTCP.\n" +"The following table specifies the traditional 16-byte header used in NTCP.\n" "The SSU and NTCP2 transports use modified headers." msgstr "" @@ -13658,23 +11728,18 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:46 #, python-format msgid "" -"While the maximum payload size is nominally 64KB, the size is further " -"constrained by the\n" -"method of fragmenting I2NP messages into multiple 1KB tunnel messages as " -"described on\n" +"While the maximum payload size is nominally 64KB, the size is further constrained by the\n" +"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n" "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n" -"The maximum number of fragments is 64, and the message may not be " -"perfectly aligned,\n" +"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n" "So the message must nominally fit in 63 fragments." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:54 msgid "" -"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL " -"delivery mode);\n" +"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n" "the maximum size of a follow-on fragment is 996 bytes.\n" -"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 " -"bytes, or 61.2 KB." +"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:60 @@ -13682,16 +11747,13 @@ msgid "" "In addition, the transports may have additional restrictions.\n" "The NTCP limit is 16KB - 6 = 16378 bytes.\n" "The SSU limit is approximately 32 KB.\n" -"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher" -" than what a tunnel can support." +"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:67 msgid "" -"Note that these are not the limits for datagrams that the client sees, as" -" the\n" -"router may bundle a reply leaseset and/or session tags together with the " -"client message\n" +"Note that these are not the limits for datagrams that the client sees, as the\n" +"router may bundle a reply leaseset and/or session tags together with the client message\n" "in a garlic message. The leaseset and tags together may add about 5.5KB.\n" "Therefore the current datagram limit is about 10KB. This limit will be\n" "increased in a future release." @@ -13748,8 +11810,7 @@ msgid "" "Priority may vary.\n" "Size is 898 bytes for a typical 2-lease leaseSet.\n" "RouterInfo structures are compressed, and size varies; however\n" -"there is a continuing effort to reduce the amount of data published in a " -"RouterInfo\n" +"there is a continuing effort to reduce the amount of data published in a RouterInfo\n" "as we approach release 1.0." msgstr "" @@ -13759,8 +11820,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:150 msgid "" -"Used for message replies, and for testing tunnels - generally wrapped in " -"a GarlicMessage" +"Used for message replies, and for testing tunnels - generally wrapped in a " +"GarlicMessage" msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:158 @@ -13771,8 +11832,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:185 msgid "" -"The most common message. Priority for tunnel participants, outbound " -"endpoints, and inbound gateways was\n" +"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n" "reduced to 200 as of release 0.6.1.33.\n" "Outbound gateway messages (i.e. those originated locally) remains at 400." msgstr "" @@ -13803,16 +11863,13 @@ msgstr "" msgid "" "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n" "See also the\n" -"<a href=\"%(commonstructures)s\">Common Data Structure Specification " -"page</a>." +"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:234 msgid "" -"It isn't clear whether the current priority scheme is generally " -"effective,\n" -"and whether the priorities for various messages should be adjusted " -"further.\n" +"It isn't clear whether the current priority scheme is generally effective,\n" +"and whether the priorities for various messages should be adjusted further.\n" "This is a topic for further research, analysis and testing." msgstr "" @@ -13834,8 +11891,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:12 msgid "" "Each of the layers in the stack provides extra capabilities.\n" -"The capabilities are listed below, starting at the bottom of the protocol" -" stack." +"The capabilities are listed below, starting at the bottom of the protocol stack." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:18 @@ -13844,8 +11900,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:20 msgid "" -"IP: Internet Protocol, allow addressing hosts on the regular internet and" -" routing packets across the internet using best-effort delivery." +"IP: Internet Protocol, allow addressing hosts on the regular internet and " +"routing packets across the internet using best-effort delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:23 @@ -13866,11 +11922,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:30 msgid "" -"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P " -"routers. These are not anonymous yet, this is strictly a hop-to-hop " -"connection.\n" -"Two protocols are implemented to provide these capabilities. NTCP builds " -"on top of TCP, while SSU uses UDP." +"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n" +"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:35 @@ -13888,20 +11941,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:42 #, python-format msgid "" -"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are " -"large messages containing encrypted I2NP (see below) messages and " -"encrypted instructions for their delivery.\n" -"The encryption is layered. The first hop will decrypt the tunnel message " -"and read a part. Another part can still be encrypted (with another key)," -"\n" +"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n" +"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n" "so it will be forwarded." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:48 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" used to pass messages through multiple routers. These I2NP messages are " +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"used to pass messages through multiple routers. These I2NP messages are " "combined in tunnel messages." msgstr "" @@ -13914,54 +11963,51 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:55 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" wrapped in each other and used to ensure encryption between two tunnels " -"and are passed along from source to destination, keeping both anonymous." +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"wrapped in each other and used to ensure encryption between two tunnels and " +"are passed along from source to destination, keeping both anonymous." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:61 msgid "" -"The following layers are strictly speaking no longer part of the I2P " -"Protocol stack, they are not part of the core 'I2P router' functionality." -"\n" -"However, each of these layers adds additional functionality, to allow " -"applications simple and convenient I2P usage." +"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n" +"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:67 msgid "" -"<b>I2P Client Layer:</b> allow any client to use I2P functionality, " -"without requiring the direct use of the router API." +"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without " +"requiring the direct use of the router API." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:69 #, python-format msgid "" "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and " -"asynchronous messaging over I2P by communicating messages over the I2CP " -"TCP socket." +"asynchronous messaging over I2P by communicating messages over the I2CP TCP " +"socket." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:74 msgid "" -"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like " -"functionality on top of I2P." +"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality " +"on top of I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:76 #, python-format msgid "" -"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of " -"TCP-like streams over I2P. This allows easier porting of existing " -"applications to I2P." +"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-" +"like streams over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:80 #, python-format msgid "" "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-" -"like messages over I2P. This allows easier porting of existing " -"applications to I2P." +"like messages over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:85 @@ -13981,8 +12027,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:99 msgid "" -"Finally, what could be considered the <b>'I2P application layer'</b>, is " -"a large number of applications on top of I2P.\n" +"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n" "We can order this based on the I2P stack layer they use." msgstr "" @@ -14034,12 +12079,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:8 msgid "" -"A \"transport\" in I2P is a method for direct, point-to-point " -"communication\n" +"A \"transport\" in I2P is a method for direct, point-to-point communication\n" "between two routers.\n" "Transports must provide confidentiality and integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" +"against external adversaries while authenticating that the router contacted \n" "is the one who should receive a given message." msgstr "" @@ -14093,8 +12136,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:44 msgid "" "Maintain a set of router addresses, one or more for each transport,\n" -"that the router publishes as its global contact information (the " -"RouterInfo).\n" +"that the router publishes as its global contact information (the RouterInfo).\n" "Each transport may connect using one of these addresses, which may be\n" "IPv4 or (as of version 0.9.8) IPv6." msgstr "" @@ -14123,10 +12165,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:55 msgid "" -"Maintenance of connection limits for each transport, implementation of " -"various thresholds for these limits,\n" -"and communication of threshold status to the router so it may make " -"operational changes based on the status" +"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n" +"and communication of threshold status to the router so it may make operational changes based on the status" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:59 @@ -14145,27 +12185,26 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:62 msgid "" -"Coordination of firewall status and local IP, and changes to either, " -"among the transports" +"Coordination of firewall status and local IP, and changes to either, among " +"the transports" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:63 #: i2p2www/pages/site/docs/transport/ssu.html:35 msgid "" -"Communication of firewall status and local IP, and changes to either, to " -"the router and the user interface" +"Communication of firewall status and local IP, and changes to either, to the" +" router and the user interface" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:64 msgid "" -"Determination of a consensus clock, which is used to periodically update " -"the router's clock, as a backup for NTP" +"Determination of a consensus clock, which is used to periodically update the" +" router's clock, as a backup for NTP" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:65 msgid "" -"Maintenance of status for each peer, including whether it is connected, " -"whether it was recently connected,\n" +"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n" "and whether it was reachable in the last attempt" msgstr "" @@ -14175,8 +12214,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:70 msgid "" -"Honoring the automated and manual lists of banned peers maintained by the" -" router,\n" +"Honoring the automated and manual lists of banned peers maintained by the router,\n" "and refusing outbound and inbound connections to those peers" msgstr "" @@ -14186,10 +12224,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:79 msgid "" -"The transport subsystem maintains a set of router addresses, each of " -"which lists a transport method, IP, and port.\n" -"These addresses constitute the advertised contact points, and are " -"published by the router to the network database.\n" +"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n" +"These addresses constitute the advertised contact points, and are published by the router to the network database.\n" "Addresses may also contain an arbitrary set of additional options." msgstr "" @@ -14210,16 +12246,13 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:92 #, python-format msgid "" -"A router is firewalled, and therefore publishes an SSU address which " -"contains a list of cooperating\n" -"peers or \"introducers\" who will assist in NAT traversal (see <a " -"href=\"%(ssu)s\">the SSU spec</a> for details)" +"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n" +"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:96 msgid "" -"A router is not firewalled or its NAT ports are open; it publishes both " -"NTCP and SSU addresses containing\n" +"A router is not firewalled or its NAT ports are open; it publishes both NTCP and SSU addresses containing\n" "directly-accessible IP and ports." msgstr "" @@ -14230,10 +12263,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:104 #, python-format msgid "" -"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> " -"only. The transport selected for any message is\n" -"independent of the upper-layer protocols and contents (router or client " -"messages, whether an external application was using\n" +"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n" +"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n" "TCP or UDP to connect to I2P, whether the upper layer was using\n" "<a href=\"%(streaming)s\">the streaming library</a>\n" "streaming\n" @@ -14245,15 +12276,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:118 msgid "" -"For each outgoing message, the transport system solicits \"bids\" from " -"each transport.\n" -"The transport bidding the lowest (best) value wins the bid and receives " -"the message for delivery.\n" +"For each outgoing message, the transport system solicits \"bids\" from each transport.\n" +"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n" "A transport may refuse to bid." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:124 -msgid "Whether a transport bids, and with what value, depend on numerous factors:" +msgid "" +"Whether a transport bids, and with what value, depend on numerous factors:" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:128 @@ -14276,8 +12306,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:132 msgid "" -"The size of the message, as different transports have different size " -"limits" +"The size of the message, as different transports have different size limits" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:133 @@ -14287,7 +12316,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:134 -msgid "Whether the connection would be indirect (requiring introducers) or direct" +msgid "" +"Whether the connection would be indirect (requiring introducers) or direct" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:135 @@ -14296,8 +12326,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:138 msgid "" -"In general, the bid values are selected so that two routers are only " -"connected by a single transport\n" +"In general, the bid values are selected so that two routers are only connected by a single transport\n" "at any one time. However, this is not a requirement." msgstr "" @@ -14315,8 +12344,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:153 msgid "" -"An \"indirect\" transport for routers that are not reachable by all other" -" routers (one form of \"restricted routes\")" +"An \"indirect\" transport for routers that are not reachable by all other " +"routers (one form of \"restricted routes\")" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:154 @@ -14325,31 +12354,24 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:157 msgid "" -"Work continues on adjusting default connection limits for each transport." -"\n" -"I2P is designed as a \"mesh network\", where it is assumed that any " -"router can connect to any other router.\n" -"This assumption may be broken by routers that have exceeded their " -"connection limits, and by\n" +"Work continues on adjusting default connection limits for each transport.\n" +"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n" +"This assumption may be broken by routers that have exceeded their connection limits, and by\n" "routers that are behind restrictive state firewalls (restricted routes)." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:164 msgid "" -"The current connection limits are higher for SSU than for NTCP, based on " -"the assumption that\n" -"the memory requirements for an NTCP connection are higher than that for " -"SSU.\n" -"However, as NTCP buffers are partially in the kernel and SSU buffers are " -"on the Java heap,\n" +"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n" +"the memory requirements for an NTCP connection are higher than that for SSU.\n" +"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n" "that assumption is difficult to verify." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:171 #, python-format msgid "" -"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol " -"Obfuscation</a>\n" +"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n" "and see how transport-layer padding may improve things." msgstr "" @@ -14360,11 +12382,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:6 #, python-format msgid "" -"The others are <a href=\"%(ssu)s\">SSU</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>.\n" +"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n" "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n" -"Java NIO (new I/O) does not suffer from the 1 thread per connection " -"issues of the old TCP transport.\n" +"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n" "NTCP-over-IPv6 is supported as of version 0.9.8." msgstr "" @@ -14379,8 +12399,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:21 msgid "" -"The NTCP code within I2P is relatively lightweight (1/4 the size of the " -"SSU code)\n" +"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n" "because it uses the underlying Java TCP transport for reliable delivery." msgstr "" @@ -14405,21 +12424,17 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:47 msgid "" "After establishment,\n" -"the NTCP transport sends individual I2NP messages, with a simple " -"checksum.\n" +"the NTCP transport sends individual I2NP messages, with a simple checksum.\n" "The unencrypted message is encoded as follows:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:65 msgid "" -"The data is then AES/256/CBC encrypted. The session key for the " -"encryption\n" +"The data is then AES/256/CBC encrypted. The session key for the encryption\n" "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n" -"The establishment between two routers is implemented in the " -"EstablishState class\n" +"The establishment between two routers is implemented in the EstablishState class\n" "and detailed below.\n" -"The IV for AES/256/CBC encryption is the last 16 bytes of the previous " -"encrypted message." +"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:73 @@ -14443,8 +12458,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:93 msgid "" -"Total length: 16 bytes. The time sync message is sent at approximately 15" -" minute intervals.\n" +"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n" "The message is encrypted just as standard messages are." msgstr "" @@ -14467,14 +12481,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:107 #: i2p2www/pages/site/docs/transport/ssu.html:188 msgid "" -"Idle timeout and connection close is at the discretion of each endpoint " -"and may vary.\n" -"The current implementation lowers the timeout as the number of " -"connections approaches the\n" -"configured maximum, and raises the timeout when the connection count is " -"low.\n" -"The recommended minimum timeout is two minutes or more, and the " -"recommended\n" +"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n" +"The current implementation lowers the timeout as the number of connections approaches the\n" +"configured maximum, and raises the timeout when the connection count is low.\n" +"The recommended minimum timeout is two minutes or more, and the recommended\n" "maximum timeout is ten minutes or more." msgstr "" @@ -14485,12 +12495,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:117 msgid "" "After establishment, and every 30-60 minutes thereafter,\n" -"the two routers should generally exchange RouterInfos using a " -"DatabaseStoreMessage.\n" -"However, Alice should check if the first queued message is a " -"DatabaseStoreMessage\n" -"so as not to send a duplicate message; this is often the case when " -"connecting to a floodfill router." +"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n" +"However, Alice should check if the first queued message is a DatabaseStoreMessage\n" +"so as not to send a duplicate message; this is often the case when connecting to a floodfill router." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:125 @@ -14499,11 +12506,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:126 msgid "" -"In the establish state, there is a 4-phase message sequence to exchange " -"DH keys and signatures.\n" +"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n" "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n" -"Then, signatures of the critical data are exchanged to confirm the " -"connection." +"Then, signatures of the critical data are exchanged to confirm the connection." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:142 @@ -14541,15 +12546,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:159 msgid "" "The DH key exchange consists of a number of steps, displayed below.\n" -"The mapping between these steps and the messages sent between I2P " -"routers,\n" +"The mapping between these steps and the messages sent between I2P routers,\n" "is marked in bold." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:165 msgid "" -"Alice generates a secret integer x. She then calculates <code>X = g^x mod" -" p</code>." +"Alice generates a secret integer x. She then calculates <code>X = g^x mod " +"p</code>." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:166 @@ -14583,8 +12587,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:173 #, python-format msgid "" -"The sessionKey is then used to exchange identities in <b>Message 3</b> " -"and <b>Message 4</b>.\n" +"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n" "The exponent (x and y) length for the DH exchange is documented on the\n" "<a href=\"%(crypto)s#exponent\">cryptography page</a>." msgstr "" @@ -14597,8 +12600,7 @@ msgstr "" #, python-format msgid "" "This is the DH request. Alice already has Bob's\n" -"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router " -"Identity</a>,\n" +"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n" "IP address, and port, as contained in his\n" "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n" "which was published to the\n" @@ -14678,8 +12680,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:312 #, python-format msgid "" -"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" +"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" " the last 16 bytes of Y as the IV" msgstr "" @@ -14695,8 +12696,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:326 msgid "" -"This contains Alice's router identity, and a signature of the critical " -"data. Alice sends Bob:" +"This contains Alice's router identity, and a signature of the critical data." +" Alice sends Bob:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:360 @@ -14716,17 +12717,14 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Bob's `RouterIdentity`, tsA, tsB.\n" -" Alice signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in her `RouterIdentity`" +" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:389 #, python-format msgid "" -"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH" -" session key and\n" -" the last 16 bytes of HXxorHI (i.e., the last 16 bytes " -"of message #1) as the IV" +"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:400 @@ -14741,8 +12739,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:406 msgid "" -"Alice will use the last 16 bytes of the encrypted contents of this " -"message as the IV for the next message." +"Alice will use the last 16 bytes of the encrypted contents of this message " +"as the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:430 @@ -14757,19 +12755,15 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Alice's `RouterIdentity`, tsA, tsB.\n" -" Bob signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in his `RouterIdentity`" +" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:479 #, python-format msgid "" -"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" -" the last 16 bytes of the encrypted contents of message " -"#2 as the IV\n" -" 48 bytes for a DSA signature, may vary for other " -"signature types" +"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of the encrypted contents of message #2 as the IV\n" +" 48 bytes for a DSA signature, may vary for other signature types" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:488 @@ -14778,8 +12772,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:491 msgid "" -"Bob will use the last 16 bytes of the encrypted contents of this message " -"as the IV for the next message." +"Bob will use the last 16 bytes of the encrypted contents of this message as " +"the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:506 @@ -14788,14 +12782,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:507 msgid "" -"The connection is established, and standard or time sync messages may be " -"exchanged.\n" -"All subsequent messages are AES encrypted using the negotiated DH session" -" key.\n" -"Alice will use the last 16 bytes of the encrypted contents of message #3 " -"as the next IV.\n" -"Bob will use the last 16 bytes of the encrypted contents of message #4 as" -" the next IV." +"The connection is established, and standard or time sync messages may be exchanged.\n" +"All subsequent messages are AES encrypted using the negotiated DH session key.\n" +"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n" +"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:516 @@ -14822,8 +12812,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:528 msgid "" -"that many bytes making up the local router's IP address (as reached by " -"the remote side)" +"that many bytes making up the local router's IP address (as reached by the " +"remote side)" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:529 @@ -14842,8 +12832,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:532 msgid "" -"xor of the local router's identity hash and the SHA256 of bytes 32 " -"through bytes 223" +"xor of the local router's identity hash and the SHA256 of bytes 32 through " +"bytes 223" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:535 @@ -14866,11 +12856,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:550 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then.\n" -"However, there is currently no provision for padding beyond the next " -"16-byte boundary,\n" +"However, there is currently no provision for padding beyond the next 16-byte boundary,\n" "to create a limited number of message sizes." msgstr "" @@ -14893,28 +12881,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:7 #, python-format msgid "" -"SSU (also called \"UDP\" in much of the I2P documentation and user " -"interfaces)\n" -"is one of three <a href=\"%(transports)s\">transports</a> currently " -"implemented in I2P.\n" -"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>." +"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n" +"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n" +"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:13 msgid "" "SSU was introduced in I2P release 0.6.\n" -"In a standard I2P installation, the router uses both NTCP and SSU for " -"outbound connections.\n" +"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n" "SSU-over-IPv6 is supported as of version 0.9.8." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:19 msgid "" -"SSU is called \"semireliable\" because it will repeatedly retransmit " -"unacknowledged messages,\n" -"but only up to a maximum number of times. After that, the message is " -"dropped." +"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n" +"but only up to a maximum number of times. After that, the message is dropped." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:24 @@ -14923,10 +12905,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:26 msgid "" -"Like the NTCP transport, SSU provides reliable, encrypted, connection-" -"oriented, point-to-point data transport.\n" -"Unique to SSU, it also provides IP detection and NAT traversal services, " -"including:" +"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n" +"Unique to SSU, it also provides IP detection and NAT traversal services, including:" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:32 @@ -14943,8 +12923,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:34 msgid "" -"Communication of firewall status and local IP, and changes to either to " -"NTCP" +"Communication of firewall status and local IP, and changes to either to NTCP" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:46 @@ -14979,26 +12958,20 @@ msgid "" "Packets are scheduled according to the router's policy, taking care\n" "not to exceed the router's outbound capacity or to exceed the measured \n" "capacity of the remote peer. The measured capacity operates along the\n" -"lines of TCP's slow start and congestion avoidance, with additive " -"increases\n" -"to the sending capacity and multiplicative decreases in face of " -"congestion.\n" +"lines of TCP's slow start and congestion avoidance, with additive increases\n" +"to the sending capacity and multiplicative decreases in face of congestion.\n" "Unlike for TCP, routers may give up on some messages after\n" -"a given period or number of retransmissions while continuing to transmit" -" \n" +"a given period or number of retransmissions while continuing to transmit \n" "other messages." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:106 msgid "" "The congestion detection techniques vary from TCP as well, since each \n" -"message has its own unique and nonsequential identifier, and each message" -"\n" -"has a limited size - at most, 32KB. To efficiently transmit this " -"feedback\n" +"message has its own unique and nonsequential identifier, and each message\n" +"has a limited size - at most, 32KB. To efficiently transmit this feedback\n" "to the sender, the receiver periodically includes a list of fully ACKed \n" -"message identifiers and may also include bitfields for partially received" -"\n" +"message identifiers and may also include bitfields for partially received\n" "messages, where each bit represents the reception of a fragment. If \n" "duplicate fragments arrive, the message should be ACKed again, or if the\n" "message has still not been fully received, the bitfield should be \n" @@ -15008,8 +12981,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:118 msgid "" "The current implementation does not pad the packets to\n" -"any particular size, but instead just places a single message fragment " -"into\n" +"any particular size, but instead just places a single message fragment into\n" "a packet and sends it off (careful not to exceed the MTU)." msgstr "" @@ -15017,8 +12989,7 @@ msgstr "" msgid "" "As of router version 0.8.12,\n" "two MTU values are used for IPv4: 620 and 1484.\n" -"The MTU value is adjusted based on the percentage of packets that are " -"retransmitted." +"The MTU value is adjusted based on the percentage of packets that are retransmitted." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:131 @@ -15037,10 +13008,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:143 msgid "" -"Based on measurements, 1492 fits nearly all reasonably small I2NP " -"messages\n" -"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going " -"to fit\n" +"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n" +"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n" "into a live network MTU anyway)." msgstr "" @@ -15060,8 +13029,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:161 msgid "" -"As of release 0.9.2, if a router's network interface MTU is less than " -"1484,\n" +"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n" "it will publish that in the network database, and other routers should\n" "honor that when a connection is established." msgstr "" @@ -15081,13 +13049,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:175 msgid "" "While the maximum message size is nominally 32KB, the practical\n" -"limit differs. The protocol limits the number of fragments to 7 bits, or " -"128.\n" -"The current implementation, however, limits each message to a maximum of " -"64 fragments,\n" +"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n" +"The current implementation, however, limits each message to a maximum of 64 fragments,\n" "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n" -"Due to overhead for bundled LeaseSets and session keys, the practical " -"limit\n" +"Due to overhead for bundled LeaseSets and session keys, the practical limit\n" "at the application level is about 6KB lower, or about 26KB.\n" "Further work is necessary to raise the UDP transport limit above 32KB.\n" "For connections using the larger MTU, larger messages are possible." @@ -15101,8 +13066,7 @@ msgstr "Klucze" msgid "" "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n" "When Alice originates a session with Bob,\n" -"the MAC and session keys are negotiated as part of the DH exchange, and " -"are then used\n" +"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n" "for the HMAC and encryption, respectively. During the DH exchange, \n" "Bob's publicly knowable introKey is used for the MAC and encryption." msgstr "" @@ -15119,8 +13083,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:216 msgid "" -"Upon receiving a message, the receiver checks the \"from\" IP address and" -" port\n" +"Upon receiving a message, the receiver checks the \"from\" IP address and port\n" "with all established sessions - if there are matches,\n" "that session's MAC keys are tested in the HMAC. If none\n" "of those verify or if there are no matching IP addresses, the \n" @@ -15210,8 +13173,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:296 msgid "" -"Direct session establishment is used when no third party is required for " -"NAT traversal.\n" +"Direct session establishment is used when no third party is required for NAT traversal.\n" "The message sequence is as follows:" msgstr "" @@ -15231,10 +13193,8 @@ msgid "" "After the SessionConfirmed message is received, Bob sends a small\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n" "as a confirmation.\n" -"In this message, the 4-byte message ID is set to a random number, and the" -"\n" -"8-byte \"arrival time\" is set to the current network-wide ID, which is 2" -"\n" +"In this message, the 4-byte message ID is set to a random number, and the\n" +"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n" "(i.e. 0x0000000000000002)." msgstr "" @@ -15250,8 +13210,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:335 msgid "" -"It does not appear that the type of the status message or its contents " -"matters.\n" +"It does not appear that the type of the status message or its contents matters.\n" "It was originally added becasue the DatabaseStore message was delayed\n" "several seconds; since the store is now sent immediately, perhaps\n" "the status message can be eliminated." @@ -15261,8 +13220,7 @@ msgstr "" msgid "" "Introduction keys are delivered through an external channel \n" "(the network database),\n" -"where they have traditionally been identical to the router Hash through " -"release 0.9.47,\n" +"where they have traditionally been identical to the router Hash through release 0.9.47,\n" "but may be random as of release 0.9.48.\n" "They must be used when establishing a session key. For the indirect\n" "address, the peer must first contact the relayhost and ask them for\n" @@ -15281,24 +13239,16 @@ msgid "" "is necessary for efficient NAT traversal. Charlie, a router behind a\n" "NAT or firewall which does not allow unsolicited inbound UDP packets,\n" "first contacts a few peers, choosing some to serve as introducers. Each\n" -"of these peers (Bob, Bill, Betty, etc) provide Charlie with an " -"introduction\n" -"tag - a 4 byte random number - which he then makes available to the " -"public\n" -"as methods of contacting him. Alice, a router who has Charlie's " -"published\n" -"contact methods, first sends a RelayRequest packet to one or more of the" -" \n" +"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n" +"tag - a 4 byte random number - which he then makes available to the public\n" +"as methods of contacting him. Alice, a router who has Charlie's published\n" +"contact methods, first sends a RelayRequest packet to one or more of the \n" "introducers, asking each to introduce her to Charlie (offering the \n" "introduction tag to identify Charlie). Bob then forwards a RelayIntro\n" -"packet to Charlie including Alice's public IP and port number, then sends" -"\n" -"Alice back a RelayResponse packet containing Charlie's public IP and port" -"\n" -"number. When Charlie receives the RelayIntro packet, he sends off a " -"small\n" -"random packet to Alice's IP and port (poking a hole in his NAT/firewall)," -"\n" +"packet to Charlie including Alice's public IP and port number, then sends\n" +"Alice back a RelayResponse packet containing Charlie's public IP and port\n" +"number. When Charlie receives the RelayIntro packet, he sends off a small\n" +"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n" "and when Alice receives Bob's RelayResponse packet, she begins a new \n" "full direction session establishment with the specified IP and port." msgstr "" @@ -15308,20 +13258,21 @@ msgid "Connection establishment (indirect using an introducer)" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:389 -msgid "Alice first connects to introducer Bob, who relays the request to Charlie." +msgid "" +"Alice first connects to introducer Bob, who relays the request to Charlie." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:407 msgid "" -"After the hole punch, the session is established between Alice and " -"Charlie as in a direct establishment." +"After the hole punch, the session is established between Alice and Charlie " +"as in a direct establishment." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:422 +#: i2p2www/pages/site/docs/transport/ssu.html:427 msgid "Peer testing" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:424 +#: i2p2www/pages/site/docs/transport/ssu.html:429 msgid "" "The automation of collaborative reachability testing for peers is\n" "enabled by a sequence of PeerTest messages. With its proper \n" @@ -15330,7 +13281,7 @@ msgid "" "quite simple:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:443 +#: i2p2www/pages/site/docs/transport/ssu.html:448 msgid "" "Each of the PeerTest messages carry a nonce identifying the\n" "test series itself, as initialized by Alice. If Alice doesn't \n" @@ -15340,7 +13291,7 @@ msgid "" "that may be reached are as follows:" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:453 +#: i2p2www/pages/site/docs/transport/ssu.html:458 msgid "" "If she doesn't receive a response from Bob, she will retransmit\n" "up to a certain number of times, but if no response ever arrives,\n" @@ -15350,7 +13301,7 @@ msgid "" "Charlie to reply." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:462 +#: i2p2www/pages/site/docs/transport/ssu.html:467 msgid "" "If Alice doesn't receive a PeerTest message with the \n" "expected nonce from a third party (Charlie), she will retransmit\n" @@ -15362,7 +13313,7 @@ msgid "" "IP and port that Bob offered up should be forwarded)." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:473 +#: i2p2www/pages/site/docs/transport/ssu.html:478 msgid "" "If Alice receives Bob's PeerTest message and both of Charlie's\n" "PeerTest messages but the enclosed IP and port numbers in Bob's \n" @@ -15373,7 +13324,7 @@ msgid "" "remote connectivity, ignoring further port discovery." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:483 +#: i2p2www/pages/site/docs/transport/ssu.html:488 msgid "" "If Alice receives Charlie's first message but not his second,\n" "she will retransmit her PeerTest message to Charlie up to a \n" @@ -15381,7 +13332,7 @@ msgid "" "that Charlie is either confused or no longer online." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:491 +#: i2p2www/pages/site/docs/transport/ssu.html:496 msgid "" "Alice should choose Bob arbitrarily from known peers who seem\n" "to be capable of participating in peer tests. Bob in turn should\n" @@ -15392,7 +13343,7 @@ msgid "" "to designate a new peer as Bob and try again with a different nonce." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:501 +#: i2p2www/pages/site/docs/transport/ssu.html:506 msgid "" "Alice's introduction key is included in all of the PeerTest \n" "messages so that she doesn't need to already have an established\n" @@ -15401,11 +13352,11 @@ msgid "" "with either Bob or Charlie, but it is not required." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:529 +#: i2p2www/pages/site/docs/transport/ssu.html:534 msgid "Transmission window, ACKs and Retransmissions" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:530 +#: i2p2www/pages/site/docs/transport/ssu.html:535 #, python-format msgid "" "The DATA message may contain ACKs of full messages and\n" @@ -15415,26 +13366,24 @@ msgid "" "for details." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:538 +#: i2p2www/pages/site/docs/transport/ssu.html:543 #, python-format msgid "" -"The details of windowing, ACK, and retransmission strategies are not " -"specified\n" +"The details of windowing, ACK, and retransmission strategies are not specified\n" "here. See the Java code for the current implementation.\n" "During the establishment phase, and for peer testing, routers\n" "should implement exponential backoff for retransmission.\n" "For an established connection, routers should implement\n" -"an adjustable transmission window, RTT estimate and timeout, similar to " -"TCP\n" +"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n" "or <a href=\"%(streaming)s\">streaming</a>.\n" "See the code for initial, min and max parameters." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:550 +#: i2p2www/pages/site/docs/transport/ssu.html:555 msgid "Security" msgstr "BezpieczeÅ„stwo" -#: i2p2www/pages/site/docs/transport/ssu.html:551 +#: i2p2www/pages/site/docs/transport/ssu.html:556 msgid "" "UDP source addresses may, of course, be spoofed.\n" "Additionally, the IPs and ports contained inside specific\n" @@ -15443,108 +13392,98 @@ msgid "" "Also, certain actions and responses may need to be rate-limited." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:559 +#: i2p2www/pages/site/docs/transport/ssu.html:564 msgid "" "The details of validation are not specified\n" "here. Implementers should add defenses where appropriate." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:565 +#: i2p2www/pages/site/docs/transport/ssu.html:570 msgid "Peer capabilities" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:575 +#: i2p2www/pages/site/docs/transport/ssu.html:580 msgid "" "If the peer address contains the 'B' capability, that means \n" "they are willing and able to participate in peer tests as\n" "a 'Bob' or 'Charlie'." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:612 +#: i2p2www/pages/site/docs/transport/ssu.html:617 msgid "" -"Analysis of current SSU performance, including assessment of window size " -"adjustment\n" -"and other parameters, and adjustment of the protocol implementation to " -"improve\n" +"Analysis of current SSU performance, including assessment of window size adjustment\n" +"and other parameters, and adjustment of the protocol implementation to improve\n" "performance, is a topic for future work." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:618 +#: i2p2www/pages/site/docs/transport/ssu.html:623 msgid "" -"The current implementation repeatedly sends acknowledgments for the same " -"packets,\n" +"The current implementation repeatedly sends acknowledgments for the same packets,\n" "which unnecessarily increases overhead." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:623 +#: i2p2www/pages/site/docs/transport/ssu.html:628 msgid "" -"The default small MTU value of 620 should be analyzed and possibly " -"increased.\n" +"The default small MTU value of 620 should be analyzed and possibly increased.\n" "The current MTU adjustment strategy should be evaluated.\n" -"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? " -"Probably not." +"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:629 +#: i2p2www/pages/site/docs/transport/ssu.html:634 msgid "The protocol should be extended to exchange MTUs during the setup." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:633 +#: i2p2www/pages/site/docs/transport/ssu.html:638 msgid "Rekeying is currently unimplemented and may never be." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:637 +#: i2p2www/pages/site/docs/transport/ssu.html:642 msgid "" -"The potential use of the 'challenge' fields in RelayIntro and " -"RelayResponse,\n" -"and use of the padding field in SessionRequest and SessionCreated, is " -"undocumented." +"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n" +"and use of the padding field in SessionRequest and SessionCreated, is undocumented." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:642 +#: i2p2www/pages/site/docs/transport/ssu.html:647 msgid "" "Instead of a single fragment per packet, a more efficient\n" -"strategy may be to bundle multiple message fragments into the same " -"packet,\n" +"strategy may be to bundle multiple message fragments into the same packet,\n" "so long as it doesn't exceed the MTU." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:648 +#: i2p2www/pages/site/docs/transport/ssu.html:653 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:654 +#: i2p2www/pages/site/docs/transport/ssu.html:659 msgid "" -"Why are introduction keys the same as the router hash, should it be " -"changed, would there be any benefit?" +"Why are introduction keys the same as the router hash, should it be changed," +" would there be any benefit?" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:658 +#: i2p2www/pages/site/docs/transport/ssu.html:663 msgid "Capacities appear to be unused." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:662 +#: i2p2www/pages/site/docs/transport/ssu.html:667 msgid "" -"Signed-on times in SessionCreated and SessionConfirmed appear to be " -"unused or unverified." +"Signed-on times in SessionCreated and SessionConfirmed appear to be unused " +"or unverified." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:667 +#: i2p2www/pages/site/docs/transport/ssu.html:672 msgid "Implementation Diagram" msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:668 +#: i2p2www/pages/site/docs/transport/ssu.html:673 msgid "" "This diagram\n" -"should accurately reflect the current implementation, however there may " -"be small differences." +"should accurately reflect the current implementation, however there may be small differences." msgstr "" -#: i2p2www/pages/site/docs/transport/ssu.html:676 +#: i2p2www/pages/site/docs/transport/ssu.html:681 msgid "Now on the SSU specification page" msgstr "" @@ -15565,12 +13504,9 @@ msgid "" "Within I2P, messages are passed in one direction through a virtual\n" "tunnel of peers, using whatever means are available to pass the \n" "message on to the next hop. Messages arrive at the tunnel's \n" -"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel " -"messages, \n" -"and are forwarded on to the next hop in the tunnel, which processes and " -"verifies\n" -"the validity of the message and sends it on to the next hop, and so on, " -"until\n" +"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n" +"and are forwarded on to the next hop in the tunnel, which processes and verifies\n" +"the validity of the message and sends it on to the next hop, and so on, until\n" "it reaches the tunnel endpoint. That <i>endpoint</i> takes the messages\n" "bundled up by the gateway and forwards them as instructed - either\n" "to another router, to another tunnel on another router, or locally." @@ -15592,12 +13528,9 @@ msgid "" "in the tunnel, and provides each with the necessary configuration\n" "data. They may have any number of hops.\n" "It is the intent to make\n" -"it hard for either participants or third parties to determine the length " -"of \n" -"a tunnel, or even for colluding participants to determine whether they " -"are a\n" -"part of the same tunnel at all (barring the situation where colluding " -"peers are\n" +"it hard for either participants or third parties to determine the length of \n" +"a tunnel, or even for colluding participants to determine whether they are a\n" +"part of the same tunnel at all (barring the situation where colluding peers are\n" "next to each other in the tunnel)." msgstr "" @@ -15635,8 +13568,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:69 #, python-format msgid "" -"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are " -"processed and passed through it.\n" +"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n" "Tunnel operation has four distinct processes, taken on by various \n" "peers in the tunnel." msgstr "" @@ -15663,8 +13595,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:89 msgid "" -"Eventually, the tunnel messages arrive at the endpoint where the I2NP " -"messages\n" +"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n" "originally bundled by the gateway are reassembled and forwarded on as \n" "requested." msgstr "" @@ -15724,11 +13655,13 @@ msgid "Decrypt (using an encryption operation)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:133 -msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message" +msgid "" +"Decrypt (using an encryption operation) to reveal plaintext tunnel message" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:134 -msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" +msgid "" +"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:142 @@ -15789,10 +13722,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:181 msgid "" "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n" -"tunnel ID to listen for messages with and what tunnel ID they should be " -"forwarded\n" -"on as to the next hop, and each hop chooses the tunnel ID which they " -"receive messages\n" +"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n" +"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n" "on. Tunnels themselves are short-lived (10 minutes).\n" "Even if subsequent tunnels are built using the same sequence of \n" "peers, each hop's tunnel ID will change." @@ -15800,16 +13731,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:190 msgid "" -"To prevent adversaries from tagging the messages along the path by " -"adjusting\n" -"the message size, all tunnel messages are a fixed 1024 bytes in size. To" -" accommodate \n" -"larger I2NP messages as well as to support smaller ones more efficiently," -" the\n" -"gateway splits up the larger I2NP messages into fragments contained " -"within each\n" -"tunnel message. The endpoint will attempt to rebuild the I2NP message " -"from the\n" +"To prevent adversaries from tagging the messages along the path by adjusting\n" +"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n" +"larger I2NP messages as well as to support smaller ones more efficiently, the\n" +"gateway splits up the larger I2NP messages into fragments contained within each\n" +"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n" "fragments for a short period of time, but will discard them as necessary." msgstr "" @@ -15826,30 +13752,20 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:207 msgid "" -"After the preprocessing of messages into a padded payload, the gateway " -"builds\n" -"a random 16 byte IV value, iteratively encrypting it and the tunnel " -"message as\n" -"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel " -"message} to the next hop." +"After the preprocessing of messages into a padded payload, the gateway builds\n" +"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n" +"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:213 msgid "" -"How encryption at the gateway is done depends on whether the tunnel is an" -"\n" -"inbound or an outbound tunnel. For inbound tunnels, they simply select a" -" random\n" -"IV, postprocessing and updating it to generate the IV for the gateway and" -" using \n" -"that IV along side their own layer key to encrypt the preprocessed data." -" For outbound \n" -"tunnels they must iteratively decrypt the (unencrypted) IV and " -"preprocessed \n" -"data with the IV and layer keys for all hops in the tunnel. The result " -"of the outbound\n" -"tunnel encryption is that when each peer encrypts it, the endpoint will " -"recover \n" +"How encryption at the gateway is done depends on whether the tunnel is an\n" +"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n" +"IV, postprocessing and updating it to generate the IV for the gateway and using \n" +"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n" +"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n" +"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n" +"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n" "the initial preprocessed data." msgstr "" @@ -15859,46 +13775,29 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:227 msgid "" -"When a peer receives a tunnel message, it checks that the message came " -"from\n" -"the same previous hop as before (initialized when the first message comes" -" through\n" -"the tunnel). If the previous peer is a different router, or if the " -"message has\n" -"already been seen, the message is dropped. The participant then encrypts" -" the \n" -"received IV with AES256/ECB using their IV key to determine the current " -"IV, uses \n" -"that IV with the participant's layer key to encrypt the data, encrypts " -"the \n" -"current IV with AES256/ECB using their IV key again, then forwards the " -"tuple \n" -"{nextTunnelId, nextIV, encryptedData} to the next hop. This double " -"encryption\n" +"When a peer receives a tunnel message, it checks that the message came from\n" +"the same previous hop as before (initialized when the first message comes through\n" +"the tunnel). If the previous peer is a different router, or if the message has\n" +"already been seen, the message is dropped. The participant then encrypts the \n" +"received IV with AES256/ECB using their IV key to determine the current IV, uses \n" +"that IV with the participant's layer key to encrypt the data, encrypts the \n" +"current IV with AES256/ECB using their IV key again, then forwards the tuple \n" +"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n" "of the IV (both before and after use) help address a certain class of\n" "confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:243 msgid "" -"Duplicate message detection is handled by a decaying Bloom filter on " -"message\n" -"IVs. Each router maintains a single Bloom filter to contain the XOR of " -"the IV and\n" -"the first block of the message received for all of the tunnels it is " -"participating\n" -"in, modified to drop seen entries after 10-20 minutes (when the tunnels " -"will have\n" -"expired). The size of the bloom filter and the parameters used are " -"sufficient to\n" -"more than saturate the router's network connection with a negligible " -"chance of \n" -"false positive. The unique value fed into the Bloom filter is the XOR of" -" the IV \n" -"and the first block so as to prevent nonsequential colluding peers in the" -" tunnel \n" -"from tagging a message by resending it with the IV and first block " -"switched." +"Duplicate message detection is handled by a decaying Bloom filter on message\n" +"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n" +"the first block of the message received for all of the tunnels it is participating\n" +"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n" +"expired). The size of the bloom filter and the parameters used are sufficient to\n" +"more than saturate the router's network connection with a negligible chance of \n" +"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n" +"and the first block so as to prevent nonsequential colluding peers in the tunnel \n" +"from tagging a message by resending it with the IV and first block switched." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:256 @@ -15907,27 +13806,19 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:258 msgid "" -"After receiving and validating a tunnel message at the last hop in the " -"tunnel,\n" -"how the endpoint recovers the data encoded by the gateway depends upon " -"whether \n" -"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, " -"the \n" -"endpoint encrypts the message with its layer key just like any other " -"participant, \n" -"exposing the preprocessed data. For inbound tunnels, the endpoint is " -"also the \n" -"tunnel creator so they can merely iteratively decrypt the IV and message," -" using the \n" +"After receiving and validating a tunnel message at the last hop in the tunnel,\n" +"how the endpoint recovers the data encoded by the gateway depends upon whether \n" +"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n" +"endpoint encrypts the message with its layer key just like any other participant, \n" +"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n" +"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n" "layer and IV keys of each step in reverse order." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:268 msgid "" -"At this point, the tunnel endpoint has the preprocessed data sent by the " -"gateway,\n" -"which it may then parse out into the included I2NP messages and forwards " -"them as\n" +"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n" +"which it may then parse out into the included I2NP messages and forwards them as\n" "requested in their delivery instructions." msgstr "" @@ -15937,30 +13828,21 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:277 msgid "" -"When building a tunnel, the creator must send a request with the " -"necessary\n" -"configuration data to each of the hops and wait for all of them to agree " -"before\n" -"enabling the tunnel. The requests are encrypted so that only the peers " -"who need\n" -"to know a piece of information (such as the tunnel layer or IV key) has " -"that\n" -"data. In addition, only the tunnel creator will have access to the " -"peer's\n" -"reply. There are three important dimensions to keep in mind when " -"producing\n" -"the tunnels: what peers are used (and where), how the requests are sent " -"(and \n" +"When building a tunnel, the creator must send a request with the necessary\n" +"configuration data to each of the hops and wait for all of them to agree before\n" +"enabling the tunnel. The requests are encrypted so that only the peers who need\n" +"to know a piece of information (such as the tunnel layer or IV key) has that\n" +"data. In addition, only the tunnel creator will have access to the peer's\n" +"reply. There are three important dimensions to keep in mind when producing\n" +"the tunnels: what peers are used (and where), how the requests are sent (and \n" "replies received), and how they are maintained." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:291 msgid "" -"Beyond the two types of tunnels - inbound and outbound - there are two " -"styles\n" +"Beyond the two types of tunnels - inbound and outbound - there are two styles\n" "of peer selection used for different tunnels - exploratory and client.\n" -"Exploratory tunnels are used for both network database maintenance and " -"tunnel\n" +"Exploratory tunnels are used for both network database maintenance and tunnel\n" "maintenance, while client tunnels are used for end to end client messages." msgstr "" @@ -15970,18 +13852,12 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:301 msgid "" -"Exploratory tunnels are built out of a random selection of peers from a " -"subset\n" -"of the network. The particular subset varies on the local router and on " -"what their\n" -"tunnel routing needs are. In general, the exploratory tunnels are built " -"out of\n" -"randomly selected peers who are in the peer's \"not failing but active\" " -"profile\n" -"category. The secondary purpose of the tunnels, beyond merely tunnel " -"routing,\n" -"is to find underutilized high capacity peers so that they can be promoted" -" for\n" +"Exploratory tunnels are built out of a random selection of peers from a subset\n" +"of the network. The particular subset varies on the local router and on what their\n" +"tunnel routing needs are. In general, the exploratory tunnels are built out of\n" +"randomly selected peers who are in the peer's \"not failing but active\" profile\n" +"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n" +"is to find underutilized high capacity peers so that they can be promoted for\n" "use in client tunnels." msgstr "" @@ -15998,14 +13874,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:319 msgid "" -"Client tunnels are built with a more stringent set of requirements - the " -"local\n" -"router will select peers out of its \"fast and high capacity\" profile " -"category so\n" -"that performance and reliability will meet the needs of the client " -"application.\n" -"However, there are several important details beyond that basic selection " -"that \n" +"Client tunnels are built with a more stringent set of requirements - the local\n" +"router will select peers out of its \"fast and high capacity\" profile category so\n" +"that performance and reliability will meet the needs of the client application.\n" +"However, there are several important details beyond that basic selection that \n" "should be adhered to, depending upon the client's anonymity needs." msgstr "" @@ -16031,10 +13903,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:341 msgid "" "To frustrate the predecessor \n" -"attack, the tunnel selection keeps the peers selected in a strict order -" -"\n" -"if A, B, and C are in a tunnel for a particular tunnel pool, the hop " -"after A is always B, and the hop after\n" +"attack, the tunnel selection keeps the peers selected in a strict order -\n" +"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n" "B is always C." msgstr "" @@ -16043,18 +13913,15 @@ msgid "" "Ordering is implemented by generating a random 32-byte key for each\n" "tunnel pool at startup.\n" "Peers should not be able to guess the ordering, or an attacker could\n" -"craft two router hashes far apart to maximize the chance of being at both" -"\n" +"craft two router hashes far apart to maximize the chance of being at both\n" "ends of a tunnel.\n" "Peers are sorted by XOR distance of the\n" -"SHA256 Hash of (the peer's hash concatenated with the random key) from " -"the random key" +"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:363 msgid "" -"Because each tunnel pool uses a different random key, ordering is " -"consistent\n" +"Because each tunnel pool uses a different random key, ordering is consistent\n" "within a single pool but not between different pools.\n" "New keys are generated at each router restart." msgstr "" @@ -16066,8 +13933,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:372 #, python-format msgid "" -"A multi-hop tunnel is built using a single build message which is " -"repeatedly\n" +"A multi-hop tunnel is built using a single build message which is repeatedly\n" "decrypted and forwarded. In the terminology of\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n" "this is \"non-interactive\" telescopic tunnel building." @@ -16078,38 +13944,28 @@ msgstr "" msgid "" "This tunnel request preparation, delivery, and response method is\n" "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n" -"predecessors exposed, cuts the number of messages transmitted, verifies " -"proper\n" -"connectivity, and avoids the message counting attack of traditional " -"telescopic\n" +"predecessors exposed, cuts the number of messages transmitted, verifies proper\n" +"connectivity, and avoids the message counting attack of traditional telescopic\n" "tunnel creation.\n" -"(This method, which sends messages to extend a tunnel through the " -"already-established\n" -"part of the tunnel, is termed \"interactive\" telescopic tunnel building " -"in\n" +"(This method, which sends messages to extend a tunnel through the already-established\n" +"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n" "the \"Hashing it out\" paper.)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:390 #, python-format msgid "" -"The details of tunnel request and response messages, and their " -"encryption,\n" +"The details of tunnel request and response messages, and their encryption,\n" "<a href=\"%(tunnelcreation)s\">are specified here</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:395 msgid "" -"Peers may reject tunnel creation requests for a variety of reasons, " -"though\n" -"a series of four increasingly severe rejections are known: probabilistic " -"rejection\n" -"(due to approaching the router's capacity, or in response to a flood of " -"requests), \n" -"transient overload, bandwidth overload, and critical failure. When " -"received, \n" -"those four are interpreted by the tunnel creator to help adjust their " -"profile of\n" +"Peers may reject tunnel creation requests for a variety of reasons, though\n" +"a series of four increasingly severe rejections are known: probabilistic rejection\n" +"(due to approaching the router's capacity, or in response to a flood of requests), \n" +"transient overload, bandwidth overload, and critical failure. When received, \n" +"those four are interpreted by the tunnel creator to help adjust their profile of\n" "the router in question." msgstr "" @@ -16127,37 +13983,26 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:412 #, python-format msgid "" -"To allow efficient operation, the router maintains a series of tunnel " -"pools,\n" -"each managing a group of tunnels used for a specific purpose with their " -"own\n" -"configuration. When a tunnel is needed for that purpose, the router " -"selects one\n" -"out of the appropriate pool at random. Overall, there are two " -"exploratory tunnel\n" -"pools - one inbound and one outbound - each using the router's default " -"configuration.\n" +"To allow efficient operation, the router maintains a series of tunnel pools,\n" +"each managing a group of tunnels used for a specific purpose with their own\n" +"configuration. When a tunnel is needed for that purpose, the router selects one\n" +"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n" +"pools - one inbound and one outbound - each using the router's default configuration.\n" "In addition, there is a pair of pools for each local destination -\n" -"one inbound and one outbound tunnel pool. Those pools use the " -"configuration specified\n" -"when the local destination connects to the router via <a " -"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" +"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n" +"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" "not specified." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:424 #, python-format msgid "" -"Each pool has within its configuration a few key settings, defining how " -"many\n" -"tunnels to keep active, how many backup tunnels to maintain in case of " -"failure,\n" +"Each pool has within its configuration a few key settings, defining how many\n" +"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n" "how long the tunnels should be, whether those\n" "lengths should be randomized, as \n" -"well as any of the other settings allowed when configuring individual " -"tunnels.\n" -"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP " -"page</a>." +"well as any of the other settings allowed when configuring individual tunnels.\n" +"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:434 @@ -16174,20 +14019,14 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:440 msgid "" -"Tunnel building is expensive, and tunnels expire a fixed time after they " -"are built.\n" -"However, when a pool that runs out of tunnels, the Destination is " -"essentially dead.\n" -"In addition, tunnel build success rate may vary greatly with both local " -"and global\n" +"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n" +"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n" +"In addition, tunnel build success rate may vary greatly with both local and global\n" "network conditions.\n" -"Therefore, it is important to maintain an anticipatory, adaptive build " -"strategy\n" -"to ensure that new tunnels are successfully built before they are needed," -"\n" +"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n" +"to ensure that new tunnels are successfully built before they are needed,\n" "without building an excess of tunnels, building them too soon,\n" -"or consuming too much CPU or bandwidth creating and sending the encrypted" -" build messages." +"or consuming too much CPU or bandwidth creating and sending the encrypted build messages." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:451 @@ -16195,8 +14034,7 @@ msgid "" "For each tuple {exploratory/client, in/out, length, length variance}\n" "the router maintains statistics on the time required for a successful\n" "tunnel build.\n" -"Using these statistics, it calculates how long before a tunnel's " -"expiration\n" +"Using these statistics, it calculates how long before a tunnel's expiration\n" "it should start attempting to build a replacement.\n" "As the expiration time approaches without a successful replacement,\n" "it starts multiple build attempts in parallel, and then\n" @@ -16218,30 +14056,18 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:473 msgid "" -"Even though the tunnels within I2P bear a resemblance to a circuit " -"switched\n" -"network, everything within I2P is strictly message based - tunnels are " -"merely\n" -"accounting tricks to help organize the delivery of messages. No " -"assumptions are\n" -"made regarding reliability or ordering of messages, and retransmissions " -"are left\n" -"to higher levels (e.g. I2P's client layer streaming library). This " -"allows I2P\n" -"to take advantage of throttling techniques available to both packet " -"switched and\n" -"circuit switched networks. For instance, each router may keep track of " -"the \n" -"moving average of how much data each tunnel is using, combine that with " -"all of \n" -"the averages used by other tunnels the router is participating in, and be" -" able\n" -"to accept or reject additional tunnel participation requests based on its" -" \n" -"capacity and utilization. On the other hand, each router can simply drop" -" \n" -"messages that are beyond its capacity, exploiting the research used on " -"the \n" +"Even though the tunnels within I2P bear a resemblance to a circuit switched\n" +"network, everything within I2P is strictly message based - tunnels are merely\n" +"accounting tricks to help organize the delivery of messages. No assumptions are\n" +"made regarding reliability or ordering of messages, and retransmissions are left\n" +"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n" +"to take advantage of throttling techniques available to both packet switched and\n" +"circuit switched networks. For instance, each router may keep track of the \n" +"moving average of how much data each tunnel is using, combine that with all of \n" +"the averages used by other tunnels the router is participating in, and be able\n" +"to accept or reject additional tunnel participation requests based on its \n" +"capacity and utilization. On the other hand, each router can simply drop \n" +"messages that are beyond its capacity, exploiting the research used on the \n" "normal Internet." msgstr "" @@ -16249,23 +14075,16 @@ msgstr "" msgid "" "In the current implementation, routers implement a\n" "weighted random early discard (WRED) strategy.\n" -"For all participating routers (internal participant, inbound gateway, and" -" outbound endpoint),\n" +"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n" "the router will start randomly dropping a portion of messages as the\n" "bandwidth limits are approached.\n" -"As traffic gets closer to, or exceeds, the limits, more messages are " -"dropped.\n" -"For an internal participant, all messages are fragmented and padded and " -"therefore are the same size.\n" -"At the inbound gateway and outbound endpoint, however, the dropping " -"decision is made\n" -"on the full (coalesced) message, and the message size is taken into " -"account.\n" +"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n" +"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n" +"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n" +"on the full (coalesced) message, and the message size is taken into account.\n" "Larger messages are more likely to be dropped.\n" -"Also, messages are more likely to be dropped at the outbound endpoint " -"than the inbound gateway,\n" -"as those messages are not as \"far along\" in their journey and thus the " -"network cost of\n" +"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n" +"as those messages are not as \"far along\" in their journey and thus the network cost of\n" "dropping those messages is lower." msgstr "" @@ -16275,16 +14094,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:509 msgid "" -"What strategies could be used at the gateway and at each hop for " -"delaying,\n" -"reordering, rerouting, or padding messages? To what extent should this " -"be done\n" -"automatically, how much should be configured as a per tunnel or per hop " -"setting,\n" -"and how should the tunnel's creator (and in turn, user) control this " -"operation?\n" -"All of this is left as unknown, to be worked out for a distant future " -"release." +"What strategies could be used at the gateway and at each hop for delaying,\n" +"reordering, rerouting, or padding messages? To what extent should this be done\n" +"automatically, how much should be configured as a per tunnel or per hop setting,\n" +"and how should the tunnel's creator (and in turn, user) control this operation?\n" +"All of this is left as unknown, to be worked out for a distant future release." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:518 @@ -16293,13 +14107,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:519 msgid "" -"The padding strategies can be used on a variety of levels, addressing the" -"\n" +"The padding strategies can be used on a variety of levels, addressing the\n" "exposure of message size information to different adversaries.\n" -"The current fixed tunnel message size is 1024 bytes. Within this " -"however, the fragmented\n" -"messages themselves are not padded by the tunnel at all, though for end " -"to end \n" +"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n" +"messages themselves are not padded by the tunnel at all, though for end to end \n" "messages, they may be padded as part of the garlic wrapping." msgstr "" @@ -16327,8 +14138,7 @@ msgstr "Listopad 2016" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7 msgid "" -"This page describes the origins and design of I2P's unidirectional " -"tunnels.\n" +"This page describes the origins and design of I2P's unidirectional tunnels.\n" "For further information see:" msgstr "" @@ -16362,8 +14172,7 @@ msgid "" "Several apps and protocols, notably HTTP,\n" "do transfer data in such manner. Having the traffic follow the same \n" "route to its destination and back could make it easier for an \n" -"attacker who has only timing and traffic volume data to infer the path a" -" \n" +"attacker who has only timing and traffic volume data to infer the path a \n" "tunnel is taking.\n" "Having the response come back along a different path arguably \n" "makes it harder." @@ -16372,42 +14181,27 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45 msgid "" "When dealing with \n" -"an internal adversary or most external adversaries, I2P's undirectional " -"tunnels\n" -"expose half as much traffic data than would be exposed with bidirectional" -" circuits\n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels." +"an internal adversary or most external adversaries, I2P's undirectional tunnels\n" +"expose half as much traffic data than would be exposed with bidirectional circuits\n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55 msgid "" "The strategy of using two separate tunnels for inbound and outbound\n" -"communication is not the only technique available, and it does have " -"anonymity\n" -"implications. On the positive side, by using separate tunnels it lessens" -" the\n" -"traffic data exposed for analysis to participants in a tunnel - for " -"instance,\n" -"peers in an outbound tunnel from a web browser would only see the traffic" -" of\n" +"communication is not the only technique available, and it does have anonymity\n" +"implications. On the positive side, by using separate tunnels it lessens the\n" +"traffic data exposed for analysis to participants in a tunnel - for instance,\n" +"peers in an outbound tunnel from a web browser would only see the traffic of\n" "an HTTP GET, while the peers in an inbound tunnel would see the payload \n" -"delivered along the tunnel. With bidirectional tunnels, all participants" -" would\n" -"have access to the fact that e.g. 1KB was sent in one direction, then " -"100KB\n" -"in the other. On the negative side, using unidirectional tunnels means " -"that\n" -"there are two sets of peers which need to be profiled and accounted for, " -"and\n" -"additional care must be taken to address the increased speed of " -"predecessor\n" +"delivered along the tunnel. With bidirectional tunnels, all participants would\n" +"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n" +"in the other. On the negative side, using unidirectional tunnels means that\n" +"there are two sets of peers which need to be profiled and accounted for, and\n" +"additional care must be taken to address the increased speed of predecessor\n" "attacks. The tunnel pooling and building process\n" "(peer selection and ordering strategies)\n" "should minimize the worries of the predecessor attack." @@ -16421,28 +14215,22 @@ msgstr "" #, python-format msgid "" "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n" -"declared that I2P's unidirectional tunnels \"seems to be a bad design " -"decision\"." +"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80 msgid "" "The paper's main point is that\n" -"deanonymizations on unidirectional tunnels take a longer time, which is " -"an \n" -"advantage, but that an attacker can be more certain in the unidirectional" -" case. \n" -"Therefore, the paper claims it isn't an advantage at all, but a " -"disadvantage, at least\n" +"deanonymizations on unidirectional tunnels take a longer time, which is an \n" +"advantage, but that an attacker can be more certain in the unidirectional case. \n" +"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n" "with long-living I2P Sites." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88 msgid "" -"This conclusion is not fully supported by the paper. Unidirectional " -"tunnels clearly \n" -"mitigate other attacks and it's not clear how to trade off the risk of " -"the \n" +"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n" +"mitigate other attacks and it's not clear how to trade off the risk of the \n" "attack in the paper\n" "with attacks on a bidirectional tunnel architecture." msgstr "" @@ -16451,63 +14239,45 @@ msgstr "" msgid "" "This conclusion is based on an arbitrary certainty vs. time weighting \n" "(tradeoff) that may not be applicable in all cases. For \n" -"example, somebody could make a list of possible IPs then issue subpoenas " -"to \n" +"example, somebody could make a list of possible IPs then issue subpoenas to \n" "each. Or the attacker could DDoS each in turn and via a simple \n" -"intersection attack see if the I2P Site goes down or is slowed down. So " -"close \n" +"intersection attack see if the I2P Site goes down or is slowed down. So close \n" "may be good enough, or time may be more important." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104 msgid "" -"The conclusion is based on a specific weighting of the importance of " -"certainty \n" -"vs. time, and that weighting may be wrong, and it's definitely debatable," -" \n" -"especially in a real world with subpoenas, search warrants, and other " -"methods \n" +"The conclusion is based on a specific weighting of the importance of certainty \n" +"vs. time, and that weighting may be wrong, and it's definitely debatable, \n" +"especially in a real world with subpoenas, search warrants, and other methods \n" "available for final confirmation." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111 msgid "" "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n" -"tunnels is clearly outside the scope of the paper, and has not been done" -" \n" -"elsewhere. For example, how does this attack compare to the numerous " -"possible \n" -"timing attacks published about onion-routed networks? Clearly the authors" -" have not\n" +"tunnels is clearly outside the scope of the paper, and has not been done \n" +"elsewhere. For example, how does this attack compare to the numerous possible \n" +"timing attacks published about onion-routed networks? Clearly the authors have not\n" "done that analysis, if it's even possible to do it\n" "effectively." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120 msgid "" -"Tor uses bidirectional tunnels and has had a lot of academic review. I2P" -" \n" -"uses unidirectional tunnels and has had very little review. Does the lack" -" of a \n" -"research paper defending unidirectional tunnels mean that it is a poor " -"design \n" +"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n" +"uses unidirectional tunnels and has had very little review. Does the lack of a \n" +"research paper defending unidirectional tunnels mean that it is a poor design \n" "choice, or just that it needs more study? Timing attacks and \n" -"distributed attacks are difficult to defend against in both I2P and Tor. " -"The \n" -"design intent (see references above) was that unidirectional tunnels are " -"more \n" -"resistant to timing attacks. However, the paper presents a somewhat " -"different type of timing \n" +"distributed attacks are difficult to defend against in both I2P and Tor. The \n" +"design intent (see references above) was that unidirectional tunnels are more \n" +"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n" "attack. Is this attack, innovative as it is, sufficient to label I2P's \n" "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n" -"implication clearly inferior to Tor, or is it just a design alternative " -"that \n" -"clearly needs further investigation and analysis? There are several other" -" reasons \n" -"to consider I2P currently inferior to Tor and other projects (small " -"network \n" -"size, lack of funding, lack of review) but is unidirectional tunnels " -"really a \n" +"implication clearly inferior to Tor, or is it just a design alternative that \n" +"clearly needs further investigation and analysis? There are several other reasons \n" +"to consider I2P currently inferior to Tor and other projects (small network \n" +"size, lack of funding, lack of review) but is unidirectional tunnels really a \n" "reason?" msgstr "" @@ -16518,4 +14288,3 @@ msgid "" "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n" "conclusion is not supported by the paper." msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/get-involved.po b/i2p2www/translations/pl/LC_MESSAGES/get-involved.po index 7ad7fe010cb9b9fd0e9410ffeaff9f7b14850c54..c605737715241466a1d19017b902d49b1e741b62 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/pl/LC_MESSAGES/get-involved.po @@ -1,26 +1,25 @@ -# Polish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Karol Kosek, 2018,2020 # Karol Kosek, 2020 # sebx, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-05-01 16:48+0000\n" -"Last-Translator: ☆Verdulo\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Karol Kosek, 2020\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -35,12 +34,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -55,44 +51,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -131,10 +116,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -164,10 +147,8 @@ msgstr "Naklejki" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -182,25 +163,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -226,8 +197,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -241,12 +211,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -257,18 +224,11 @@ msgstr "TÅ‚umaczenie" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." -msgstr "" -"Pomóż przetÅ‚umaczyć stronÄ™ internetowÄ… i oprogramowanie na swój jÄ™zyk. " -"TÅ‚umacze sÄ… bardzo ważnÄ… częściÄ… tego zdecentralizowanego projektu, a " -"Twoja praca jest zawsze doceniana. Zobacz <a " -"href=\"%(newtrans)s\">poradnik dla nowych tÅ‚umaczy</a>, aby dowiedzieć " -"siÄ™ wiÄ™cej." +msgstr "Pomóż przetÅ‚umaczyć stronÄ™ internetowÄ… i oprogramowanie na swój jÄ™zyk. TÅ‚umacze sÄ… bardzo ważnÄ… częściÄ… tego zdecentralizowanego projektu, a Twoja praca jest zawsze doceniana. Zobacz <a href=\"%(newtrans)s\">poradnik dla nowych tÅ‚umaczy</a>, aby dowiedzieć siÄ™ wiÄ™cej." #: i2p2www/pages/site/get-involved/index.html:47 msgid "Documentation" @@ -276,17 +236,12 @@ msgstr "Dokumentacja" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -297,16 +252,11 @@ msgstr "TestujÄ™" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -319,14 +269,10 @@ msgstr "UsÅ‚ugi" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -336,9 +282,9 @@ msgstr "Ponowne seedowanie" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -382,8 +328,7 @@ msgstr "" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -391,7 +336,7 @@ msgstr "" msgid "Roadmap" msgstr "Plany na przyszÅ‚ość" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -452,84 +397,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -538,17 +460,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -556,29 +473,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -586,42 +497,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -665,72 +567,52 @@ msgstr "" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -740,8 +622,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -754,33 +636,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -801,76 +677,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -880,25 +737,18 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -909,29 +759,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -941,10 +783,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -952,13 +792,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -969,43 +806,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1020,28 +850,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1052,8 +874,7 @@ msgstr "UsuniÄ™to" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1067,8 +888,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1087,14 +907,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1103,17 +919,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1123,8 +936,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1146,32 +958,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1180,47 +985,39 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1232,12 +1029,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1262,8 +1056,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1282,8 +1076,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1312,20 +1105,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1397,8 +1186,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1411,24 +1199,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1438,22 +1217,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1489,21 +1260,16 @@ msgstr "" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1527,10 +1293,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1541,8 +1305,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1555,10 +1318,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1568,7 +1329,8 @@ msgid "Release Signing Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1589,7 +1351,8 @@ msgid "Download PGP public key" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1597,13 +1360,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1611,7 +1375,8 @@ msgid "Security GPG Key" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1620,8 +1385,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1653,35 +1417,28 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1689,29 +1446,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1738,12 +1489,10 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1753,10 +1502,8 @@ msgstr "SpoÅ‚eczność" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1778,8 +1525,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1787,13 +1534,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1802,8 +1550,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1817,34 +1564,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1854,61 +1595,49 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1935,20 +1664,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1957,14 +1685,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1974,12 +1702,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1999,8 +1728,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2027,12 +1755,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2051,22 +1776,22 @@ msgstr "Używanie IDE do I2P" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2083,8 +1808,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2101,14 +1826,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2187,34 +1912,26 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2224,20 +1941,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2254,22 +1967,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2281,10 +1991,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2294,38 +2002,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2343,23 +2043,17 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2373,11 +2067,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2388,34 +2079,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2428,18 +2112,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2453,16 +2133,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2482,67 +2160,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2566,8 +2234,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2583,44 +2251,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2628,8 +2286,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2638,64 +2295,59 @@ msgid "New Developer's Guide" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "Uzyskiwanie kodu I2P" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "TÅ‚umaczenia" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "NarzÄ™dzia" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2703,42 +2355,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "Åatwy sposób: Git" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2751,143 +2395,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 -#, python-format -msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 -#, python-format -msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "Anonimowo:" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2896,93 +2428,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -3002,11 +2483,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3021,10 +2500,8 @@ msgstr "" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3044,12 +2521,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3060,27 +2534,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3096,10 +2566,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3117,8 +2585,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3131,19 +2598,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3151,15 +2614,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3168,8 +2629,8 @@ msgstr "FAQ" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3185,67 +2646,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3270,10 +2729,8 @@ msgstr "PrzeglÄ…d" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3282,21 +2739,17 @@ msgstr "Wymagania" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3319,8 +2772,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3330,18 +2782,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3351,10 +2798,8 @@ msgstr "Polityka PrywatnoÅ›ci" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3363,17 +2808,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3382,10 +2825,8 @@ msgstr "Pierwsze kroki" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3396,18 +2837,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "" - diff --git a/i2p2www/translations/pl/LC_MESSAGES/priority.po b/i2p2www/translations/pl/LC_MESSAGES/priority.po index 40bb1a51b86fb62818191c2e0f8fa5cec00c9e2c..675d8036167dc8fe820fe93d683f62f9f0982530 100644 --- a/i2p2www/translations/pl/LC_MESSAGES/priority.po +++ b/i2p2www/translations/pl/LC_MESSAGES/priority.po @@ -1,7 +1,7 @@ -# Polish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Tomasz Ciborski <zenji.yamada.nihon@gmail.com>, 2015 # Karolina <karolina@bitwylesne.pl>, 2014 @@ -14,19 +14,18 @@ # Tracerneo <ziolkoneo@gmail.com>, 2013 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:27+0000\n" -"PO-Revision-Date: 2021-11-28 20:00+0000\n" -"Last-Translator: ☆Verdulo\n" +"PO-Revision-Date: 2013-02-03 00:02+0000\n" +"Last-Translator: ☆Verdulo, 2021\n" "Language-Team: Polish (http://www.transifex.com/otf/I2P/language/pl/)\n" -"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && " -"(n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && " -"n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: pl\n" +"Plural-Forms: nplurals=4; plural=(n==1 ? 0 : (n%10>=2 && n%10<=4) && (n%100<12 || n%100>14) ? 1 : n!=1 && (n%10>=0 && n%10<=1) || (n%10>=5 && n%10<=9) || (n%100>=12 && n%100<=14) ? 2 : 3);\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" @@ -65,16 +64,10 @@ msgstr "Autor:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P\n" -"and to utilize the outproxies available within I2P. Below are " -"walkthroughs for\n" +"Your web browser will need to be configured in order to browse web sites on I2P\n" +"and to utilize the outproxies available within I2P. Below are walkthroughs for\n" "some of the most popular browsers." -msgstr "" -"BÄ™dziesz musiaÅ‚(a) skonfigurować swojÄ… przeglÄ…darkÄ™ do przeglÄ…dania " -"ukrytych stron w sieci I2P i zwykÅ‚ych stron poprzez proxy wyjÅ›ciowe. " -"Poniżej znajdujÄ… siÄ™ opisy konfiguracji najpopularniejszych przeglÄ…darek " -"internetowych." +msgstr "BÄ™dziesz musiaÅ‚(a) skonfigurować swojÄ… przeglÄ…darkÄ™ do przeglÄ…dania ukrytych stron w sieci I2P i zwykÅ‚ych stron poprzez proxy wyjÅ›ciowe. Poniżej znajdujÄ… siÄ™ opisy konfiguracji najpopularniejszych przeglÄ…darek internetowych." #: i2p2www/pages/downloads/browser-content.html:7 msgid "Firefox Profile for Windows" @@ -83,23 +76,15 @@ msgstr "Profil dla Firefoksa pod Windowsem" #: i2p2www/pages/downloads/browser-content.html:8 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" "<a href='%(profile)s'>Firefox profile</a>." -msgstr "" -"Jeżeli korzystasz z systemu Windows, zalecanÄ… metodÄ… przeglÄ…dania zasobów" -" sieci I2P jest nasz <a href='%(profile)s'>profil przeglÄ…darki " -"Firefox</a>." +msgstr "Jeżeli korzystasz z systemu Windows, zalecanÄ… metodÄ… przeglÄ…dania zasobów sieci I2P jest nasz <a href='%(profile)s'>profil przeglÄ…darki Firefox</a>." #: i2p2www/pages/downloads/browser-content.html:12 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -"\n" +"If you do not wish to use that profile or are not on Windows, you need to\n" "configure your browser yourself. Read below on how to that." -msgstr "" -"Jeżeli nie chcesz korzystać z tego profilu bÄ…dź nie korzystasz z " -"Windowsa, musisz samodzielnie skonfigurować przeglÄ…darkÄ™. Instrukcje " -"znajdujÄ… siÄ™ poniżej." +msgstr "Jeżeli nie chcesz korzystać z tego profilu bÄ…dź nie korzystasz z Windowsa, musisz samodzielnie skonfigurować przeglÄ…darkÄ™. Instrukcje znajdujÄ… siÄ™ poniżej." #: i2p2www/pages/downloads/browser-content.html:17 msgid "How to configure your browser" @@ -118,39 +103,23 @@ msgstr "Konfiguracja z użyciem eksperymentalnego rozszerzenia" #: i2p2www/pages/downloads/browser-content.html:30 msgid "" "A new way of automatically configuring the I2P Browser is\n" -"currently being tested. It uses the Firefox's \"Container Tabs\" to build" -" private\n" +"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n" "browsing tools for use with I2P and I2P applications." -msgstr "" -"TrwajÄ… testy nowego sposobu na automatyczne skonfigurowanie „przeglÄ…darki" -" I2Pâ€. Korzysta ono z funkcji Firefoksa „karty z kontekstemâ€, aby " -"utworzyć prywatnÄ… przeglÄ…darkÄ™ do użytku ze stronami i aplikacjami I2P. " +msgstr "TrwajÄ… testy nowego sposobu na automatyczne skonfigurowanie „przeglÄ…darki I2Pâ€. Korzysta ono z funkcji Firefoksa „karty z kontekstemâ€, aby utworzyć prywatnÄ… przeglÄ…darkÄ™ do użytku ze stronami i aplikacjami I2P. " #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "It does pre-configuration of your browser by enabling some of\n" -"the privacy Browser Settings like ResistFingerprinting, and enforces " -"WebRTC proxy\n" -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving\n" -"Firefox's integration with I2P. It is a by-product of the I2P Browser " -"project.\n" -msgstr "" -"Rozszerzenie to konfiguruje przeglÄ…darkÄ™ aktywujÄ…c kilka ustawieÅ„ " -"prywatnoÅ›ci, takich jak „privacy.resistFingerprinting†czy wymuszenie " -"dziaÅ‚ania WebRTC przez proxy. Zawiera również menu, zakÅ‚adki i narzÄ™dzia " -"monitorujÄ…ce zwiÄ™kszajÄ…ce integracjÄ™ przeglÄ…darki Firefox z I2P. Jest to " -"efekt uboczny prac nad „PrzeglÄ…darkÄ… I2Pâ€.\n" +"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n" +"obedience. It also contains menus, shortcuts, and monitoring tools improving\n" +"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n" +msgstr "Rozszerzenie to konfiguruje przeglÄ…darkÄ™ aktywujÄ…c kilka ustawieÅ„ prywatnoÅ›ci, takich jak „privacy.resistFingerprinting†czy wymuszenie dziaÅ‚ania WebRTC przez proxy. Zawiera również menu, zakÅ‚adki i narzÄ™dzia monitorujÄ…ce zwiÄ™kszajÄ…ce integracjÄ™ przeglÄ…darki Firefox z I2P. Jest to efekt uboczny prac nad „PrzeglÄ…darkÄ… I2Pâ€.\n" #: i2p2www/pages/downloads/browser-content.html:38 msgid "" -"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon" -"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" +"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" "can be obtained from the Mozilla addon store.\n" -msgstr "" -"Rozszerzenie <a href=\"https://addons.mozilla.org/pl/firefox/addon/i2p-" -"in-private-browsing/\">I2P in Private Browsing</a> można poprać z " -"repozytorium rozszerzeÅ„ Mozilli.\n" +msgstr "Rozszerzenie <a href=\"https://addons.mozilla.org/pl/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a> można poprać z repozytorium rozszerzeÅ„ Mozilli.\n" #: i2p2www/pages/downloads/browser-content.html:41 msgid "Instructions for Firefox 57 and above:" @@ -159,13 +128,9 @@ msgstr "Instrukcja dla Firefoksa 57 i nowszych:" #: i2p2www/pages/downloads/browser-content.html:42 msgid "" "From the Menu button in the top right, select <em>Preferences</em>.\n" -"Scroll down until you see the <em>Network Proxy</em> section, as shown in" -" the\n" +"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n" "screenshot below. Click on <em>Settings</em>" -msgstr "" -"Kliknij w menu ☰ w prawym górnym rogu, wybierz <em>Preferencje</em>. " -"NastÄ™pnie przewiÅ„ w dół do sekcji <em>Sieć</em> i wybierz " -"<em>Ustawienia</em>" +msgstr "Kliknij w menu ☰ w prawym górnym rogu, wybierz <em>Preferencje</em>. NastÄ™pnie przewiÅ„ w dół do sekcji <em>Sieć</em> i wybierz <em>Ustawienia</em>" #: i2p2www/pages/downloads/browser-content.html:48 msgid "Firefox57 Network Options" @@ -175,13 +140,9 @@ msgstr "Firefox 57: opcje sieci" msgid "" "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n" " configuration</em>. Set both the HTTP and SSL Proxy to address\n" -"<code>127.0.0.1</code> with port <code>4444</code> as shown in the " -"following\n" +"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n" "screenshot." -msgstr "" -"W oknie <em>Ustawienia poÅ‚Ä…czenia</em> wybierz <em>RÄ™czna konfiguracja " -"serwerów proxy</em>, ustaw proxy HTTP i HTTPS na <code>127.0.0.1</code>, " -"port <code>4444</code>, tak jak widnieje to na poniższym zrzucie ekranu." +msgstr "W oknie <em>Ustawienia poÅ‚Ä…czenia</em> wybierz <em>RÄ™czna konfiguracja serwerów proxy</em>, ustaw proxy HTTP i HTTPS na <code>127.0.0.1</code>, port <code>4444</code>, tak jak widnieje to na poniższym zrzucie ekranu." #: i2p2www/pages/downloads/browser-content.html:56 msgid "" @@ -197,10 +158,7 @@ msgstr "Firefox 57: ustawienia poÅ‚Ä…czenia" msgid "" "Finally, go to the address <em>about:config</em> and find the property\n" "media.peerConnection.ice.proxy_only. Ensure that this setting is True." -msgstr "" -"NastÄ™pnie przejdź na stronÄ™ <em>about:config</em> i znajdź ustawienie " -"„media.peerconnection.ice.proxy_only†i upewnij siÄ™, że ma przypisanÄ… " -"wartość „Trueâ€." +msgstr "NastÄ™pnie przejdź na stronÄ™ <em>about:config</em> i znajdź ustawienie „media.peerconnection.ice.proxy_only†i upewnij siÄ™, że ma przypisanÄ… wartość „Trueâ€." #: i2p2www/pages/downloads/browser-content.html:63 msgid "" @@ -219,26 +177,12 @@ msgstr " Chrome" #: i2p2www/pages/downloads/browser-content.html:69 msgid "" "An experimental, partially-automated configuration process for\n" -"Chrome is available. In order to configure it, create a new " -"<em>Profile</em>\n" -"especially for your I2P browsing, separate from the default profile. Then" -" install\n" -"this <a " -"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>" -" in your newly-created profile. This profile\n" -"is now configured to use I2P. Highly detailed instructions are available " -"at the\n" -"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-" -"Chromium\">homepage.</a>\n" -msgstr "" -"Eksperymentalna, częściowo automatyczna metoda konfiguracji jest dostÄ™pna" -" dl przeglÄ…darki Chrome. Musisz utworzyć nowy <em>profil</em> specjalnie " -"do przeglÄ…dania sieci I2P, oddzielny od zwykÅ‚ego profilu. NastÄ™pnie " -"zainstaluj w tym profilu to <a \n" -"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>rozszerzenie</em></a>." -" Profil jest już gotowy do pracy z sieciÄ… I2P. DokÅ‚adniejsze instrukcje " -"znajdujÄ… siÄ™ na <a href=\"https://eyedeekay.github.io/I2P-Configuration-" -"For-Chromium/\">tej stronie</a> (w j. angielskim).\n" +"Chrome is available. In order to configure it, create a new <em>Profile</em>\n" +"especially for your I2P browsing, separate from the default profile. Then install\n" +"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n" +"is now configured to use I2P. Highly detailed instructions are available at the\n" +"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n" +msgstr "Eksperymentalna, częściowo automatyczna metoda konfiguracji jest dostÄ™pna dl przeglÄ…darki Chrome. Musisz utworzyć nowy <em>profil</em> specjalnie do przeglÄ…dania sieci I2P, oddzielny od zwykÅ‚ego profilu. NastÄ™pnie zainstaluj w tym profilu to <a \nhref=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>rozszerzenie</em></a>. Profil jest już gotowy do pracy z sieciÄ… I2P. DokÅ‚adniejsze instrukcje znajdujÄ… siÄ™ na <a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium/\">tej stronie</a> (w j. angielskim).\n" #: i2p2www/pages/downloads/browser-content.html:76 msgid "All Chrome Versions" @@ -246,21 +190,12 @@ msgstr "Wszystkie wersje Chrome" #: i2p2www/pages/downloads/browser-content.html:77 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their\n" -"proxy settings depending on variant and platform. These instructions may " -"be\n" -"slightly different in Brave or Iridium, for instance. From the " -"<em>Main</em>\n" -"menu, navigate to the <em>Settings</em>, and search for the <em></em> " -"menu item.\n" +"Chromium-Based Browsers like Chrome have slightly different places for their\n" +"proxy settings depending on variant and platform. These instructions may be\n" +"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n" +"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n" "Clicking it will open the right settings for your platform." -msgstr "" -"PrzeglÄ…darki na silniku Chromium, takie jak Google Chrome majÄ… różne " -"umiejscowienie ustawieÅ„ proxy w zależnoÅ›ci od wariantu i platformy. " -"Poniższe instrukcje mogÄ… nieco siÄ™ różnić dla przeglÄ…darek Brave czy " -"Iridium. W <em>menu głównym<em> otwórz <em>Ustawienia</em> i wyszukaj " -"<em>proxy</em>. Kliknij, aby otworzyć ustawienia serwerów proxy." +msgstr "PrzeglÄ…darki na silniku Chromium, takie jak Google Chrome majÄ… różne umiejscowienie ustawieÅ„ proxy w zależnoÅ›ci od wariantu i platformy. Poniższe instrukcje mogÄ… nieco siÄ™ różnić dla przeglÄ…darek Brave czy Iridium. W <em>menu głównym<em> otwórz <em>Ustawienia</em> i wyszukaj <em>proxy</em>. Kliknij, aby otworzyć ustawienia serwerów proxy." #: i2p2www/pages/downloads/browser-content.html:84 msgid "Chrome Proxy Options" @@ -268,16 +203,10 @@ msgstr "Chrome: ustawienia proxy" #: i2p2www/pages/downloads/browser-content.html:85 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used\n" -"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure" -" it by\n" +"On Windows, this button will launch you into the shared proxy settings used\n" +"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n" "following the Internet Explorer 8 guide." -msgstr "" -"Pod systemem Windows zostanÄ… otwarte współdzielone ustawienia proxy " -"używane przez przeglÄ…darkÄ™ <a href=\"#ie8\"><em>Internet " -"Explorer</em></a>, opis konfiguracji znajdziesz w instrukcji odnoÅ›nie " -"konfiguracji przeglÄ…darki Internet Explorer 8." +msgstr "Pod systemem Windows zostanÄ… otwarte współdzielone ustawienia proxy używane przez przeglÄ…darkÄ™ <a href=\"#ie8\"><em>Internet Explorer</em></a>, opis konfiguracji znajdziesz w instrukcji odnoÅ›nie konfiguracji przeglÄ…darki Internet Explorer 8." #: i2p2www/pages/downloads/browser-content.html:92 msgid " IceRaven and other Firefoxes for Android " @@ -290,103 +219,54 @@ msgstr "Konfiguracja z użyciem rozszerzenia" #: i2p2www/pages/downloads/browser-content.html:94 msgid "" "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n" -"an about:config page for you to configure proxy settings manually. It is " -"further\n" -"not possible to use most extensions in Fenix-based Firefoxes. It is " -"possible to\n" -"enable support about:config and enable more extensions in Firefox Nightly" -" at the time \n" -"of this writing, but it's a manual and difficult process. " -"<em>IceRaven</em> is a fork\n" -"of Firefox which enables a collection of extensions while Mozilla and the" -" Mozilla\n" -"Community work on adding support for extensions to Firefox for Android. " -"It provides\n" -"the easiest way of configuring a modern Firefox-based Browser for " -"Android. It does\n" -"not come from Mozilla and carries no guarantees from them. <em>Installing" -" the extension\n" +"an about:config page for you to configure proxy settings manually. It is further\n" +"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n" +"enable support about:config and enable more extensions in Firefox Nightly at the time \n" +"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n" +"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n" +"Community work on adding support for extensions to Firefox for Android. It provides\n" +"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n" +"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P.</em>" -msgstr "" -"Nowsze wersje przeglÄ…darki Firefox („Fenixâ€) nie majÄ… strony " -"about:config, co uniemożliwia rÄ™cznÄ… konfiguracjÄ™. Ponadto wiÄ™kszość " -"rozszerzeÅ„ nie dziaÅ‚a z wersjami Firefoksa „Fenixâ€. Jest możliwa " -"aktywacja strony about:config i pobranie innych rozszerzeÅ„ w wersji " -"Nightly w czasie pisania tej instrukcji, ale jest to żmudny i trudny " -"proces. <em>IceRaven</em> jest odnogÄ… Firefoksa umożliwiajÄ…cÄ… korzystanie" -" z wiÄ™kszej iloÅ›ci rozszerzeÅ„ podczas gdy organizacja i spoÅ‚eczność " -"Mozilli pracujÄ… nad dodaniem wsparcia dla rozszerzeÅ„ do Firefoksa na " -"Androidzie. Jest to najÅ‚atwiejszy sposób na konfiguracjÄ™ nowszych wersji " -"Firefoksa, ale aplikacja ta nie pochodzi od Mozilli i nie jest przez " -"posiada aprobaty organizacji Mozilla. <em>Instalacja rozszerzenia w " -"przeglÄ…darce IceRaven umożliwi przekierowanie Twojego ruchu sieciowego do" -" sieci I2P.</em>" +msgstr "Nowsze wersje przeglÄ…darki Firefox („Fenixâ€) nie majÄ… strony about:config, co uniemożliwia rÄ™cznÄ… konfiguracjÄ™. Ponadto wiÄ™kszość rozszerzeÅ„ nie dziaÅ‚a z wersjami Firefoksa „Fenixâ€. Jest możliwa aktywacja strony about:config i pobranie innych rozszerzeÅ„ w wersji Nightly w czasie pisania tej instrukcji, ale jest to żmudny i trudny proces. <em>IceRaven</em> jest odnogÄ… Firefoksa umożliwiajÄ…cÄ… korzystanie z wiÄ™kszej iloÅ›ci rozszerzeÅ„ podczas gdy organizacja i spoÅ‚eczność Mozilli pracujÄ… nad dodaniem wsparcia dla rozszerzeÅ„ do Firefoksa na Androidzie. Jest to najÅ‚atwiejszy sposób na konfiguracjÄ™ nowszych wersji Firefoksa, ale aplikacja ta nie pochodzi od Mozilli i nie jest przez posiada aprobaty organizacji Mozilla. <em>Instalacja rozszerzenia w przeglÄ…darce IceRaven umożliwi przekierowanie Twojego ruchu sieciowego do sieci I2P.</em>" #: i2p2www/pages/downloads/browser-content.html:104 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been\n" -"using IceRaven for a while, go to the main menu, select the History tab, " -"and make\n" -"sure that you have cleared information about your past browsing by " -"tapping the\n" +"If you have not installed IceRaven yet, go to the next step. If you have been\n" +"using IceRaven for a while, go to the main menu, select the History tab, and make\n" +"sure that you have cleared information about your past browsing by tapping the\n" "\"Delete History\" button." -msgstr "" -"Jeżeli jeszcze nie posiadasz apki IceRaven, przejdź do nastÄ™pnego kroku. " -"Jeżeli korzystaÅ‚eÅ›/korzystaÅ‚aÅ› przez pewien czas z IceRavena, otwórz " -"kartÄ™ historii i wyczyść informacje o wczeÅ›niejszej aktywnoÅ›ci " -"przyciskiem „Wyczyść historiÄ™â€." +msgstr "Jeżeli jeszcze nie posiadasz apki IceRaven, przejdź do nastÄ™pnego kroku. Jeżeli korzystaÅ‚eÅ›/korzystaÅ‚aÅ› przez pewien czas z IceRavena, otwórz kartÄ™ historii i wyczyść informacje o wczeÅ›niejszej aktywnoÅ›ci przyciskiem „Wyczyść historiÄ™â€." #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\"\n" -"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. " -"Install\n" +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n" +"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n" "the extension named <em>I2P Proxy for Android and other Systems</em>.\n" -msgstr "" -"Otwórz menu główne przeglÄ…darki IceRaven, przewiÅ„ do sekcji " -"„Rozszerzeniaâ€. Otwórz „Menadżera rozszerzeń†z menu i zainstaluj " -"rozszerzenie <em>I2P Proxy for Android and other Systems</em>.\n" +msgstr "Otwórz menu główne przeglÄ…darki IceRaven, przewiÅ„ do sekcji „Rozszerzeniaâ€. Otwórz „Menadżera rozszerzeń†z menu i zainstaluj rozszerzenie <em>I2P Proxy for Android and other Systems</em>.\n" #: i2p2www/pages/downloads/browser-content.html:112 msgid "Your IceRaven browser is now configured to use I2P.\n" -msgstr "" -"Teraz Twoja przeglÄ…darka IceRaven jest skonfigurowana do przeglÄ…dania " -"sieci I2P.\n" +msgstr "Teraz Twoja przeglÄ…darka IceRaven jest skonfigurowana do przeglÄ…dania sieci I2P.\n" #: i2p2www/pages/downloads/browser-content.html:114 msgid "" "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n" "web browsers, if installed from the following addons.mozilla.org URL.\n" -"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-" -"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" -msgstr "" -"Rozszerzenie to dziaÅ‚a także w przeglÄ…darkach opartych na starszych (<68)" -" wersji Firefoksa, jeżeli zostaÅ‚o zainstalowane z repozytorium Mozilli: " -"<em><a href=\"https://addons.mozilla.org/pl/android/addon/i2p-" -"proxy/\">I2P Proxy for Android and Other Systems</a><em>.\n" +"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" +msgstr "Rozszerzenie to dziaÅ‚a także w przeglÄ…darkach opartych na starszych (<68) wersji Firefoksa, jeżeli zostaÅ‚o zainstalowane z repozytorium Mozilli: <em><a href=\"https://addons.mozilla.org/pl/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>.\n" #: i2p2www/pages/downloads/browser-content.html:118 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." -msgstr "" -"Rozszerzenie to jest takie same jak rozszerzenie do Chromium i jest " -"skompilowane z tego samego kodu źródÅ‚owego." +"This extension is identical to the Chromium extension and is built from the " +"same source." +msgstr "Rozszerzenie to jest takie same jak rozszerzenie do Chromium i jest skompilowane z tego samego kodu źródÅ‚owego." #: i2p2www/pages/downloads/browser-content.html:119 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their <a " -"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-" -"support-in-firefox-for-android-nightly/\">Blog</a>" -msgstr "" -"Aby wÅ‚Ä…czyć wsparcie rozszerzeÅ„ w Firefoksie Nightly, przeczytaj <a " -"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-" -"support-in-firefox-for-android-nightly/\">nastÄ™pujÄ…cy artykuÅ‚</a> (w j. " -"angielskim) na blogu Mozilli." +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>" +msgstr "Aby wÅ‚Ä…czyć wsparcie rozszerzeÅ„ w Firefoksie Nightly, przeczytaj <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">nastÄ™pujÄ…cy artykuÅ‚</a> (w j. angielskim) na blogu Mozilli." #: i2p2www/pages/downloads/browser-content.html:124 msgid "Internet Explorer" @@ -394,13 +274,10 @@ msgstr "Internet Explorer" #: i2p2www/pages/downloads/browser-content.html:125 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." -msgstr "" -"W menu start wyszukaj „Sieć i internetâ€, aby otworzyć ustawienia. Kliknij" -" ostatniÄ… pozycjÄ™ w menu – „Proxyâ€." +msgstr "W menu start wyszukaj „Sieć i internetâ€, aby otworzyć ustawienia. Kliknij ostatniÄ… pozycjÄ™ w menu – „Proxyâ€." #: i2p2www/pages/downloads/browser-content.html:130 msgid "IE Internet Options" @@ -408,22 +285,12 @@ msgstr "Opcje internetowe IE" #: i2p2www/pages/downloads/browser-content.html:131 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." -msgstr "" -"NastÄ™pnie zaznacz „Użyj serwera proxy dla sieci LAN†i „Nie używaj " -"serwera proxy dla adresów lokalnychâ€. NastÄ™pnie kliknij przycisk " -"„Zaawansowane†i wprowadź numery portów. Wprowadź wartoÅ›ci z poniższego " -"obrazka, IP 127.0.0.1, port 4444 dla HTTP i 4445 dla HTTPS. Kliknij OK, " -"aby zapisać ustawienia proxy, co sprawi, że Twoja przeglÄ…darka bÄ™dzie " -"skonfigurowana do pracy z I2P." +msgstr "NastÄ™pnie zaznacz „Użyj serwera proxy dla sieci LAN†i „Nie używaj serwera proxy dla adresów lokalnychâ€. NastÄ™pnie kliknij przycisk „Zaawansowane†i wprowadź numery portów. Wprowadź wartoÅ›ci z poniższego obrazka, IP 127.0.0.1, port 4444 dla HTTP i 4445 dla HTTPS. Kliknij OK, aby zapisać ustawienia proxy, co sprawi, że Twoja przeglÄ…darka bÄ™dzie skonfigurowana do pracy z I2P." #: i2p2www/pages/downloads/browser-content.html:138 msgid "IE Proxy Settings" @@ -431,67 +298,41 @@ msgstr "IE: ustawienia proxy" #: i2p2www/pages/downloads/browser-content.html:143 msgid "" -"Remember: I2P was not designed for creating proxies to the outer " -"Internet.\n" +"Remember: I2P was not designed for creating proxies to the outer Internet.\n" "Instead, it is meant to be used as an internal network." -msgstr "" -"Miej na uwadze fakt, że sieć I2P nie zostaÅ‚a zaprojektowana do tworzenia " -"serwerów proxy do normalnego internetu. Celem I2P jest bycie zewnÄ™trznÄ… " -"zamkniÄ™tÄ… sieciÄ…." +msgstr "Miej na uwadze fakt, że sieć I2P nie zostaÅ‚a zaprojektowana do tworzenia serwerów proxy do normalnego internetu. Celem I2P jest bycie zewnÄ™trznÄ… zamkniÄ™tÄ… sieciÄ…." #: i2p2www/pages/downloads/browser-content.html:147 msgid "" -"<p><b>The I2P project itself does not run any proxies to the " -"Internet.</b>\n" +"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n" "The only outproxy is a service from the privacy solutions project.\n" -"Consider donating to them for a continued stable service. Increased " -"funding will\n" +"Consider donating to them for a continued stable service. Increased funding will\n" "allow them to improve this service. </p>\n" "<a href=\"http://privacysolutions.no\"\n" " target=\"_blank\">http://privacysolutions.no</a>" -msgstr "" -"<p><b>Projekt I2P nie jest operatorem serwerów proxy do zwykÅ‚ego " -"internetu<b> Jedyne proxy zewnÄ™trzne jest udostÄ™pniane przez projekt " -"Privacy Solutions. Prosimy rozważyć dotacjÄ™ dla nich, aby wciąż mogli " -"oferować stabilnÄ… usÅ‚ugÄ™. WiÄ™ksze fundusze pozwolÄ… im na rozbudowanie " -"usÅ‚ugi.</p>\n" -"<a href=\"http://privacysolutions.no\" " -"target=\"_blank\">http://privacysolutions.no</a>" +msgstr "<p><b>Projekt I2P nie jest operatorem serwerów proxy do zwykÅ‚ego internetu<b> Jedyne proxy zewnÄ™trzne jest udostÄ™pniane przez projekt Privacy Solutions. Prosimy rozważyć dotacjÄ™ dla nich, aby wciąż mogli oferować stabilnÄ… usÅ‚ugÄ™. WiÄ™ksze fundusze pozwolÄ… im na rozbudowanie usÅ‚ugi.</p>\n<a href=\"http://privacysolutions.no\" target=\"_blank\">http://privacysolutions.no</a>" #: i2p2www/pages/downloads/browser-content.html:155 #, python-format msgid "" -"By default, I2P comes with two outproxies configured: " -"<code>%(http)s</code>\n" -"and <code>%(https)s</code>. Even the domain names are different, it's the" -" same outproxy you hit.\n" +"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n" +"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n" "(multi-homed/keyed for better performance)" -msgstr "" -"DomyÅ›lnie wÄ™zeÅ‚ I2P jest skonfigurowany z dwoma zewnÄ™trznymi proxy: " -"<code>%(http)s</code> i <code>%(https)s</code>. Mimo tego, że sÄ… to różne" -" domeny jest to te same proxy zewnÄ™trzne (wiele serwerów i kluczy dla " -"zwiÄ™kszenia wydajnoÅ›ci)." +msgstr "DomyÅ›lnie wÄ™zeÅ‚ I2P jest skonfigurowany z dwoma zewnÄ™trznymi proxy: <code>%(http)s</code> i <code>%(https)s</code>. Mimo tego, że sÄ… to różne domeny jest to te same proxy zewnÄ™trzne (wiele serwerów i kluczy dla zwiÄ™kszenia wydajnoÅ›ci)." #: i2p2www/pages/downloads/browser-content.html:160 msgid "" "Filtering is active on these outproxies (for example, mibbit and torrent\n" "tracker access is blocked). I2P Sites\n" -"that are accessible via .i2p addresses are also not allowed via the " -"outproxies.\n" +"that are accessible via .i2p addresses are also not allowed via the outproxies.\n" "As a convenience, the outproxy blocks ad servers." -msgstr "" -"Proxy te filtrujÄ… poÅ‚Ä…czenia (przykÅ‚adowo Mibbit i trackery torrentów sÄ… " -"zablokowane). Strony majÄ…ce mirrory w domenie .i2p również sÄ… blokowane. " -"Dla wygody blokowane sÄ… również serwery reklam." +msgstr "Proxy te filtrujÄ… poÅ‚Ä…czenia (przykÅ‚adowo Mibbit i trackery torrentów sÄ… zablokowane). Strony majÄ…ce mirrory w domenie .i2p również sÄ… blokowane. Dla wygody blokowane sÄ… również serwery reklam." #: i2p2www/pages/downloads/browser-content.html:166 msgid "" -"<a href=\"https://www.torproject.org\">Tor</a> is a good application to " -"use as an\n" +"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n" "outproxy to the Internet." -msgstr "" -"Jeżeli chcesz proxy do zwykÅ‚ego internetu, skorzystaj z <a " -"href=\"https://www.torproject.org\">sieci Tor</a>." +msgstr "Jeżeli chcesz proxy do zwykÅ‚ego internetu, skorzystaj z <a href=\"https://www.torproject.org\">sieci Tor</a>." #: i2p2www/pages/downloads/config.html:2 i2p2www/pages/site/faq.html:19 msgid "Configuration" @@ -507,20 +348,11 @@ msgstr "Debian Buster, Ubuntu Bionic i nowsze" #: i2p2www/pages/downloads/debian.html:7 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have " -"older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" "If you are not running Debian Sid or the latest Ubuntu release,\n" -"use our Debian repo or Launchpad PPA to ensure you're running the latest " -"I2P version." -msgstr "" -"I2P jest dostÄ™pne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub " -"późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach " -"Debian Buster i Ubuntu Bionic (LTS) mogÄ… być przestarzaÅ‚e. Jeżeli " -"korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj" -" nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszÄ… " -"wersjÄ™." +"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." +msgstr "I2P jest dostÄ™pne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach Debian Buster i Ubuntu Bionic (LTS) mogÄ… być przestarzaÅ‚e. Jeżeli korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszÄ… wersjÄ™." #: i2p2www/pages/downloads/debian.html:14 msgid "Debian or Ubuntu, All Versions" @@ -541,23 +373,16 @@ msgstr "<a href=\"#debian\">Debian</a> (Wheezy i nowsze)" #: i2p2www/pages/downloads/debian.html:23 #, python-format msgid "" -"The I2P packages <em>may</em> work on systems not listed above. Please " -"report any issues\n" +"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n" "with these packages on <a href=\"%(trac)s\">Trac</a> at\n" "<a href=\"%(trac)s\">https://trac.i2p2.de</a>." -msgstr "" -"Paczki I2P <em>mogÄ…</em> dziaÅ‚ać w systemach nie wymienionych poniżej. " -"Prosimy o zgÅ‚aszanie wszelkich bÅ‚Ä™dów zwiÄ…zanych z tymi paczkami na " -"naszym <a href=\"%(trac)s\">systemie Å›ledzenia bÅ‚Ä™dów</a> pod adresem <a " -"href=\"%(trac)s\">https://trac.i2p2.de</a>." +msgstr "Paczki I2P <em>mogÄ…</em> dziaÅ‚ać w systemach nie wymienionych poniżej. Prosimy o zgÅ‚aszanie wszelkich bÅ‚Ä™dów zwiÄ…zanych z tymi paczkami na naszym <a href=\"%(trac)s\">systemie Å›ledzenia bÅ‚Ä™dów</a> pod adresem <a href=\"%(trac)s\">https://trac.i2p2.de</a>." #: i2p2www/pages/downloads/debian.html:29 msgid "" "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its " "derivatives (<em>Try this if you're not using Debian)</em>" -msgstr "" -"Opcja 1: <a href=\"#ubuntu\">aktualne wersje</a> Ubuntu i pochodne " -"(<em>spróbuj tego jeÅ›li nie używasz Debiana)</em>" +msgstr "Opcja 1: <a href=\"#ubuntu\">aktualne wersje</a> Ubuntu i pochodne (<em>spróbuj tego jeÅ›li nie używasz Debiana)</em>" #: i2p2www/pages/downloads/debian.html:30 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)" @@ -565,9 +390,7 @@ msgstr "Opcja 2: <a href=\"#debian\">Debian</a> (Å‚Ä…cznie z pochodnymi Debiana #: i2p2www/pages/downloads/debian.html:33 msgid "Instructions for Ubuntu and derivatives like Linux Mint & Trisquel" -msgstr "" -"Instrukcje dla Ubuntu i pochodnych dystrybucji takich jak Linux Mint czy " -"Trisquel" +msgstr "Instrukcje dla Ubuntu i pochodnych dystrybucji takich jak Linux Mint czy Trisquel" #: i2p2www/pages/downloads/debian.html:34 msgid "Adding the PPA via the command line and installing I2P" @@ -582,10 +405,7 @@ msgid "" "This command will add the PPA to /etc/apt/sources.list.d and fetch the\n" "gpg key that the repository has been signed with. The GPG key ensures\n" "that the packages have not been tampered with since being built." -msgstr "" -"To polecenie doda PPA do /etc/apt/sources.list.d i pobierze klucz GPG, " -"którym repozytorium zostaÅ‚o podpisane. Klucz GPG zapewnia, że pakiety nie" -" zostaÅ‚y naruszone przez kogoÅ› w trakcie budowy." +msgstr "To polecenie doda PPA do /etc/apt/sources.list.d i pobierze klucz GPG, którym repozytorium zostaÅ‚o podpisane. Klucz GPG zapewnia, że pakiety nie zostaÅ‚y naruszone przez kogoÅ› w trakcie budowy." #: i2p2www/pages/downloads/debian.html:46 msgid "Notify your package manager of the new PPA by entering:" @@ -596,10 +416,7 @@ msgid "" "This command will retrieve the latest list of software from each\n" "repository that is enabled on your system, including the I2P PPA that\n" "was added with the earlier command." -msgstr "" -"Komenda ta pobierze najnowszÄ… listÄ™ oprogramowania z każdego " -"repozytorium, które jest aktywne w systemie, Å‚Ä…cznie z PPA I2P dodane " -"poprzednim poleceniem." +msgstr "Komenda ta pobierze najnowszÄ… listÄ™ oprogramowania z każdego repozytorium, które jest aktywne w systemie, Å‚Ä…cznie z PPA I2P dodane poprzednim poleceniem." #: i2p2www/pages/downloads/debian.html:54 msgid "You are now ready to install I2P!" @@ -611,54 +428,36 @@ msgstr "Dodawanie PPA używajÄ…c Synaptic" #: i2p2www/pages/downloads/debian.html:61 msgid "" -"Open Synaptic (System -> Administration -> Synaptic Package " -"Manager)." +"Open Synaptic (System -> Administration -> Synaptic Package Manager)." msgstr "Otwórz Synaptic (system → administracja → menadżer pakietów Synaptic)." #: i2p2www/pages/downloads/debian.html:66 msgid "" -"Once Synaptic opens, select <em>Repositories</em> from the " -"<em>Settings</em> menu." -msgstr "" -"Kiedy Synaptic otworzy siÄ™, wybierz <em>repozytoria</em> z menu " -"<em>ustawienia</em>." +"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>" +" menu." +msgstr "Kiedy Synaptic otworzy siÄ™, wybierz <em>repozytoria</em> z menu <em>ustawienia</em>." #: i2p2www/pages/downloads/debian.html:71 msgid "" "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste " "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click " -"<em>Add Source</em>. Click the <em>Close</em> button then " -"<em>Reload</em>." -msgstr "" -"Kliknij w zakÅ‚adkÄ™ <em>inne źródÅ‚a</em>, nastÄ™pnie <em>dodaj</em> i wklej" -" <code>ppa:i2p-maintainers/i2p</code> do pola APT i kliknij na <em>dodaj " -"źródÅ‚o</em>. NastÄ™pnie kliknij przycisk <em>zamknij</em> i " -"<em>odÅ›wież</em>." +"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>." +msgstr "Kliknij w zakÅ‚adkÄ™ <em>inne źródÅ‚a</em>, nastÄ™pnie <em>dodaj</em> i wklej <code>ppa:i2p-maintainers/i2p</code> do pola APT i kliknij na <em>dodaj źródÅ‚o</em>. NastÄ™pnie kliknij przycisk <em>zamknij</em> i <em>odÅ›wież</em>." #: i2p2www/pages/downloads/debian.html:76 msgid "" "In the Quick Filter box, type in <code>i2p</code> and press enter. When " "<code>i2p</code> is returned in the results list, right click " -"<code>i2p</code> and select <em>Mark for Installation</em>. After doing " -"so you may see a <em>Mark additional required changes?</em> popup. If so," -" click <em>Mark</em> then <em>Apply</em>." -msgstr "" -"W polu szybkiego filtrowania wpisz <code>i2p</code> i naciÅ›nij enter. Gdy" -" <code>i2p</code> pojawi siÄ™ na liÅ›cie wyników, kliknij go prawym " -"przyciskiem myszy i wybierz <em>zaznacz w celu instalacji</em>. Po " -"dokonaniu wyboru możesz zobaczyć okno: <em>zaznaczyć dodatkowe wymagane " -"zmiany?</em>. JeÅ›li tak, wybierz <em>zaznacz</em> a nastÄ™pnie " -"<em>zastosuj</em>." +"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so " +"you may see a <em>Mark additional required changes?</em> popup. If so, click" +" <em>Mark</em> then <em>Apply</em>." +msgstr "W polu szybkiego filtrowania wpisz <code>i2p</code> i naciÅ›nij enter. Gdy <code>i2p</code> pojawi siÄ™ na liÅ›cie wyników, kliknij go prawym przyciskiem myszy i wybierz <em>zaznacz w celu instalacji</em>. Po dokonaniu wyboru możesz zobaczyć okno: <em>zaznaczyć dodatkowe wymagane zmiany?</em>. JeÅ›li tak, wybierz <em>zaznacz</em> a nastÄ™pnie <em>zastosuj</em>." #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring " -"it for your system." -msgstr "" -"Gdy proces instalacji siÄ™ zakoÅ„czy, możesz przejść do nastÄ™pnej części <a" -" href=\"#Post-install_work\">uruchamianie I2P</a> i konfigurowanie go w " -"systemie." +"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system." +msgstr "Gdy proces instalacji siÄ™ zakoÅ„czy, możesz przejść do nastÄ™pnej części <a href=\"#Post-install_work\">uruchamianie I2P</a> i konfigurowanie go w systemie." #: i2p2www/pages/downloads/debian.html:87 msgid "Instructions for Debian" @@ -670,46 +469,30 @@ msgstr "Obecnie wspierane architektury" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with <code>su</code> or by prefixing each command with " -"<code>sudo</code>)." -msgstr "" -"Uwaga: poniższe czynnoÅ›ci powinny zostać uruchomione z uprawnieniami " -"administratora (jednorazowo wpisujÄ…c komendÄ™ <code>su</code> bÄ…dź też " -"wpisujÄ…c przed każdÄ… komendÄ… <code>sudo</code>)." +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)." +msgstr "Uwaga: poniższe czynnoÅ›ci powinny zostać uruchomione z uprawnieniami administratora (jednorazowo wpisujÄ…c komendÄ™ <code>su</code> bÄ…dź też wpisujÄ…c przed każdÄ… komendÄ… <code>sudo</code>)." #: i2p2www/pages/downloads/debian.html:96 msgid "" "Ensure that <code>apt-transport-https</code> and <code>curl</code> are " "installed." -msgstr "" -"Upewnij siÄ™, że pakiety <code>apt-transport-https</code> i " -"<code>curl</code> sÄ… zainstalowane." +msgstr "Upewnij siÄ™, że pakiety <code>apt-transport-https</code> i <code>curl</code> sÄ… zainstalowane." #: i2p2www/pages/downloads/debian.html:103 #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the <a " -"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" +" Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" " and verify with <code>%(file2)s</code> on your system.\n" " Then, add lines like the following to <code>%(file)s</code>." -msgstr "" -"\n" -"Sprawdź używanÄ… wersjÄ™ Debiana na <a " -"href=\"https://wiki.debian.org/LTS/\" " -"target=\"_blank\">wiki.debian.org</a> i zweryfikuj to w pliku " -"<code>%(file2)s</code>. NastÄ™pnie dopisz nastÄ™pujÄ…ce linijki do pliku " -"<code>%(file)s</code>:" +msgstr "\nSprawdź używanÄ… wersjÄ™ Debiana na <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">wiki.debian.org</a> i zweryfikuj to w pliku <code>%(file2)s</code>. NastÄ™pnie dopisz nastÄ™pujÄ…ce linijki do pliku <code>%(file)s</code>:" #: i2p2www/pages/downloads/debian.html:136 msgid "" "Note: If you are running Debian Sid (testing), then you can install I2P " "directly from Debian's main repository" -msgstr "" -"Uwaga: jeżeli pracujesz na Debianie sid (wydanie testowe), możesz " -"bezpoÅ›rednio zainstalować I2P z głównego repozytorium" +msgstr "Uwaga: jeżeli pracujesz na Debianie sid (wydanie testowe), możesz bezpoÅ›rednio zainstalować I2P z głównego repozytorium" #: i2p2www/pages/downloads/debian.html:143 #, python-format @@ -731,33 +514,22 @@ msgstr "Powiadom menadżera paczek o nowym repozytorium wpisujÄ…c:" #: i2p2www/pages/downloads/debian.html:175 msgid "" "This command will retrieve the latest list of software from every\n" -"repository enabled on your system, including the I2P repository added in " -"step\n" +"repository enabled on your system, including the I2P repository added in step\n" "1." -msgstr "" -"Komenda ta pobierze najnowszÄ… listÄ™ oprogramowania z każdego " -"repozytorium, które jest aktywne w systemie, Å‚Ä…cznie z repozytorium I2P " -"dodanym w kroku 1." +msgstr "Komenda ta pobierze najnowszÄ… listÄ™ oprogramowania z każdego repozytorium, które jest aktywne w systemie, Å‚Ä…cznie z repozytorium I2P dodanym w kroku 1." #: i2p2www/pages/downloads/debian.html:181 msgid "" -"You are now ready to install I2P! Installing the <code>i2p-keyring</code>" -"\n" +"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n" "package will ensure that you receive updates to the repository's GPG key." -msgstr "" -"JesteÅ› już gotowy do instalacji I2P! Instalacja paczki <code>i2p-" -"keyring</code> zagwarantuje otrzymywanie aktualizacji klucza GPG " -"repozytorium." +msgstr "JesteÅ› już gotowy do instalacji I2P! Instalacja paczki <code>i2p-keyring</code> zagwarantuje otrzymywanie aktualizacji klucza GPG repozytorium." #: i2p2www/pages/downloads/debian.html:191 msgid "" -"After the installation process completes you can move on to the next part" -" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it " -"for your system." -msgstr "" -"Gdy zakoÅ„czy siÄ™ proces instalacji, możesz przejść do nastÄ™pnej części <a" -" href=\"#Post-install_work\">uruchamiania</a> i konfigurowania I2P dla " -"Twojego systemu." +"After the installation process completes you can move on to the next part of" +" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your" +" system." +msgstr "Gdy zakoÅ„czy siÄ™ proces instalacji, możesz przejść do nastÄ™pnej części <a href=\"#Post-install_work\">uruchamiania</a> i konfigurowania I2P dla Twojego systemu." #: i2p2www/pages/downloads/debian.html:196 #: i2p2www/pages/downloads/post-install.html:1 @@ -768,95 +540,52 @@ msgstr "Zadania poinstalacyjne" msgid "" "Using these I2P packages the I2P router can be started in the following\n" "three ways:" -msgstr "" -"UżywajÄ…c tych paczek I2P, wÄ™zeÅ‚ I2P może zostać uruchomiony na trzy " -"nastÄ™pujÄ…ce sposoby:" +msgstr "UżywajÄ…c tych paczek I2P, wÄ™zeÅ‚ I2P może zostać uruchomiony na trzy nastÄ™pujÄ…ce sposoby:" #: i2p2www/pages/downloads/debian.html:204 msgid "" -""on demand" using the i2prouter script. Simply run " -""<code>i2prouter\n" -"start</code>" from a command prompt. (Note: Do " -"<strong><u>not</u></strong> use\n" +""on demand" using the i2prouter script. Simply run "<code>i2prouter\n" +"start</code>" from a command prompt. (Note: Do <strong><u>not</u></strong> use\n" "sudo or run it as root!)" -msgstr "" -"„na żądanie†korzystajÄ…c ze skryptu „i2prouter'†– wpisz w terminal:<br>\n" -"<code>i2prouter start</code><br>\n" -"(Uwaga: <strong><u>nie</strong></u> używaj sudo ani nie uruchomiaj jako " -"root!)" +msgstr "„na żądanie†korzystajÄ…c ze skryptu „i2prouter'†– wpisz w terminal:<br>\n<code>i2prouter start</code><br>\n(Uwaga: <strong><u>nie</strong></u> używaj sudo ani nie uruchomiaj jako root!)" #: i2p2www/pages/downloads/debian.html:211 msgid "" -""on demand" without the <a " -"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" -"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-" -"nowrapper</code>\".\n" +""on demand" without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" +"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n" "(Note: Do <strong><u>not</u></strong>\n" "use sudo or run it as root!)" -msgstr "" -"„na żądanie†niekorzystajÄ…c z <a " -"href=\"http://wrapper.tanukisoftware.com/\">wrappera usÅ‚ugi Javy</a> " -"(potrzebne na nie-Linuksowych/nie-x86 systemach) wpisujÄ…c w terminal:<br>" -"\n" -"<code>i2prouter-nowrapper</code><br>\n" -"(Uwaga: <strong><u>nie</u></strong> używaj sudo ani nie uruchamiaj jako " -"root!)" +msgstr "„na żądanie†niekorzystajÄ…c z <a href=\"http://wrapper.tanukisoftware.com/\">wrappera usÅ‚ugi Javy</a> (potrzebne na nie-Linuksowych/nie-x86 systemach) wpisujÄ…c w terminal:<br>\n<code>i2prouter-nowrapper</code><br>\n(Uwaga: <strong><u>nie</u></strong> używaj sudo ani nie uruchamiaj jako root!)" #: i2p2www/pages/downloads/debian.html:219 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"<code>dpkg-" -"reconfigure\n" -"i2p</code>\" as root or using sudo. This is the recommended means of " -"operation." -msgstr "" -"jako usÅ‚uga, która automatycznie uruchamia siÄ™ podczas startu systemu, " -"nawet przed zalogowaniem; usÅ‚ugÄ™ można aktywować poleceniem:<br>\n" -"<code>dpkg-reconfigure i2p</code><br>\n" -"jako root lub używajÄ…c sudo. To jest zalecany tryb dziaÅ‚ania." +"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n" +"i2p</code>\" as root or using sudo. This is the recommended means of operation." +msgstr "jako usÅ‚uga, która automatycznie uruchamia siÄ™ podczas startu systemu, nawet przed zalogowaniem; usÅ‚ugÄ™ można aktywować poleceniem:<br>\n<code>dpkg-reconfigure i2p</code><br>\njako root lub używajÄ…c sudo. To jest zalecany tryb dziaÅ‚ania." #: i2p2www/pages/downloads/debian.html:227 msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" -"if you can. The ports to forward can be found on the <a " -"href=\"http://127.0.0.1:7657/confignet\">\n" -"network configuration page</a> in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find <a href=\"http://portforward.com\">portforward.com</a> to be" -" helpful." -msgstr "" -"Podczas pierwszej instalacji, proszÄ™ pamiÄ™tać aby <b>skonfigurować swój " -"NAT/zaporÄ™ sieciowÄ…</b> w razie możliwoÅ›ci. Porty które należy " -"przekierować znajdziesz na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji sieci</a> w" -" konsoli wÄ™zÅ‚a. Jeżeli bÄ™dziesz potrzebowaÅ‚ pomocy z przekierowaniem " -"portów, to zajrzyj na stronÄ™ <a " -"href=\"http://portforward.com\">portforward.com</a>." +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" +"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n" +"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful." +msgstr "Podczas pierwszej instalacji, proszÄ™ pamiÄ™tać aby <b>skonfigurować swój NAT/zaporÄ™ sieciowÄ…</b> w razie możliwoÅ›ci. Porty które należy przekierować znajdziesz na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji sieci</a> w konsoli wÄ™zÅ‚a. Jeżeli bÄ™dziesz potrzebowaÅ‚ pomocy z przekierowaniem portów, to zajrzyj na stronÄ™ <a href=\"http://portforward.com\">portforward.com</a>." #: i2p2www/pages/downloads/debian.html:234 msgid "" "Please review and <b>adjust the bandwidth settings</b> on the\n" "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." -msgstr "" -"Prosimy także o sprawdzenie i <b>dostosowanie ustawieÅ„ przepustowoÅ›ci</b>" -" na <a href=\"http://127.0.0.1:7657/config.jsp\">stronie " -"konfiguracji</a>, ponieważ domyÅ›lne ustawienia 96 KB/s pobierania i 40 " -"KB/s wysyÅ‚ania sÄ… bardzo oszczÄ™dne." +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." +msgstr "Prosimy także o sprawdzenie i <b>dostosowanie ustawieÅ„ przepustowoÅ›ci</b> na <a href=\"http://127.0.0.1:7657/config.jsp\">stronie konfiguracji</a>, ponieważ domyÅ›lne ustawienia 96 KB/s pobierania i 40 KB/s wysyÅ‚ania sÄ… bardzo oszczÄ™dne." #: i2p2www/pages/downloads/debian.html:240 #: i2p2www/pages/downloads/post-install.html:34 #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the <a " -"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy " -"howto." -msgstr "" -"Jeżeli chcesz surfować po stronach .i2p, to zajrzyj na stronÄ™ <a " -"href=\"%(browserconfig)s\">ustawieÅ„ proxy przeglÄ…darki</a> aby dowiedzieć" -" siÄ™ co i jak." +"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto." +msgstr "Jeżeli chcesz surfować po stronach .i2p, to zajrzyj na stronÄ™ <a href=\"%(browserconfig)s\">ustawieÅ„ proxy przeglÄ…darki</a> aby dowiedzieć siÄ™ co i jak." #: i2p2www/pages/downloads/docker.html:5 msgid "Installing I2P in Docker" @@ -890,9 +619,9 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:24 msgid "" -"<p>Note that this quick-start approach is not suitable for production " -"use. If you want to use I2P in production please read all the " -"instructions on this page." +"<p>Note that this quick-start approach is not suitable for production use. " +"If you want to use I2P in production please read all the instructions on " +"this page." msgstr "" #: i2p2www/pages/downloads/docker.html:25 @@ -916,8 +645,8 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " "downloads. See the example below." msgstr "" @@ -938,8 +667,8 @@ msgstr "Porty" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." msgstr "" #: i2p2www/pages/downloads/docker.html:38 @@ -1013,11 +742,10 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:96 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." msgstr "" #: i2p2www/pages/downloads/docker.html:97 @@ -1027,9 +755,9 @@ msgstr "PrzykÅ‚ad" #: i2p2www/pages/downloads/docker.html:98 msgid "" "Here is an example container that mounts <code>i2phome</code> as home " -"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." +"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:6 @@ -1040,17 +768,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit <a href=\"%(firefox)s\">The " -"Firefox\n" +"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n" "Profile Page</a>." msgstr "" @@ -1065,12 +788,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n" "product." @@ -1083,17 +803,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." msgstr "" @@ -1107,32 +822,24 @@ msgstr "Jak siÄ™ z tego korzysta?" #, python-format msgid "" "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n" -"just download and install <a href=\"%(postfilename)s\">this " -"installer</a>. To\n" +"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n" "start an installer, \"double-click\" the downloaded .exe file." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:65 @@ -1156,9 +863,7 @@ msgstr "" msgid "" "The files are signed by %(signer)s,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." -msgstr "" -"Pliki sÄ… podpisane przez programistÄ™ %(signer)s, <a " -"href=\"%(signingkey)s\">którego klucz znajdziesz tutaj</a>." +msgstr "Pliki sÄ… podpisane przez programistÄ™ %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajdziesz tutaj</a>." #: i2p2www/pages/downloads/easyinstall.html:85 #: i2p2www/pages/downloads/firefox.html:70 @@ -1174,10 +879,8 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." msgstr "" @@ -1189,16 +892,11 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:101 @@ -1209,19 +907,16 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the <code>i2p.firefox</code> " -"project." +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the <code>i2p.firefox</code> project." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:107 #: i2p2www/pages/downloads/easyinstall.html:115 #: i2p2www/pages/downloads/firefox.html:92 -#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79 -#: i2p2www/pages/downloads/mac.html:86 +#: i2p2www/pages/downloads/firefox.html:100 +#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86 msgid "Gitlab Repository" msgstr "" @@ -1233,11 +928,9 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:109 #: i2p2www/pages/downloads/firefox.html:94 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." msgstr "" @@ -1249,50 +942,34 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:117 #: i2p2www/pages/downloads/firefox.html:102 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:124 #: i2p2www/pages/downloads/firefox.html:109 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." msgstr "" #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>." msgstr "" @@ -1302,30 +979,20 @@ msgstr "Profil I2P do przeglÄ…darki Firefox" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." msgstr "" #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" @@ -1358,12 +1025,8 @@ msgstr "Laboratorium" #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"<a href = \"%(lab)s\">I2P Lab</a>\n" -msgstr "" -"\n" -"Jeżeli chciaÅ‚(a)byÅ› wypróbować eksperymentalne projekty zwiÄ…zane z I2P, " -"zapraszamy do <a href = \"%(lab)s\">laboratorium I2P</a>\n" +"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n" +msgstr "\nJeżeli chciaÅ‚(a)byÅ› wypróbować eksperymentalne projekty zwiÄ…zane z I2P, zapraszamy do <a href = \"%(lab)s\">laboratorium I2P</a>\n" #: i2p2www/pages/downloads/list.html:26 msgid "Getting Started" @@ -1377,9 +1040,7 @@ msgstr "Podstawowe kroki" msgid "" "For most platforms and systems, setting I2P installed and running will\n" "consist of up to three steps." -msgstr "" -"Na wiÄ™kszoÅ›ci platform i systemów instalacja i konfiguracja I2P skÅ‚ada " -"siÄ™ z maksymalnie trzech kroków." +msgstr "Na wiÄ™kszoÅ›ci platform i systemów instalacja i konfiguracja I2P skÅ‚ada siÄ™ z maksymalnie trzech kroków." #: i2p2www/pages/downloads/list.html:31 msgid "Install Java: " @@ -1389,8 +1050,7 @@ msgstr "Instalacja Javy: " #, python-format msgid "" " I2P is written in Java and requires\n" -"a Java system to be installed to run. In addition to the I2P download, " -"you need to install Java if you do not have it \n" +"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n" "already installed. I2P requires Java Runtime Version 7 or higher.\n" "(<a href=\"%(java)s\">Oracle</a>,\n" "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n" @@ -1401,21 +1061,8 @@ msgid "" "<br />\n" "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n" "or type <tt>java -version</tt> at your command prompt.\n" -"Only two platforms do not require Java to be installed before I2P is " -"installed, those platforms are:" -msgstr "" -"I2P jest napisane w Javie i wymaga instalacji Å›rodowiska uruchomieniowego" -" Java. Oprócz pobrania I2P, konieczna jest instalacja Javy, jeżeli " -"jeszcze jej nie posiadasz. I2P wymaga Å›rodowiska Java Runtime w wersji 7 " -"lub nowszej (zalecane <a href=\"%(java)s\">Oracle</a>, <a " -"href=\"%(openjdk)s\">OpenJDK</a>, lub <a href=\"%(icedtea)s\">IcedTea</a>" -" Java w wersji 7 lub 8, z wyjÄ…tkiem Raspberry Pi: <a " -"href=\"%(arm8)s\">OpenJDK 9 dla ARM</a>, PowerPC: <a " -"href=\"%(ibmsdk7)s\">IBM Java SE 7 lub 8</a>)\n" -"<br />\n" -"<a href=\"%(detectjre)s\">Sprawdź swojÄ… wersjÄ™ Javy tutaj</a> lub wpisz w" -" konsolÄ™: <tt>java -version</tt>. Tylko nastÄ™pujÄ…ce dwie platformy nie " -"wymagajÄ… instalacji Javy przed instalacjÄ… I2P:" +"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:" +msgstr "I2P jest napisane w Javie i wymaga instalacji Å›rodowiska uruchomieniowego Java. Oprócz pobrania I2P, konieczna jest instalacja Javy, jeżeli jeszcze jej nie posiadasz. I2P wymaga Å›rodowiska Java Runtime w wersji 7 lub nowszej (zalecane <a href=\"%(java)s\">Oracle</a>, <a href=\"%(openjdk)s\">OpenJDK</a>, lub <a href=\"%(icedtea)s\">IcedTea</a> Java w wersji 7 lub 8, z wyjÄ…tkiem Raspberry Pi: <a href=\"%(arm8)s\">OpenJDK 9 dla ARM</a>, PowerPC: <a href=\"%(ibmsdk7)s\">IBM Java SE 7 lub 8</a>)\n<br />\n<a href=\"%(detectjre)s\">Sprawdź swojÄ… wersjÄ™ Javy tutaj</a> lub wpisz w konsolÄ™: <tt>java -version</tt>. Tylko nastÄ™pujÄ…ce dwie platformy nie wymagajÄ… instalacji Javy przed instalacjÄ… I2P:" #: i2p2www/pages/downloads/list.html:50 msgid "Android: " @@ -1424,13 +1071,9 @@ msgstr "Android: " #: i2p2www/pages/downloads/list.html:50 msgid "" "Android comes with a Java virtual machine\n" -"as part of the platform, which I2P for Android uses. Therefore it is not " -"necessary to install Java to use\n" +"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n" "I2P for Android." -msgstr "" -"System Android dostarczany jest z wirtualnÄ… maszynÄ… Javy, z której " -"korzysta I2P. Nie jest wiÄ™c konieczna instalacja Javy do korzystania z " -"sieci I2P." +msgstr "System Android dostarczany jest z wirtualnÄ… maszynÄ… Javy, z której korzysta I2P. Nie jest wiÄ™c konieczna instalacja Javy do korzystania z sieci I2P." #: i2p2www/pages/downloads/list.html:53 msgid "Debian and Ubuntu: " @@ -1439,11 +1082,8 @@ msgstr "Debian i Ubuntu: " #: i2p2www/pages/downloads/list.html:53 msgid "" "On Debian and Ubuntu when using\n" -"a .deb package to install, the system will automatically install and " -"configure a Java environment for you." -msgstr "" -"Instalacja I2P na dystrybucjach Debian i Ubuntu za pomocÄ… paczki .deb " -"wymusi automatycznÄ… instalacjÄ™ i konfiguracjÄ™ Å›rodowiska Java." +"a .deb package to install, the system will automatically install and configure a Java environment for you." +msgstr "Instalacja I2P na dystrybucjach Debian i Ubuntu za pomocÄ… paczki .deb wymusi automatycznÄ… instalacjÄ™ i konfiguracjÄ™ Å›rodowiska Java." #: i2p2www/pages/downloads/list.html:56 msgid "Install I2P: " @@ -1453,9 +1093,7 @@ msgstr "Instalacja I2P: " msgid "" "Once you have Java installed, you should\n" "run the I2P installer for your platform. This step applies to all systems." -msgstr "" -"Po instalacji Javy, uruchom instalkÄ™ I2P przeznaczonÄ… dla Twojej " -"platformy." +msgstr "Po instalacji Javy, uruchom instalkÄ™ I2P przeznaczonÄ… dla Twojej platformy." #: i2p2www/pages/downloads/list.html:58 msgid "Install/Configure a Browser(Optional): " @@ -1464,14 +1102,9 @@ msgstr "Instalacja/konfiguracja przeglÄ…darki (opcjonalne): " #: i2p2www/pages/downloads/list.html:58 msgid "" "Finally, you'll need to\n" -"configure applications to use I2P. Many applications can use I2P, but the" -" first application most people configure is a Web\n" +"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n" "Browser for browsing I2P sites. Detailed instructions are available on the" -msgstr "" -"Na koniec musisz skonfigurować aplikacje do dziaÅ‚ania z sieciÄ… I2P. Wiele" -" aplikacji można skonfigurować do dziaÅ‚ania z I2P, jednak zazwyczaj " -"pierwszÄ… z nich bÄ™dzie przeglÄ…darka internetowa. Szczegółowe instrukcje " -"znajdujÄ… siÄ™ na stronie" +msgstr "Na koniec musisz skonfigurować aplikacje do dziaÅ‚ania z sieciÄ… I2P. Wiele aplikacji można skonfigurować do dziaÅ‚ania z I2P, jednak zazwyczaj pierwszÄ… z nich bÄ™dzie przeglÄ…darka internetowa. Szczegółowe instrukcje znajdujÄ… siÄ™ na stronie" #: i2p2www/pages/downloads/list.html:61 msgid "Browser Page" @@ -1516,10 +1149,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:106 msgid "" "It's now possible to install all I2P components using\n" -" a single package(<strong>No Java Required</strong>). To try out the" -" new installer, click here.\n" -" This bundle can also be used to configure a Firefox Profile. It " -"will not\n" +" a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n" +" This bundle can also be used to configure a Firefox Profile. It will not\n" " interfere with an existing I2P installation if one exists.\n" " " msgstr "" @@ -1534,8 +1165,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:116 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." msgstr "" #: i2p2www/pages/downloads/list.html:120 @@ -1545,24 +1176,13 @@ msgstr "I2P dla systemu macOS" #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will " -"launch the GUI installer.\n" -" Depending on how your computer is set up, you may be able to start " -"the\n" -" installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file or\n" +"The most reliable way to launch the installer is from a terminal like this:\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n" +" Depending on how your computer is set up, you may be able to start the\n" +" installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file or\n" " right-clicking the file and selecting "Open with Java".\n" " Unfortunately, this behaviour is difficult to predict." -msgstr "" -"Najbardziej pewnÄ… metodÄ… uruchomienia instalatora jest wpisanie w " -"terminalu: <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. Uruchomi" -" to graficzny instalator. Zależnie od konfiguracji Twojego komputera, " -"bÄ™dziesz musiaÅ‚(a) dwukrotnie kliknąć plik " -"„i2pinstall_%(i2pversion)s.jar†bÄ…dź kliknąć plik prawym i wybierz " -"„Uruchom za pomocÄ… Javaâ€. Niestety to zachowanie jest trudne do " -"przewidzenia." +msgstr "Najbardziej pewnÄ… metodÄ… uruchomienia instalatora jest wpisanie w terminalu: <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. Uruchomi to graficzny instalator. Zależnie od konfiguracji Twojego komputera, bÄ™dziesz musiaÅ‚(a) dwukrotnie kliknąć plik „i2pinstall_%(i2pversion)s.jar†bÄ…dź kliknąć plik prawym i wybierz „Uruchom za pomocÄ… Javaâ€. Niestety to zachowanie jest trudne do przewidzenia." #: i2p2www/pages/downloads/list.html:131 i2p2www/pages/downloads/list.html:159 msgid "Command line (headless) install:" @@ -1571,20 +1191,12 @@ msgstr "Instalacja z linii komend:" #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially\n" -" useful for servers, containers, or certain virtual machines. If you " -"wish to\n" +"I2P can also be installed in a terminal environment, which may be especially\n" +" useful for servers, containers, or certain virtual machines. If you wish to\n" " use the installer without a GUI, you can use the command \n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to " -"follow\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n" " the install procedure in your terminal." -msgstr "" -"WÄ™zeÅ‚ I2P może zostać zainstalowany z poziomu terminala, co jest " -"użyteczne przy serwerach i maszynach wirtualnych. Jeżeli chcesz uruchomić" -" instalator w trybie terminala, użyj polecenia <code>java -jar " -"i2pinstall_%(i2pversion)s.jar -console</code> i postÄ™puj zgodnie z " -"wyÅ›wietlanymi instrukcjami." +msgstr "WÄ™zeÅ‚ I2P może zostać zainstalowany z poziomu terminala, co jest użyteczne przy serwerach i maszynach wirtualnych. Jeżeli chcesz uruchomić instalator w trybie terminala, użyj polecenia <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> i postÄ™puj zgodnie z wyÅ›wietlanymi instrukcjami." #: i2p2www/pages/downloads/list.html:140 msgid "DMG Bundle (Beta)" @@ -1608,20 +1220,11 @@ msgstr "Paczki dla Debiana i Ubuntu sÄ… dostÄ™pne." #: i2p2www/pages/downloads/list.html:174 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -" However, Debian Buster and Ubuntu Bionic (LTS) distributions will " -"have older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +" However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" " If you are not running Debian Sid or the latest Ubuntu release,\n" -" use our Debian repo or Launchpad PPA to ensure you're running the " -"latest I2P version." -msgstr "" -"I2P jest dostÄ™pne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub " -"późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach " -"Debian Buster i Ubuntu Bionic (LTS) mogÄ… być przestarzaÅ‚e. Jeżeli " -"korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj" -" nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszÄ… " -"wersjÄ™." +" use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." +msgstr "I2P jest dostÄ™pne w oficjalnych repozytoriach Ubuntu Bionic (18.04) lub późniejszych, w Debianie Buster i sid. Jednakże wersje w dystrybucjach Debian Buster i Ubuntu Bionic (LTS) mogÄ… być przestarzaÅ‚e. Jeżeli korzystasz z dystrybucji Debian sid lub najnowszego wydania Ubuntu, dodaj nasze repozytorium Debiana lub Launchpad PPA, aby otrzymać najnowszÄ… wersjÄ™." #: i2p2www/pages/downloads/list.html:182 msgid "I2P for Android" @@ -1629,15 +1232,9 @@ msgstr "I2P dla systemu Android" #: i2p2www/pages/downloads/list.html:185 msgid "" -"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed\n" -" I2P, unfortunately this release fixes some IPC issues which will " -"force you to uninstall your current installation before installing this." -msgstr "" -"Wymaga Androida 4.0 (Ice Cream Sandwich) lub nowszego. JeÅ›li wczeÅ›niej " -"zainstalowaÅ‚eÅ›/aÅ› I2P, niestety ta wersja rozwiÄ…zuje niektóre problemy z " -"IPC, które zmuszajÄ… CiÄ™ do odinstalowania obecnej instalacji przed jej " -"zainstalowaniem." +"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n" +" I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this." +msgstr "Wymaga Androida 4.0 (Ice Cream Sandwich) lub nowszego. JeÅ›li wczeÅ›niej zainstalowaÅ‚eÅ›/aÅ› I2P, niestety ta wersja rozwiÄ…zuje niektóre problemy z IPC, które zmuszajÄ… CiÄ™ do odinstalowania obecnej instalacji przed jej zainstalowaniem." #: i2p2www/pages/downloads/list.html:189 msgid "512 MB RAM minimum; 1 GB recommended." @@ -1645,14 +1242,9 @@ msgstr "Minimalnie 512 MB RAM; zalecane 1 GB." #: i2p2www/pages/downloads/list.html:192 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them\n" -" completely before installing any other version. The apk's from " -"download.i2p2.de are signed by idk." -msgstr "" -"Wersje te nie sÄ… ze sobÄ… kompatybilne, sÄ… podpisane różnymi kluczami. " -"Musisz odinstalować jednÄ… aplikacjÄ™, przed instalacjÄ… innej wersji. Pliki" -" .apk z serwera download.i2p2.de sÄ… podpisane przez programistÄ™ idk." +"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n" +" completely before installing any other version. The apk's from download.i2p2.de are signed by idk." +msgstr "Wersje te nie sÄ… ze sobÄ… kompatybilne, sÄ… podpisane różnymi kluczami. Musisz odinstalować jednÄ… aplikacjÄ™, przed instalacjÄ… innej wersji. Pliki .apk z serwera download.i2p2.de sÄ… podpisane przez programistÄ™ idk." #: i2p2www/pages/downloads/list.html:199 msgid "I2P for Docker" @@ -1662,48 +1254,34 @@ msgstr "I2P dla Dockera" msgid "" "I2P is now available as a Docker package from the Docker Hub.\n" " You may retrieve the image by running the 'docker pull' command." -msgstr "" -"I2P jest teraz dostÄ™pne jako paczka Dockera z Docker Hub. Możesz pobrać " -"obraz instalacyjny poleceniem <code>docker pull</code>:" +msgstr "I2P jest teraz dostÄ™pne jako paczka Dockera z Docker Hub. Możesz pobrać obraz instalacyjny poleceniem <code>docker pull</code>:" #: i2p2www/pages/downloads/list.html:213 msgid "docker pull geti2p/i2p" msgstr "docker pull geti2p/i2p" #: i2p2www/pages/downloads/list.html:219 -msgid "Additional instructions for configuring your container can be found here." +msgid "" +"Additional instructions for configuring your container can be found here." msgstr "" #: i2p2www/pages/downloads/list.html:224 #, python-format msgid "" -"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s" -"#getting-the-i2p-code\">monotone</a>\n" -" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a " -"href=\"%(github)s\">Github</a>.\n" +"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n" +" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n" " <br />\n" -" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg)</code> then either\n" +" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n" " run the GUI installer or headless install as above." -msgstr "" -"Możesz też pobrać kod źródÅ‚owy z <a href=\"%(monotoneurl)s#getting-the-" -"i2p-code\">monotone</a> lub przez Gita z <a " -"href=\"%(gitrepo)s\">git.repo.i2p</a> lub <a " -"href=\"%(github)s\">GitHuba</a>.\n" -"<br />\n" -"WywoÅ‚aj <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg)</code> lub uruchom graficzny instalator lub" -" konsolowy jak wyżej." +msgstr "Możesz też pobrać kod źródÅ‚owy z <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a> lub przez Gita z <a href=\"%(gitrepo)s\">git.repo.i2p</a> lub <a href=\"%(github)s\">GitHuba</a>.\n<br />\nWywoÅ‚aj <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> lub uruchom graficzny instalator lub konsolowy jak wyżej." #: i2p2www/pages/downloads/list.html:234 #, python-format msgid "" -"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-" -"code\">git</a>\n" +"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n" " and on <a href=\"%(github)s\">Github</a>.\n" " Android builds require the I2P source.\n" -" See the documentation in the Android source for additional build " -"requirements and instructions." +" See the documentation in the Android source for additional build requirements and instructions." msgstr "" #: i2p2www/pages/downloads/list.html:251 @@ -1711,21 +1289,14 @@ msgstr "" msgid "" "The Windows installer is signed by %(signer)s,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." -msgstr "" -"Instalator na systemy Windows zostaÅ‚ podpisany przez programistÄ™ " -"%(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje siÄ™ " -"tutaj</a>." +msgstr "Instalator na systemy Windows zostaÅ‚ podpisany przez programistÄ™ %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje siÄ™ tutaj</a>." #: i2p2www/pages/downloads/list.html:257 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." -msgstr "" -"Natywny instalator dla systemu macOS zostaÅ‚ podpisany przez %(signer)s " -"certyfikatem Apple Developer ID, <a href=\"%(signingkey)s\">którego klucz" -" znajduje siÄ™ tutaj</a>." +msgstr "Natywny instalator dla systemu macOS zostaÅ‚ podpisany przez %(signer)s certyfikatem Apple Developer ID, <a href=\"%(signingkey)s\">którego klucz znajduje siÄ™ tutaj</a>." #: i2p2www/pages/downloads/list.html:263 msgid "Updates from earlier releases:" @@ -1738,41 +1309,25 @@ msgstr "Zarówno automatyczna i rÄ™czna aktualizacja jest dostÄ™pna dla tej wers #: i2p2www/pages/downloads/list.html:270 msgid "" "If you are running 0.7.5 or later, your router should detect the\n" -"new release. To upgrade simply click the 'Download Update' button on your" -" router console\n" +"new release. To upgrade simply click the 'Download Update' button on your router console\n" "when it appears." -msgstr "" -"JeÅ›li masz uruchomionÄ… wersjÄ™ 0.7.5 lub późniejszÄ…, Twój wÄ™zeÅ‚ powinien " -"wykryć dostÄ™pność nowych wersji. Aby aktualizować kliknij przycisk " -"„pobierz aktualizację†w konsoli wÄ™zÅ‚a, gdy siÄ™ pojawi." +msgstr "JeÅ›li masz uruchomionÄ… wersjÄ™ 0.7.5 lub późniejszÄ…, Twój wÄ™zeÅ‚ powinien wykryć dostÄ™pność nowych wersji. Aby aktualizować kliknij przycisk „pobierz aktualizację†w konsoli wÄ™zÅ‚a, gdy siÄ™ pojawi." #: i2p2www/pages/downloads/list.html:276 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router\n" -"since 0.9.9. Routers older than 0.9.9 will fail to verify update files " -"signed by str4d,\n" +"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n" +"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n" "and will need to be manually updated using the process below." -msgstr "" -"Od wersji 0.9.23 niektóre wydania sÄ… podpisane przez dewelopera str4d, " -"którego klucz podpisujÄ…cy dostarczany jest z oprogramowaniem od wersji " -"0.9.9. WÄ™zÅ‚y starsze niż 0.9.9 nie zaktualizujÄ… siÄ™ z powodu bÅ‚Ä™du " -"podczas weryfikacji plików podpisanych przez str4d, wymagana bÄ™dzie " -"rÄ™czna aktualizacja opisana poniżej." +msgstr "Od wersji 0.9.23 niektóre wydania sÄ… podpisane przez dewelopera str4d, którego klucz podpisujÄ…cy dostarczany jest z oprogramowaniem od wersji 0.9.9. WÄ™zÅ‚y starsze niż 0.9.9 nie zaktualizujÄ… siÄ™ z powodu bÅ‚Ä™du podczas weryfikacji plików podpisanych przez str4d, wymagana bÄ™dzie rÄ™czna aktualizacja opisana poniżej." #: i2p2www/pages/downloads/list.html:287 msgid "" "Download the file to your I2P\n" " installation directory and <b>rename as i2pupdate.zip</b>.\n" -" (alternately, you can get the source as above and run \"ant " -"updater\", then copy the\n" +" (alternately, you can get the source as above and run \"ant updater\", then copy the\n" " resulting i2pupdate.zip to your I2P installation directory). You do\n" " NOT need to unzip the file." -msgstr "" -"Pobierz plik do Twojego folderu instalacyjnego I2P i <b>zmieÅ„ nazwÄ™ na " -"i2pupdate.zip</b>, (można również pobrać powyższe źródÅ‚o i wywoÅ‚ać „ant " -"updaterâ€, a nastÄ™pnie skopiować i2pupdate.zip do katalogu instalacyjnego " -"I2P). NIE musisz wypakowywać tego pliku." +msgstr "Pobierz plik do Twojego folderu instalacyjnego I2P i <b>zmieÅ„ nazwÄ™ na i2pupdate.zip</b>, (można również pobrać powyższe źródÅ‚o i wywoÅ‚ać „ant updaterâ€, a nastÄ™pnie skopiować i2pupdate.zip do katalogu instalacyjnego I2P). NIE musisz wypakowywać tego pliku." #: i2p2www/pages/downloads/list.html:296 msgid "Click <a href=\"http://localhost:7657/configservice.jsp\">\"Restart\"</a>" @@ -1787,9 +1342,7 @@ msgstr "Teraz idź zaparzyć sobie kawusiÄ™ i wróć za 11 minut" msgid "" "The file is signed by %(signer)s,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." -msgstr "" -"Ten plik jest podpisany przez programistÄ™ %(signer)s, <a " -"href=\"%(signingkey)s\">którego klucz znajduje siÄ™ tutaj</a>." +msgstr "Ten plik jest podpisany przez programistÄ™ %(signer)s, <a href=\"%(signingkey)s\">którego klucz znajduje siÄ™ tutaj</a>." #: i2p2www/pages/downloads/list.html:314 msgid "Previous Releases" @@ -1798,25 +1351,15 @@ msgstr "Poprzednie wydania" #: i2p2www/pages/downloads/list.html:316 #, python-format msgid "" -"Previous releases are available on <a " -"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google " -"Code</a>\n" +"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n" "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n" -"and within the I2P network on <a " -"href=\"http://%(echelon)s/\">%(echelon)s</a>." -msgstr "" -"Poprzednie wersje sÄ… dostÄ™pne na <a " -"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google " -"Code</a> i <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a> \n" -"oraz wewnÄ…trz sieci I2P na <a " -"href=\"http://%(echelon)s/\">%(echelon)s</a>." +"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>." +msgstr "Poprzednie wersje sÄ… dostÄ™pne na <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a> i <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a> \noraz wewnÄ…trz sieci I2P na <a href=\"http://%(echelon)s/\">%(echelon)s</a>." #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG bundle for Mac OS. It installs and " -"behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" @@ -1824,61 +1367,44 @@ msgstr "" #, python-format msgid "" "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n" -"<code>ARM(M1)</code> Macs in emulated mode, but the performance is " -"unknown. M1 Mac\n" -"users should report results to us at the <a href=\"%(perf)s\">Gitlab " -"Repository</a>." +"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n" +"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:18 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:27 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on <a href=\"%(browser)s\">the browser configuration\n" "page</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:34 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" #: i2p2www/pages/downloads/mac.html:61 msgid "" -"Download that file and double-click on it. Accept the License Agreement," -" then\n" -"drag the <code>I2P</code> icon on top of the <code>Applications</code> " -"icon.\n" +"Download that file and double-click on it. Accept the License Agreement, then\n" +"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n" "Launch I2P from Finder." msgstr "" @@ -1888,18 +1414,14 @@ msgstr "Ograniczenia" #: i2p2www/pages/downloads/mac.html:69 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:75 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1907,76 +1429,45 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n" "which has further instructions." -msgstr "" -"Po uruchomieniu instalatora pod Windowsem, kliknij w przycisk „start I2Pâ€" -" który wyÅ›wietli <a href=\"http://localhost:7657/index.jsp\">konsolÄ™ " -"wÄ™zÅ‚a</a> zawierajÄ…cÄ… dalsze instrukcje." +msgstr "Po uruchomieniu instalatora pod Windowsem, kliknij w przycisk „start I2P†który wyÅ›wietli <a href=\"http://localhost:7657/index.jsp\">konsolÄ™ wÄ™zÅ‚a</a> zawierajÄ…cÄ… dalsze instrukcje." #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." -msgstr "" -"Na systemach uniksopodobnych, I2P może być uruchomiony jako usÅ‚uga " -"używajÄ…c skryptu „i2prouterâ€, znajdujÄ…cego siÄ™ w katalogu który wybraÅ‚eÅ› " -"dla I2P. Po przejÅ›ciu do tego katalogu w terminalu i wpisaniu „sh " -"i2prouter status†powinno pokazać Ci jaki jest status wÄ™zÅ‚a. Argumenty " -"„startâ€, „stop†i „restart†kontrolujÄ… usÅ‚ugÄ™. <a " -"href=\"http://localhost:7657/index.jsp\">Konsola wÄ™zÅ‚a</a> jest dostÄ™pna " -"tam gdzie zawsze. Użytkownicy OpenSolaris i innych systemów dla których " -"powÅ‚oka (i2psvc) jest nieobsÅ‚ugiwana, mogÄ… uruchomić wÄ™zeÅ‚ korzystajÄ…c z " -"„sh runplain.shâ€." +msgstr "Na systemach uniksopodobnych, I2P może być uruchomiony jako usÅ‚uga używajÄ…c skryptu „i2prouterâ€, znajdujÄ…cego siÄ™ w katalogu który wybraÅ‚eÅ› dla I2P. Po przejÅ›ciu do tego katalogu w terminalu i wpisaniu „sh i2prouter status†powinno pokazać Ci jaki jest status wÄ™zÅ‚a. Argumenty „startâ€, „stop†i „restart†kontrolujÄ… usÅ‚ugÄ™. <a href=\"http://localhost:7657/index.jsp\">Konsola wÄ™zÅ‚a</a> jest dostÄ™pna tam gdzie zawsze. Użytkownicy OpenSolaris i innych systemów dla których powÅ‚oka (i2psvc) jest nieobsÅ‚ugiwana, mogÄ… uruchomić wÄ™zeÅ‚ korzystajÄ…c z „sh runplain.shâ€." #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>." -msgstr "" -"Podczas pierwszej instalacji prosimy pamiÄ™tać o <b>skonfigurowaniu " -"swojego NAT-u/zapory sieciowej</b> majÄ…c na uwadze porty używane przez " -"I2P <a href=\"%(faq)s#ports\">opisane tutaj</a>. JeÅ›li pomyÅ›lnie " -"otworzyÅ‚eÅ› swój port TCP przychodzÄ…cy, także aktywuj nasÅ‚uch na TCP na <a" -" href=\"http://localhost:7657/confignet.jsp\">stronie konfiguracji</a>." +msgstr "Podczas pierwszej instalacji prosimy pamiÄ™tać o <b>skonfigurowaniu swojego NAT-u/zapory sieciowej</b> majÄ…c na uwadze porty używane przez I2P <a href=\"%(faq)s#ports\">opisane tutaj</a>. JeÅ›li pomyÅ›lnie otworzyÅ‚eÅ› swój port TCP przychodzÄ…cy, także aktywuj nasÅ‚uch na TCP na <a href=\"http://localhost:7657/confignet.jsp\">stronie konfiguracji</a>." #: i2p2www/pages/downloads/post-install.html:28 msgid "" "Also, please review and <b>adjust the bandwidth settings</b> on the\n" "<a href=\"http://localhost:7657/config.jsp\">configuration page</a>,\n" "as the default settings of 96 KBps down / 40 KBps up are fairly slow." -msgstr "" -"Prosimy także o sprawdzenie i <b>dostosowanie ustawieÅ„ przepustowoÅ›ci</b>" -" na <a href=\"http://localhost:7657/config.jsp\">stronie " -"konfiguracji</a>, ponieważ domyÅ›lne ustawienia 96 KB/s pobierania i " -"40 KB/s wysyÅ‚ania sÄ… bardzo wolne." +msgstr "Prosimy także o sprawdzenie i <b>dostosowanie ustawieÅ„ przepustowoÅ›ci</b> na <a href=\"http://localhost:7657/config.jsp\">stronie konfiguracji</a>, ponieważ domyÅ›lne ustawienia 96 KB/s pobierania i 40 KB/s wysyÅ‚ania sÄ… bardzo wolne." #: i2p2www/pages/downloads/redirect.html:2 msgid "Downloading..." @@ -1987,9 +1478,7 @@ msgstr "Pobieranie…" msgid "" "Your download will begin shortly. If it doesn't start within 5 seconds, " "click <a href=\"%(url)s\">here</a>." -msgstr "" -"Pobieranie powinno siÄ™ wkrótce rozpocząć. JeÅ›li nie rozpocznie siÄ™ w " -"ciÄ…gu 5 sekund, kliknij <a href=\"%(url)s\">tu</a>." +msgstr "Pobieranie powinno siÄ™ wkrótce rozpocząć. JeÅ›li nie rozpocznie siÄ™ w ciÄ…gu 5 sekund, kliknij <a href=\"%(url)s\">tu</a>." #: i2p2www/pages/downloads/select.html:2 i2p2www/pages/downloads/select.html:4 msgid "Mirror selection" @@ -2011,12 +1500,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -2026,17 +1512,10 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." -msgstr "" -"Znajdziesz tutaj szczegółowÄ… instrukcjÄ™ instalacji i konfiguracji I2P, " -"wliczajÄ…c w to instalacjÄ™ zależnoÅ›ci i konfiguracjÄ™ przeglÄ…darki na " -"Å›wieżym systemie Windows 10. Możesz pominąć niektóre etapy, jeżeli masz " -"już zainstalowanÄ… JavÄ™ 8 bÄ…dź Firefoksa." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." +msgstr "Znajdziesz tutaj szczegółowÄ… instrukcjÄ™ instalacji i konfiguracji I2P, wliczajÄ…c w to instalacjÄ™ zależnoÅ›ci i konfiguracjÄ™ przeglÄ…darki na Å›wieżym systemie Windows 10. Możesz pominąć niektóre etapy, jeżeli masz już zainstalowanÄ… JavÄ™ 8 bÄ…dź Firefoksa." #: i2p2www/pages/downloads/windows.html:18 msgid "So what are we going to do here?" @@ -2068,15 +1547,10 @@ msgstr "Krok pierwszy: instalacja Javy" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" -msgstr "" -"Aby korzystać z oprogramowania I2P niezbÄ™dne jest Å›rodowisko " -"uruchomieniowe Java. Pod systemem Windows zaleca siÄ™ instalacjÄ™ Javy 8 od" -" Oracle. Podążaj za poniższymi wskazówkami:" +msgstr "Aby korzystać z oprogramowania I2P niezbÄ™dne jest Å›rodowisko uruchomieniowe Java. Pod systemem Windows zaleca siÄ™ instalacjÄ™ Javy 8 od Oracle. Podążaj za poniższymi wskazówkami:" #: i2p2www/pages/downloads/windows.html:35 msgid "If you already have Java installed, you may" @@ -2084,22 +1558,15 @@ msgstr "Jeżeli masz już zainstalowanÄ… JavÄ™, możesz" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" -msgstr "" -"I2P wymaga do dziaÅ‚ania Javy, jeżeli nie masz jej zainstalowanej, " -"otrzymasz taki bÅ‚Ä…d:" +msgstr "I2P wymaga do dziaÅ‚ania Javy, jeżeli nie masz jej zainstalowanej, otrzymasz taki bÅ‚Ä…d:" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." -msgstr "" -"Doceniamy fakt, że jest dostÄ™pny szeroki wachlarz Å›rodowisk Java, ale " -"Java od Oracle jest najÅ‚atwiejsza do instalacji i użytku z I2P pod " -"systemem Windows." +msgstr "Doceniamy fakt, że jest dostÄ™pny szeroki wachlarz Å›rodowisk Java, ale Java od Oracle jest najÅ‚atwiejsza do instalacji i użytku z I2P pod systemem Windows." #: i2p2www/pages/downloads/windows.html:48 msgid "Download it from" @@ -2107,21 +1574,15 @@ msgstr "Pobierz plik z" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." -msgstr "" -"Dwukrotnie kliknij pobrany plik. Nie wybieraj wÅ‚asnego katalogu, pozostaw" -" domyÅ›lne ustawienia." +msgstr "Dwukrotnie kliknij pobrany plik. Nie wybieraj wÅ‚asnego katalogu, pozostaw domyÅ›lne ustawienia." #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." -msgstr "" -"Instalator wyÅ›wietli trochÄ™ informacji czym jest Java, gdzie jest " -"używana, itp., poczekaj aż instalacja siÄ™ zakoÅ„czy." +msgstr "Instalator wyÅ›wietli trochÄ™ informacji czym jest Java, gdzie jest używana, itp., poczekaj aż instalacja siÄ™ zakoÅ„czy." #: i2p2www/pages/downloads/windows.html:62 msgid "When you see this, Java is almost installed." @@ -2144,7 +1605,8 @@ msgid "https://geti2p.net" msgstr "https://geti2p.net/pl" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "Wybierz jÄ™zyk." #: i2p2www/pages/downloads/windows.html:83 @@ -2153,30 +1615,21 @@ msgstr "Na pierwszym ekranie jest wprowadzenie." #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." -msgstr "" -"Oprogramowanie I2P w wiÄ™kszoÅ›ci należy do domeny publicznej, częściowo na" -" wolnych licencjach i z niewielkÄ… porcjÄ… kodu na licencji GPLv2." +msgstr "Oprogramowanie I2P w wiÄ™kszoÅ›ci należy do domeny publicznej, częściowo na wolnych licencjach i z niewielkÄ… porcjÄ… kodu na licencji GPLv2." #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." -msgstr "" -"Zaleca siÄ™ instalacjÄ™ I2P w domyÅ›lnym katalogu, jest to najÅ‚atwiejszy " -"sposób pracy." +msgstr "Zaleca siÄ™ instalacjÄ™ I2P w domyÅ›lnym katalogu, jest to najÅ‚atwiejszy sposób pracy." #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." -msgstr "" -"Nie musisz uruchamiać I2P jako usÅ‚ugi systemowej, Å‚atwy w użyciu skrót " -"zostanie dodany do menu start, aby kontrolować I2P." +msgstr "Nie musisz uruchamiać I2P jako usÅ‚ugi systemowej, Å‚atwy w użyciu skrót zostanie dodany do menu start, aby kontrolować I2P." #: i2p2www/pages/downloads/windows.html:102 msgid "I2P will copy it's files into the install location." @@ -2184,11 +1637,9 @@ msgstr "Pliki I2P zostanÄ… skopiowane do docelowego katalogu." #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." -msgstr "" -"I2P zostaÅ‚o zainstalowane! WÅ‚Ä…cz je używajÄ…c skrótu „Start I2P†w menu " -"start lub na pulpicie." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." +msgstr "I2P zostaÅ‚o zainstalowane! WÅ‚Ä…cz je używajÄ…c skrótu „Start I2P†w menu start lub na pulpicie." #: i2p2www/pages/downloads/windows.html:109 msgid "Part Three: Install a Better Browser(Firefox or Tor Browser)" @@ -2196,28 +1647,17 @@ msgstr "Krok trzeci: instalacja przeglÄ…darki Firefox (bÄ…dź Tor Browser)" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." -msgstr "" -"Jeżeli masz już zainstalowanÄ… przeglÄ…darkÄ™ Firefox lub Tor Browser, pomiÅ„" -" dwa pierwsze kroki." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." +msgstr "Jeżeli masz już zainstalowanÄ… przeglÄ…darkÄ™ Firefox lub Tor Browser, pomiÅ„ dwa pierwsze kroki." #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." -msgstr "" -"DomyÅ›lna przeglÄ…darka w systemach Windows – Microsoft Edge – niestety nie" -" posiada ustawieÅ„ proxy umożliwiajÄ…cych bezpieczne korzystanie z I2P. " -"NajÅ‚atwiejszÄ… przeglÄ…darkÄ… do korzystania z I2P jest Firefox (możliwa " -"jest również konfiguracja Google Chrome, ale jest to zalecane tylko dla " -"zaawansowanych użytkowników). Poniżej znajduje siÄ™ opis, co należy " -"zrobić, aby móc przeglÄ…dać strony I2P za pomocÄ… Firefoksa." +msgstr "DomyÅ›lna przeglÄ…darka w systemach Windows – Microsoft Edge – niestety nie posiada ustawieÅ„ proxy umożliwiajÄ…cych bezpieczne korzystanie z I2P. NajÅ‚atwiejszÄ… przeglÄ…darkÄ… do korzystania z I2P jest Firefox (możliwa jest również konfiguracja Google Chrome, ale jest to zalecane tylko dla zaawansowanych użytkowników). Poniżej znajduje siÄ™ opis, co należy zrobić, aby móc przeglÄ…dać strony I2P za pomocÄ… Firefoksa." #: i2p2www/pages/downloads/windows.html:118 msgid "If you already have Firefox installed, you may" @@ -2245,14 +1685,9 @@ msgstr "Wybierz jÄ™zyk używany podczas instalacji." #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." -msgstr "" -"PrzeglÄ…darka I2P zawiera mnóstwo zewnÄ™trznego oprogramowania, wiÄ™c " -"wyÅ›wietlana jest szczegółowa licencja. CaÅ‚e zawarte oprogramowanie jest " -"wolne i otwarte (WiOO)." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." +msgstr "PrzeglÄ…darka I2P zawiera mnóstwo zewnÄ™trznego oprogramowania, wiÄ™c wyÅ›wietlana jest szczegółowa licencja. CaÅ‚e zawarte oprogramowanie jest wolne i otwarte (WiOO)." #: i2p2www/pages/downloads/windows.html:147 msgid "You now have a browser ready for I2P!" @@ -2264,20 +1699,15 @@ msgstr "Krok czwarty: konfiguracja przepustowoÅ›ci I2P" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." -msgstr "" -"Podczas pierwszego otwarcia strony konsoli wÄ™zÅ‚a, zostaniesz " -"przekierowany/a do kreatora konfiguracji pasma." +msgstr "Podczas pierwszego otwarcia strony konsoli wÄ™zÅ‚a, zostaniesz przekierowany/a do kreatora konfiguracji pasma." #: i2p2www/pages/downloads/windows.html:158 msgid "" "During the bandwidth test, we'll need to connect to the external M-Lab " "Service, which makes" -msgstr "" -"Podczas testu przepustowoÅ›ci, zostaniesz poÅ‚Ä…czony/a z zewnÄ™trznÄ… stronÄ… " -"M-Lab, która przeprowadzi" +msgstr "Podczas testu przepustowoÅ›ci, zostaniesz poÅ‚Ä…czony/a z zewnÄ™trznÄ… stronÄ… M-Lab, która przeprowadzi" #: i2p2www/pages/downloads/windows.html:162 msgid "The bandwidth test takes about a minute to run completely." @@ -2288,31 +1718,22 @@ msgid "Here we have an overview of the applications." msgstr "Tutaj przedstawione jest podsumowanie aplikacji I2P." #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." -msgstr "" -"Teraz Twoje ustawienia przepustowoÅ›ci sÄ… skonfigurowane do wydajnego " -"uczestnictwa w sieci I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." +msgstr "Teraz Twoje ustawienia przepustowoÅ›ci sÄ… skonfigurowane do wydajnego uczestnictwa w sieci I2P." #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "Jeżeli chcesz ponownie uruchomić kreator konfiguracji, odwiedź stronÄ™" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the <a " -"href=\"https://localhost:7657/home\">router console homepage</a> to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n" "get started." -msgstr "" -"Gotowe! Teraz jesteÅ› gotowy/a do korzystania z I2P. Możesz przeglÄ…dać " -"ukryte strony .i2p, pobierać pliki, zakÅ‚adać wÅ‚asne usÅ‚ugi, korzystać z " -"poczty elektronicznej i czatów, wszystko anonimowo. Odwiedź <a " -"href=\"http://localhost:7657/home\">stronÄ™ startowÄ… wÄ™zÅ‚a</a>, aby " -"rozpocząć." +msgstr "Gotowe! Teraz jesteÅ› gotowy/a do korzystania z I2P. Możesz przeglÄ…dać ukryte strony .i2p, pobierać pliki, zakÅ‚adać wÅ‚asne usÅ‚ugi, korzystać z poczty elektronicznej i czatów, wszystko anonimowo. Odwiedź <a href=\"http://localhost:7657/home\">stronÄ™ startowÄ… wÄ™zÅ‚a</a>, aby rozpocząć." #: i2p2www/pages/global/error_404.html:3 msgid "Not found" @@ -2320,11 +1741,9 @@ msgstr "Nie znaleziono" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." -msgstr "" -"Niestety, ale źródÅ‚o którego szukasz ma innÄ… nazwÄ™, nie istnieje lub " -"zostaÅ‚o usuniÄ™te." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." +msgstr "Niestety, ale źródÅ‚o którego szukasz ma innÄ… nazwÄ™, nie istnieje lub zostaÅ‚o usuniÄ™te." #: i2p2www/pages/global/error_500.html:5 msgid "Server error" @@ -2392,9 +1811,7 @@ msgstr "Projekt Niewidzialny Internet" msgid "" "This page was last updated in %(lastupdated)s and is accurate for router " "version %(accuratefor)s." -msgstr "" -"Ostatnia aktualizacja strony: %(lastupdated)s; zawarte informacje dotyczÄ…" -" wÄ™zÅ‚a w wersji %(accuratefor)s." +msgstr "Ostatnia aktualizacja strony: %(lastupdated)s; zawarte informacje dotyczÄ… wÄ™zÅ‚a w wersji %(accuratefor)s." #: i2p2www/pages/global/layout.html:84 #, python-format @@ -2737,28 +2154,18 @@ msgstr "Spotkania I2P – subskrypcja ATOM" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "<a href=\"%(mtgforum)s\">the meetings forum</a>." -msgstr "" -"Narady projektu odbywajÄ… siÄ™ regularnie w każdy pierwszy wtorek miesiÄ…ca " -"o 20:00 UTC (21:00 CET). Każdy może zaplanować i poprowadzić naradÄ™ " -"poprzez ustalenie porzÄ…dku obrad na <a href=\"%(mtgforum)s\">forum " -"obrad</a>." +msgstr "Narady projektu odbywajÄ… siÄ™ regularnie w każdy pierwszy wtorek miesiÄ…ca o 20:00 UTC (21:00 CET). Każdy może zaplanować i poprowadzić naradÄ™ poprzez ustalenie porzÄ…dku obrad na <a href=\"%(mtgforum)s\">forum obrad</a>." #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"<a href=\"%(blogindex)s\">Status updates</a> from developers are also " -"available." -msgstr "" -"Jeżeli masz coÅ› do przedyskutowania, możesz znaleźć programistów I2P na " -"kanale IRC #i2p-dev. DostÄ™pne sÄ… także <a " -"href=\"%(blogindex)s\">wieÅ›ci</a> od twórców." +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available." +msgstr "Jeżeli masz coÅ› do przedyskutowania, możesz znaleźć programistów I2P na kanale IRC #i2p-dev. DostÄ™pne sÄ… także <a href=\"%(blogindex)s\">wieÅ›ci</a> od twórców." #: i2p2www/pages/meetings/show.html:2 #, python-format @@ -2790,22 +2197,14 @@ msgid "" "<a href=\"%(bibtex)s\">BibTeX source page</a> for examples.<br />\n" "Remember to include URLs if possible:\n" "<a href=\"%(citeseer)s\">offline papers are less useful</a>." -msgstr "" -"Prosimy przesÅ‚ać nowe lub poprawione wpisy na <a name=\"contact\"><span " -"class=\"email\">%(email)s</span></a>.<br />\n" -"JeÅ›li mógÅ‚byÅ›, zapisz je w formacie BibTeX, zobacz przykÅ‚ady na <a " -"href=\"%(bibtex)s\">stronie BibTeX-a</a>.<br />\n" -"PamiÄ™taj aby umieÅ›cić odnoÅ›niki: <a href=\"%(citeseer)s\">dokumenty " -"offline sÄ… mniej przydatne</a>." +msgstr "Prosimy przesÅ‚ać nowe lub poprawione wpisy na <a name=\"contact\"><span class=\"email\">%(email)s</span></a>.<br />\nJeÅ›li mógÅ‚byÅ›, zapisz je w formacie BibTeX, zobacz przykÅ‚ady na <a href=\"%(bibtex)s\">stronie BibTeX-a</a>.<br />\nPamiÄ™taj aby umieÅ›cić odnoÅ›niki: <a href=\"%(citeseer)s\">dokumenty offline sÄ… mniej przydatne</a>." #: i2p2www/pages/papers/list.html:80 #, python-format msgid "" "The source code for this page was adapted from\n" "<a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>." -msgstr "" -"Kod źródÅ‚owy tej strony zostaÅ‚ zaadoptowany z <a " -"href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>." +msgstr "Kod źródÅ‚owy tej strony zostaÅ‚ zaadoptowany z <a href=\"%(anonbib)s\">Free Haven's anonymity bibliography</a>." #: i2p2www/pages/site/contact.html:4 msgid "Email" @@ -2815,10 +2214,7 @@ msgstr "E-poczta" msgid "" "Please do not use these email addresses for support requests.\n" "For contact specific to research, outreach and security please use:" -msgstr "" -"Prosimy nie używać poniższych adresów e‑poczty w celu uzyskania pomocy. " -"Aby uzyskać informacje odnoÅ›nie badaÅ„ naukowych, współpracy bÄ…dź luk " -"bezpieczeÅ„stwa, prosimy o kontakt:" +msgstr "Prosimy nie używać poniższych adresów e‑poczty w celu uzyskania pomocy. Aby uzyskać informacje odnoÅ›nie badaÅ„ naukowych, współpracy bÄ…dź luk bezpieczeÅ„stwa, prosimy o kontakt:" #: i2p2www/pages/site/contact.html:24 msgid "Please visit our I2P user forum -" @@ -2828,22 +2224,16 @@ msgstr "Prosimy odwiedzić forum użytkowników I2P –" msgid "" "available on non-private internet at https://i2pforum.net and on I2P at " "http://i2pforum.i2p" -msgstr "" -"dostÄ™pne w nieanonimowym internecie: https://i2pforum.net i w sieci I2P: " -"http://i2pforum.i2p" +msgstr "dostÄ™pne w nieanonimowym internecie: https://i2pforum.net i w sieci I2P: http://i2pforum.i2p" #: i2p2www/pages/site/contact.html:26 #, python-format msgid "" "Most of the discussion about I2P's development happens on the <a " -"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." -msgstr "" -"WiÄ™kszość dyskusji o rozwoju sieci I2P odbywa siÄ™ na <a " -"href=\"http://%(zzz)s\">forum dewelopera zzz</a> (dostÄ™pne tylko poprzez " -"sieć I2P). Jest to najlepsze miejsce do zadawania pytaÅ„, gdy kanaÅ‚ IRC " -"„i2p-dev†jest nieaktywny." +"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." +msgstr "WiÄ™kszość dyskusji o rozwoju sieci I2P odbywa siÄ™ na <a href=\"http://%(zzz)s\">forum dewelopera zzz</a> (dostÄ™pne tylko poprzez sieć I2P). Jest to najlepsze miejsce do zadawania pytaÅ„, gdy kanaÅ‚ IRC „i2p-dev†jest nieaktywny." #: i2p2www/pages/site/contact.html:30 msgid "Social Media" @@ -2852,42 +2242,19 @@ msgstr "Media spoÅ‚ecznoÅ›ciowe" #: i2p2www/pages/site/contact.html:32 msgid "" "<ul>\n" -" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - " -"https://mastodon.social/@i2p</a></li>\n" -" <li><a href=\"https://twitter.com/GetI2P\">Twitter - " -"https://twitter.com/GetI2P</a></li>\n" -" <li><a href=\"https://old.reddit.com/i2p\">Reddit - " -"https://old.reddit.com/i2p</a></li>\n" -"</ul>" -msgstr "" -"<ul>\n" -" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - " -"https://mastodon.social/@i2p</a></li>\n" -" <li><a href=\"https://twitter.com/GetI2P\">Twitter - " -"https://twitter.com/GetI2P</a></li>\n" -" <li><a href=\"https://old.reddit.com/i2p\">Reddit - " -"https://old.reddit.com/i2p</a></li>\n" +" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n" +" <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n" +" <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n" "</ul>" +msgstr "<ul>\n <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n</ul>" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like <a " -"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" -" <a href=\"http://www.einirc.de/\">EIN</a> and <a " -"href=\"http://freenode.net/\">Freenode</a>.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." -msgstr "" -"NaszÄ… głównÄ… sieciÄ… IRC jest sieć Irc2P wewnÄ…trz I2P; domyÅ›lny tunel do " -"tej sieci jest skonfigurowany w każdej nowej instalacji wÄ™zÅ‚a. JesteÅ›my " -"też obecni na kilku standardowych sieciach jak <a " -"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" -"<a href=\"http://www.einirc.de/\">EIN</a> i <a " -"href=\"http://freenode.net/\">Freenode</a>. Wszystkie kanaÅ‚y o I2P na " -"tych sieciach sÄ… powiÄ…zane z głównymi kanaÅ‚ami na Irc2P poprzez boty " -"przekaźnikowe." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" +" <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." +msgstr "NaszÄ… głównÄ… sieciÄ… IRC jest sieć Irc2P wewnÄ…trz I2P; domyÅ›lny tunel do tej sieci jest skonfigurowany w każdej nowej instalacji wÄ™zÅ‚a. JesteÅ›my też obecni na kilku standardowych sieciach jak <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n<a href=\"http://www.einirc.de/\">EIN</a> i <a href=\"http://freenode.net/\">Freenode</a>. Wszystkie kanaÅ‚y o I2P na tych sieciach sÄ… powiÄ…zane z głównymi kanaÅ‚ami na Irc2P poprzez boty przekaźnikowe." #: i2p2www/pages/site/contact.html:49 msgid "Channel list:" @@ -2911,9 +2278,7 @@ msgstr "Listy dyskusyjne" #: i2p2www/pages/site/contact.html:58 msgid "I2P has no active mailing lists, however archives can be accessed." -msgstr "" -"Obecnie nie ma aktywnych list dyskusyjnych o I2P, jednakże dostÄ™pne sÄ… " -"archiwa." +msgstr "Obecnie nie ma aktywnych list dyskusyjnych o I2P, jednakże dostÄ™pne sÄ… archiwa." #: i2p2www/pages/site/contact.html:62 msgid "Lists" @@ -2930,8 +2295,8 @@ msgstr "dyskusje deweloperów I2P – wszystko zwiÄ…zane z rozwojem I2P" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" msgstr "ogólne dyskusje o I2P – wszystko co nie pasuje w innych listach leci tutaj" #: i2p2www/pages/site/contact.html:80 @@ -3103,7 +2468,8 @@ msgid "Product Development" msgstr "Menadżer rozwoju" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "nadzorowanie projektów od etapu wczesnego planu aż do ukoÅ„czenia" #: i2p2www/pages/site/contact.html:189 @@ -3150,9 +2516,7 @@ msgstr "Specjalista ds. dizajnu i użytecznoÅ›ci" #: i2p2www/pages/site/contact.html:216 msgid "ongoing improvements to user experience for website and software" -msgstr "" -"ciÄ…gÅ‚e polepszanie doÅ›wiadczenia użytkownika oprogramowania i strony " -"internetowej" +msgstr "ciÄ…gÅ‚e polepszanie doÅ›wiadczenia użytkownika oprogramowania i strony internetowej" #: i2p2www/pages/site/contact.html:234 msgid "Director of passion" @@ -3195,9 +2559,7 @@ msgstr "wtyczka I2P-Bote" #: i2p2www/pages/site/contact.html:256 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a> lead" -msgstr "" -"Główny programista <a " -"href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" +msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=12\">I2PSnark</a>" #: i2p2www/pages/site/contact.html:258 msgid "Maintains the integrated Bittorrent client" @@ -3206,9 +2568,7 @@ msgstr "zarzÄ…dza rozwojem zintegrowanego klienta BitTorrent" #: i2p2www/pages/site/contact.html:261 #, python-format msgid "<a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a> lead" -msgstr "" -"Główny programista <a " -"href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>" +msgstr "Główny programista <a href=\"http://%(forum)s/viewforum.php?f=25\">Syndie</a>" #: i2p2www/pages/site/contact.html:263 msgid "Syndie development" @@ -3276,9 +2636,7 @@ msgstr "tworzenie paczek Debiana/Ubuntu i zarzÄ…dzanie PPA" #: i2p2www/pages/site/contact.html:306 msgid "Routerconsole backend and UI work, website revamp, unit tests work" -msgstr "" -"back-end i interfejs konsoli wÄ™zÅ‚a, reorganizacja strony, testy " -"jednostkowe" +msgstr "back-end i interfejs konsoli wÄ™zÅ‚a, reorganizacja strony, testy jednostkowe" #: i2p2www/pages/site/contact.html:311 msgid "Help needed on many fronts!" @@ -3358,7 +2716,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "rozwój jbigi, migracja wiki, uporzÄ…dkowanie dokumentacji" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "java-odpluskwianie i rozwój klienta I2PTunnel i konsoli wÄ™zÅ‚a" #: i2p2www/pages/site/contact.html:397 @@ -3411,16 +2770,11 @@ msgstr "" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.<br>\n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n" "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.<br>\n" -"We work together to build a free world without hate, racism and " -"violence.<br>\n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n" +"We work together to build a free world without hate, racism and violence.<br>\n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." msgstr "" #: i2p2www/pages/site/faq.html:2 @@ -3441,11 +2795,8 @@ msgstr "Czy instalacja Javy jest wymagana aby korzystać z I2P?" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" -msgstr "" -"Czym sÄ… strony .i2p i jak mam skonfigurować swojÄ… przeglÄ…darkÄ™, aby móc " -"je przeglÄ…dać?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" +msgstr "Czym sÄ… strony .i2p i jak mam skonfigurować swojÄ… przeglÄ…darkÄ™, aby móc je przeglÄ…dać?" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 msgid "What do the Active x/y numbers mean in the router console?" @@ -3458,11 +2809,9 @@ msgstr "Mój wÄ™zeÅ‚ ma bardzo maÅ‚o aktywnych uczestników, czy to jest OK?" #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" -msgstr "" -"Mam uprzedzenia do pewnych treÅ›ci. Jak mogÄ™ siÄ™ ustrzec przed " -"rozsyÅ‚aniem, przechowywaniem i oglÄ…daniem ich?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" +msgstr "Mam uprzedzenia do pewnych treÅ›ci. Jak mogÄ™ siÄ™ ustrzec przed rozsyÅ‚aniem, przechowywaniem i oglÄ…daniem ich?" #: i2p2www/pages/site/faq.html:14 msgid "Is it possible to block I2P?" @@ -3472,9 +2821,7 @@ msgstr "Czy można zablokować I2P?" msgid "" "In <code>wrapper.log</code> I see an error stating <code>Protocol family " "unavailable</code> when I2P is loading" -msgstr "" -"W <code>wrapper.log</code> zauważyÅ‚em bÅ‚Ä…d <code>Protocol family " -"unavailable</code> podczas uruchamiania I2P" +msgstr "W <code>wrapper.log</code> zauważyÅ‚em bÅ‚Ä…d <code>Protocol family unavailable</code> podczas uruchamiania I2P" #: i2p2www/pages/site/faq.html:16 i2p2www/pages/site/faq.html:189 msgid "Most of the I2P Sites within I2P are down?" @@ -3500,9 +2847,7 @@ msgstr "Jak zaÅ‚ożyć wÅ‚asnÄ… stronÄ™ w sieci I2P?" msgid "" "If I host a website at I2P at home, containing only HTML and CSS, is it " "dangerous?" -msgstr "" -"Czy hostowanie na komputerze w domu strony .i2p napisanÄ… tylko w HTML i " -"CSS jest niebezpieczne?" +msgstr "Czy hostowanie na komputerze w domu strony .i2p napisanÄ… tylko w HTML i CSS jest niebezpieczne?" #: i2p2www/pages/site/faq.html:25 msgid "How Does I2P find \".i2p\" websites?" @@ -3520,17 +2865,13 @@ msgstr "Jakich portów używa I2P?" msgid "" "I'm missing lots of hosts in my address book. What are some good " "subscription links?" -msgstr "" -"Brakuje mnóstwa adresów w mojej książce adresowej. Gdzie sÄ… jakieÅ› dobre " -"linki do subskrypcji?" +msgstr "Brakuje mnóstwa adresów w mojej książce adresowej. Gdzie sÄ… jakieÅ› dobre linki do subskrypcji?" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" -msgstr "" -"Jak mogÄ™ dostać siÄ™ do konsoli wÄ™zÅ‚a z innych komputerów lub zablokować " -"dostÄ™p hasÅ‚em?" +"How can I access the web console from my other machines or password protect " +"it?" +msgstr "Jak mogÄ™ dostać siÄ™ do konsoli wÄ™zÅ‚a z innych komputerów lub zablokować dostÄ™p hasÅ‚em?" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 msgid "How can I use applications from my other machines?" @@ -3542,11 +2883,8 @@ msgstr "Czy jest możliwe użycie I2P jako proxy SOCKS?" #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" -msgstr "" -"Jak mogÄ™ poÅ‚Ä…czyć siÄ™ z IRC, BitTorrentem, lub innymi usÅ‚ugami w " -"normalnym Internecie?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" +msgstr "Jak mogÄ™ poÅ‚Ä…czyć siÄ™ z IRC, BitTorrentem, lub innymi usÅ‚ugami w normalnym Internecie?" #: i2p2www/pages/site/faq.html:34 msgid "Reseeds" @@ -3556,9 +2894,7 @@ msgstr "Reseed" msgid "" "My router has been up for several minutes and has zero or very few " "connections" -msgstr "" -"Mój wÄ™zeÅ‚ jest aktywny od kilku minut i nawiÄ…zaÅ‚ zero lub bardzo maÅ‚o " -"poÅ‚Ä…czeÅ„" +msgstr "Mój wÄ™zeÅ‚ jest aktywny od kilku minut i nawiÄ…zaÅ‚ zero lub bardzo maÅ‚o poÅ‚Ä…czeÅ„" #: i2p2www/pages/site/faq.html:37 i2p2www/pages/site/faq.html:763 msgid "How do I reseed manually?" @@ -3572,9 +2908,7 @@ msgstr "Prywatność i bezpieczeÅ„stwo" msgid "" "Is my router an \"exit node\"(outproxy) to the regular Internet? I don't " "want it to be." -msgstr "" -"Czy mój wÄ™zeÅ‚ jest „wÄ™zÅ‚em wyjÅ›ciowym†(proxy wyjÅ›ciowym - outproxy) do " -"normalnego Internetu? Nie chcÄ™ aby nim byÅ‚." +msgstr "Czy mój wÄ™zeÅ‚ jest „wÄ™zÅ‚em wyjÅ›ciowym†(proxy wyjÅ›ciowym - outproxy) do normalnego Internetu? Nie chcÄ™ aby nim byÅ‚." #: i2p2www/pages/site/faq.html:42 i2p2www/pages/site/faq.html:695 msgid "Is it easy to detect the use of I2P by analyzing network traffic?" @@ -3586,11 +2920,9 @@ msgstr "Czy korzystanie z I2P jest bezpieczne?" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"WidzÄ™ adresy IP innych użytkowników sieci I2P w konsoli wÄ™zÅ‚a. Czy to " -"oznacza, że mój adres IP jest widoczny dla innych?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "WidzÄ™ adresy IP innych użytkowników sieci I2P w konsoli wÄ™zÅ‚a. Czy to oznacza, że mój adres IP jest widoczny dla innych?" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 msgid "Is using an outproxy safe?" @@ -3616,18 +2948,13 @@ msgstr "Dlaczego mój wÄ™zeÅ‚ wykorzystuje zbyt dużo mocy procesora?" msgid "" "My active peers / known peers / participating tunnels / connections / " "bandwidth vary dramatically over time! Is anything wrong?" -msgstr "" -"Moi aktywni uczestnicy / znani uczestnicy / uczestniczÄ…ce tunele / " -"poÅ‚Ä…czenia / przepustowość zmieniajÄ… siÄ™ jak szalone z czasem! Czy jest " -"coÅ› nie tak?" +msgstr "Moi aktywni uczestnicy / znani uczestnicy / uczestniczÄ…ce tunele / poÅ‚Ä…czenia / przepustowość zmieniajÄ… siÄ™ jak szalone z czasem! Czy jest coÅ› nie tak?" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" -msgstr "" -"Dlaczego pobieranie plików, przeglÄ…danie stron, ogółem wszystko jest " -"wolniejsze w sieci I2P niż w normalnym internecie?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" +msgstr "Dlaczego pobieranie plików, przeglÄ…danie stron, ogółem wszystko jest wolniejsze w sieci I2P niż w normalnym internecie?" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 msgid "I think I found a bug, where can I report it?" @@ -3640,74 +2967,42 @@ msgstr "Mam pytanie!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the <a href=\"%(java)s\">Java programming language</a>." -" \n" +"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An <a href=\"%(android)s\">Android port</a> is also available." -msgstr "" -"I2P jest napisane w jÄ™zyku programowania <a href=\"%(java)s\">Java</a>. " -"Oprogramowanie zostaÅ‚o przetestowane na systemach Windows, Linux, FreeBSD" -" i macOS. DostÄ™pny jest również port na <a " -"href=\"%(android)s\">Androida</a>." +msgstr "I2P jest napisane w jÄ™zyku programowania <a href=\"%(java)s\">Java</a>. Oprogramowanie zostaÅ‚o przetestowane na systemach Windows, Linux, FreeBSD i macOS. DostÄ™pny jest również port na <a href=\"%(android)s\">Androida</a>." #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." -msgstr "" -"OdnoÅ›nie użycia pamiÄ™ci: I2P jest domyÅ›lnie skonfigurowane do korzystania" -" z 128 MB pamiÄ™ci RAM. Jest to wystarczajÄ…co do przeglÄ…dania stron i IRC," -" ale inne aktywnoÅ›ci mogÄ… wymagać wiÄ™kszej iloÅ›ci pamiÄ™ci. Do trasowania " -"wiÄ™kszych iloÅ›ci danych, korzystania z BitTorrenta i hostowania " -"intensywnie wykorzystywanych ukrytych usÅ‚ug, niezbÄ™dna jest wiÄ™ksza ilość" -" pamiÄ™ci." +msgstr "OdnoÅ›nie użycia pamiÄ™ci: I2P jest domyÅ›lnie skonfigurowane do korzystania z 128 MB pamiÄ™ci RAM. Jest to wystarczajÄ…co do przeglÄ…dania stron i IRC, ale inne aktywnoÅ›ci mogÄ… wymagać wiÄ™kszej iloÅ›ci pamiÄ™ci. Do trasowania wiÄ™kszych iloÅ›ci danych, korzystania z BitTorrenta i hostowania intensywnie wykorzystywanych ukrytych usÅ‚ug, niezbÄ™dna jest wiÄ™ksza ilość pamiÄ™ci." #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." -msgstr "" -"OdnoÅ›nie zużycia procesora: dziaÅ‚anie I2P zostaÅ‚o sprawdzone na leciwych " -"systemach, takich jak komputery jednopÅ‚ytkowe <a " -"href=\"%(rpi)s\">Raspberry Pi</a>. Ponieważ I2P korzysta z zaawansowanej " -"kryptografii, mocniejszy procesor byÅ‚by odpowiedniejszy do korzystania z " -"systemu obciążonego I2P i reszty zadaÅ„ (usÅ‚ugi systemu operacyjnego, " -"powÅ‚oka, inne procesy, przeglÄ…darka internetowa)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." +msgstr "OdnoÅ›nie zużycia procesora: dziaÅ‚anie I2P zostaÅ‚o sprawdzone na leciwych systemach, takich jak komputery jednopÅ‚ytkowe <a href=\"%(rpi)s\">Raspberry Pi</a>. Ponieważ I2P korzysta z zaawansowanej kryptografii, mocniejszy procesor byÅ‚by odpowiedniejszy do korzystania z systemu obciążonego I2P i reszty zadaÅ„ (usÅ‚ugi systemu operacyjnego, powÅ‚oka, inne procesy, przeglÄ…darka internetowa)." #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "<a href=\"%(chart)s\">%(chart)s</a>.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." -msgstr "" -"Porównanie kilku dostÄ™pnych Å›rodowisk uruchomieniowych Javy (JRE) " -"dostÄ™pne jest pod adresem: <a href=\"%(chart)s\">%(chart)s</a>. Zaleca " -"siÄ™ korzystanie z Javy od Sun/Oracle lub z OpenJDK." +msgstr "Porównanie kilku dostÄ™pnych Å›rodowisk uruchomieniowych Javy (JRE) dostÄ™pne jest pod adresem: <a href=\"%(chart)s\">%(chart)s</a>. Zaleca siÄ™ korzystanie z Javy od Sun/Oracle lub z OpenJDK." #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "<a href=\"%(alt)s\">alternative clients</a> which don't require Java." -msgstr "" -"Podczas gdy główna implementacja klienta I2P wymaga Javy, istnieje kilka " -"<a href=\"%(alt)s\">alternatywnych klientów</a>, które jej nie wymagajÄ…." +msgstr "Podczas gdy główna implementacja klienta I2P wymaga Javy, istnieje kilka <a href=\"%(alt)s\">alternatywnych klientów</a>, które jej nie wymagajÄ…." #: i2p2www/pages/site/faq.html:101 msgid "What is an \"I2P Site?\"" @@ -3716,161 +3011,77 @@ msgstr "Czym jest strona .i2p?" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the <a href=\"%(browsers)s\">browser configuration page</a>." -msgstr "" -"Strona w domenie .i2p jest anonimowo hostowanÄ… stronÄ… internetowÄ…, ukrytÄ…" -" usÅ‚ugÄ… dostÄ™pnÄ… poprzez przeglÄ…darkÄ™ internetowÄ…. Można na niÄ… wejść " -"uprzednio konfigurujÄ…c proxy swojej przeglÄ…darki (zwykle na " -"<tt>localhost</tt> i port <tt>4444</tt>). Szczegółowe instrukcje znajdujÄ…" -" siÄ™ na <a href=\"%(browsers)s\">stronie konfiguracji przeglÄ…darki</a>." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>." +msgstr "Strona w domenie .i2p jest anonimowo hostowanÄ… stronÄ… internetowÄ…, ukrytÄ… usÅ‚ugÄ… dostÄ™pnÄ… poprzez przeglÄ…darkÄ™ internetowÄ…. Można na niÄ… wejść uprzednio konfigurujÄ…c proxy swojej przeglÄ…darki (zwykle na <tt>localhost</tt> i port <tt>4444</tt>). Szczegółowe instrukcje znajdujÄ… siÄ™ na <a href=\"%(browsers)s\">stronie konfiguracji przeglÄ…darki</a>." #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." -msgstr "" -"X oznacza liczbÄ™ uczestników do których wysÅ‚aÅ‚eÅ› lub otrzymaÅ‚eÅ› wiadomość" -" w przeciÄ…gu ostatniej minuty, Y oznacza liczbÄ™ uczestników z którymi " -"kontaktowaÅ‚eÅ› siÄ™ w ciÄ…gu ostatniej godziny. Najedź kursorem nad inne " -"elementy, aby wyÅ›wietlić ich krótki opis." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." +msgstr "X oznacza liczbÄ™ uczestników do których wysÅ‚aÅ‚eÅ› lub otrzymaÅ‚eÅ› wiadomość w przeciÄ…gu ostatniej minuty, Y oznacza liczbÄ™ uczestników z którymi kontaktowaÅ‚eÅ› siÄ™ w ciÄ…gu ostatniej godziny. Najedź kursorem nad inne elementy, aby wyÅ›wietlić ich krótki opis." #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" -msgstr "" -"I2P jest sieciÄ… anonimowÄ… – zostaÅ‚a zaprojektowana do walki z blokadÄ… i " -"cenzurÄ… treÅ›ci, i ma na celu umożliwienie komunikacji każdemu bez " -"wyjÄ…tków. Ruch tunelowany przez Twój wÄ™zeÅ‚ jest zabezpieczony kilkoma " -"warstwami szyfrowania. PomijajÄ…c przypadek wystÄ…pienia poważnej " -"podatnoÅ›ci bezpieczeÅ„stwa (żadna jest obecnie znana), nie jest możliwe " -"ustalenie co jest przesyÅ‚ane, wiÄ™c nie ma możliwoÅ›ci rozróżnienia treÅ›ci " -"pożądanych od niepożądanych. Odpowiedź na to pytanie skÅ‚ada siÄ™ z 3 " -"części:" +msgstr "I2P jest sieciÄ… anonimowÄ… – zostaÅ‚a zaprojektowana do walki z blokadÄ… i cenzurÄ… treÅ›ci, i ma na celu umożliwienie komunikacji każdemu bez wyjÄ…tków. Ruch tunelowany przez Twój wÄ™zeÅ‚ jest zabezpieczony kilkoma warstwami szyfrowania. PomijajÄ…c przypadek wystÄ…pienia poważnej podatnoÅ›ci bezpieczeÅ„stwa (żadna jest obecnie znana), nie jest możliwe ustalenie co jest przesyÅ‚ane, wiÄ™c nie ma możliwoÅ›ci rozróżnienia treÅ›ci pożądanych od niepożądanych. Odpowiedź na to pytanie skÅ‚ada siÄ™ z 3 części:" #: i2p2www/pages/site/faq.html:129 msgid "" "<b>Distribution</b><br> \n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an <a " -"href=\"#exit\">exit node</a> (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route <i>any</i> traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." -msgstr "" -"<b>rozsyÅ‚anie</b><br> \n" -"CaÅ‚y ruch w sieci I2P jest szyfrowany kilkoma warstwami. Ni znasz " -"zawartoÅ›ci, źródÅ‚a ani przeznaczenia wiadomoÅ›ci. CaÅ‚y ruch przesyÅ‚any " -"przez Twój wÄ™zeÅ‚ jest ruchem wewnÄ™trznym sieci I2P, nie jesteÅ› <a " -"href=\"#exit\">wÄ™zÅ‚em wyjÅ›ciowym</a> (dokÅ‚adnie «outproxy» w terminologii" -" I2P). JedynÄ… alternatywÄ… jest odmowa przesyÅ‚ania <i>caÅ‚ego</i> ruchu " -"poprzez ustawienie opcji „udostÄ™pnij†(w zakÅ‚adce „przepustowośćâ€) lub " -"parametru <tt>maxParticipatingTunnels</tt> (w zakÅ‚adce „zaawansowaneâ€) na" -" 0. ByÅ‚oby miÅ‚o, gdybyÅ› tego nie robiÅ‚ i pomógÅ‚ sieci poprzez " -"uczestnictwo w przesyÅ‚aniu ruchu innych użytkowników. Ponad 95% " -"użytkowników uczestniczy w przesyÅ‚aniu ruchu innych użytkowników." +msgstr "<b>rozsyÅ‚anie</b><br> \nCaÅ‚y ruch w sieci I2P jest szyfrowany kilkoma warstwami. Ni znasz zawartoÅ›ci, źródÅ‚a ani przeznaczenia wiadomoÅ›ci. CaÅ‚y ruch przesyÅ‚any przez Twój wÄ™zeÅ‚ jest ruchem wewnÄ™trznym sieci I2P, nie jesteÅ› <a href=\"#exit\">wÄ™zÅ‚em wyjÅ›ciowym</a> (dokÅ‚adnie «outproxy» w terminologii I2P). JedynÄ… alternatywÄ… jest odmowa przesyÅ‚ania <i>caÅ‚ego</i> ruchu poprzez ustawienie opcji „udostÄ™pnij†(w zakÅ‚adce „przepustowośćâ€) lub parametru <tt>maxParticipatingTunnels</tt> (w zakÅ‚adce „zaawansowaneâ€) na 0. ByÅ‚oby miÅ‚o, gdybyÅ› tego nie robiÅ‚ i pomógÅ‚ sieci poprzez uczestnictwo w przesyÅ‚aniu ruchu innych użytkowników. Ponad 95% użytkowników uczestniczy w przesyÅ‚aniu ruchu innych użytkowników." #: i2p2www/pages/site/faq.html:139 msgid "" "<b>Storage</b><br> \n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, <a " -"href=\"http://freenetproject.org/\">Freenet</a>.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n" "By running I2P, you are not storing content for anyone." -msgstr "" -"<b>przechowywanie</b><br>\n" -"I2P nie jest rozproszonym magazynem treÅ›ci, tego typu usÅ‚uga musi być " -"uprzednio zainstalowana przez użytkownika (przykÅ‚adem jest Tahoe-LAFS). " -"Rzoproszonym magazynem treÅ›ci jest inna sieć anonimowa: <a " -"href=\"http://freenetproject.org/\">Freenet</a>. MajÄ…c uruchomiony wÄ™zeÅ‚ " -"I2P, nie przechowujesz jakichkolwiek treÅ›ci innych użytkowników." +msgstr "<b>przechowywanie</b><br>\nI2P nie jest rozproszonym magazynem treÅ›ci, tego typu usÅ‚uga musi być uprzednio zainstalowana przez użytkownika (przykÅ‚adem jest Tahoe-LAFS). Rzoproszonym magazynem treÅ›ci jest inna sieć anonimowa: <a href=\"http://freenetproject.org/\">Freenet</a>. MajÄ…c uruchomiony wÄ™zeÅ‚ I2P, nie przechowujesz jakichkolwiek treÅ›ci innych użytkowników." #: i2p2www/pages/site/faq.html:147 msgid "" "<b>Access</b><br>\n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." -msgstr "" -"<b>oglÄ…danie</b><br>\n" -"Jeżeli jest jakaÅ› ukryta usÅ‚uga z treÅ›ciami co do których masz " -"uprzedzenia, po prostu na niÄ… nie wchodź. Twój wÄ™zeÅ‚ nie bÄ™dzie pobieraÅ‚ " -"jakiejkolwiek treÅ›ci bez Twojego żądania." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." +msgstr "<b>oglÄ…danie</b><br>\nJeżeli jest jakaÅ› ukryta usÅ‚uga z treÅ›ciami co do których masz uprzedzenia, po prostu na niÄ… nie wchodź. Twój wÄ™zeÅ‚ nie bÄ™dzie pobieraÅ‚ jakiejkolwiek treÅ›ci bez Twojego żądania." #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." -msgstr "" -"Tak, najprostszÄ… i najbardziej powszechnÄ… metodÄ… jest zablokowanie " -"serwerów pozwalajÄ…cych znaleźć nowe wÄ™zÅ‚y – tzw. «reseed». CaÅ‚kowite " -"zablokowanie caÅ‚ego szyfrowanego ruchu również dziaÅ‚aÅ‚oby (jednakże " -"spowodowaÅ‚oby to zablokowane wielu usÅ‚ug niezwiÄ…zanych z I2P). W " -"przypadku zablokowania serwerów reseed, wciąż można byÅ‚oby pobrać paczkÄ™ " -"reseed z GitHuba, którÄ… można byÅ‚oby zablokować blokujÄ…c caÅ‚kowicie " -"dostÄ™p do GitHuba. Wciąż możliwe byÅ‚oby przeprowadzić reseedowanie przez " -"serwer proxy (oprócz sieci Tor jest wiele innych serwerów dostÄ™pnych na " -"sieci), bÄ…dź pobranie (lub wymiana offline) paczki reseed od znajomego." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." +msgstr "Tak, najprostszÄ… i najbardziej powszechnÄ… metodÄ… jest zablokowanie serwerów pozwalajÄ…cych znaleźć nowe wÄ™zÅ‚y – tzw. «reseed». CaÅ‚kowite zablokowanie caÅ‚ego szyfrowanego ruchu również dziaÅ‚aÅ‚oby (jednakże spowodowaÅ‚oby to zablokowane wielu usÅ‚ug niezwiÄ…zanych z I2P). W przypadku zablokowania serwerów reseed, wciąż można byÅ‚oby pobrać paczkÄ™ reseed z GitHuba, którÄ… można byÅ‚oby zablokować blokujÄ…c caÅ‚kowicie dostÄ™p do GitHuba. Wciąż możliwe byÅ‚oby przeprowadzić reseedowanie przez serwer proxy (oprócz sieci Tor jest wiele innych serwerów dostÄ™pnych na sieci), bÄ…dź pobranie (lub wymiana offline) paczki reseed od znajomego." #: i2p2www/pages/site/faq.html:161 msgid "" "In <code>wrapper.log</code> I see an error that states \"<code>Protocol " "family unavailable</code>\" when loading the Router Console" -msgstr "" -"W pliku<code>wrapper.log</code> pojawia siÄ™ bÅ‚Ä…d: „<code>Protocol family " -"unavailable</code>†podczas Å‚adowania konsoli wÄ™zÅ‚a." +msgstr "W pliku<code>wrapper.log</code> pojawia siÄ™ bÅ‚Ä…d: „<code>Protocol family unavailable</code>†podczas Å‚adowania konsoli wÄ™zÅ‚a." #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" -msgstr "" -"Ten bÅ‚Ä…d czÄ™sto wystÄ™puje z programami Java wykorzystujÄ…cych sieć na " -"niektórych systemach skonfigurowanych do używania domyÅ›lnie IPv6. Jest na" -" to kilka sposobów:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" +msgstr "Ten bÅ‚Ä…d czÄ™sto wystÄ™puje z programami Java wykorzystujÄ…cych sieć na niektórych systemach skonfigurowanych do używania domyÅ›lnie IPv6. Jest na to kilka sposobów:" #: i2p2www/pages/site/faq.html:168 msgid "" "On Linux based systems, you can <code>echo 0 > " "/proc/sys/net/ipv6/bindv6only</code>" -msgstr "" -"Na systemach linuksowych, wpisz code>echo 0 > " -"/proc/sys/net/ipv6/bindv6only</code>" +msgstr "Na systemach linuksowych, wpisz code>echo 0 > /proc/sys/net/ipv6/bindv6only</code>" #: i2p2www/pages/site/faq.html:170 msgid "Look for the following lines in <code>wrapper.config</code>." @@ -3878,48 +3089,32 @@ msgstr "Poszukaj nastÄ™pujÄ…cych linii w <code>wrapper.config</code>:" #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." -msgstr "" -"Jeżeli je napotkasz, od-komentuj je poprzez usuniÄ™cie znaków „#â€. Jeżeli " -"ich nie ma, to je dodaj bez znaków „#â€." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." +msgstr "Jeżeli je napotkasz, od-komentuj je poprzez usuniÄ™cie znaków „#â€. Jeżeli ich nie ma, to je dodaj bez znaków „#â€." #: i2p2www/pages/site/faq.html:177 msgid "" "Another option would be to remove the <strong>::1</strong> from " "<code>~/.i2p/clients.config</code>" -msgstr "" -"InnÄ… opcjÄ… jest usuniÄ™cie <strong>::1</strong> z " -"<code>~/.i2p/clients.config</code>." +msgstr "InnÄ… opcjÄ… jest usuniÄ™cie <strong>::1</strong> z <code>~/.i2p/clients.config</code>." #: i2p2www/pages/site/faq.html:181 msgid "" -"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> " -"to take effect, you must completely\n" +"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n" "stop the router and the wrapper. Clicking <em>Restart</em> on your\n" "router console will NOT reread this file! You must\n" "click <em>Shutdown</em>, wait 11 minutes, then start I2P." -msgstr "" -"<strong>UWAGA</strong>: wszelkie zmiany w <code>wrapper.config</code> " -"wymagajÄ… caÅ‚kowitego restartu wÄ™zÅ‚a i wrappera. Samo klikniÄ™cie " -"<em>Restart</em> w konsoli wÄ™zÅ‚a NIE przeÅ‚aduje tego pliku! Musisz " -"kliknąć <em>Zamknij</em>, poczekać 11 minut, i ponownie wÅ‚Ä…czyć I2P." +msgstr "<strong>UWAGA</strong>: wszelkie zmiany w <code>wrapper.config</code> wymagajÄ… caÅ‚kowitego restartu wÄ™zÅ‚a i wrappera. Samo klikniÄ™cie <em>Restart</em> w konsoli wÄ™zÅ‚a NIE przeÅ‚aduje tego pliku! Musisz kliknąć <em>Zamknij</em>, poczekać 11 minut, i ponownie wÅ‚Ä…czyć I2P." #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites." -msgstr "" -"Jeżeli weźmiemy pod uwagÄ™ wszystkie strony .i2p w historii, to tak, " -"wiÄ™kszość z nich jest martwych. Ludzie i strony I2P rodzÄ… siÄ™ i odchodzÄ…." -" Dobrym sposobem na rozpoczÄ™cie przygody z I2P jest spojrzenie na listÄ™ " -"czynnych stron .i2p. Strona <a href=\"%(eepstatus)s\">%(eepstatus)s</a> " -"Å›ledzi aktywne strony I2P." +msgstr "Jeżeli weźmiemy pod uwagÄ™ wszystkie strony .i2p w historii, to tak, wiÄ™kszość z nich jest martwych. Ludzie i strony I2P rodzÄ… siÄ™ i odchodzÄ…. Dobrym sposobem na rozpoczÄ™cie przygody z I2P jest spojrzenie na listÄ™ czynnych stron .i2p. Strona <a href=\"%(eepstatus)s\">%(eepstatus)s</a> Å›ledzi aktywne strony I2P." #: i2p2www/pages/site/faq.html:199 msgid "Why is I2P listening on port 32000?" @@ -3927,106 +3122,49 @@ msgstr "Dlaczego I2P nasÅ‚uchuje na porcie 32000?" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." -msgstr "" -"UsÅ‚uga wrappera Javy „Tanuki†otwiera ten port – przypiÄ™ty pod localhost " -"– aby komunikować siÄ™ z oprogramowaniem uruchomionym wewnÄ…trz JVM. Kiedy " -"maszyna wirtualna Javy jest uruchamiana, tworzony jest klucz, potrzebny " -"do poÅ‚Ä…czenia z wrapperem. Po tym jak JVM utworzy poÅ‚Ä…czenie z wrapperem," -" wrapper odrzuca wszystkie nastÄ™pne poÅ‚Ä…czenia." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." +msgstr "UsÅ‚uga wrappera Javy „Tanuki†otwiera ten port – przypiÄ™ty pod localhost – aby komunikować siÄ™ z oprogramowaniem uruchomionym wewnÄ…trz JVM. Kiedy maszyna wirtualna Javy jest uruchamiana, tworzony jest klucz, potrzebny do poÅ‚Ä…czenia z wrapperem. Po tym jak JVM utworzy poÅ‚Ä…czenie z wrapperem, wrapper odrzuca wszystkie nastÄ™pne poÅ‚Ä…czenia." #: i2p2www/pages/site/faq.html:206 msgid "" "More information can be found in the <a " "href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" "port.html\">wrapper documentation</a>." -msgstr "" -"WiÄ™cej informacji jest dostÄ™pnych w <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">dokumentacji wrappera</a>." +msgstr "WiÄ™cej informacji jest dostÄ™pnych w <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>." #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a <a " -"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." -msgstr "" -"Instrukcje konfiguracji serwerów proxy dla różnych przeglÄ…darek " -"internetowych wraz z zrzutami ekranu znajdujÄ… siÄ™ na <a " -"href=\"%(browserconfig)s\">osobnej stronie</a>. Bardziej zaawansowane " -"konfiguracje z użyciem narzÄ™dzi zewnÄ™trznych takich jak rozszerzenie do " -"przeglÄ…darek FoxyProxy bÄ…dź serwer Privoxy sÄ… możliwe, ale ich " -"niepoprawna konfiguracja grozi wyciekiem Twoich danych." +"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." +msgstr "Instrukcje konfiguracji serwerów proxy dla różnych przeglÄ…darek internetowych wraz z zrzutami ekranu znajdujÄ… siÄ™ na <a href=\"%(browserconfig)s\">osobnej stronie</a>. Bardziej zaawansowane konfiguracje z użyciem narzÄ™dzi zewnÄ™trznych takich jak rozszerzenie do przeglÄ…darek FoxyProxy bÄ…dź serwer Privoxy sÄ… możliwe, ale ich niepoprawna konfiguracja grozi wyciekiem Twoich danych." #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the <a " -"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel " -"configuration page</a>), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to <code>localhost " -"6668</code>. \n" -"HexChat-like client users can create a new network with the server " -"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n" +"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" -msgstr "" -"\n" -"Tunel do głównego serwera IRC w sieci I2P – Irc2P – zostaÅ‚ utworzony " -"podczas instalacji I2P (zajrzyj na <a " -"href=\"http://localhost:7657/i2ptunnel/index.jsp\">stronÄ™ zarzÄ…dzania " -"ukrytymi usÅ‚ugami</a>) i jest automatycznie uruchamiany podczas startu " -"wÄ™zÅ‚a. Aby siÄ™ z nim poÅ‚Ä…czyć, skonfiguruj swojego klienta IRC do " -"Å‚Ä…czenia siÄ™ z serwerem <code>localhost 6668</code>. Użytkownicy programu" -" HexChat mogÄ… utworzyć nowÄ… sieć z serwerem <code>localhost/6668</code> " -"(zaznacz „pomiÅ„ serwer proxyâ€, jeżeli masz skonfigurowany serwer proxy). " -"Użytkownicy programu Weechat mogÄ… wpisać nastÄ™pujÄ…ce polecenie:" +msgstr "\nTunel do głównego serwera IRC w sieci I2P – Irc2P – zostaÅ‚ utworzony podczas instalacji I2P (zajrzyj na <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">stronÄ™ zarzÄ…dzania ukrytymi usÅ‚ugami</a>) i jest automatycznie uruchamiany podczas startu wÄ™zÅ‚a. Aby siÄ™ z nim poÅ‚Ä…czyć, skonfiguruj swojego klienta IRC do Å‚Ä…czenia siÄ™ z serwerem <code>localhost 6668</code>. Użytkownicy programu HexChat mogÄ… utworzyć nowÄ… sieć z serwerem <code>localhost/6668</code> (zaznacz „pomiÅ„ serwer proxyâ€, jeżeli masz skonfigurowany serwer proxy). Użytkownicy programu Weechat mogÄ… wpisać nastÄ™pujÄ…ce polecenie:" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the " -"top of your router console for instructions." -msgstr "" -"Kliknij w odnoÅ›nik „<a href=\"http://localhost:7658/\">serwer www</a>†w " -"konsoli Twojego wÄ™zÅ‚a, aby dowiedzieć siÄ™ wiÄ™cej." +"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top " +"of your router console for instructions." +msgstr "Kliknij w odnoÅ›nik „<a href=\"http://localhost:7658/\">serwer www</a>†w konsoli Twojego wÄ™zÅ‚a, aby dowiedzieć siÄ™ wiÄ™cej." #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." -msgstr "" -"Jeżeli prowadzisz wÅ‚asny blog lub udostÄ™pniasz jakieÅ› maÅ‚o wrażliwe " -"treÅ›ci, to raczej nie jesteÅ› w wiÄ™kszym niebezpieczeÅ„stwie. Jeżeli " -"potrzebujesz podstawowej prywatnoÅ›ci, również nie jesteÅ› w wiÄ™kszym " -"niebezpieczeÅ„stwie. Jeżeli hostujesz jakieÅ› wrażliwe treÅ›ci, Twoja usÅ‚uga" -" przestanie dziaÅ‚ać w tym samym momencie co Twój wÄ™zeÅ‚. KtoÅ› monitorujÄ…cy" -" czas niedostÄ™pnoÅ›ci Twojej usÅ‚ugi może skorelować to z wydarzeniami w " -"Å›wiecie rzeczywistym i zdeanonimizować CiÄ™ przy pewnych nakÅ‚adach pracy. " -"Można siÄ™ przed tym bronić hostujÄ…c usÅ‚ugÄ™ na wielu serwerach " -"(multihoming) bÄ…dź korzystajÄ…c z Tahoe-LAFS, ale wymaga do dodatkowej " -"konfiguracji i jest odpowiednie tylko dla pewnego rodzaju zagrożeÅ„. Nie " -"istnieje jedno idealne rozwiÄ…zanie, ochrona przed inwigilacjÄ… wymaga " -"rozważnych decyzji w każdym przypadku." +msgstr "Jeżeli prowadzisz wÅ‚asny blog lub udostÄ™pniasz jakieÅ› maÅ‚o wrażliwe treÅ›ci, to raczej nie jesteÅ› w wiÄ™kszym niebezpieczeÅ„stwie. Jeżeli potrzebujesz podstawowej prywatnoÅ›ci, również nie jesteÅ› w wiÄ™kszym niebezpieczeÅ„stwie. Jeżeli hostujesz jakieÅ› wrażliwe treÅ›ci, Twoja usÅ‚uga przestanie dziaÅ‚ać w tym samym momencie co Twój wÄ™zeÅ‚. KtoÅ› monitorujÄ…cy czas niedostÄ™pnoÅ›ci Twojej usÅ‚ugi może skorelować to z wydarzeniami w Å›wiecie rzeczywistym i zdeanonimizować CiÄ™ przy pewnych nakÅ‚adach pracy. Można siÄ™ przed tym bronić hostujÄ…c usÅ‚ugÄ™ na wielu serwerach (multihoming) bÄ…dź korzystajÄ…c z Tahoe-LAFS, ale wymaga do dodatkowej konfiguracji i jest odpowiednie tylko dla pewnego rodzaju zagrożeÅ„. Nie istnieje jedno idealne rozwiÄ…zanie, ochrona przed inwigilacjÄ… wymaga rozważnych decyzji w każdym przypadku." #: i2p2www/pages/site/faq.html:250 msgid "How Does I2P find \".i2p\" websites? " @@ -4038,38 +3176,24 @@ msgstr "Jak można dodać adresy do książki adresowej?" #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." -msgstr "" -"Nie można dodać adresu bez znajomoÅ›ci przynajmniej adresu Base32 lub " -"Base64 strony. Åatwo zapamiÄ™tywalna nazwa hosta jest tylko aliasem adresu" -" kryptograficznego, który odpowiada adresowi Base32/Base64. Bez tego " -"adresu kryptograficznego nie ma możliwoÅ›ci odwiedzenia danej strony w " -"sieci I2P. Rozpowszechnianiem adresów osobom, które jaszcze ich nie znajÄ…" -" zajmujÄ… siÄ™ „usÅ‚ugi skokówâ€. Przy wejÅ›ciu na nieznany adres wÄ™zeÅ‚ I2P " -"zaproponuje użycia usÅ‚ugi skoków, z których stats.i2p jest najbardziej " -"godnÄ… zaufania." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." +msgstr "Nie można dodać adresu bez znajomoÅ›ci przynajmniej adresu Base32 lub Base64 strony. Åatwo zapamiÄ™tywalna nazwa hosta jest tylko aliasem adresu kryptograficznego, który odpowiada adresowi Base32/Base64. Bez tego adresu kryptograficznego nie ma możliwoÅ›ci odwiedzenia danej strony w sieci I2P. Rozpowszechnianiem adresów osobom, które jaszcze ich nie znajÄ… zajmujÄ… siÄ™ „usÅ‚ugi skokówâ€. Przy wejÅ›ciu na nieznany adres wÄ™zeÅ‚ I2P zaproponuje użycia usÅ‚ugi skoków, z których stats.i2p jest najbardziej godnÄ… zaufania." #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." -msgstr "" -"Hostowanie strony korzystajÄ…c z wbudowanej aplikacji „i2ptunnel†nie " -"spowoduje automatycznej rejestracji strony w usÅ‚udze skoków. Aby " -"przydzielić nazwÄ™ lokalnie, wejdź na stronÄ™ konfiguracji i kliknij „dodaj" -" do lokalnej książki adresowejâ€. NastÄ™pnie przejdź do <a " -"href=\"http://127.0.0.1:7657/dns\">http://127.0.0.1:7657/dns</a> i " -"udostÄ™pnij innym odnoÅ›nik pomocniczy." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." +msgstr "Hostowanie strony korzystajÄ…c z wbudowanej aplikacji „i2ptunnel†nie spowoduje automatycznej rejestracji strony w usÅ‚udze skoków. Aby przydzielić nazwÄ™ lokalnie, wejdź na stronÄ™ konfiguracji i kliknij „dodaj do lokalnej książki adresowejâ€. NastÄ™pnie przejdź do <a href=\"http://127.0.0.1:7657/dns\">http://127.0.0.1:7657/dns</a> i udostÄ™pnij innym odnoÅ›nik pomocniczy." #: i2p2www/pages/site/faq.html:261 msgid "The ports that are used by I2P can be divided into 2 sections:" @@ -4091,18 +3215,10 @@ msgstr "Poniżej szczegółowy opis." #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." -msgstr "" -"Porty wystawione do internetu<br>\n" -"Uwaga: od wersji 0.7.8 nowe instalacje nie wykorzystujÄ… portu 8887, tylko" -" losowy port z przedziaÅ‚u [9000, 31000] wybrany podczas " -"pierwszego uruchomienia wÄ™zÅ‚a. Wybrany port jest wyÅ›wietlany na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> wÄ™zÅ‚a." +"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." +msgstr "Porty wystawione do internetu<br>\nUwaga: od wersji 0.7.8 nowe instalacje nie wykorzystujÄ… portu 8887, tylko losowy port z przedziaÅ‚u [9000, 31000] wybrany podczas pierwszego uruchomienia wÄ™zÅ‚a. Wybrany port jest wyÅ›wietlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> wÄ™zÅ‚a." #: i2p2www/pages/site/faq.html:278 msgid "OUTBOUND" @@ -4111,12 +3227,9 @@ msgstr "WYCHODZÄ„CE" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to " -"arbitrary remote UDP ports, allowing for replies" -msgstr "" -"UDP losowego portu wyÅ›wietlanego na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> do " -"dowolnych zdalnych portów UDP, z możliwoÅ›ciÄ… odpowiedzi" +"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary" +" remote UDP ports, allowing for replies" +msgstr "UDP losowego portu wyÅ›wietlanego na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> do dowolnych zdalnych portów UDP, z możliwoÅ›ciÄ… odpowiedzi" #: i2p2www/pages/site/faq.html:281 msgid "TCP from random high ports to arbitrary remote TCP ports" @@ -4125,13 +3238,8 @@ msgstr "losowy wysoki TCP do dowolnych zdalnych portów TCP" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" -msgstr "" -"UDP do portu 123, z możliwoÅ›ciÄ… odpowiedzi (jest to niezbÄ™dne do " -"wewnÄ™trznej usÅ‚ugi synchronizacji czasu I2P poprzez SNTP – odpytuje " -"losowy serwer SNTP z pool.ntp.org lub inny wybrany przez użytkownika)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" +msgstr "UDP do portu 123, z możliwoÅ›ciÄ… odpowiedzi (jest to niezbÄ™dne do wewnÄ™trznej usÅ‚ugi synchronizacji czasu I2P poprzez SNTP – odpytuje losowy serwer SNTP z pool.ntp.org lub inny wybrany przez użytkownika)" #: i2p2www/pages/site/faq.html:285 msgid "INBOUND" @@ -4142,36 +3250,26 @@ msgid "" "(Optional, recommended) UDP to the port noted on the <a " "href=\"http://127.0.0.1:7657/confignet\">configuration page</a> from " "arbitrary locations" -msgstr "" -"(opcjonalny, zalecany) UDP wyÅ›wietlany na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z " -"dowolnych zdalnych adresów" +msgstr "(opcjonalny, zalecany) UDP wyÅ›wietlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z dowolnych zdalnych adresów" #: i2p2www/pages/site/faq.html:288 msgid "" "(Optional, recommended) TCP to the port noted on <a " "href=\"http://127.0.0.1:7657/confignet\">configuration page</a> from " "arbitrary locations" -msgstr "" -"(opcjonalny, zalecany) TCP wyÅ›wietlany na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z " -"dowolnych zdalnych adresów" +msgstr "(opcjonalny, zalecany) TCP wyÅ›wietlany na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a> z dowolnych zdalnych adresów" #: i2p2www/pages/site/faq.html:289 msgid "" "Inbound TCP can be disabled on the <a " "href=\"http://127.0.0.1:7657/confignet\">configuration page</a>" -msgstr "" -"przychodzÄ…cy TCP można dezaktywować na <a " -"href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a>" +msgstr "przychodzÄ…cy TCP można dezaktywować na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji</a>" #: i2p2www/pages/site/faq.html:292 msgid "" "Local I2P ports, listening only to local connections by default, except " "where noted:" -msgstr "" -"Lokalne porty I2P, nasÅ‚uchujÄ…ce domyÅ›lnie tylko lokalnych poÅ‚Ä…czeÅ„, o ile" -" nie zanotowano inaczej:" +msgstr "Lokalne porty I2P, nasÅ‚uchujÄ…ce domyÅ›lnie tylko lokalnych poÅ‚Ä…czeÅ„, o ile nie zanotowano inaczej:" #: i2p2www/pages/site/faq.html:296 msgid "PORT" @@ -4189,204 +3287,106 @@ msgstr "OPIS" msgid "" "Cannot be changed. Binds to all interfaces. May be disabled on <a " "href=\"http://127.0.0.1:7657/confignet\">confignet</a>." -msgstr "" -"Niezmienialny. Podpina siÄ™ pod wszystkie interfejsy. Może zostać " -"wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/confignet\">stronie " -"konfiguracji „siećâ€</a>." +msgstr "Niezmienialny. Podpina siÄ™ pod wszystkie interfejsy. Może zostać wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „siećâ€</a>." #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the bob.config file." -msgstr "" -"Gniazdo wysokopoziomowego API dla aplikacji klienckich. DomyÅ›lnie " -"wyÅ‚Ä…czone. Może zostać wÅ‚Ä…czony/wyÅ‚Ä…czony na <a " -"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji " -"„klientyâ€</a>. Można zmienić w pliku bob.config." +msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. DomyÅ›lnie wyÅ‚Ä…czone. Może zostać wÅ‚Ä…czony/wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klientyâ€</a>. Można zmienić w pliku bob.config." #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." -msgstr "" -"Może zostać wyÅ‚Ä…czony lub zmieniony na stronie „zarzÄ…dzanie ukrytymi " -"usÅ‚ugami†w konsoli wÄ™zÅ‚a. Można również przypiąć do okreÅ›lonego lub " -"wszystkich interfejsów sieciowych." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." +msgstr "Może zostać wyÅ‚Ä…czony lub zmieniony na stronie „zarzÄ…dzanie ukrytymi usÅ‚ugami†w konsoli wÄ™zÅ‚a. Można również przypiąć do okreÅ›lonego lub wszystkich interfejsów sieciowych." #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.HTTPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." -msgstr "" -"Podpina siÄ™ pod adresy LAN. Może zostać zmieniony używajÄ…c zaawansowanego" -" ustawienia <code>i2np.upnp.HTTPPort=nnnn</code>. Może zostać wyÅ‚Ä…czony " -"na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji " -"„siećâ€</a>." +" May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +msgstr "Podpina siÄ™ pod adresy LAN. Może zostać zmieniony używajÄ…c zaawansowanego ustawienia <code>i2np.upnp.HTTPPort=nnnn</code>. Może zostać wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „siećâ€</a>." #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.SSDPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." -msgstr "" -"Podpina siÄ™ pod adresy LAN. Może zostać zmieniony używajÄ…c zaawansowanego" -" ustawienia <code>i2np.upnp.SSDPPort=nnnn</code>. Może zostać wyÅ‚Ä…czony " -"na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji " -"„siećâ€</a>." +" May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +msgstr "Podpina siÄ™ pod adresy LAN. Może zostać zmieniony używajÄ…c zaawansowanego ustawienia <code>i2np.upnp.SSDPPort=nnnn</code>. Może zostać wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/confignet\">stronie konfiguracji „siećâ€</a>." #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>." -msgstr "" -"Używane przez aplikacje klienckie. Można zmienić port na <a " -"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji " -"„klientyâ€</a>, ale nie jest to zalecane. Można podpiąć do okreÅ›lonego lub" -" wszystkich interfejsów sieciowych, lub zostać wyÅ‚Ä…czony." +" May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>." +msgstr "Używane przez aplikacje klienckie. Można zmienić port na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klientyâ€</a>, ale nie jest to zalecane. Można podpiąć do okreÅ›lonego lub wszystkich interfejsów sieciowych, lub zostać wyÅ‚Ä…czony." #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" -" May be changed in the <code>clients.config</code> file with the" -" SAM command line option <code>sam.udp.port=nnnn</code>." -msgstr "" -"Gniazdo wysokopoziomowego API dla aplikacji klienckich. Otwierany tylko " -"gdy klient SAM v3 zażąda sesji UDP. Może zostać wÅ‚Ä…czony/wyÅ‚Ä…czony na <a" -" href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji " -"„klientyâ€</a>. Może zostać zmieniony w pliku <code>clients.config</code> " -"w linijce <code>sam.udp.port=nnnn</code>." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +" May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>." +msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. Otwierany tylko gdy klient SAM v3 zażąda sesji UDP. Może zostać wÅ‚Ä…czony/wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klientyâ€</a>. Może zostać zmieniony w pliku <code>clients.config</code> w linijce <code>sam.udp.port=nnnn</code>." #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the <code>clients.config</code> file." -msgstr "" -"Gniazdo wysokopoziomowego API dla aplikacji klienckich. DomyÅ›lnie " -"wyÅ‚Ä…czony dla Å›wieżych instalacji od wersji 0.6.5. Może zostać " -"wÅ‚Ä…czony/wyÅ‚Ä…czony na <a " -"href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji " -"„klientyâ€</a>. Może zostać zmieniony w pliku <code>clients.config</code>." +msgstr "Gniazdo wysokopoziomowego API dla aplikacji klienckich. DomyÅ›lnie wyÅ‚Ä…czony dla Å›wieżych instalacji od wersji 0.6.5. Może zostać wÅ‚Ä…czony/wyÅ‚Ä…czony na <a href=\"http://127.0.0.1:7657/configclients\">stronie konfiguracji „klientyâ€</a>. Może zostać zmieniony w pliku <code>clients.config</code>." #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the <code>clients.config</code>file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." -msgstr "" -"Może zostać wyÅ‚Ä…czony w pliku <code>clients.config</code>. Może również " -"zostać przypisany do okreÅ›lonego lub wszystkich interfejsów sieciowych w " -"tym pliku konfiguracyjnym." +" May also be configured to be bound to a specific interface or all interfaces in that file." +msgstr "Może zostać wyÅ‚Ä…czony w pliku <code>clients.config</code>. Może również zostać przypisany do okreÅ›lonego lub wszystkich interfejsów sieciowych w tym pliku konfiguracyjnym." #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the <code>clients.config</code> file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the <code>jetty.xml</code> file." -msgstr "" -"Może zostać wyÅ‚Ä…czony w pliku <code>clients.config</code>. Może również " -"zostać przypisany do okreÅ›lonego lub wszystkich interfejsów sieciowych w " -"pliku <code>jetty.xml</code>." +" May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file." +msgstr "Może zostać wyÅ‚Ä…czony w pliku <code>clients.config</code>. Może również zostać przypisany do okreÅ›lonego lub wszystkich interfejsów sieciowych w pliku <code>jetty.xml</code>." #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." -msgstr "" -"Może zostać wyÅ‚Ä…czony lub zmieniony na stronie „zarzÄ…dzanie ukrytymi " -"usÅ‚ugami†w konsoli wÄ™zÅ‚a. Można również przypiąć do okreÅ›lonego lub " -"wszystkich interfejsów sieciowych." +" May also be configured to be bound to a specific interface or all interfaces." +msgstr "Może zostać wyÅ‚Ä…czony lub zmieniony na stronie „zarzÄ…dzanie ukrytymi usÅ‚ugami†w konsoli wÄ™zÅ‚a. Można również przypiąć do okreÅ›lonego lub wszystkich interfejsów sieciowych." #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." -msgstr "" -"WychodzÄ…cy tylko na 32000, nie nasÅ‚uchuje na tym porcie. Rozpoczyna od " -"31000 i kolejno szuka wolnego portu aż do 31999. Aby zmienić, zajrzyj do " -"<a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">dokumentacji wrappera</a>. WiÄ™cej informacji <a " -"href=\"#port32000\">poniżej</a>." +msgstr "WychodzÄ…cy tylko na 32000, nie nasÅ‚uchuje na tym porcie. Rozpoczyna od 31000 i kolejno szuka wolnego portu aż do 31999. Aby zmienić, zajrzyj do <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>. WiÄ™cej informacji <a href=\"#port32000\">poniżej</a>." #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." -msgstr "" -"Aby zmienić, zajrzyj do <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">dokumentacji wrappera</a>. WiÄ™cej informacji <a " -"href=\"#port32000\">poniżej</a>." +msgstr "Aby zmienić, zajrzyj do <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">dokumentacji wrappera</a>. WiÄ™cej informacji <a href=\"#port32000\">poniżej</a>." #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." -msgstr "" -"Lokalne porty i porty tuneli ukrytych usÅ‚ug I2P nie muszÄ… być osiÄ…galne " -"ze zdalnych maszyn, ale <u>powinny</u> być osiÄ…galne lokalnie. Możesz " -"także potrzebować dodatkowych portów dla utworzonych tuneli ukrytych " -"usÅ‚ug I2P na stronie „<a " -"href=\"http://localhost:7657/i2ptunnel/\">zarzÄ…dzanie ukrytymi " -"usÅ‚ugami</a> â€(które też wymagaÅ‚yby lokalnego dostÄ™pu, ale nie zdalnego, " -"o ile tego nie potrzebujesz)." +msgstr "Lokalne porty i porty tuneli ukrytych usÅ‚ug I2P nie muszÄ… być osiÄ…galne ze zdalnych maszyn, ale <u>powinny</u> być osiÄ…galne lokalnie. Możesz także potrzebować dodatkowych portów dla utworzonych tuneli ukrytych usÅ‚ug I2P na stronie „<a href=\"http://localhost:7657/i2ptunnel/\">zarzÄ…dzanie ukrytymi usÅ‚ugami</a> â€(które też wymagaÅ‚yby lokalnego dostÄ™pu, ale nie zdalnego, o ile tego nie potrzebujesz)." #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." -msgstr "" -"PodsumowujÄ…c, żadne porty nie muszÄ… być dostÄ™pne z zewnÄ…trz, ale jeżeli " -"potrafisz skonfigurować swój NAT/zaporÄ™ sieciowÄ…, aby przekierować " -"przychodzÄ…ce poÅ‚Ä…czenia UDP i TCP do <a " -"href=\"http://localhost:7657/config\">portu skonfigurowanego na tej " -"stronie</a>, bÄ™dziesz siÄ™ cieszyÅ‚(a) wiÄ™kszÄ… wydajnoÅ›ciÄ…. Musisz też " -"zezwolić na wychodzÄ…ce pakiety UDP do dowolnych zdalnych komputerów " -"(blokowanie losowych IP narzÄ™dziami typu PeerGuardian tylko przynosi " -"wiÄ™cej szkody niż pożytku – nie rób tego)." +msgstr "PodsumowujÄ…c, żadne porty nie muszÄ… być dostÄ™pne z zewnÄ…trz, ale jeżeli potrafisz skonfigurować swój NAT/zaporÄ™ sieciowÄ…, aby przekierować przychodzÄ…ce poÅ‚Ä…czenia UDP i TCP do <a href=\"http://localhost:7657/config\">portu skonfigurowanego na tej stronie</a>, bÄ™dziesz siÄ™ cieszyÅ‚(a) wiÄ™kszÄ… wydajnoÅ›ciÄ…. Musisz też zezwolić na wychodzÄ…ce pakiety UDP do dowolnych zdalnych komputerów (blokowanie losowych IP narzÄ™dziami typu PeerGuardian tylko przynosi wiÄ™cej szkody niż pożytku – nie rób tego)." #: i2p2www/pages/site/faq.html:534 msgid "This question can be answered in 3 parts:" @@ -4396,41 +3396,21 @@ msgstr "Odpowiedź na to pytanie skÅ‚ada siÄ™ z 3 części:" msgid "" "My router often displays a message saying \"Website Not Found In Address " "Book\", why do I see this message?" -msgstr "" -"Mój wÄ™zeÅ‚ czÄ™sto wyÅ›wietla komunikat „nie znaleziono strony www w książce" -" adresowejâ€, jaka jest tego przyczyna?" +msgstr "Mój wÄ™zeÅ‚ czÄ™sto wyÅ›wietla komunikat „nie znaleziono strony www w książce adresowejâ€, jaka jest tego przyczyna?" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as <i>http://website.i2p</i> are references" -" to a long, random string known as a <b>destination</b>. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a <a " -"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." -msgstr "" -"Czytelne dla ludzi adresy, takie jak <i>http://website.i2p</i> sÄ… " -"odnoÅ›nikami do dÅ‚ugich ciÄ…gów znaków okreÅ›lanych jako <b>miejsca " -"przeznaczenia</b>. Te odnoÅ›niki sÄ… rejestrowane i przetrzymywane w " -"usÅ‚ugach książek adresowych takich jak np. stats.i2p (zarzÄ…dzana przez " -"użytkownika zzz). CzÄ™sto spotkasz siÄ™ z adresami „b32â€. Adres „b32†jest " -"zahaszowanym (dokÅ‚adnie przez funkcjÄ™ <a " -"href=\"https://pl.wikipedia.org/wiki/SHA-2\">SHA256</a>) adresem miejsca " -"przeznaczenia. Do tego haszu jest doklejony ciÄ…g „.b32.i2pâ€, aby utworzyć" -" klikalny odnoÅ›nik do ukrytej usÅ‚ugi, który nie wymaga rejestracji w " -"książce adresowej." +"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." +msgstr "Czytelne dla ludzi adresy, takie jak <i>http://website.i2p</i> sÄ… odnoÅ›nikami do dÅ‚ugich ciÄ…gów znaków okreÅ›lanych jako <b>miejsca przeznaczenia</b>. Te odnoÅ›niki sÄ… rejestrowane i przetrzymywane w usÅ‚ugach książek adresowych takich jak np. stats.i2p (zarzÄ…dzana przez użytkownika zzz). CzÄ™sto spotkasz siÄ™ z adresami „b32â€. Adres „b32†jest zahaszowanym (dokÅ‚adnie przez funkcjÄ™ <a href=\"https://pl.wikipedia.org/wiki/SHA-2\">SHA256</a>) adresem miejsca przeznaczenia. Do tego haszu jest doklejony ciÄ…g „.b32.i2pâ€, aby utworzyć klikalny odnoÅ›nik do ukrytej usÅ‚ugi, który nie wymaga rejestracji w książce adresowej." #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." -msgstr "" -"Można dodać zasubskrybować adresy do książki adresowej Twojego wÄ™zÅ‚a, aby" -" komunikat ten pojawiaÅ‚ siÄ™ rzadziej." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." +msgstr "Można dodać zasubskrybować adresy do książki adresowej Twojego wÄ™zÅ‚a, aby komunikat ten pojawiaÅ‚ siÄ™ rzadziej." #: i2p2www/pages/site/faq.html:545 msgid "What is an address book subscription?" @@ -4438,21 +3418,16 @@ msgstr "Czym jest subskrypcja książki adresowej?" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." -msgstr "" -"SÄ… to pliki hostowane na różnych witrynach w sieci I2P zawierajÄ…ce listy " -"stron .i2p wraz z odpowiadajÄ…cymi im przeznaczeniami." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." +msgstr "SÄ… to pliki hostowane na różnych witrynach w sieci I2P zawierajÄ…ce listy stron .i2p wraz z odpowiadajÄ…cymi im przeznaczeniami." #: i2p2www/pages/site/faq.html:547 msgid "" "The address book is located at <a " "href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a> where " "further information can be found." -msgstr "" -"Książka adresowa znajduje siÄ™ w konsoli wÄ™zÅ‚a pod adresem <a " -"href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a>, gdzie " -"znajdujÄ… siÄ™ dalsze informacje." +msgstr "Książka adresowa znajduje siÄ™ w konsoli wÄ™zÅ‚a pod adresem <a href=\"http://localhost:7657/dns\">http://localhost:7657/dns</a>, gdzie znajdujÄ… siÄ™ dalsze informacje." #: i2p2www/pages/site/faq.html:548 msgid "What are some good address book subscription links?" @@ -4464,14 +3439,10 @@ msgstr "Skorzystaj z nastÄ™pujÄ…cych:" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" -msgstr "" -"Ze wzglÄ™dów bezpieczeÅ„stwa, konsola administracyjna wÄ™zÅ‚a domyÅ›lnie " -"nasÅ‚uchuje poÅ‚Ä…czeÅ„ tylko na lokalnym interfejsie sieciowym. SÄ… dwie " -"metody na zdalny dostÄ™p do konsoli wÄ™zÅ‚a:" +msgstr "Ze wzglÄ™dów bezpieczeÅ„stwa, konsola administracyjna wÄ™zÅ‚a domyÅ›lnie nasÅ‚uchuje poÅ‚Ä…czeÅ„ tylko na lokalnym interfejsie sieciowym. SÄ… dwie metody na zdalny dostÄ™p do konsoli wÄ™zÅ‚a:" #: i2p2www/pages/site/faq.html:566 i2p2www/pages/site/faq.html:572 msgid "SSH Tunnel" @@ -4481,9 +3452,7 @@ msgstr "Tunel SSH" msgid "" "Configuring your console to be available on a Public IP address with a " "username & password" -msgstr "" -"Konfiguracja konsoli. aby byÅ‚a dostÄ™pna z zewnÄ…trz z publicznego adresu " -"IP i chroniona hasÅ‚em" +msgstr "Konfiguracja konsoli. aby byÅ‚a dostÄ™pna z zewnÄ…trz z publicznego adresu IP i chroniona hasÅ‚em" #: i2p2www/pages/site/faq.html:569 msgid "These are detailed below:" @@ -4491,25 +3460,15 @@ msgstr "Opisy poniżej:" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example <a " -"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" -msgstr "" -"Na systemach uniksopodobnych, jest to najÅ‚atwiejszy sposób na zdalny " -"dostÄ™p do konsoli wÄ™zÅ‚a I2P.<br>\n" -"(Uwaga: serwer SSH jest również dostÄ™pny na system Windows, na przykÅ‚ad " -"<a " -"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>.)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" +msgstr "Na systemach uniksopodobnych, jest to najÅ‚atwiejszy sposób na zdalny dostÄ™p do konsoli wÄ™zÅ‚a I2P.<br>\n(Uwaga: serwer SSH jest również dostÄ™pny na system Windows, na przykÅ‚ad <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>.)" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" -msgstr "" -"Po skonfigurowaniu dostÄ™pu do Twojego systemu przez SSH, użyj parametru " -"„-L†z odpowiednimi argumentami, przykÅ‚ad:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" +msgstr "Po skonfigurowaniu dostÄ™pu do Twojego systemu przez SSH, użyj parametru „-L†z odpowiednimi argumentami, przykÅ‚ad:" #: i2p2www/pages/site/faq.html:593 msgid "Open <code>~/.i2p/clients.config</code> and replace" @@ -4517,429 +3476,215 @@ msgstr "Otwórz plik <code>~/.i2p/clients.config</code> i zastÄ…p" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to <a " -"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." -msgstr "" -"Przejdź do <a " -"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>" -" i opcjonalnie zabezpiecz swojÄ… konsolÄ™ wÄ™zÅ‚a I2P nazwÄ… użytkownika i " -"hasÅ‚em – jest to szczególnie zalecane, aby ktoÅ› nie namieszaÅ‚ w Twojej " -"konsoli narażajÄ…c CiÄ™ na demaskacjÄ™." +"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." +msgstr "Przejdź do <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> i opcjonalnie zabezpiecz swojÄ… konsolÄ™ wÄ™zÅ‚a I2P nazwÄ… użytkownika i hasÅ‚em – jest to szczególnie zalecane, aby ktoÅ› nie namieszaÅ‚ w Twojej konsoli narażajÄ…c CiÄ™ na demaskacjÄ™." #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to <a " -"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and " -"hit \"Graceful restart\", \n" +"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" -msgstr "" -"Przejdź do <a " -"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> i " -"kliknij „restartâ€, aby zrestartować JVM i przeÅ‚adować aplikacje " -"klienckie." +msgstr "Przejdź do <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> i kliknij „restartâ€, aby zrestartować JVM i przeÅ‚adować aplikacje klienckie." #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at <code>http://(System_IP):7657</code> and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." -msgstr "" -"Po restarcie, konsola powinna być dostÄ™pna zdalnie. Wejdź na swojÄ… " -"konsolÄ™ pod <code>http://(publiczny adres IP):7657</code> i wpisz " -"uprzednio zdefiniowanÄ… nazwÄ™ użytkownika i hasÅ‚o, jeżeli Twoja " -"przeglÄ…darka obsÅ‚uguje okienko uwierzytelniania." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." +msgstr "Po restarcie, konsola powinna być dostÄ™pna zdalnie. Wejdź na swojÄ… konsolÄ™ pod <code>http://(publiczny adres IP):7657</code> i wpisz uprzednio zdefiniowanÄ… nazwÄ™ użytkownika i hasÅ‚o, jeżeli Twoja przeglÄ…darka obsÅ‚uguje okienko uwierzytelniania." #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." -msgstr "" -"Uwaga: możesz wpisać w powyższej konfiguracji 0.0.0.0. Jest to okreÅ›lenie" -" interfejsu sieciowego, nie sieci lub maski podsieci. 0.0.0.0 oznacza " -"podpiÄ™cie siÄ™ pod wszystkie interfejsy sieciowe, wiÄ™c bÄ™dzie osiÄ…galne " -"zarówno z 127.0.0.1:7657, z sieci lokalnej (LAN) i z internetu (WAN). " -"BÄ…dź ostrożny/a korzystajÄ…c z tej opcji, ponieważ konsola bÄ™dzie wtedy " -"dostÄ™pna ze WSZYSTKICH adresów skonfigurowanych w systemie." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." +msgstr "Uwaga: możesz wpisać w powyższej konfiguracji 0.0.0.0. Jest to okreÅ›lenie interfejsu sieciowego, nie sieci lub maski podsieci. 0.0.0.0 oznacza podpiÄ™cie siÄ™ pod wszystkie interfejsy sieciowe, wiÄ™c bÄ™dzie osiÄ…galne zarówno z 127.0.0.1:7657, z sieci lokalnej (LAN) i z internetu (WAN). BÄ…dź ostrożny/a korzystajÄ…c z tej opcji, ponieważ konsola bÄ™dzie wtedy dostÄ™pna ze WSZYSTKICH adresów skonfigurowanych w systemie." #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"<a " -"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" -msgstr "" -"Przeczytaj odpowiedź na poprzednie pytanie odnoÅ›nie instrukcji " -"przekierowania portów przez SSH, zajrzyj również na stronÄ™ w konsoli " -"wÄ™zÅ‚a: <a " -"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>." +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" +msgstr "Przeczytaj odpowiedź na poprzednie pytanie odnoÅ›nie instrukcji przekierowania portów przez SSH, zajrzyj również na stronÄ™ w konsoli wÄ™zÅ‚a: <a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>." #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." -msgstr "" -"Proxy SOCKS dziaÅ‚a od wydania 0.7.1. Wspierane sÄ… SOCKS 4/4a/5. I2P nie " -"ma proxy wyjÅ›ciowego SOCKS, wiÄ™c bÄ™dzie to użyteczne tylko do " -"przeglÄ…dania domen .i2p." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." +msgstr "Proxy SOCKS dziaÅ‚a od wydania 0.7.1. Wspierane sÄ… SOCKS 4/4a/5. I2P nie ma proxy wyjÅ›ciowego SOCKS, wiÄ™c bÄ™dzie to użyteczne tylko do przeglÄ…dania domen .i2p." #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." -msgstr "" -"Wiele aplikacji może powodować wyciek wrażliwych danych, które mogÄ… CiÄ™ " -"zdemaskować, wiÄ™c zaleca siÄ™ ostrożność podczas korzystania przez I2P z " -"proxy SOCKS. I2P anonimizuje tylko informacje o poÅ‚Ä…czeniu, ale jeżeli " -"jakaÅ› aplikacja przesyÅ‚a te informacje w zawartoÅ›ci, oprogramowanie I2P " -"nie ma możliwoÅ›ci chronić Twojej prywatnoÅ›ci. PrzykÅ‚ad: niektóre klienty " -"pocztowe przesyÅ‚ajÄ… adres IP systemu na którym pracujÄ… na serwera " -"pocztowego. I2P nie ma możliwoÅ›ci odfiltrować tych informacji, wiÄ™c " -"używanie I2P jako proxy SOCKS dla aplikacji jest możliwe, ale niezwykle " -"niebezpieczne." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." +msgstr "Wiele aplikacji może powodować wyciek wrażliwych danych, które mogÄ… CiÄ™ zdemaskować, wiÄ™c zaleca siÄ™ ostrożność podczas korzystania przez I2P z proxy SOCKS. I2P anonimizuje tylko informacje o poÅ‚Ä…czeniu, ale jeżeli jakaÅ› aplikacja przesyÅ‚a te informacje w zawartoÅ›ci, oprogramowanie I2P nie ma możliwoÅ›ci chronić Twojej prywatnoÅ›ci. PrzykÅ‚ad: niektóre klienty pocztowe przesyÅ‚ajÄ… adres IP systemu na którym pracujÄ… na serwera pocztowego. I2P nie ma możliwoÅ›ci odfiltrować tych informacji, wiÄ™c używanie I2P jako proxy SOCKS dla aplikacji jest możliwe, ale niezwykle niebezpieczne." #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>." -msgstr "" -"W każdym bÄ…dź razie, jeżeli chcesz wiÄ™cej informacji o proxy SOCKS, kilka" -" użytecznych wskazówek znajdziesz na <a href=\"%(socks)s\">tej " -"stronie</a>." +msgstr "W każdym bÄ…dź razie, jeżeli chcesz wiÄ™cej informacji o proxy SOCKS, kilka użytecznych wskazówek znajdziesz na <a href=\"%(socks)s\">tej stronie</a>." #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project <a " -"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-" -"idea\">recommends against using BitTorrent over Tor</a>, \n" +"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n" "as there are serious anonymity-related issues associated with doing so." -msgstr "" -"O ile zostaÅ‚a zaÅ‚ożona usÅ‚uga proxy wyjÅ›ciowego do usÅ‚ugi z którÄ… siÄ™ " -"chcesz poÅ‚Ä…czyć, nie jest to możliwe. Obecnie sÄ… tylko trzy typy proxy " -"wyjÅ›ciowego w sieci I2P: HTTP, HTTPS, e-poczta. Nie ma obecnie proxy " -"wyjÅ›ciowego SOCKS. Jeżeli potrzebujesz z tego typu usÅ‚ugi, zainteresuj " -"siÄ™ sieciÄ… Tor. ProszÄ™ mieć na uwadze fakt, że programiÅ›ci projektu Tor " -"<a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-" -"idea\">odradzajÄ… korzystanie z BitTorrenta poprzez Tor</a> z powodu " -"poważnych problemów z bezpieczeÅ„stwem wynikajÄ…cych z takiego " -"postÄ™powania." +msgstr "O ile zostaÅ‚a zaÅ‚ożona usÅ‚uga proxy wyjÅ›ciowego do usÅ‚ugi z którÄ… siÄ™ chcesz poÅ‚Ä…czyć, nie jest to możliwe. Obecnie sÄ… tylko trzy typy proxy wyjÅ›ciowego w sieci I2P: HTTP, HTTPS, e-poczta. Nie ma obecnie proxy wyjÅ›ciowego SOCKS. Jeżeli potrzebujesz z tego typu usÅ‚ugi, zainteresuj siÄ™ sieciÄ… Tor. ProszÄ™ mieć na uwadze fakt, że programiÅ›ci projektu Tor <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">odradzajÄ… korzystanie z BitTorrenta poprzez Tor</a> z powodu poważnych problemów z bezpieczeÅ„stwem wynikajÄ…cych z takiego postÄ™powania." #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." -msgstr "" -"Czy mój wÄ™zeÅ‚ jest „wÄ™zÅ‚em wyjÅ›ciowym†do normalnego Internetu? Nie chcÄ™ " -"aby nim byÅ‚." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." +msgstr "Czy mój wÄ™zeÅ‚ jest „wÄ™zÅ‚em wyjÅ›ciowym†do normalnego Internetu? Nie chcÄ™ aby nim byÅ‚." #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our " -"forums, if you would like to learn more about running an outproxy." -msgstr "" -"Nie. W przeciwieÅ„stwie do sieci <a " -"href=\"https://www.torproject.org/\">Tor</a> „wÄ™zÅ‚y wyjÅ›ciowe†(a " -"dokÅ‚adniej „outproxy†w terminologii I2P) nie sÄ… niezbÄ™dnÄ… częściÄ… sieci." -" Tylko wolontariusze, którzy skonfigurowali specjalne oprogramowanie " -"tworzÄ… bramki do zwykÅ‚ego internetu. Jest ich dosÅ‚ownie kilku. DomyÅ›lnie " -"proxy wyjÅ›ciowe HTTP (skonfigurowane na porcie 4444) zawiera tylko jeden " -"taki serwer: false.i2p. Jeżeli ciekawi CiÄ™ jak uruchomić wÅ‚asne proxy " -"wyjÅ›ciowe, na forum I2P znajduje siÄ™ <a href=\"%(outproxy)s\">poradnik " -"(en)</a>." +"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy." +msgstr "Nie. W przeciwieÅ„stwie do sieci <a href=\"https://www.torproject.org/\">Tor</a> „wÄ™zÅ‚y wyjÅ›ciowe†(a dokÅ‚adniej „outproxy†w terminologii I2P) nie sÄ… niezbÄ™dnÄ… częściÄ… sieci. Tylko wolontariusze, którzy skonfigurowali specjalne oprogramowanie tworzÄ… bramki do zwykÅ‚ego internetu. Jest ich dosÅ‚ownie kilku. DomyÅ›lnie proxy wyjÅ›ciowe HTTP (skonfigurowane na porcie 4444) zawiera tylko jeden taki serwer: false.i2p. Jeżeli ciekawi CiÄ™ jak uruchomić wÅ‚asne proxy wyjÅ›ciowe, na forum I2P znajduje siÄ™ <a href=\"%(outproxy)s\">poradnik (en)</a>." #: i2p2www/pages/site/faq.html:679 msgid "I2P strives to be safe in it's default configuration for all users." -msgstr "" -"I2P usiÅ‚uje być bezpieczne w domyÅ›lnej konfiguracji dla wiÄ™kszoÅ›ci " -"użytkowników." +msgstr "I2P usiÅ‚uje być bezpieczne w domyÅ›lnej konfiguracji dla wiÄ™kszoÅ›ci użytkowników." #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" -msgstr "" -"Może być niebezpieczne korzystanie z sieci I2P w tak zwanych „opresyjnych" -" paÅ„stwachâ€, gdzie prawo może zabraniać korzystania z oprogramowania " -"anonimizujÄ…cego. WiÄ™kszość użytkowników I2P nie znajduje siÄ™ w takich " -"paÅ„stwach, a wÄ™zÅ‚y użytkowników w opresyjnych paÅ„stwach przechodzÄ… w " -"„tryb ukrytyâ€, w którym interakcje z resztÄ… sieci sÄ… ograniczone, aby " -"byli mniej widoczni dla obserwujÄ…cych sieć.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" +msgstr "Może być niebezpieczne korzystanie z sieci I2P w tak zwanych „opresyjnych paÅ„stwachâ€, gdzie prawo może zabraniać korzystania z oprogramowania anonimizujÄ…cego. WiÄ™kszość użytkowników I2P nie znajduje siÄ™ w takich paÅ„stwach, a wÄ™zÅ‚y użytkowników w opresyjnych paÅ„stwach przechodzÄ… w „tryb ukrytyâ€, w którym interakcje z resztÄ… sieci sÄ… ograniczone, aby byli mniej widoczni dla obserwujÄ…cych sieć.\n" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." -msgstr "" -"Tak, w ten sposób dziaÅ‚a w peÅ‚ni rozproszona sieć P2P. Każdy uczestniczy " -"w przesyÅ‚aniu pakietów innych użytkowników, wiÄ™c Twój adres IP musi być " -"znany innym, aby nawiÄ…zywać poÅ‚Ä…czenia." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." +msgstr "Tak, w ten sposób dziaÅ‚a w peÅ‚ni rozproszona sieć P2P. Każdy uczestniczy w przesyÅ‚aniu pakietów innych użytkowników, wiÄ™c Twój adres IP musi być znany innym, aby nawiÄ…zywać poÅ‚Ä…czenia." #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." -msgstr "" -"Pomimo tego, że fakt korzystania przez Ciebie z sieci I2P jest jawny, " -"inni nie majÄ… wglÄ…du co do tego co robisz w sieci I2P. Nie można " -"stwierdzić, czy dany użytkownik sieci I2P dzieli siÄ™ plikami, hostuje " -"stronÄ™, przeglÄ…da, czy tylko poÅ›redniczy w ruchu innych użytkowników." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." +msgstr "Pomimo tego, że fakt korzystania przez Ciebie z sieci I2P jest jawny, inni nie majÄ… wglÄ…du co do tego co robisz w sieci I2P. Nie można stwierdzić, czy dany użytkownik sieci I2P dzieli siÄ™ plikami, hostuje stronÄ™, przeglÄ…da, czy tylko poÅ›redniczy w ruchu innych użytkowników." #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." -msgstr "" -"Można z pewnym prawdopodobieÅ„stwem wywnioskować czy ktoÅ› korzysta z sieci" -" I2P, ale ciężko być tego pewnym. Najpewniejszym sposobem byÅ‚oby " -"znajomość adresu IP (o ile jest staÅ‚y) komputera podejrzanego, a " -"nastÄ™pnie posiadanie kilku monitorowanych wÄ™złów sieci I2P w różnych " -"sieciach. Kiedy jeden z nich poÅ‚Ä…czy siÄ™ z podejrzanym komputerem, jego " -"wÄ™zeÅ‚ I2P pojawi siÄ™ w bazie wÄ™złów. Może to zająć trochÄ™ czasu, a może " -"wcale nie nastÄ…pić. Możesz również caÅ‚kowicie blokować szyfrowany ruch w " -"okreÅ›lonej sieci, aby każdy wÄ™zeÅ‚ I2P z tej sieci straciÅ‚ wszystkich " -"użytkowników. W tym momencie wÄ™zÅ‚y te poÅ‚Ä…czÄ… siÄ™ z serwerami " -"reseedowania, co administrator sieci powinien z Å‚atwoÅ›ciÄ… zaobserwować." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." +msgstr "Można z pewnym prawdopodobieÅ„stwem wywnioskować czy ktoÅ› korzysta z sieci I2P, ale ciężko być tego pewnym. Najpewniejszym sposobem byÅ‚oby znajomość adresu IP (o ile jest staÅ‚y) komputera podejrzanego, a nastÄ™pnie posiadanie kilku monitorowanych wÄ™złów sieci I2P w różnych sieciach. Kiedy jeden z nich poÅ‚Ä…czy siÄ™ z podejrzanym komputerem, jego wÄ™zeÅ‚ I2P pojawi siÄ™ w bazie wÄ™złów. Może to zająć trochÄ™ czasu, a może wcale nie nastÄ…pić. Możesz również caÅ‚kowicie blokować szyfrowany ruch w okreÅ›lonej sieci, aby każdy wÄ™zeÅ‚ I2P z tej sieci straciÅ‚ wszystkich użytkowników. W tym momencie wÄ™zÅ‚y te poÅ‚Ä…czÄ… siÄ™ z serwerami reseedowania, co administrator sieci powinien z Å‚atwoÅ›ciÄ… zaobserwować." #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through <a " -"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport" -" Layer Security (TLS)</a>. \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." -msgstr "" -"I2P nie szyfruje transferu w internecie, sieć Tor także nie, np. " -"korzystajÄ…c z <a " -"href=\"https://pl.wikipedia.org/wiki/Transport_Layer_Security\">protokoÅ‚u" -" TLS</a>. Celem obydwu sieci jest przesÅ‚anie danych w postaci " -"niezmienionej i anonimowo przez sieć do odbiorcy. Każdy nieszyfrowany " -"ruch sieciowy generowany na Twoim systemie trafi w koÅ„cu do proxy/wÄ™zÅ‚a " -"wyjÅ›ciowego jako nieszyfrowany. Oznacza to, że Twój ruch sieciowy może " -"być przechwycony przez operatorów proxy/wÄ™złów wyjÅ›ciowych. Sposobem na " -"ochronÄ™ ruchu przed tym zagrożeniem jest upewnienie siÄ™, że caÅ‚y ruch do " -"proxy wyjÅ›ciowego bÄ™dzie szyfrowany przez TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." +msgstr "I2P nie szyfruje transferu w internecie, sieć Tor także nie, np. korzystajÄ…c z <a href=\"https://pl.wikipedia.org/wiki/Transport_Layer_Security\">protokoÅ‚u TLS</a>. Celem obydwu sieci jest przesÅ‚anie danych w postaci niezmienionej i anonimowo przez sieć do odbiorcy. Każdy nieszyfrowany ruch sieciowy generowany na Twoim systemie trafi w koÅ„cu do proxy/wÄ™zÅ‚a wyjÅ›ciowego jako nieszyfrowany. Oznacza to, że Twój ruch sieciowy może być przechwycony przez operatorów proxy/wÄ™złów wyjÅ›ciowych. Sposobem na ochronÄ™ ruchu przed tym zagrożeniem jest upewnienie siÄ™, że caÅ‚y ruch do proxy wyjÅ›ciowego bÄ™dzie szyfrowany przez TLS." #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"<a " -"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" -msgstr "" -"WiÄ™cej informacji znajdziesz na stronie projektu Tor: <a " -"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" -" (w j. angielskim)." +"For more information, you may read the Tor FAQ's answer to this question:\n" +"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" +msgstr "WiÄ™cej informacji znajdziesz na stronie projektu Tor: <a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a> (w j. angielskim)." #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on <a " -"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" -"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our " -"forums</a> as well." -msgstr "" -"Ponadto, możesz być zagrożony na skutek zmowy pomiÄ™dzy operatorem proxy " -"wyjÅ›ciowego i innych usÅ‚ug w I2P, jeÅ›li używasz tych samych tuneli (opcja" -" „klient współdzielony)â€. Dyskusja na ten temat zostaÅ‚a przeprowadzona na" -" <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>. Wykonano również " -"kopiÄ™ tej dyskusji na <a href=\"%(i2pforum)s>innym forums</a>." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" +"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well." +msgstr "Ponadto, możesz być zagrożony na skutek zmowy pomiÄ™dzy operatorem proxy wyjÅ›ciowego i innych usÅ‚ug w I2P, jeÅ›li używasz tych samych tuneli (opcja „klient współdzielony)â€. Dyskusja na ten temat zostaÅ‚a przeprowadzona na <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>. Wykonano również kopiÄ™ tej dyskusji na <a href=\"%(i2pforum)s>innym forums</a>." #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you " -"choose to trust the outproxy operator." -msgstr "" -"\n" -"PodsumowujÄ…c, na to pytanie możesz sobie odpowiedzieć tylko Ty sam, " -"ponieważ odpowiedź zależy od Twoich nawyków przeglÄ…dania, przyjÄ™tego <a " -"href=\"%(threatmodel)s\">modelu zagrożenia</a> i zaufania do operatora " -"proxy wyjÅ›ciowego." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator." +msgstr "\nPodsumowujÄ…c, na to pytanie możesz sobie odpowiedzieć tylko Ty sam, ponieważ odpowiedź zależy od Twoich nawyków przeglÄ…dania, przyjÄ™tego <a href=\"%(threatmodel)s\">modelu zagrożenia</a> i zaufania do operatora proxy wyjÅ›ciowego." #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." -msgstr "" -"Zmniejszenie anonimowoÅ›ci może nastÄ…pić na skutek:<br>\n" -"A) identyfikacji cech spójnych anonimowych tożsamoÅ›ci<br>\n" -"B) identyfikacji cech ulotnych powtarzanych poÅ‚Ä…czeÅ„.<br>\n" -"Mówimy tylko o zmniejszeniu anonimowoÅ›ci, ponieważ wiele z tych cech jest" -" wspólnych dla wielu użytkowników tworzÄ…cych „zbiórâ€. W im mniejszym " -"zbiorze siÄ™ znajdujesz i w jak wielu maÅ‚ych zbiorach siÄ™ znajdujesz, tym " -"mniejsza jest Twoja anonimowość." +msgstr "Zmniejszenie anonimowoÅ›ci może nastÄ…pić na skutek:<br>\nA) identyfikacji cech spójnych anonimowych tożsamoÅ›ci<br>\nB) identyfikacji cech ulotnych powtarzanych poÅ‚Ä…czeÅ„.<br>\nMówimy tylko o zmniejszeniu anonimowoÅ›ci, ponieważ wiele z tych cech jest wspólnych dla wielu użytkowników tworzÄ…cych „zbiórâ€. W im mniejszym zbiorze siÄ™ znajdujesz i w jak wielu maÅ‚ych zbiorach siÄ™ znajdujesz, tym mniejsza jest Twoja anonimowość." #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." -msgstr "" -"W przeszÅ‚oÅ›ci ataki na sieć I2P polegaÅ‚y na korelacji bazy dany sieci i " -"weryfikacji. DodajÄ…c element losowoÅ›ci pomiÄ™dzy bazÄ… danych i weryfikacjÄ…" -" zmniejszono prawdopodobieÅ„stwo powiÄ…zania z aktywnoÅ›ciÄ… w sieci I2P, " -"zmniejszajÄ…c tym samym skuteczność tego ataku." +msgstr "W przeszÅ‚oÅ›ci ataki na sieć I2P polegaÅ‚y na korelacji bazy dany sieci i weryfikacji. DodajÄ…c element losowoÅ›ci pomiÄ™dzy bazÄ… danych i weryfikacjÄ… zmniejszono prawdopodobieÅ„stwo powiÄ…zania z aktywnoÅ›ciÄ… w sieci I2P, zmniejszajÄ…c tym samym skuteczność tego ataku." #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." -msgstr "" -"Ataki na oprogramowanie skonfigurowane do pracy z sieciÄ… I2P sÄ… poza " -"zakresem możliwoÅ›ci zespoÅ‚u I2P. Użytkownik przeglÄ…dajÄ…cy strony .i2p " -"bÄ…dź hostujÄ…cy wÅ‚asnÄ… stronÄ™ w sieci I2P musi samodzielnie przemyÅ›leć " -"model zagrożenia. PrzeglÄ…darki internetowe sÄ… szczególnie problematyczne," -" ponieważ zostawiajÄ… „odcisk palca przeglÄ…darkiâ€. Korzystanie ze " -"zestandaryzowanego profilu przeglÄ…darki pozwala zmniejszyć to ryzyko." +msgstr "Ataki na oprogramowanie skonfigurowane do pracy z sieciÄ… I2P sÄ… poza zakresem możliwoÅ›ci zespoÅ‚u I2P. Użytkownik przeglÄ…dajÄ…cy strony .i2p bÄ…dź hostujÄ…cy wÅ‚asnÄ… stronÄ™ w sieci I2P musi samodzielnie przemyÅ›leć model zagrożenia. PrzeglÄ…darki internetowe sÄ… szczególnie problematyczne, ponieważ zostawiajÄ… „odcisk palca przeglÄ…darkiâ€. Korzystanie ze zestandaryzowanego profilu przeglÄ…darki pozwala zmniejszyć to ryzyko." #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the <a " -"href=\"#manual_reseed\">reseed instructions</a>." -msgstr "" -"Nowe instalacje I2P przeprowadzajÄ… proces reseedowania automatycznie " -"kiedy liczba znanych uczestników spadnie do bardzo niskiej wartoÅ›ci. " -"Jeżeli potrzebujesz rÄ™cznie przeprowadzić reseedowanie swojego wÄ™zÅ‚a, " -"zajrzyj do <a href=\"#manual_reseed\">instrukcji reseedowania</a>." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>." +msgstr "Nowe instalacje I2P przeprowadzajÄ… proces reseedowania automatycznie kiedy liczba znanych uczestników spadnie do bardzo niskiej wartoÅ›ci. Jeżeli potrzebujesz rÄ™cznie przeprowadzić reseedowanie swojego wÄ™zÅ‚a, zajrzyj do <a href=\"#manual_reseed\">instrukcji reseedowania</a>." #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." -msgstr "" -"WÄ™zeÅ‚ I2P musi zostać reseedowany podczas pierwszego poÅ‚Ä…czenia z sieciÄ…." -" Reseedowanie polega na pobraniu kilku plików zawierajÄ…cych informacje o " -"wÄ™zÅ‚ach (zapakowanych w cyfrowo podpisany plik .zip) po HTTPS z co " -"najmniej dwóch predefiniowanych serwerów prowadzonych przez wolontariuszy" -" w zwykÅ‚ym internecie." +msgstr "WÄ™zeÅ‚ I2P musi zostać reseedowany podczas pierwszego poÅ‚Ä…czenia z sieciÄ…. Reseedowanie polega na pobraniu kilku plików zawierajÄ…cych informacje o wÄ™zÅ‚ach (zapakowanych w cyfrowo podpisany plik .zip) po HTTPS z co najmniej dwóch predefiniowanych serwerów prowadzonych przez wolontariuszy w zwykÅ‚ym internecie." #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." -msgstr "" -"Typowym objawem nieudanego reseedowania jest wskaźnik „znani†(po lewej " -"stronie konsoli wÄ™zÅ‚a) wyÅ›wietlajÄ…cy bardzo maÅ‚Ä… wartość (czÄ™sto mnij niż" -" 5), która nie roÅ›nie. To może siÄ™ zdarzyć, miÄ™dzy innymi gdy Twoja " -"zapora sieciowa blokuje ruch wychodzÄ…cy lub żądanie reseedowania jest " -"caÅ‚kowicie zablokowane." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." +msgstr "Typowym objawem nieudanego reseedowania jest wskaźnik „znani†(po lewej stronie konsoli wÄ™zÅ‚a) wyÅ›wietlajÄ…cy bardzo maÅ‚Ä… wartość (czÄ™sto mnij niż 5), która nie roÅ›nie. To może siÄ™ zdarzyć, miÄ™dzy innymi gdy Twoja zapora sieciowa blokuje ruch wychodzÄ…cy lub żądanie reseedowania jest caÅ‚kowicie zablokowane." #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." -msgstr "" -"Jeżeli utknÄ…Å‚eÅ› za zaporÄ… Twojego dostawcy internetu lub jakiegoÅ› filtra," -" możesz rÄ™cznie poÅ‚Ä…czyć siÄ™ z sieciÄ… I2P." +msgstr "Jeżeli utknÄ…Å‚eÅ› za zaporÄ… Twojego dostawcy internetu lub jakiegoÅ› filtra, możesz rÄ™cznie poÅ‚Ä…czyć siÄ™ z sieciÄ… I2P." #: i2p2www/pages/site/faq.html:784 #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, " -"hostname, and port." -msgstr "" -"\n" -"Wraz z wydaniem 0.9.33 możesz także skonfigurować swój wÄ™zeÅ‚, aby " -"reseedowaÅ‚ przez proxy. Przejdź do <a href=\"%(url)s\">%(url)s</a> i " -"skonfiguruj rodzaj proxy, nazwÄ™ hosta i port." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port." +msgstr "\nWraz z wydaniem 0.9.33 możesz także skonfigurować swój wÄ™zeÅ‚, aby reseedowaÅ‚ przez proxy. Przejdź do <a href=\"%(url)s\">%(url)s</a> i skonfiguruj rodzaj proxy, nazwÄ™ hosta i port." #: i2p2www/pages/site/faq.html:789 msgid "Joining the I2P Network using a reseed file" @@ -4947,28 +3692,14 @@ msgstr "DoÅ‚Ä…czanie do sieci I2P za pomocÄ… pliku reseed" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." -msgstr "" -"Skontaktuj siÄ™ z zaufanym kolegÄ… posiadajÄ…cym wÄ™zeÅ‚ I2P i poproÅ› go o " -"pomoc w reseedowaniu Twojego wÄ™zÅ‚a I2P. PoproÅ› go o przesÅ‚anie pliku " -"reseed wyeksportowanego z jego wÄ™zÅ‚a I2P. Jest ważne, aby ten plik zostaÅ‚" -" przesÅ‚any bezpiecznym kanaÅ‚em, np. w postaci zaszyfrowanej (PGP, " -"podpisz, zaszyfruj i zweryfikuj zaufanym kluczem publicznym), aby nie " -"zostaÅ‚ przez kogoÅ› zmodyfikowany. Plik ten jest niepodpisany, wiÄ™c ufaj " -"tylko plikom od zaufanych osób. Nigdy nie importuj pliku reseed z " -"nieznanego źródÅ‚a." +msgstr "Skontaktuj siÄ™ z zaufanym kolegÄ… posiadajÄ…cym wÄ™zeÅ‚ I2P i poproÅ› go o pomoc w reseedowaniu Twojego wÄ™zÅ‚a I2P. PoproÅ› go o przesÅ‚anie pliku reseed wyeksportowanego z jego wÄ™zÅ‚a I2P. Jest ważne, aby ten plik zostaÅ‚ przesÅ‚any bezpiecznym kanaÅ‚em, np. w postaci zaszyfrowanej (PGP, podpisz, zaszyfruj i zweryfikuj zaufanym kluczem publicznym), aby nie zostaÅ‚ przez kogoÅ› zmodyfikowany. Plik ten jest niepodpisany, wiÄ™c ufaj tylko plikom od zaufanych osób. Nigdy nie importuj pliku reseed z nieznanego źródÅ‚a." #: i2p2www/pages/site/faq.html:800 #, python-format @@ -5004,11 +3735,9 @@ msgstr "UdostÄ™pnianie pliku reseed" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" -msgstr "" -"Zaufani znajomi mogÄ… wykorzystać Twój wÄ™zeÅ‚ I2P, aby podÅ‚Ä…czyć siÄ™ do " -"sieci:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" +msgstr "Zaufani znajomi mogÄ… wykorzystać Twój wÄ™zeÅ‚ I2P, aby podÅ‚Ä…czyć siÄ™ do sieci:" #: i2p2www/pages/site/faq.html:815 msgid "Under \"Create Reseed File\" click \"Create reseed file\"" @@ -5022,19 +3751,11 @@ msgstr "bezpiecznie wyÅ›lij plik %(filename)s swojemu znajomemu" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." -msgstr "" -"Nie udostÄ™pniaj tego pliku nieznajomym gdyż zawiera on wrażliwe " -"informacje prywatne (100 informacji o wÄ™zÅ‚ach) z Twojego wÄ™zÅ‚a I2P! Aby " -"chronić swojÄ… anonimowość możesz poczekać kilka godzin/dni zanim " -"udostÄ™pnisz ten plik przyjacielowi. Zaleca siÄ™ oszczÄ™dnie korzystać z tej" -" procedury (< 2 razy na tydzieÅ„)." +msgstr "Nie udostÄ™pniaj tego pliku nieznajomym gdyż zawiera on wrażliwe informacje prywatne (100 informacji o wÄ™zÅ‚ach) z Twojego wÄ™zÅ‚a I2P! Aby chronić swojÄ… anonimowość możesz poczekać kilka godzin/dni zanim udostÄ™pnisz ten plik przyjacielowi. Zaleca siÄ™ oszczÄ™dnie korzystać z tej procedury (< 2 razy na tydzieÅ„)." #: i2p2www/pages/site/faq.html:826 msgid " General guidelines for manual reseeding of I2P " @@ -5042,12 +3763,13 @@ msgstr "Ogólne wytyczne dotyczÄ…ce rÄ™cznego reseedu I2P" #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" msgstr "Nie udostÄ™pniaj publicznie lub znajomemu znajomego pliku reseed!" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" msgstr "UdostÄ™pniaj ten plik tylko ograniczonej liczbie osób (< 3)!" #: i2p2www/pages/site/faq.html:830 @@ -5056,77 +3778,34 @@ msgstr "Plik ten jest ważny tylko kilka dni (< 20)!" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using <a " -"href=\"https://www.torproject.org/\">Tor</a>." -msgstr "" -"Sieć I2P nie zostaÅ‚a zaprojektowana do bycia bramkÄ… do zwykÅ‚ego " -"internetu. Jak już wspomniano, istniejÄ… usÅ‚ugi – uruchamiane przez " -"wolontariuszy – umożliwiajÄ…ce dostÄ™p do zwykÅ‚ego internetu, tak zwane " -"„outproxyâ€. Jest jedno proxy wyjÅ›ciowe domyÅ›lnie skonfigurowane w tunelu " -"klienckim HTTP: false.i2p. UsÅ‚uga ta obecnie dziaÅ‚a, ale nie " -"gwarantujemy, że bÄ™dzie zawsze dziaÅ‚aÅ‚a, ponieważ nie jest to oficjalna " -"usÅ‚uga dostarczana przez projekt I2P. Jeżeli Twoim głównym celem jest " -"dostÄ™p do treÅ›ci w zwykÅ‚ym nieanonimowym internecie, zalecamy " -"skorzystanie z projektu <a href=\"https://www.torproject.org/\">Tor</a>." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>." +msgstr "Sieć I2P nie zostaÅ‚a zaprojektowana do bycia bramkÄ… do zwykÅ‚ego internetu. Jak już wspomniano, istniejÄ… usÅ‚ugi – uruchamiane przez wolontariuszy – umożliwiajÄ…ce dostÄ™p do zwykÅ‚ego internetu, tak zwane „outproxyâ€. Jest jedno proxy wyjÅ›ciowe domyÅ›lnie skonfigurowane w tunelu klienckim HTTP: false.i2p. UsÅ‚uga ta obecnie dziaÅ‚a, ale nie gwarantujemy, że bÄ™dzie zawsze dziaÅ‚aÅ‚a, ponieważ nie jest to oficjalna usÅ‚uga dostarczana przez projekt I2P. Jeżeli Twoim głównym celem jest dostÄ™p do treÅ›ci w zwykÅ‚ym nieanonimowym internecie, zalecamy skorzystanie z projektu <a href=\"https://www.torproject.org/\">Tor</a>." #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." -msgstr "" -"WewnÄ…trz sieci I2P nie ma potrzeby korzystania z HTTPS. Wszystkie " -"transfery sÄ… szyfrowane od-koÅ„ca-do-koÅ„ca, każda dodatkowa warstwa " -"szyfrowania (np. HTTPS) nie zwiÄ™ksza anonimowoÅ›ci. Jednakże jeżeli ktoÅ› " -"chciaÅ‚by/musi skorzystać z HTTPS, domyÅ›lne proxy HTTP wspiera ruch HTTPS." -" Operator ukrytej usÅ‚ugi musiaÅ‚by specjalnie skonfigurować i aktywować " -"dostÄ™p po HTTPS." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." +msgstr "WewnÄ…trz sieci I2P nie ma potrzeby korzystania z HTTPS. Wszystkie transfery sÄ… szyfrowane od-koÅ„ca-do-koÅ„ca, każda dodatkowa warstwa szyfrowania (np. HTTPS) nie zwiÄ™ksza anonimowoÅ›ci. Jednakże jeżeli ktoÅ› chciaÅ‚by/musi skorzystać z HTTPS, domyÅ›lne proxy HTTP wspiera ruch HTTPS. Operator ukrytej usÅ‚ugi musiaÅ‚by specjalnie skonfigurować i aktywować dostÄ™p po HTTPS." #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." -msgstr "" -"FTP nie jest wspierane z powodów technicznych. Obecnie nie ma proxy " -"wyjÅ›ciowych FTP, być może nawet nie daÅ‚oby siÄ™ utworzyć takiej usÅ‚ugi. " -"Każdy inny rodzaj proxy wyjÅ›ciowego powinno siÄ™ dać utworzyć wybierajÄ…c " -"opcjÄ™ tunelu „standardowyâ€. Jeżeli chciaÅ‚(a)byÅ› zaÅ‚ożyć wÅ‚asne outproxy, " -"ostrożnie zapoznaj siÄ™ z potencjalnymi zagrożeniami. SpoÅ‚eczność I2P być " -"może bÄ™dzie w stanie udzielić Ci porad technicznych, nie bój siÄ™ pytać. " -"Jak już wczeÅ›niej wspomniano, każda usÅ‚uga proxy wyjÅ›ciowego nie jest " -"podstawowÄ… usÅ‚ugÄ… sieci I2P. SÄ… to usÅ‚ugi uruchamiane przez " -"wolontariuszy, mogÄ… one zniknąć w każdej chwili." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." +msgstr "FTP nie jest wspierane z powodów technicznych. Obecnie nie ma proxy wyjÅ›ciowych FTP, być może nawet nie daÅ‚oby siÄ™ utworzyć takiej usÅ‚ugi. Każdy inny rodzaj proxy wyjÅ›ciowego powinno siÄ™ dać utworzyć wybierajÄ…c opcjÄ™ tunelu „standardowyâ€. Jeżeli chciaÅ‚(a)byÅ› zaÅ‚ożyć wÅ‚asne outproxy, ostrożnie zapoznaj siÄ™ z potencjalnymi zagrożeniami. SpoÅ‚eczność I2P być może bÄ™dzie w stanie udzielić Ci porad technicznych, nie bój siÄ™ pytać. Jak już wczeÅ›niej wspomniano, każda usÅ‚uga proxy wyjÅ›ciowego nie jest podstawowÄ… usÅ‚ugÄ… sieci I2P. SÄ… to usÅ‚ugi uruchamiane przez wolontariuszy, mogÄ… one zniknąć w każdej chwili." #: i2p2www/pages/site/faq.html:876 msgid "My router is using a large amount of CPU, what can I do about this?" @@ -5142,16 +3821,10 @@ msgstr "JRE" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"<code>java -version</code> at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." -msgstr "" -"Spróbuj użyć albo OpenJDK albo Javy od Sun/Oracle jeżeli jest dostÄ™pna na" -" Twój system. Możesz sprawdzić którÄ… wersjÄ™ Javy masz zainstalowanÄ… " -"wpisujÄ…c <code>java -version</code> do konsoli/powÅ‚oki. Na innych " -"implementacjach Javy wydajność jest sÅ‚aba." +msgstr "Spróbuj użyć albo OpenJDK albo Javy od Sun/Oracle jeżeli jest dostÄ™pna na Twój system. Możesz sprawdzić którÄ… wersjÄ™ Javy masz zainstalowanÄ… wpisujÄ…c <code>java -version</code> do konsoli/powÅ‚oki. Na innych implementacjach Javy wydajność jest sÅ‚aba." #: i2p2www/pages/site/faq.html:888 msgid "File sharing applications, e.g. BitTorrent" @@ -5159,13 +3832,9 @@ msgstr "programy do wymiany plików, np. BitTorrent" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." -msgstr "" -"Masz wÅ‚Ä…czony klient BitTorrent przez I2P? Spróbuj zredukować liczbÄ™ " -"torrentów, limity pobierania, lub wyÅ‚Ä…cz go caÅ‚kowicie aby sprawdzić czy " -"to coÅ› pomoże." +msgstr "Masz wÅ‚Ä…czony klient BitTorrent przez I2P? Spróbuj zredukować liczbÄ™ torrentów, limity pobierania, lub wyÅ‚Ä…cz go caÅ‚kowicie aby sprawdzić czy to coÅ› pomoże." #: i2p2www/pages/site/faq.html:895 msgid "High bandwidth settings" @@ -5173,15 +3842,9 @@ msgstr "wysokie ustawienia przepustowoÅ›ci" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for <em>share bandwidth percentage</em> on the " -"<a href=\"http://localhost:7657/config\">configuration</a> page." -msgstr "" -"Może Twoje limity przepustowoÅ›ci sÄ… zbyt wysokie? Być może zbyt dużo " -"transferu jest przesyÅ‚ane przez Twój wÄ™zeÅ‚ I2P i jest on przeciążony. " -"Spróbuj zmniejszyć <em>procent udostÄ™pnianego pasma</em> na stronie <a " -"href=\"http://localhost:7657/config\">konfiguracji</a>." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page." +msgstr "Może Twoje limity przepustowoÅ›ci sÄ… zbyt wysokie? Być może zbyt dużo transferu jest przesyÅ‚ane przez Twój wÄ™zeÅ‚ I2P i jest on przeciążony. Spróbuj zmniejszyć <em>procent udostÄ™pnianego pasma</em> na stronie <a href=\"http://localhost:7657/config\">konfiguracji</a>." #: i2p2www/pages/site/faq.html:901 msgid "I2P Version" @@ -5189,11 +3852,9 @@ msgstr "wersja I2P" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." -msgstr "" -"Upewnij siÄ™, że korzystasz z najnowszej wersji I2P aby czerpać korzyÅ›ci z" -" poprawek bÅ‚Ä™dów i wydajnoÅ›ciowych." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." +msgstr "Upewnij siÄ™, że korzystasz z najnowszej wersji I2P aby czerpać korzyÅ›ci z poprawek bÅ‚Ä™dów i wydajnoÅ›ciowych." #: i2p2www/pages/site/faq.html:907 msgid "Memory allocation" @@ -5201,19 +3862,10 @@ msgstr "przydziaÅ‚ pamiÄ™ci" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting <code>wrapper.java.maxmemory</code> in the file " -"<code>wrapper.config</code>." -msgstr "" -"Czy wystarczajÄ…ca ilość pamiÄ™ci zostaÅ‚a zarezerwowana dla I2P? Spójrz na " -"wykres pamiÄ™ci na <a href=\"http://localhost:7657/graphs\">stronie " -"wykresów</a> i sprawdź, czy wykres nie jest „przyciÄ™ty†– JVM spÄ™dza " -"wiÄ™kszość czasu na odÅ›miecaniu pamiÄ™ci (ang. garbage collection). ZwiÄ™ksz" -" wartość <code>wrapper.java.maxmemory</code> w pliku " -"<code>wrapper.config</code>." +"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>." +msgstr "Czy wystarczajÄ…ca ilość pamiÄ™ci zostaÅ‚a zarezerwowana dla I2P? Spójrz na wykres pamiÄ™ci na <a href=\"http://localhost:7657/graphs\">stronie wykresów</a> i sprawdź, czy wykres nie jest „przyciÄ™ty†– JVM spÄ™dza wiÄ™kszość czasu na odÅ›miecaniu pamiÄ™ci (ang. garbage collection). ZwiÄ™ksz wartość <code>wrapper.java.maxmemory</code> w pliku <code>wrapper.config</code>." #: i2p2www/pages/site/faq.html:915 #, python-format @@ -5222,13 +3874,9 @@ msgstr "piki wysokiego użycia, czy staÅ‚e użycie CPU w 100%?" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." -msgstr "" -"Czy użycie procesora jest po prostu wyższe nie byÅ› chciaÅ‚(a), czy caÅ‚y " -"czas wynosi 100%? Jeżeli stale wynosi 100% to może to być jakiÅ› " -"bÅ‚Ä…d. Zajrzyj do dziennika wÄ™zÅ‚a po dalsze informacje." +msgstr "Czy użycie procesora jest po prostu wyższe nie byÅ› chciaÅ‚(a), czy caÅ‚y czas wynosi 100%? Jeżeli stale wynosi 100% to może to być jakiÅ› bÅ‚Ä…d. Zajrzyj do dziennika wÄ™zÅ‚a po dalsze informacje." #: i2p2www/pages/site/faq.html:922 msgid "Java-related" @@ -5237,17 +3885,9 @@ msgstr "zwiÄ…zane z JavÄ…" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on " -"diagnosing, building, and testing methods." -msgstr "" -"Być może używasz opartej na Javie biblioteki BigInteger zamiast natywnej " -"wersji, zwÅ‚aszcza jeżeli masz nowy lub nietypowy sprzÄ™t lub system " -"(OpenSolaris, mipsel, itp.). Zajrzyj na <a href=\"%(jbigi)s\">stronÄ™ " -"jbigi</a> po instrukcje na temat diagnozowania, kompilacji i metod " -"testowania." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods." +msgstr "Być może używasz opartej na Javie biblioteki BigInteger zamiast natywnej wersji, zwÅ‚aszcza jeżeli masz nowy lub nietypowy sprzÄ™t lub system (OpenSolaris, mipsel, itp.). Zajrzyj na <a href=\"%(jbigi)s\">stronÄ™ jbigi</a> po instrukcje na temat diagnozowania, kompilacji i metod testowania." #: i2p2www/pages/site/faq.html:929 msgid "Participating tunnels" @@ -5255,231 +3895,109 @@ msgstr "tunele uczestniczÄ…ce" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the <a " -"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" -"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a " -"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> " -"page." -msgstr "" -"Jeżeli Twoja natywna biblioteka jbigi dziaÅ‚a poprawnie, najwiÄ™kszym " -"pożeraczem CPU prawdopodobnie jest przekazywany ruch uczestniczÄ…cych " -"tuneli. To wykorzystuje CPU, ponieważ przy każdym skoku każda kolejna " -"warstwa szyfrowania musi zostać zdekodowana. Możesz zmniejszyć ruch " -"uczestniczÄ…cy na dwa sposoby – poprzez redukcjÄ™ udostÄ™pnianej " -"przepustowoÅ›ci na stronie <a " -"href=\"http://localhost:7657/confignet.jsp\">confignet.jsp</a> lub " -"poprzez ustawienie <tt>router.maxParticipatingTunnels=nnn</tt> na stronie" -" <a " -"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced.jsp</a>." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" +"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page." +msgstr "Jeżeli Twoja natywna biblioteka jbigi dziaÅ‚a poprawnie, najwiÄ™kszym pożeraczem CPU prawdopodobnie jest przekazywany ruch uczestniczÄ…cych tuneli. To wykorzystuje CPU, ponieważ przy każdym skoku każda kolejna warstwa szyfrowania musi zostać zdekodowana. Możesz zmniejszyć ruch uczestniczÄ…cy na dwa sposoby – poprzez redukcjÄ™ udostÄ™pnianej przepustowoÅ›ci na stronie <a href=\"http://localhost:7657/confignet.jsp\">confignet.jsp</a> lub poprzez ustawienie <tt>router.maxParticipatingTunnels=nnn</tt> na stronie <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced.jsp</a>." #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" -msgstr "" -"Jeżeli Twój wÄ™zeÅ‚ Å‚Ä…czy siÄ™ z 10 lub wiÄ™cej aktywnymi uczestnikami, to " -"wszystko jest w porzÄ…dku. WÄ™zeÅ‚ I2P przez caÅ‚y czas powinien utrzymywać " -"Å‚Ä…czność z kilkoma uczestnikami. Najlepszym sposobem na bycie „lepiej " -"poÅ‚Ä…czonym†z sieciÄ… jest udostÄ™pnianie wiÄ™kszej iloÅ›ci pasma. Ilość " -"pasma udostÄ™pnianego przez wÄ™zeÅ‚ można skonfigurować na stronie <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>." +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" +msgstr "Jeżeli Twój wÄ™zeÅ‚ Å‚Ä…czy siÄ™ z 10 lub wiÄ™cej aktywnymi uczestnikami, to wszystko jest w porzÄ…dku. WÄ™zeÅ‚ I2P przez caÅ‚y czas powinien utrzymywać Å‚Ä…czność z kilkoma uczestnikami. Najlepszym sposobem na bycie „lepiej poÅ‚Ä…czonym†z sieciÄ… jest udostÄ™pnianie wiÄ™kszej iloÅ›ci pasma. Ilość pasma udostÄ™pnianego przez wÄ™zeÅ‚ można skonfigurować na stronie <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>." #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." -msgstr "" -"Nie, to jest normalne zachowanie. Każdy wÄ™zeÅ‚ dynamicznie dostosowuje siÄ™" -" do zmieniajÄ…cych siÄ™ warunków sieci i potrzeb. WÄ™zÅ‚y przyÅ‚Ä…czajÄ… i " -"odÅ‚Ä…czajÄ… siÄ™ od sieci w zależnoÅ›ci od tego czy maszyny na których sÄ… " -"zainstalowane sÄ… wÅ‚Ä…czone/wyÅ‚Ä…czone i czy sÄ… poÅ‚Ä…czone bÄ…dź odÅ‚Ä…czone od " -"internetu. Twój wÄ™zeÅ‚ na bieżąco aktualizuje swojÄ… bazÄ™ danych sieci " -"(NetDB). Tunele w których uczestniczy Twój wÄ™zeÅ‚ wygasajÄ… po 10 minutach " -"i mogÄ… być odnowione przez Twój wÄ™zeÅ‚." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." +msgstr "Nie, to jest normalne zachowanie. Każdy wÄ™zeÅ‚ dynamicznie dostosowuje siÄ™ do zmieniajÄ…cych siÄ™ warunków sieci i potrzeb. WÄ™zÅ‚y przyÅ‚Ä…czajÄ… i odÅ‚Ä…czajÄ… siÄ™ od sieci w zależnoÅ›ci od tego czy maszyny na których sÄ… zainstalowane sÄ… wÅ‚Ä…czone/wyÅ‚Ä…czone i czy sÄ… poÅ‚Ä…czone bÄ…dź odÅ‚Ä…czone od internetu. Twój wÄ™zeÅ‚ na bieżąco aktualizuje swojÄ… bazÄ™ danych sieci (NetDB). Tunele w których uczestniczy Twój wÄ™zeÅ‚ wygasajÄ… po 10 minutach i mogÄ… być odnowione przez Twój wÄ™zeÅ‚." #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" -msgstr "" -"Szyfrowanie i trasowanie pakietów w sieci I2P stanowi znaczÄ…cy narzut i " -"zmniejsza dostÄ™pnÄ… przepustowość. Można to wyjaÅ›nić za pomocÄ… rysunku:" +msgstr "Szyfrowanie i trasowanie pakietów w sieci I2P stanowi znaczÄ…cy narzut i zmniejsza dostÄ™pnÄ… przepustowość. Można to wyjaÅ›nić za pomocÄ… rysunku:" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." -msgstr "" -"Na tym rysunku jest przeÅ›ledzona droga wiadomoÅ›ci w sieci I2P. WÄ™zeÅ‚ " -"użytkownika I2P jest oznaczony jako „Aâ€, a ukryta usÅ‚uga (przykÅ‚adowo " -"strona http://stats.i2p) jest oznaczony jako „Bâ€. Zarówno klient jak i " -"serwer korzystajÄ… z 3-skokowych tuneli, te skoki sÄ… reprezentowane jako:" -" „Pâ€, „Qâ€, „Râ€, „Xâ€, „Yâ€, „Zâ€, „Pâ‚â€, „Qâ‚â€, „Râ‚â€, „Xâ‚â€, „Y₆i „Zâ‚â€." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +msgstr "Na tym rysunku jest przeÅ›ledzona droga wiadomoÅ›ci w sieci I2P. WÄ™zeÅ‚ użytkownika I2P jest oznaczony jako „Aâ€, a ukryta usÅ‚uga (przykÅ‚adowo strona http://stats.i2p) jest oznaczony jako „Bâ€. Zarówno klient jak i serwer korzystajÄ… z 3-skokowych tuneli, te skoki sÄ… reprezentowane jako: „Pâ€, „Qâ€, „Râ€, „Xâ€, „Yâ€, „Zâ€, „Pâ‚â€, „Qâ‚â€, „Râ‚â€, „Xâ‚â€, „Y₆i „Zâ‚â€." #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." -msgstr "" -"„Pâ€, „Q†i „R†reprezentujÄ… tunel wychodzÄ…cy dla „Aâ€; „Xâ‚â€, „Y₆i „Z₆" -"reprezentujÄ… tunel wychodzÄ…cy dla „Bâ€. Analogicznie „Xâ€, „Y†i „Z†" -"reprezentujÄ… tunel przychodzÄ…cy dla „Bâ€, oraz „Pâ‚â€, „Q₆i „R₆" -"oznaczajÄ… tunel przychodzÄ…cy dla „Aâ€. StrzaÅ‚ki symbolizujÄ… kierunek ruchu" -" pakietów. Teksty nad i pod strzaÅ‚kami symbolizujÄ… przepustowość i " -"opóźnienie pomiÄ™dzy parami skoków." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." +msgstr "„Pâ€, „Q†i „R†reprezentujÄ… tunel wychodzÄ…cy dla „Aâ€; „Xâ‚â€, „Y₆i „Z₆reprezentujÄ… tunel wychodzÄ…cy dla „Bâ€. Analogicznie „Xâ€, „Y†i „Z†reprezentujÄ… tunel przychodzÄ…cy dla „Bâ€, oraz „Pâ‚â€, „Q₆i „R₆oznaczajÄ… tunel przychodzÄ…cy dla „Aâ€. StrzaÅ‚ki symbolizujÄ… kierunek ruchu pakietów. Teksty nad i pod strzaÅ‚kami symbolizujÄ… przepustowość i opóźnienie pomiÄ™dzy parami skoków." #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." -msgstr "" -"Kiedy zarówno klient jak i serwer korzystajÄ… z 3‑skokowych tuneli, " -"sumarycznie 12 innych wÄ™złów sieci I2P tuneluje ruch. 6 uczestników " -"poÅ›redniczy w transferze od klienta do serwera, na transfer ten skÅ‚ada " -"siÄ™ 3‑skokowy tunel wychodzÄ…cy z „A†(„Pâ€, „Qâ€, „Râ€) i 3‑skokowy tunel " -"przychodzÄ…cy do „B†(„Xâ€, „Yâ€, „Zâ€). W podobny sposób 6 uczestników " -"poÅ›redniczy w transferze od serwera do klienta." +msgstr "Kiedy zarówno klient jak i serwer korzystajÄ… z 3‑skokowych tuneli, sumarycznie 12 innych wÄ™złów sieci I2P tuneluje ruch. 6 uczestników poÅ›redniczy w transferze od klienta do serwera, na transfer ten skÅ‚ada siÄ™ 3‑skokowy tunel wychodzÄ…cy z „A†(„Pâ€, „Qâ€, „Râ€) i 3‑skokowy tunel przychodzÄ…cy do „B†(„Xâ€, „Yâ€, „Zâ€). W podobny sposób 6 uczestników poÅ›redniczy w transferze od serwera do klienta." #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" -msgstr "" -"Na poczÄ…tek rozważmy opóźnienie – czas potrzebny na wysÅ‚anie zapytania od" -" klienta przez sieć I2P do serwera i wysÅ‚anie odpowiedzi z powrotem do " -"klienta. DodajÄ…c opóźnienia otrzymujemy:" +msgstr "Na poczÄ…tek rozważmy opóźnienie – czas potrzebny na wysÅ‚anie zapytania od klienta przez sieć I2P do serwera i wysÅ‚anie odpowiedzi z powrotem do klienta. DodajÄ…c opóźnienia otrzymujemy:" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." -msgstr "" -"W naszym przykÅ‚adzie jest to 740 ms – zdecydowanie wiÄ™cej niż podczas " -"normalnego przeglÄ…dania internetu." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." +msgstr "W naszym przykÅ‚adzie jest to 740 ms – zdecydowanie wiÄ™cej niż podczas normalnego przeglÄ…dania internetu." #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." -msgstr "" -"Teraz przeÅ›ledźmy dostÄ™pnÄ… przepustowość. Jest ona zależna od " -"najwolniejszego poÅ‚Ä…czenia pomiÄ™dzy skokami od klienta do serwera, oraz " -"także od serwera do klienta. DostÄ™pna przepustowość dla ruchu " -"wychodzÄ…cego od klienta do serwera w naszym przykÅ‚adzie pomiÄ™dzy " -"uczestnikami „R†i „X†oraz pomiÄ™dzy „X†i „Y†wynosi 32 KB/s. Pomimo " -"wiÄ™kszej dostÄ™pnej przepustowoÅ›ci pomiÄ™dzy innymi skokami, te skoki sÄ… " -"wÄ…skim gardÅ‚em i limitujÄ… maksymalnÄ… dostÄ™pnÄ… przepustowość od „A†do „Bâ€" -" na 32 KB/s. W podobny sposób można przeÅ›ledzić trasÄ™ od serwera do " -"klienta i wykazać, że dostÄ™pna przepustowość wynosi 64 KB/s – pomiÄ™dzy " -"skokami „Z₆i „Y₆oraz „Y₆i „X₆oraz „Q₆i „Pâ‚â€." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." +msgstr "Teraz przeÅ›ledźmy dostÄ™pnÄ… przepustowość. Jest ona zależna od najwolniejszego poÅ‚Ä…czenia pomiÄ™dzy skokami od klienta do serwera, oraz także od serwera do klienta. DostÄ™pna przepustowość dla ruchu wychodzÄ…cego od klienta do serwera w naszym przykÅ‚adzie pomiÄ™dzy uczestnikami „R†i „X†oraz pomiÄ™dzy „X†i „Y†wynosi 32 KB/s. Pomimo wiÄ™kszej dostÄ™pnej przepustowoÅ›ci pomiÄ™dzy innymi skokami, te skoki sÄ… wÄ…skim gardÅ‚em i limitujÄ… maksymalnÄ… dostÄ™pnÄ… przepustowość od „A†do „B†na 32 KB/s. W podobny sposób można przeÅ›ledzić trasÄ™ od serwera do klienta i wykazać, że dostÄ™pna przepustowość wynosi 64 KB/s – pomiÄ™dzy skokami „Z₆i „Y₆oraz „Y₆i „X₆oraz „Q₆i „Pâ‚â€." #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." -msgstr "" -"Zalecamy, abyÅ› zwiÄ™kszyÅ‚(a) swoje limity przepustowoÅ›ci. Pomoże to sieci " -"zwiÄ™kszajÄ…c dostÄ™pnÄ… przepustowość, co podniesie Twój komfort korzystania" -" z sieci I2P. Ustawienia przepustowoÅ›ci sÄ… konfigurowalne na stronie <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>. " -"ProszÄ™ mieć na uwadze fakt, że limity poÅ‚Ä…czenia internetowego zależą od " -"dostawcy Å‚Ä…cza internetowego." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." +msgstr "Zalecamy, abyÅ› zwiÄ™kszyÅ‚(a) swoje limity przepustowoÅ›ci. Pomoże to sieci zwiÄ™kszajÄ…c dostÄ™pnÄ… przepustowość, co podniesie Twój komfort korzystania z sieci I2P. Ustawienia przepustowoÅ›ci sÄ… konfigurowalne na stronie <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>. ProszÄ™ mieć na uwadze fakt, że limity poÅ‚Ä…czenia internetowego zależą od dostawcy Å‚Ä…cza internetowego." #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." -msgstr "" -"Również zalecamy ustawienie wystarczajÄ…cej iloÅ›ci udostÄ™pnianego pasma – " -"pozwala to na uczestnictwo w tunelowaniu ruchu innych uczestników przez " -"Twój wÄ™zeÅ‚ I2P. Tunelowanie ruchu innych sprawia, że Twój wÄ™zeÅ‚ jest " -"dobrze zintegrowany z sieciÄ… i zwiÄ™ksza szybkoÅ›ci Twoich transferów." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." +msgstr "Również zalecamy ustawienie wystarczajÄ…cej iloÅ›ci udostÄ™pnianego pasma – pozwala to na uczestnictwo w tunelowaniu ruchu innych uczestników przez Twój wÄ™zeÅ‚ I2P. Tunelowanie ruchu innych sprawia, że Twój wÄ™zeÅ‚ jest dobrze zintegrowany z sieciÄ… i zwiÄ™ksza szybkoÅ›ci Twoich transferów." #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, <a href=\"%(downloadslist)s\">install the latest " -"release</a>." -msgstr "" -"I2P jest wciąż w fazie rozwoju. Jest wprowadzane mnóstwo ulepszeÅ„ i " -"poprawek, i ogólnie mówiÄ…c, korzystanie z najnowszej wersji ma pozytywny " -"wpÅ‚yw na wydajność. Jeżeli tego nie zrobiÅ‚eÅ›, to <a " -"href=\"%(downloadslist)s\">zainstaluj najnowszÄ… wersjÄ™</a>." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>." +msgstr "I2P jest wciąż w fazie rozwoju. Jest wprowadzane mnóstwo ulepszeÅ„ i poprawek, i ogólnie mówiÄ…c, korzystanie z najnowszej wersji ma pozytywny wpÅ‚yw na wydajność. Jeżeli tego nie zrobiÅ‚eÅ›, to <a href=\"%(downloadslist)s\">zainstaluj najnowszÄ… wersjÄ™</a>." #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." -msgstr "" -"Napotkane bÅ‚Ä™dy/problemy można zgÅ‚aszać na naszym systemie Å›ledzenia " -"bÅ‚Ä™dów, dostÄ™pnym zarówno z normalnego internetu jak i z I2P. Mamy " -"również forum – dostÄ™pne z I2P i z normalnego internetu. Mamy również " -"kanaÅ‚ IRC – dostÄ™pny poprzez I2P (Irc2P) lub poprzez Freenode." +msgstr "Napotkane bÅ‚Ä™dy/problemy można zgÅ‚aszać na naszym systemie Å›ledzenia bÅ‚Ä™dów, dostÄ™pnym zarówno z normalnego internetu jak i z I2P. Mamy również forum – dostÄ™pne z I2P i z normalnego internetu. Mamy również kanaÅ‚ IRC – dostÄ™pny poprzez I2P (Irc2P) lub poprzez Freenode." #: i2p2www/pages/site/faq.html:1044 msgid "Our Bugtracker:" @@ -5499,22 +4017,11 @@ msgstr "Forum:" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-" -"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" -" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this" -" \n" -" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and" -" follow up on IRC in #i2p<" -msgstr "" -"Możesz wkleić powiÄ…zany dziennik zdarzeÅ„ do wklejarki (pastebin), listÄ™ " -"wklejarek w zwykÅ‚ym internecie znajdziesz na <a " -"href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-" -"Instances-Directory\">PrivateBin Wiki</a>; w sieci I2P dostÄ™pny jest <a " -"href=\"http://paste.crypthost.i2p\">ten serwer PrivateBin</a> bÄ…dź <a " -"href=\"http://pasta-nojs.i2p\">ten serwer niewymagajÄ…cy JavaScriptu</a>, " -"a nastÄ™pnie wejdź na kanaÅ‚ #i2p na naszym IRC." +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" +" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n" +" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<" +msgstr "Możesz wkleić powiÄ…zany dziennik zdarzeÅ„ do wklejarki (pastebin), listÄ™ wklejarek w zwykÅ‚ym internecie znajdziesz na <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Instances-Directory\">PrivateBin Wiki</a>; w sieci I2P dostÄ™pny jest <a href=\"http://paste.crypthost.i2p\">ten serwer PrivateBin</a> bÄ…dź <a href=\"http://pasta-nojs.i2p\">ten serwer niewymagajÄ…cy JavaScriptu</a>, a nastÄ™pnie wejdź na kanaÅ‚ #i2p na naszym IRC." #: i2p2www/pages/site/faq.html:1054 msgid "Join #i2p-dev Discuss with the developers on IRC" @@ -5522,20 +4029,11 @@ msgstr "Porozmawiaj z programistami na IRC-u na kanale #i2p-dev" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." -msgstr "" -"Prosimy zawrzeć powiÄ…zane informacje z dziennika zdarzeÅ„ wÄ™zÅ‚a, który " -"jest dostÄ™pny pod adresem <a " -"href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>. " -"Prosimy o udostÄ™pnienie caÅ‚ego tekstu z sekcji „wersja I2P i Å›rodowisko " -"uruchomieniowe†wraz z bÅ‚Ä™dami/ostrzeżeniami wyÅ›wietlanymi w dzienniku na" -" stronie konsoli." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." +msgstr "Prosimy zawrzeć powiÄ…zane informacje z dziennika zdarzeÅ„ wÄ™zÅ‚a, który jest dostÄ™pny pod adresem <a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>. Prosimy o udostÄ™pnienie caÅ‚ego tekstu z sekcji „wersja I2P i Å›rodowisko uruchomieniowe†wraz z bÅ‚Ä™dami/ostrzeżeniami wyÅ›wietlanymi w dzienniku na stronie konsoli." #: i2p2www/pages/site/faq.html:1070 #, python-format @@ -5545,16 +4043,8 @@ msgid "" " <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n" " <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n" "</ul>\n" -"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it " -"here (with the answer, hopefully)." -msgstr "" -"Åšwietnie! Znajdziesz nasz na IRC:\n" -"<ul>\n" -" <li>na kanale <code>#i2p</code> na <code>irc.freenode.net</code></li>\n" -" <li>na kanale <code>#i2p</code> na <code>IRC2P</code></li>\n" -"</ul>\n" -"lub napisz na <a href=\"http://%(forum)s/\">forum I2P</a>, a my Ci " -"odpiszemy." +"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)." +msgstr "Åšwietnie! Znajdziesz nasz na IRC:\n<ul>\n <li>na kanale <code>#i2p</code> na <code>irc.freenode.net</code></li>\n <li>na kanale <code>#i2p</code> na <code>IRC2P</code></li>\n</ul>\nlub napisz na <a href=\"http://%(forum)s/\">forum I2P</a>, a my Ci odpiszemy." #: i2p2www/pages/site/impressum.html:4 msgid "German laws" @@ -5567,13 +4057,9 @@ msgstr "Sieć Anonimowa I2P" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." -msgstr "" -"Anonimowa rozproszona i bezpoÅ›rednia (peer-to-peer) warstwa komunikacji " -"stworzona za pomocÄ… otwartoźródÅ‚owego oprogramowania i przeznaczona do " -"uruchamiania tradycyjnych usÅ‚ug internetowych jak e-mail, IRC i stron " -"internetowych." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." +msgstr "Anonimowa rozproszona i bezpoÅ›rednia (peer-to-peer) warstwa komunikacji stworzona za pomocÄ… otwartoźródÅ‚owego oprogramowania i przeznaczona do uruchamiania tradycyjnych usÅ‚ug internetowych jak e-mail, IRC i stron internetowych." #: i2p2www/pages/site/index.html:8 msgid "Welcome to the Invisible Internet" @@ -5581,13 +4067,9 @@ msgstr "Witamy w niewidzialnym internecie" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " -msgstr "" -"Projekt Niewidzialny Internet jest sieciÄ… tworzonÄ… przez wolontariuszy " -"zaprojektowanÄ… z myÅ›lÄ… o prywatnoÅ›ci. Jest to wolna i anonimowa " -"alternatywa dla zwykÅ‚ego internetu." +msgstr "Projekt Niewidzialny Internet jest sieciÄ… tworzonÄ… przez wolontariuszy zaprojektowanÄ… z myÅ›lÄ… o prywatnoÅ›ci. Jest to wolna i anonimowa alternatywa dla zwykÅ‚ego internetu." #: i2p2www/pages/site/index.html:11 #, python-format @@ -5601,21 +4083,11 @@ msgstr "Czym jest I2P?" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." -msgstr "" -"\n" -"Projekt Niewidzialny Internet (|I2P) jest caÅ‚kowicie szyfrowanÄ… prywatnÄ… " -"warstwÄ… sieci. Zapewnia zarówno prywatność jak i anonimowość. Każdego " -"dnia ludzie korzystajÄ… z niej, aby Å‚Ä…czyć siÄ™ z innymi ludźmi bez obaw o " -"bycie Å›ledzonymi. Niekiedy ludzie polegajÄ… na sieci I2P, kiedy potrzebujÄ…" -" dyskrecji lub podczas wykonywania poufnych zadaÅ„." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." +msgstr "\nProjekt Niewidzialny Internet (|I2P) jest caÅ‚kowicie szyfrowanÄ… prywatnÄ… warstwÄ… sieci. Zapewnia zarówno prywatność jak i anonimowość. Każdego dnia ludzie korzystajÄ… z niej, aby Å‚Ä…czyć siÄ™ z innymi ludźmi bez obaw o bycie Å›ledzonymi. Niekiedy ludzie polegajÄ… na sieci I2P, kiedy potrzebujÄ… dyskrecji lub podczas wykonywania poufnych zadaÅ„." #: i2p2www/pages/site/index.html:23 msgid "I2P Cares About Privacy" @@ -5624,22 +4096,14 @@ msgstr "I2P troszczy siÄ™ o prywatność" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." -msgstr "" -"Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. " -"CaÅ‚y ruch w sieci I2P to ruch wewnÄ™trzny, niemajÄ…cy bezpoÅ›redniego " -"kontaktu ze zwykÅ‚ym internetem. Jest to warstwa sieci nad internetem. " -"Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiÄ™dzy TobÄ… i " -"innymi użytkownikami. Nikt nie może zobaczyć skÄ…d, dokÄ…d i co jest " -"przesyÅ‚ane. Dodatkowo sieć oferuje ochronÄ™ przed rozpoznawaniem wzorców i" -" przed blokadÄ… cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do " -"przesyÅ‚ania ruchu, blokowanie lokalizacji jest również ograniczone." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." +msgstr "Sieć I2P ukrywa serwer przed użytkownikiem i użytkownika przed serwerem. CaÅ‚y ruch w sieci I2P to ruch wewnÄ™trzny, niemajÄ…cy bezpoÅ›redniego kontaktu ze zwykÅ‚ym internetem. Jest to warstwa sieci nad internetem. Sieć I2P wykorzystuje szyfrowane tunele jednokierunkowe pomiÄ™dzy TobÄ… i innymi użytkownikami. Nikt nie może zobaczyć skÄ…d, dokÄ…d i co jest przesyÅ‚ane. Dodatkowo sieć oferuje ochronÄ™ przed rozpoznawaniem wzorców i przed blokadÄ… cenzorów. Ponieważ sieć I2P wykorzystuje użytkowników do przesyÅ‚ania ruchu, blokowanie lokalizacji jest również ograniczone." #: i2p2www/pages/site/index.html:27 msgid "Read more…" @@ -5652,8 +4116,8 @@ msgstr "P2P" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." msgstr "" #: i2p2www/pages/site/index.html:33 @@ -5668,10 +4132,7 @@ msgstr "Zaprojektowana z myÅ›lÄ… o prywatnoÅ›ci i bezpieczeÅ„stwie" msgid "" "I2P has created transport protocols that resist DPI censorship, and " "continuously improves its end to end encryption." -msgstr "" -"Sieć I2P używa protokołów transportowych odpornych na gÅ‚Ä™bokÄ… inspekcjÄ™ " -"pakietów (DPI), a używane metody szyfrowania od-koÅ„ca-do-koÅ„ca sÄ… " -"nieustannie ulepszane." +msgstr "Sieć I2P używa protokołów transportowych odpornych na gÅ‚Ä™bokÄ… inspekcjÄ™ pakietów (DPI), a używane metody szyfrowania od-koÅ„ca-do-koÅ„ca sÄ… nieustannie ulepszane." #: i2p2www/pages/site/index.html:37 msgid "Read the I2P Transport Overview" @@ -5687,9 +4148,7 @@ msgstr "I2P jest warstwÄ… aplikacji z Å‚atwym w użyciu " #: i2p2www/pages/site/index.html:40 msgid "APIs for creating your own privacy - aware apps." -msgstr "" -"API umożliwiajÄ…cym tworzenie wÅ‚asnych aplikacji nakierowanych na " -"prywatność." +msgstr "API umożliwiajÄ…cym tworzenie wÅ‚asnych aplikacji nakierowanych na prywatność." #: i2p2www/pages/site/index.html:44 msgid "News & Updates" @@ -5707,12 +4166,8 @@ msgstr "Polecane odnoÅ›niki i zasoby" #, python-format msgid "" "See also the page with\n" -"<a href=\"%(media)s\">links to presentations, videos, and tutorials about" -" I2P</a>." -msgstr "" -"Zobacz także stronÄ™ z\n" -"<a href=\"%(media)s\">linkami do prezentacji, filmikami, i poradnikami o " -"I2P</a>." +"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>." +msgstr "Zobacz także stronÄ™ z\n<a href=\"%(media)s\">linkami do prezentacji, filmikami, i poradnikami o I2P</a>." #: i2p2www/pages/site/links.html:12 msgid "I2P on the web" @@ -5737,4 +4192,3 @@ msgstr "Fora, nowoÅ›ci, inne" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" msgstr "Starocie" - diff --git a/i2p2www/translations/ro/LC_MESSAGES/about.po b/i2p2www/translations/ro/LC_MESSAGES/about.po index 825c034203e2ad5c03b3fa99fab63cfe964c1fe2..e5789b104f02fb5df99ed0a077ecabb1d763c856 100644 --- a/i2p2www/translations/ro/LC_MESSAGES/about.po +++ b/i2p2www/translations/ro/LC_MESSAGES/about.po @@ -1,25 +1,25 @@ -# Romanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # polearnik <polearnik@mail.ru>, 2019 # titus <titus0818@gmail.com>, 2015-2016 # titus <titus0818@gmail.com>, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: polearnik <polearnik@mail.ru>\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: polearnik <polearnik@mail.ru>, 2019\n" "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n" -"Plural-Forms: nplurals=3; " -"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ro\n" +"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -29,15 +29,9 @@ msgstr "ClienÈ›i alternative I2P" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." -msgstr "" -"Principala implementare a clientului I2P utilizează Java. Dacă pentru " -"unii\n" -"motiv pentru care nu puteÈ›i utiliza Java pe dispozitivul dvs., există " -"implementări alternative\n" -"dezvoltat de membrii comunității." +msgstr "Principala implementare a clientului I2P utilizează Java. Dacă pentru unii\nmotiv pentru care nu puteÈ›i utiliza Java pe dispozitivul dvs., există implementări alternative\ndezvoltat de membrii comunității." #: i2p2www/pages/site/about/alternative-clients.html:12 #, python-format @@ -45,32 +39,21 @@ msgid "" "<a href=\"%(i2pd)s\">i2pd</a> is a I2P client implementation in C++.\n" "As of early 2016, i2pd is became stable enough to be used in \n" "production, and since summer 2016 it fully implements all I2P APIs." -msgstr "" -"<a href=\"%(i2pd)s\">i2pd</a> este o implementare a clientului I2P în C " -"++.\n" -"La începutul anului 2016, i2pd a devenit suficient de stabil pentru a fi " -"utilizat în\n" -"producÈ›ie, iar din vara 2016 implementează integral toate API-urile I2P." +msgstr "<a href=\"%(i2pd)s\">i2pd</a> este o implementare a clientului I2P în C ++.\nLa începutul anului 2016, i2pd a devenit suficient de stabil pentru a fi utilizat în\nproducÈ›ie, iar din vara 2016 implementează integral toate API-urile I2P." #: i2p2www/pages/site/about/alternative-clients.html:19 #, python-format msgid "" "<a href=\"%(kovri)s\">Kovri</a> is active i2pd fork developed for Monero " "cryptocurrency." -msgstr "" -"<a href=\"%(kovri)s\">Kovri</a> este o furcă activă i2pd dezvoltată " -"pentru criptocurrency Monero." +msgstr "<a href=\"%(kovri)s\">Kovri</a> este o furcă activă i2pd dezvoltată pentru criptocurrency Monero." #: i2p2www/pages/site/about/alternative-clients.html:24 #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." -msgstr "" -"<a href=\"%(go_i2p)s\">Go-I2P</a> este un client I2P dezvoltat folosind\n" -"<a href=\"%(golang)s\">GO</a> limbaj de programare. Proiectul este în " -"curs de dezvoltare." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." +msgstr "<a href=\"%(go_i2p)s\">Go-I2P</a> este un client I2P dezvoltat folosind\n<a href=\"%(golang)s\">GO</a> limbaj de programare. Proiectul este în curs de dezvoltare." #: i2p2www/pages/site/about/browser-config.html:2 msgid "Web Browser Configuration" @@ -82,11 +65,147 @@ msgstr "Glosar" #: i2p2www/pages/site/about/glossary.html:4 msgid "" -"This page lists often-used terminology when discussing I2P and " +"This table lists often-used terminology when discussing I2P and " "cryptography." msgstr "" -"Această pagină listează terminologia folosită frecvent atunci când " -"discută despre I2P È™i criptografie." + +#: i2p2www/pages/site/about/glossary.html:9 +msgid "" +"I2P: Invisible Internet Project: a project meant to\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" +" range of applications." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:12 +msgid "" +"Router: The core I2P software, which routes encrypted\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" +" clients or servers connecting to the I2P network through the\n" +" router." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:17 +msgid "" +"RouterIdentity: A collection of information required to\n" +" communicate directly with a router, such as its IP address and listening\n" +" port, public signing and encryption keys etc." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:20 +msgid "" +"Tunnel: An anonymous communication pathway between a\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" +" traffic and one for outbound traffic." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:24 +msgid "" +"Destination: The cryptographic identity of a tunnel.\n" +" These are the identities of clients and servers within the I2P network,\n" +" and are analogous to the IP:port of a computer on the normal\n" +" internet." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:28 +msgid "" +"LeaseSet: A collection of information required to\n" +" communicate with a client or server at a particular Destination, such as\n" +" the gateways of the inbound Tunnels for that\n" +" Destination." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:34 +msgid "" +"This table lists definition of different networks and their components. These\n" +"terms and the definitions provided are taken from\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" +"Shelf: 7 Maxims by Simply Secure</a>(used with permission)." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:40 +msgid "" +"Decentralization: Network architecture that avoids\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:44 +msgid "" +"Peer-to-Peer (p2p): Peers make a portion of their \n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" +" central coordination by servers or stable hosts. Popularized by\n" +" BitTorrent, Napster, and Bitcoin." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:49 +msgid "" +"Federated: Federation allows separate deployments of a\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" +" Each deployment may host multiple users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:54 +msgid "" +"Blockchain: A distributed ledger that can record\n" +" transactions between multiple parties efficiently and in a verifiable\n" +" and permanent way." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:57 +msgid "" +"Distributed systems: Academic topic within the\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" +" distributed systems architectures." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:62 +msgid "" +"TCP/UDP: The two foundational transport protocols used\n" +" on the Internet. Common protocols used to send data between two\n" +" computers." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:65 +msgid "" +"DHT: Distributed hash table, used in some projects to\n" +" connect peers to each other by storing information in the form of\n" +" key-value pairs in a distributed manner." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:68 +msgid "" +"IP address: A number of a computer or network which is\n" +" unique and thus can be used to address it." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:70 +msgid "" +"WebRTC: A protocol standard for establishing connections\n" +" in a web browser where data passes directly between\n" +" users." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:73 +msgid "" +"Hash: A number, usually displayed as a string of letters\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" +" data." +msgstr "" + +#: i2p2www/pages/site/about/glossary.html:76 +msgid "" +"UX: User experience, the overall experience of a person\n" +" using a product or a service, especially in terms of how easy it is to\n" +" use." +msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:2 msgid "Hall Of Fame" @@ -94,23 +213,11 @@ msgstr "Hall Of Fame" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." -msgstr "" -"I2P este un proiect realizat complet de pasionaÈ›ii de timp liber. Dar un " -"proiect mare de genul\n" -"I2P nu este creat doar din software, trebuie să fie necesare mai multe " -"servere, înregistrări de domenii È™i cafele\n" -"fii plătit pentru a obÈ›ine un rezultat excelent. Oamenii din întreaga " -"lume doneaza I2P ajung la starea în care se află\n" -"în prezent. Aici îi urmărim pe cei care ne-au dat un nume pentru a fi " -"publicat într-o sală de faimă I2P." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." +msgstr "I2P este un proiect realizat complet de pasionaÈ›ii de timp liber. Dar un proiect mare de genul\nI2P nu este creat doar din software, trebuie să fie necesare mai multe servere, înregistrări de domenii È™i cafele\nfii plătit pentru a obÈ›ine un rezultat excelent. Oamenii din întreaga lume doneaza I2P ajung la starea în care se află\nîn prezent. Aici îi urmărim pe cei care ne-au dat un nume pentru a fi publicat într-o sală de faimă I2P." #: i2p2www/pages/site/about/hall-of-fame.html:12 msgid "Big thanks go to the following people who have donated to I2P!" @@ -119,22 +226,15 @@ msgstr "MulÈ›umiri mari mergeÈ›i următorilor oameni care au donat I2P!" #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." -msgstr "" -"Dacă aÈ›i făcut o donaÈ›ie, vă rugăm să trimiteÈ›i un e-mail la <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" -"cu numele sau nick-ul (È™i, opÈ›ional, pagina principală), astfel încât să " -"vă putem enumera aici." +msgstr "Dacă aÈ›i făcut o donaÈ›ie, vă rugăm să trimiteÈ›i un e-mail la <a href=\"mailto:%(echelon)s\">echelon</a>\ncu numele sau nick-ul (È™i, opÈ›ional, pagina principală), astfel încât să vă putem enumera aici." #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." -msgstr "" -"Lista nesortată a donatorilor I2P în 15 ani de istorie I2P, începând cu " -"martie 2004 È™i martie 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." +msgstr "Lista nesortată a donatorilor I2P în 15 ani de istorie I2P, începând cu martie 2004 È™i martie 2019." #: i2p2www/pages/site/about/intro.html:2 #: i2p2www/pages/site/about/software.html:2 @@ -147,12 +247,8 @@ msgstr "Proiectul Internet Invizibil" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -162,13 +258,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -177,15 +273,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -194,28 +290,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -224,38 +319,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" -msgstr "" -"Văd adrese IP ale tuturor celorlalte noduri I2P în consola routerului. " -"Asta înseamnă că adresa mea IP este vizibilă de alÈ›ii?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" +msgstr "Văd adrese IP ale tuturor celorlalte noduri I2P în consola routerului. Asta înseamnă că adresa mea IP este vizibilă de alÈ›ii?" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -264,13 +356,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -279,35 +371,21 @@ msgstr "ComparaÈ›ii" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Există o mulÈ›ime de alte aplicaÈ›ii È™i proiecte ce lucrează asupra " -"comunicării anonimă È™i I2P a fost inspirat de o mare parte a eforturilor " -"lor. Aceasta nu este o listă completă a resurselor de anonimat - <a " -"href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie " -"Anonimatului</a> È™i de GNUnet <a href = \"https://www .gnunet.org/link-" -"uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva " -"sisteme se disting prin comparaÈ›ie continua. Următoarele pagini au " -"comparaÈ›ii individuale :" +msgstr "Există o mulÈ›ime de alte aplicaÈ›ii È™i proiecte ce lucrează asupra comunicării anonimă È™i I2P a fost inspirat de o mare parte a eforturilor lor. Aceasta nu este o listă completă a resurselor de anonimat - <a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie Anonimatului</a> È™i de GNUnet <a href = \"https://www .gnunet.org/link-uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva sisteme se disting prin comparaÈ›ie continua. Următoarele pagini au comparaÈ›ii individuale :" #: i2p2www/pages/site/about/intro.html:56 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte " -"retele: </ a>" +msgstr "Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte retele: </ a>" #: i2p2www/pages/site/about/media.html:2 msgid "Presentations on I2P" @@ -316,28 +394,20 @@ msgstr "Prezentări pe I2P" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." -msgstr "" -"Urmează link-uri către prezentări, videoclipuri È™i tutoriale despre I2P. " -"Link-uri către lucrările de cercetare pe I2P sunt disponibile <a " -"href=\"%(papers)s\">aici</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." +msgstr "Urmează link-uri către prezentări, videoclipuri È™i tutoriale despre I2P. Link-uri către lucrările de cercetare pe I2P sunt disponibile <a href=\"%(papers)s\">aici</a>." #: i2p2www/pages/site/about/media.html:8 #, python-format msgid "To request an addition to this page, please send to %(email)s." -msgstr "" -"Pentru a solicita adăugarea la această pagină, vă rugăm să trimiteÈ›i la " -"%(email)s." +msgstr "Pentru a solicita adăugarea la această pagină, vă rugăm să trimiteÈ›i la %(email)s." #: i2p2www/pages/site/about/media.html:11 msgid "" "\n" "Newest links are at the bottom of each section." -msgstr "" -"\n" -"Cele mai noi legături se găsesc în partea de jos a fiecărei secÈ›iuni." +msgstr "\nCele mai noi legături se găsesc în partea de jos a fiecărei secÈ›iuni." #: i2p2www/pages/site/about/media.html:16 msgid "Presentations" @@ -350,11 +420,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"Prezentare IIP la CodeCon\n" -"<a href=\"%(mp3)s\">Audio MP3</a>\n" -"<a href=\"%(transcript)s\">transcriere</a>\n" -"Lance James (0x90), februarie 2002." +msgstr "Prezentare IIP la CodeCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(transcript)s\">transcriere</a>\nLance James (0x90), februarie 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -363,11 +429,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"Prezentare IIP la ToorCon\n" -"<a href=\"%(mp3)s\">Audio MP3</a>\n" -"<a href=\"%(slides)s\">slide-uri</a>\n" -"Lance James (0x90), septembrie 2002." +msgstr "Prezentare IIP la ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">slide-uri</a>\nLance James (0x90), septembrie 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -377,12 +439,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">A fi sau I2P</a>\n" -"(Video YouTube)\n" -"O introducere în comunicarea anonimă cu I2P.\n" -"<a href=\"%(pdf)s\">To Be or I2P (prezentare PDF)</a>,\n" -"Jens Kubieziel, 24C3 Berlin, 28 decembrie 2007." +msgstr "<a href=\"%(video)s\">A fi sau I2P</a>\n(Video YouTube)\nO introducere în comunicarea anonimă cu I2P.\n<a href=\"%(pdf)s\">To Be or I2P (prezentare PDF)</a>,\nJens Kubieziel, 24C3 Berlin, 28 decembrie 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -390,17 +447,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Videoclipul discuÈ›iei I2P la Chemnitz Linux " -"Tag</a>,\n" -"Lars Schimmer,\n" -"14-15 martie 2009" +msgstr "<a href=\"%(video)s\">Videoclipul discuÈ›iei I2P la Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 martie 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -411,9 +463,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">ÃŽn Darknetul I2P: Bine aÈ›i venit la Cipherspace</a>\n" -"Adrian Crenshaw. Schmoocon Firetalk, ianuarie 2011" +msgstr "<a href=\"%(link)s\">ÃŽn Darknetul I2P: Bine aÈ›i venit la Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, ianuarie 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -421,115 +471,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Utilizarea tehnologiei pentru a avansa " -"libertatea</a>\n" -"(Video YouTube)\n" -"Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 martie" -" 2011.\n" -"I2P acoperit de la 10:00 la 20:00 în videoclip." +msgstr "<a href=\"%(link)s\">Utilizarea tehnologiei pentru a avansa libertatea</a>\n(Video YouTube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 martie 2011.\nI2P acoperit de la 10:00 la 20:00 în videoclip." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Puncte slabe obiÈ™nuite</a>\n" -"(Video YouTube)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 " -"iulie 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Puncte slabe obiÈ™nuite</a>\n(Video YouTube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 iulie 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">Note pentru atelierul I2P / To</a>r\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 august 2011." +msgstr "<a href=\"%(link)s\">Note pentru atelierul I2P / To</a>r\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 august 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspaces / Darknets: o imagine de ansamblu " -"asupra strategiilor de atac -\n" -"DEF CON Versiune live (Youtube Video)</a>,\n" -"<a href=\"%(studio)s\">Versiunea „Studio†(Youtube Video)</a>,\n" -"<a href=\"%(slides)s\">Diapozitive (ppt)</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 august 2011." +msgstr "<a href=\"%(live)s\">Cipherspaces / Darknets: o imagine de ansamblu asupra strategiilor de atac -\nDEF CON Versiune live (Youtube Video)</a>,\n<a href=\"%(studio)s\">Versiunea „Studio†(Youtube Video)</a>,\n<a href=\"%(slides)s\">Diapozitive (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 august 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Ecosisteme de criptare spaÈ›iale " -"moderne</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 noiembrie " -"2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Ecosisteme de criptare spaÈ›iale moderne</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 noiembrie 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2P - ReÈ›eaua anonimă</a>\n" -"(Video YouTube)\n" -"Blair Dick, Universitatea din Abertay, Dundee Ethical Hacking Society, 25" -" ianuarie 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2P - ReÈ›eaua anonimă</a>\n(Video YouTube)\nBlair Dick, Universitatea din Abertay, Dundee Ethical Hacking Society, 25 ianuarie 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 august 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 august 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2P - ÃŽncă viu! (Pdf)</a>\n" -"<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 decembrie " -"2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2P - ÃŽncă viu! (Pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 decembrie 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"ÃŽnlocuirea Weary Crypto: Modernizarea reÈ›elei I2P cu primitive mai " -"puternice\n" -"<a href=\"%(link)s\">(Pdf)</a>\n" -"<a href=\"%(link2)s\">(ODP)</a>\n" -"str4d, Crypto Real World, Stanford, 8 ianuarie 2016" +msgstr "ÃŽnlocuirea Weary Crypto: Modernizarea reÈ›elei I2P cu primitive mai puternice\n<a href=\"%(link)s\">(Pdf)</a>\n<a href=\"%(link2)s\">(ODP)</a>\nstr4d, Crypto Real World, Stanford, 8 ianuarie 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -537,14 +544,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Ceapă È™i usturoi: protocoalele I2P\n" -"<a href=\"%(link)s\">(Pdf)</a>\n" -"<a href=\"%(link2)s\">(ODP)</a>\n" -"str4d, COMPSCI 460: ReÈ›ele de calculatoare, Universitatea din Wisconsin " -"Whitewater, 17 februarie 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Ceapă È™i usturoi: protocoalele I2P\n<a href=\"%(link)s\">(Pdf)</a>\n<a href=\"%(link2)s\">(ODP)</a>\nstr4d, COMPSCI 460: ReÈ›ele de calculatoare, Universitatea din Wisconsin Whitewater, 17 februarie 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -553,12 +554,7 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"Proiectul de internet invizibil - o imagine de ansamblu È™i un ghid al " -"tehnologiei\n" -"<a href=\"%(link)s\">(Mp4)</a>\n" -"<a href=\"%(link2)s\">(Webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Brussel, 4 februarie 2018" +msgstr "Proiectul de internet invizibil - o imagine de ansamblu È™i un ghid al tehnologiei\n<a href=\"%(link)s\">(Mp4)</a>\n<a href=\"%(link2)s\">(Webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Brussel, 4 februarie 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format @@ -578,11 +574,7 @@ msgid "" "(Youtube Video)\n" "This guide will show you how to install I2P in Windows XP.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Tutorial Windows I2P</a>\n" -"(Video YouTube)\n" -"Acest ghid vă va arăta cum să instalaÈ›i I2P în Windows XP.\n" -"De <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Tutorial Windows I2P</a>\n(Video YouTube)\nAcest ghid vă va arăta cum să instalaÈ›i I2P în Windows XP.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:155 #, python-format @@ -591,11 +583,7 @@ msgid "" "(Youtube Video)\n" "This will guide you through how to install I2P on a Debian Linux System.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Debian Tutorial</a>\n" -"(Video YouTube)\n" -"Acest lucru vă va ghida cum să instalaÈ›i I2P pe un sistem Linux Debian.\n" -"De <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Debian Tutorial</a>\n(Video YouTube)\nAcest lucru vă va ghida cum să instalaÈ›i I2P pe un sistem Linux Debian.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:162 #, python-format @@ -604,55 +592,33 @@ msgid "" "(Youtube Video)\n" "How to set up an anonymous web site in I2P.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Cum să configuraÈ›i un site anonim în I2P</a>\n" -"(Video YouTube)\n" -"Cum să configuraÈ›i un site web anonim în I2P.\n" -"De <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Cum să configuraÈ›i un site anonim în I2P</a>\n(Video YouTube)\nCum să configuraÈ›i un site web anonim în I2P.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:169 #, python-format msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" -"(Video YouTube)\n" -"Un tutorial despre cum să rulaÈ›i i2p pe Mac OS X È™i cum să vă conectaÈ›i " -"la irc.telecomix.i2p.\n" -"De <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n(Video YouTube)\nUn tutorial despre cum să rulaÈ›i i2p pe Mac OS X È™i cum să vă conectaÈ›i la irc.telecomix.i2p.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari explică principiile de bază ale I2P</a>\n" -"(Video YouTube)\n" -"Agent Felix Atari al Biroului de muniÈ›ii Crypto Telecomix.\n" -"De <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari explică principiile de bază ale I2P</a>\n(Video YouTube)\nAgent Felix Atari al Biroului de muniÈ›ii Crypto Telecomix.\nDe <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">Cum să accesaÈ›i I2P, anonimul P2P Darknet (instalare" -" Windows)</a>\n" -"(Video YouTube)\n" -"Acest tutorial arată cum să instalaÈ›i È™i să configuraÈ›i software-ul " -"necesar pentru a accesa I2P." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">Cum să accesaÈ›i I2P, anonimul P2P Darknet (instalare Windows)</a>\n(Video YouTube)\nAcest tutorial arată cum să instalaÈ›i È™i să configuraÈ›i software-ul necesar pentru a accesa I2P." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -660,10 +626,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">Cum să vă conectaÈ›i la I2P</a>\n" -"(Video YouTube)\n" -"Cum se instalează I2P pe Ubuntu." +msgstr "<a href=\"%(link)s\">Cum să vă conectaÈ›i la I2P</a>\n(Video YouTube)\nCum se instalează I2P pe Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -672,11 +635,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">instalarea software-ului darknet I2P în Linux</a>\n" -"(Video)\n" -"Adrian Crenshaw.\n" -"Ianuarie 2011" +msgstr "<a href=\"%(link)s\">instalarea software-ului darknet I2P în Linux</a>\n(Video)\nAdrian Crenshaw.\nIanuarie 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -684,10 +643,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Animatie scurta de rutare a usturoiului</a>\n" -"(Video YouTube)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Animatie scurta de rutare a usturoiului</a>\n(Video YouTube)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -700,11 +656,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) Intervievat de DistributedCity\n" -"<a href=\"%(link1)s\">Partea 1</a>\n" -"<a href=\"%(link2)s\">Partea 2</a>\n" -"26 iulie 2002." +msgstr "Lance James (0x90) Intervievat de DistributedCity\n<a href=\"%(link1)s\">Partea 1</a>\n<a href=\"%(link2)s\">Partea 2</a>\n26 iulie 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -713,35 +665,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) Intervievat de El PaÃs\n" -"(original în spaniolă)\n" -"<a href=\"%(link)s\">traducere in engleza</a>\n" -"31 octombrie 2002." +msgstr "Lance James (0x90) Intervievat de El PaÃs\n(original în spaniolă)\n<a href=\"%(link)s\">traducere in engleza</a>\n31 octombrie 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">2003 Business Week articol care face referire la " -"invisiblenet</a>\n" -"14 septembrie 2003." +msgstr "<a href=\"%(link)s\">2003 Business Week articol care face referire la invisiblenet</a>\n14 septembrie 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">Articolul despre Netzwelt.de despre a fi anonim pe " -"Internet</a>\n" -"(Limba germana)\n" -"Noiembrie 2007." +msgstr "<a href=\"%(link)s\">Articolul despre Netzwelt.de despre a fi anonim pe Internet</a>\n(Limba germana)\nNoiembrie 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -749,27 +688,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz intervievat de gulli.com</a>\n" -"Martie 2009\n" -"<a href=\"%(german)s\">Traducere din germană</a>" +msgstr "<a href=\"%(link)s\">zzz intervievat de gulli.com</a>\nMartie 2009\n<a href=\"%(german)s\">Traducere din germană</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz intervievat pe InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" -"18 august 2011\n" -"(link mort, însămânÈ›at în I2P la <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">trackerul" -" poÈ™taÈ™ului</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz intervievat pe InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 august 2011\n(link mort, însămânÈ›at în I2P la <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">trackerul poÈ™taÈ™ului</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -777,86 +704,52 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonimatul maselor</a>,\n" -"Jonathan Cox,\n" -"11 noiembrie 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonimatul maselor</a>,\nJonathan Cox,\n11 noiembrie 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz È™i Lance James au intervievat pe InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" -"16 februarie 2012\n" -"(link mort, însămânÈ›at în I2P la <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">trackerul" -" poÈ™taÈ™ului</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz È™i Lance James au intervievat pe InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 februarie 2012\n(link mort, însămânÈ›at în I2P la <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">trackerul poÈ™taÈ™ului</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff È™i Str4d au intervievat pe podcast-ul Brakeing " -"Down Security Ep. 2015-010 (mp3)</a>\n" -"Partea 1, 28 februarie 2015" +msgstr "<a href=\"%(mp3)s\">Jeff È™i Str4d au intervievat pe podcast-ul Brakeing Down Security Ep. 2015-010 (mp3)</a>\nPartea 1, 28 februarie 2015" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" -msgstr "" -"<a href=\"%(mp3)s\">Jeff È™i Str4d au intervievat pe podcast-ul Brakeing " -"Down Security Ep. 2015-011 (mp3)</a>\n" -"Partea 2, 6 martie 2015" +msgstr "<a href=\"%(mp3)s\">Jeff È™i Str4d au intervievat pe podcast-ul Brakeing Down Security Ep. 2015-011 (mp3)</a>\nPartea 2, 6 martie 2015" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" -msgstr "" -"<a href=\"%(link)s\">Fireside With Lei - Episodul 18: Lance James. " -"Succes, eÈ™ecuri, durere È™i budism</a>.\n" -"<a href=\"%(archive)s\">(Archive.org)</a>\n" -"<a href=\"%(mp3)s\">(Mp3)</a>\n" -"Robert Lei, 31 decembrie 2018" +msgstr "<a href=\"%(link)s\">Fireside With Lei - Episodul 18: Lance James. Succes, eÈ™ecuri, durere È™i budism</a>.\n<a href=\"%(archive)s\">(Archive.org)</a>\n<a href=\"%(mp3)s\">(Mp3)</a>\nRobert Lei, 31 decembrie 2018" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" -"2019\n" -msgstr "" -"<a href=\"%(mhatta)s\">Articole ale colaboratorului I2P Masayuki Hatta pe" -" Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" +msgstr "<a href=\"%(mhatta)s\">Articole ale colaboratorului I2P Masayuki Hatta pe Medium.com</a>\n2019\n" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" -msgstr "" -"<a href=\"%(ctrl)s\">Activarea traseului .onion È™i .i2p cu configurarea " -"automată a proxy-ului</a>\n" -"Daniel Aleksandersen, 7 februarie 2019" +msgstr "<a href=\"%(ctrl)s\">Activarea traseului .onion È™i .i2p cu configurarea automată a proxy-ului</a>\nDaniel Aleksandersen, 7 februarie 2019" #: i2p2www/pages/site/about/media.html:295 msgid "Other" @@ -866,21 +759,61 @@ msgstr "Altceva" msgid "" "I2P mentioned in Netflix's \"House of Cards\" Season 2 Episode 2,\n" "February 14, 2014" -msgstr "" -"I2P menÈ›ionat în „Casa cărÈ›ilor†din Netflix, sezonul 2 episodul 2,\n" -"14 februarie 2014" +msgstr "I2P menÈ›ionat în „Casa cărÈ›ilor†din Netflix, sezonul 2 episodul 2,\n14 februarie 2014" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" +msgstr "<a href=\"%(meeh)s\">O listă tratată de către contribuitorul I2P meeh al implementărilor I2P, bibliotecilor, resurselor, proiectelor È™i lucruri strălucitoare</a>\n2019" + +#: i2p2www/pages/site/about/restrictive-countries.html:2 +msgid "Strict Countries" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:4 +msgid "" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" +"countries will automatically be placed into \"Hidden\" mode." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:11 +msgid "" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" +"Freedom score of 39 or less (not free)." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:18 +msgid "Hidden Mode Summary" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:19 +msgid "" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" +"others." +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:26 +msgid "Strict Countries List as of 2020" +msgstr "" + +#: i2p2www/pages/site/about/restrictive-countries.html:71 +msgid "" +"If you think a country should be added to the strict countries, file an " +"issue on the I2P gitlab." msgstr "" -"<a href=\"%(meeh)s\">O listă tratată de către contribuitorul I2P meeh al " -"implementărilor I2P, bibliotecilor, resurselor, proiectelor È™i lucruri " -"strălucitoare</a>\n" -"2019" #: i2p2www/pages/site/about/software.html:4 msgid "The I2P Software" @@ -890,18 +823,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -912,84 +842,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1000,8 +907,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1009,27 +915,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1037,26 +939,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1067,10 +960,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1078,18 +969,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1100,18 +988,11 @@ msgstr "Membri proiect I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" -msgstr "" -"Suntem un grup mic de oameni răspândiÈ›i pe mai multe continente, lucrând " -"pentru\n" -"avansaÈ›i diferite aspecte ale proiectului È™i discutând despre proiectul\n" -"reÅ£ea.\n" -"<a href=\"%(volunteer)s\">Implicati-va!</a>" +msgstr "Suntem un grup mic de oameni răspândiÈ›i pe mai multe continente, lucrând pentru\navansaÈ›i diferite aspecte ale proiectului È™i discutând despre proiectul\nreÅ£ea.\n<a href=\"%(volunteer)s\">Implicati-va!</a>" #: i2p2www/pages/site/about/team.html:14 msgid "Admin" @@ -1280,7 +1161,8 @@ msgid "Product Development" msgstr "" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1520,7 +1402,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "dezvoltare jbigi, migrare wiki, curățare doc" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "depanare java È™i dezvoltare client pe I2PTunnel È™i consola de router" #: i2p2www/pages/site/about/team.html:323 @@ -1570,55 +1453,27 @@ msgstr "… È™i multe altele" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." -msgstr "" -"I2PCon 2015 a fost primul eveniment de acest gen. Avea două obiective pe " -"termen scurt.\n" -"ÃŽn primul rând, pentru a oferi publicului larg un eveniment în care ar " -"putea fi obÈ›inute cunoÈ™tinÈ›e despre confidenÈ›ialitate.\n" -"ÃŽn al doilea rând, promovarea proiectului I2P È™i a comunității sale cu " -"discuÈ›ii tehnice\n" -"despre criptografie, anonimat È™i subiecte centrate pe I2P." +msgstr "I2PCon 2015 a fost primul eveniment de acest gen. Avea două obiective pe termen scurt.\nÃŽn primul rând, pentru a oferi publicului larg un eveniment în care ar putea fi obÈ›inute cunoÈ™tinÈ›e despre confidenÈ›ialitate.\nÃŽn al doilea rând, promovarea proiectului I2P È™i a comunității sale cu discuÈ›ii tehnice\ndespre criptografie, anonimat È™i subiecte centrate pe I2P." #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." -msgstr "" -"Un obiectiv mai mare È™i pe termen lung al acestui eveniment a fost " -"construirea unei\n" -"comuniune de persoane conÈ™tiente de confidenÈ›ialitate. Prin conectarea " -"oamenilor care recunosc\n" -"importanÈ›a vieÈ›ii private, am dorit să oferim un forum în care această " -"comunitate să poată creÈ™te." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." +msgstr "Un obiectiv mai mare È™i pe termen lung al acestui eveniment a fost construirea unei\ncomuniune de persoane conÈ™tiente de confidenÈ›ialitate. Prin conectarea oamenilor care recunosc\nimportanÈ›a vieÈ›ii private, am dorit să oferim un forum în care această comunitate să poată creÈ™te." #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." -msgstr "" -"Ideea acestui eveniment a fost creată pentru prima dată de minunaÈ›ii " -"noÈ™tri prieteni de la\n" -"<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"LocaÈ›ia a fost asigurată de <a " -"href=\"https://hacklab.to/\">Hacklab.to</a>.\n" -"Marketingul a fost condus de <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> È™i Siew.\n" -"Fără ei acest eveniment nu ar fi fost posibil." +msgstr "Ideea acestui eveniment a fost creată pentru prima dată de minunaÈ›ii noÈ™tri prieteni de la\n<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\nLocaÈ›ia a fost asigurată de <a href=\"https://hacklab.to/\">Hacklab.to</a>.\nMarketingul a fost condus de <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> È™i Siew.\nFără ei acest eveniment nu ar fi fost posibil." #: i2p2www/pages/site/about/i2pcon/2015.html:32 msgid "Slides and Video" @@ -1634,8 +1489,8 @@ msgstr "Notă: Linkurile video vor fi postate pe măsură ce vor deveni disponib #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1670,22 +1525,13 @@ msgstr "Oratori" msgid "" "Colin Mahns has a strong interest in the use of anonymity and encryption " "technology to help preserve human rights in the digital age." -msgstr "" -"Colin Mahns are un interes puternic în utilizarea tehnologiei de anonimat" -" È™i criptare pentru a ajuta la păstrarea drepturilor omului în era " -"digitală." +msgstr "Colin Mahns are un interes puternic în utilizarea tehnologiei de anonimat È™i criptare pentru a ajuta la păstrarea drepturilor omului în era digitală." #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." -msgstr "" -"David Dagon este un cercetător postdoc la Georgia Tech axat pe botnets, " -"malware, securitatea reÈ›elei È™i DNS.\n" -"Interesul său pentru I2P este centrat pe păstrarea vieÈ›ii private a " -"utilizatorilor, filtrarea autonomă È™i anti-abuz." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." +msgstr "David Dagon este un cercetător postdoc la Georgia Tech axat pe botnets, malware, securitatea reÈ›elei È™i DNS.\nInteresul său pentru I2P este centrat pe păstrarea vieÈ›ii private a utilizatorilor, filtrarea autonomă È™i anti-abuz." #: i2p2www/pages/site/about/i2pcon/2015.html:89 #: i2p2www/pages/site/about/i2pcon/2015.html:105 @@ -1698,26 +1544,12 @@ msgstr "J este È™eful Toronto Crypto." #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." -msgstr "" -"Lance James este fondatorul Proiectului IRV Invisibile, predecesorul I2P," -" încă din 2002.\n" -"Și-a fondat propria companie de informaÈ›ii despre amenințări cibernetice " -"în 2003\n" -"De atunci, el este concentrat pe securitatea reÈ›elei, cercetarea în " -"domeniul malware È™i securitatea informaÈ›iilor.\n" -"ÃŽn perioada 2011-2013, a fost director al Threat Intelligence pentru The " -"Vigilant, care a fost achiziÈ›ionat de Deloitte în 2013.\n" -"El a părăsit recent Deloitte să facă consultanță prin intermediul " -"companiei sale The James Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." +msgstr "Lance James este fondatorul Proiectului IRV Invisibile, predecesorul I2P, încă din 2002.\nȘi-a fondat propria companie de informaÈ›ii despre amenințări cibernetice în 2003\nDe atunci, el este concentrat pe securitatea reÈ›elei, cercetarea în domeniul malware È™i securitatea informaÈ›iilor.\nÃŽn perioada 2011-2013, a fost director al Threat Intelligence pentru The Vigilant, care a fost achiziÈ›ionat de Deloitte în 2013.\nEl a părăsit recent Deloitte să facă consultanță prin intermediul companiei sale The James Group." #: i2p2www/pages/site/about/i2pcon/2015.html:109 msgid "Nicholas D. is a member of Hacklab Toronto." @@ -1725,23 +1557,11 @@ msgstr "Nicholas D. este membru al Hacklab Toronto." #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." -msgstr "" -"Nicholas Johnston este profesor de securitate a informaÈ›iilor la Școala " -"de calcul aplicat a Colegiului Sheridan în programul de licență InfoSec." -"\n" -"Cariera sa anterioară profesională a fost în criminalistică digitală È™i " -"investigaÈ›ii.\n" -"El este, de asemenea, un contractor specializat în răspunsul la incident." -"\n" -"Domeniile sale de cercetare includ dezvoltarea sigură de software È™i " -"analiza datelor." +msgstr "Nicholas Johnston este profesor de securitate a informaÈ›iilor la Școala de calcul aplicat a Colegiului Sheridan în programul de licență InfoSec.\nCariera sa anterioară profesională a fost în criminalistică digitală È™i investigaÈ›ii.\nEl este, de asemenea, un contractor specializat în răspunsul la incident.\nDomeniile sale de cercetare includ dezvoltarea sigură de software È™i analiza datelor." #: i2p2www/pages/site/about/i2pcon/2015.html:124 msgid "Psi is an I2P developer." @@ -1793,14 +1613,9 @@ msgstr "Ziua 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." -msgstr "" -"Prima conferință dedicată I2P a avut loc la Toronto în perioada 15-16 " -"august 2015.\n" -"ConsultaÈ›i linkul de mai jos pentru mai multe informaÈ›ii È™i link-uri " -"către diapozitive È™i videoclipuri." +msgstr "Prima conferință dedicată I2P a avut loc la Toronto în perioada 15-16 august 2015.\nConsultaÈ›i linkul de mai jos pentru mai multe informaÈ›ii È™i link-uri către diapozitive È™i videoclipuri." #: i2p2www/pages/site/about/i2pcon/index.html:9 msgid "Past years" @@ -1816,27 +1631,13 @@ msgstr "August 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." -msgstr "" -"Există câteva tehnici majore care pot fi făcute pentru a îmbunătăți " -"percepÈ›ia\n" -"performanÈ›a I2P - unele dintre următoarele sunt legate de procesor, " -"altele de lățimea de bandă\n" -", iar altele sunt în continuare legate de protocol. Cu toate acestea, " -"toate acestea\n" -"dimensiunile afectează latenÈ›a, randamentul È™i performanÈ›a percepută a\n" -"de reÈ›ea, deoarece reduc conÈ›inutul pentru resursele limitate. Această " -"listă desigur\n" -"nu este cuprinzătoare, dar le acoperă pe cele majore văzute." +msgstr "Există câteva tehnici majore care pot fi făcute pentru a îmbunătăți percepÈ›ia\nperformanÈ›a I2P - unele dintre următoarele sunt legate de procesor, altele de lățimea de bandă\n, iar altele sunt în continuare legate de protocol. Cu toate acestea, toate acestea\ndimensiunile afectează latenÈ›a, randamentul È™i performanÈ›a percepută a\nde reÈ›ea, deoarece reduc conÈ›inutul pentru resursele limitate. Această listă desigur\nnu este cuprinzătoare, dar le acoperă pe cele majore văzute." #: i2p2www/pages/site/about/performance/future.html:15 #: i2p2www/pages/site/about/performance/index.html:106 @@ -1844,9 +1645,7 @@ msgstr "" msgid "" "For past performance improvements see the <a href=\"%(history)s\">\n" "Performance History</a>." -msgstr "" -"Pentru îmbunătățiri ale performanÈ›ei anterioare, consultaÈ›i secÈ›iunea\n" -"<a href=\"%(history)s\">Istoricul performanÈ›elor</a>." +msgstr "Pentru îmbunătățiri ale performanÈ›ei anterioare, consultaÈ›i secÈ›iunea\n<a href=\"%(history)s\">Istoricul performanÈ›elor</a>." #: i2p2www/pages/site/about/performance/future.html:20 msgid "Better peer profiling and selection" @@ -1855,27 +1654,13 @@ msgstr "Mai bună profilare È™i selecÈ›ie de la egal la egal" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." -msgstr "" -"Probabil una dintre cele mai importante părÈ›i ale obÈ›inerii unei " -"performanÈ›e mai rapide o va face\n" -"să îmbunătățească modul în care routerele aleg colegii prin care își " -"construiesc tunelurile\n" -"- asigurându-vă că nu folosesc colegi cu legături lente sau cele cu " -"legături rapide care\n" -"sunt supraîncărcate etc. ÃŽn plus, trebuie să ne asigurăm că nu ne expunem" -"\n" -"noi înÈ™ine la un atac <a href=\"%(sybilpdf)s\">Sybil</a>\n" -"de la un adversar puternic, cu o mulÈ›ime de maÈ™ini rapide." +msgstr "Probabil una dintre cele mai importante părÈ›i ale obÈ›inerii unei performanÈ›e mai rapide o va face\nsă îmbunătățească modul în care routerele aleg colegii prin care își construiesc tunelurile\n- asigurându-vă că nu folosesc colegi cu legături lente sau cele cu legături rapide care\nsunt supraîncărcate etc. ÃŽn plus, trebuie să ne asigurăm că nu ne expunem\nnoi înÈ™ine la un atac <a href=\"%(sybilpdf)s\">Sybil</a>\nde la un adversar puternic, cu o mulÈ›ime de maÈ™ini rapide." #: i2p2www/pages/site/about/performance/future.html:30 msgid "Network database tuning" @@ -1883,36 +1668,15 @@ msgstr "Reglarea bazelor de date în reÈ›ea" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." -msgstr "" -"Vom dori să fim mai eficienÈ›i cu vindecarea bazei de date a reÈ›elei\n" -"È™i algoritmi de întreÈ›inere - în loc să exploreze constant spaÈ›iul cheie " -"pentru noi\n" -"colegii - provocând un număr semnificativ de mesaje de reÈ›ea È™i încărcare" -" de router - noi\n" -"poate încetini sau chiar opri explorarea până când detectăm că este ceva " -"nou\n" -"merită găsit (de exemplu, decăderea ratei de explorare în funcÈ›ie de " -"ultima dată pe cineva\n" -"ne-a dat o referire la cineva despre care nu auzisem niciodată). Putem " -"face È™i unele\n" -"acordarea a ceea ce trimitem de fapt - câți colegi ne respingem înapoi " -"(sau chiar dacă noi\n" -"respingeÈ›i un răspuns), precum È™i câte căutări simultane efectuăm." +msgstr "Vom dori să fim mai eficienÈ›i cu vindecarea bazei de date a reÈ›elei\nÈ™i algoritmi de întreÈ›inere - în loc să exploreze constant spaÈ›iul cheie pentru noi\ncolegii - provocând un număr semnificativ de mesaje de reÈ›ea È™i încărcare de router - noi\npoate încetini sau chiar opri explorarea până când detectăm că este ceva nou\nmerită găsit (de exemplu, decăderea ratei de explorare în funcÈ›ie de ultima dată pe cineva\nne-a dat o referire la cineva despre care nu auzisem niciodată). Putem face È™i unele\nacordarea a ceea ce trimitem de fapt - câți colegi ne respingem înapoi (sau chiar dacă noi\nrespingeÈ›i un răspuns), precum È™i câte căutări simultane efectuăm." #: i2p2www/pages/site/about/performance/future.html:42 msgid "Session Tag Tuning and Improvements" @@ -1921,55 +1685,24 @@ msgstr "Ajustarea È™i îmbunătățirile etichetelor de sesiune" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." -msgstr "" -"Modul în care algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + " -"SessionTag</a>\n" -"funcÈ›ionează este prin gestionarea unui set de matriÈ›e aleatorii cu o " -"singură dată, cu 32 de octeÈ›i, È™i expiră\n" -"dacă nu sunt folosite destul de repede. Dacă le expirăm prea curând, " -"suntem\n" -"forÈ›ati să cadă din nou pe o criptare ElGamal (scumpă) completă, dar dacă" -" nu\n" -"expiraÈ›i-le suficient de repede, trebuie să le reducem cantitatea, astfel" -" încât să nu facem\n" -"rămâne fără memorie (È™i dacă destinatarul este cumva corupt È™i pierde " -"unele\n" -"etichete, pot apărea chiar mai multe eÈ™ecuri de criptare înainte de " -"detectare). Cu careva\n" -"algoritmi mai activi de detecÈ›ie È™i feedback, putem asigura în siguranță " -"È™i mai mult\n" -"reglaÈ›i eficient durata de viață a etichetelor, înlocuind criptarea " -"ElGamal cu\n" -"o operaÈ›ie AES banală." +msgstr "Modul în care algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a>\nfuncÈ›ionează este prin gestionarea unui set de matriÈ›e aleatorii cu o singură dată, cu 32 de octeÈ›i, È™i expiră\ndacă nu sunt folosite destul de repede. Dacă le expirăm prea curând, suntem\nforÈ›ati să cadă din nou pe o criptare ElGamal (scumpă) completă, dar dacă nu\nexpiraÈ›i-le suficient de repede, trebuie să le reducem cantitatea, astfel încât să nu facem\nrămâne fără memorie (È™i dacă destinatarul este cumva corupt È™i pierde unele\netichete, pot apărea chiar mai multe eÈ™ecuri de criptare înainte de detectare). Cu careva\nalgoritmi mai activi de detecÈ›ie È™i feedback, putem asigura în siguranță È™i mai mult\nreglaÈ›i eficient durata de viață a etichetelor, înlocuind criptarea ElGamal cu\no operaÈ›ie AES banală." #: i2p2www/pages/site/about/performance/future.html:55 #, python-format msgid "" "Additional ideas for improving Session Tag delivery are described on the\n" "<a href=\"%(elgamalaes)s#future\">ElGamal/AES+SessionTag page</a>." -msgstr "" -"Idei suplimentare pentru îmbunătățirea livrării Etichetelor de sesiune " -"sunt descrise pe document\n" -"<a href=\"%(elgamalaes)s#future\">Pagina ElGamal / AES + SessionTag</a>." +msgstr "Idei suplimentare pentru îmbunătățirea livrării Etichetelor de sesiune sunt descrise pe document\n<a href=\"%(elgamalaes)s#future\">Pagina ElGamal / AES + SessionTag</a>." #: i2p2www/pages/site/about/performance/future.html:61 msgid "Migrate sessionTag to synchronized PRNG" @@ -1980,71 +1713,29 @@ msgstr "Migrează sesiunea Tag către PRNG sincronizat" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." -msgstr "" -"ÃŽn acest moment, algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + " -"SessionTag</a>\n" -" funcÈ›ionează prin etichetarea fiecărui mesaj criptat cu un random unic\n" -"32 byte nonce (o „etichetă de sesiuneâ€), identificând mesajul ca fiind " -"criptat\n" -"cu cheia sesiunii AES asociate. Acest lucru împiedică semenii să distingă" -"\n" -"mesaje care fac parte din aceeaÈ™i sesiune, deoarece fiecare mesaj are o \n" -"etichetă complet nouă aleatorie. Pentru a realiza acest lucru, fiecare " -"câteva mesaje conÈ›in un \n" -"nou întreg set de etichete de sesiune din mesajul criptat în sine, în mod" -" transparent\n" -"livrarea unei modalități de identificare a mesajelor viitoare. Atunci " -"trebuie să urmărim\n" -"ce mesaje sunt livrate cu succes, astfel încât să È™tim ce etichete\n" -"putem folosi." +msgstr "ÃŽn acest moment, algoritmul <a href=\"%(elgamalaes)s\">ElGamal / AES + SessionTag</a>\n funcÈ›ionează prin etichetarea fiecărui mesaj criptat cu un random unic\n32 byte nonce (o „etichetă de sesiuneâ€), identificând mesajul ca fiind criptat\ncu cheia sesiunii AES asociate. Acest lucru împiedică semenii să distingă\nmesaje care fac parte din aceeaÈ™i sesiune, deoarece fiecare mesaj are o \netichetă complet nouă aleatorie. Pentru a realiza acest lucru, fiecare câteva mesaje conÈ›in un \nnou întreg set de etichete de sesiune din mesajul criptat în sine, în mod transparent\nlivrarea unei modalități de identificare a mesajelor viitoare. Atunci trebuie să urmărim\nce mesaje sunt livrate cu succes, astfel încât să È™tim ce etichete\nputem folosi." #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" "to handle out of order delivery)." -msgstr "" -"Acest lucru funcÈ›ionează bine È™i este destul de robust, însă este " -"ineficient din punct de vedere\n" -"de utilizare a lățimii de bandă, deoarece necesită livrarea acestor " -"etichete înainte\n" -"timp (È™i nu toate etichetele pot fi necesare sau unele pot fi pierdute " -"din cauza\n" -"expirarii lor). TotuÈ™i, în medie, predelectarea costă eticheta de sesiune" -"\n" -"32 de octeÈ›i pe mesaj (dimensiunea unei etichete). După cum sugera Taral," -" totuÈ™i\n" -"dimensiunea poate fi evitată înlocuind livrarea etichetelor cu una " -"sincronizată\n" -"PRNG - când se stabileÈ™te o nouă sesiune (printr-un cod ElGamal criptat\n" -"bloc), ambele părÈ›i plantează un PRNG pentru utilizare È™i generează " -"etichetele de sesiune\n" -"la cerere (destinatarul precalculând următoarele câteva valori posibile\n" -"să se ocupe de livrare fără comandă)." +msgstr "Acest lucru funcÈ›ionează bine È™i este destul de robust, însă este ineficient din punct de vedere\nde utilizare a lățimii de bandă, deoarece necesită livrarea acestor etichete înainte\ntimp (È™i nu toate etichetele pot fi necesare sau unele pot fi pierdute din cauza\nexpirarii lor). TotuÈ™i, în medie, predelectarea costă eticheta de sesiune\n32 de octeÈ›i pe mesaj (dimensiunea unei etichete). După cum sugera Taral, totuÈ™i\ndimensiunea poate fi evitată înlocuind livrarea etichetelor cu una sincronizată\nPRNG - când se stabileÈ™te o nouă sesiune (printr-un cod ElGamal criptat\nbloc), ambele părÈ›i plantează un PRNG pentru utilizare È™i generează etichetele de sesiune\nla cerere (destinatarul precalculând următoarele câteva valori posibile\nsă se ocupe de livrare fără comandă)." #: i2p2www/pages/site/about/performance/future.html:87 msgid "Longer lasting tunnels" @@ -2052,55 +1743,26 @@ msgstr "Tuneluri de durată mai lungă" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." -msgstr "" -"Cu toate acestea, durata actuală a tunelului implicită de 10 minute este " -"destul de arbitrară\n" -"se \"simte bine\". Odată ce avem cod de vindecare a tunelului È™i " -"detectarea\n" -" mai eficienta\n" -" a eÈ™ecului, vom putea varia mai în siguranță aceste durate, reducând\n" -"reÈ›ea È™i încărcarea procesorului (datorită mesajelor costisitoare de " -"creare a tunelului)." +msgstr "Cu toate acestea, durata actuală a tunelului implicită de 10 minute este destul de arbitrară\nse \"simte bine\". Odată ce avem cod de vindecare a tunelului È™i detectarea\n mai eficienta\n a eÈ™ecului, vom putea varia mai în siguranță aceste durate, reducând\nreÈ›ea È™i încărcarea procesorului (datorită mesajelor costisitoare de creare a tunelului)." #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." -msgstr "" -"Aceasta pare a fi o soluÈ›ie uÈ™oară pentru încărcare mare pe routerele cu " -"lățime mare de bandă, dar\n" -"nu trebuie să recurgem la asta până nu am reglat mai departe algoritmii " -"de construire a tunelului.\n" -"Cu toate acestea, durata de viață a tunelului de 10 minute este codată în" -" câteva locuri,\n" -"astfel încât să fie nevoie de efort substanÈ›ial pentru modificarea " -"duratei.\n" -"De asemenea, ar fi dificil să se menÈ›ină compatibilitatea înapoi cu o " -"astfel de modificare." +"Also, it would be difficult to maintain backward compatibility with such a change." +msgstr "Aceasta pare a fi o soluÈ›ie uÈ™oară pentru încărcare mare pe routerele cu lățime mare de bandă, dar\nnu trebuie să recurgem la asta până nu am reglat mai departe algoritmii de construire a tunelului.\nCu toate acestea, durata de viață a tunelului de 10 minute este codată în câteva locuri,\nastfel încât să fie nevoie de efort substanÈ›ial pentru modificarea duratei.\nDe asemenea, ar fi dificil să se menÈ›ină compatibilitatea înapoi cu o astfel de modificare." #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." -msgstr "" -"ÃŽn prezent, întrucât rata medie de succes a construirii tunelurilor din " -"reÈ›ea este destul de mare,\n" -"nu există planuri actuale de prelungire a duratei de viață a tunelului." +msgstr "ÃŽn prezent, întrucât rata medie de succes a construirii tunelurilor din reÈ›ea este destul de mare,\nnu există planuri actuale de prelungire a duratei de viață a tunelului." #: i2p2www/pages/site/about/performance/future.html:108 msgid "Adjust the timeouts" @@ -2108,47 +1770,22 @@ msgstr "ReglaÈ›i intervalele de timp" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" -msgstr "" -"Cu toate acestea, alte lucruri destul de arbitrare, dar „bineâ€, le avem\n" -"intervale de timp curente pentru diverse activități. De ce avem un coleg " -"de 60 de secunde\n" -"\"timeout\" de neatins? De ce încercăm să trimitem prin alt tunel care a\n" -"LeaseSet face reclame după 10 secunde? De ce sunt interogările bazei de " -"date din reÈ›ea\n" -"delimitat cu 60 sau 20 de limite? De ce sunt configurate destinaÈ›iile " -"pentru a cere a\n" -"nou set de tunele la fiecare 10 minute? De ce permitem 60 de secunde " -"pentru un coleg\n" -"răspundeÈ›i la solicitarea noastră de a se alătura unui tunel? De ce " -"considerăm un tunel care\n" -"nu ne trece testul în 60 de secunde „mortâ€?" +msgstr "Cu toate acestea, alte lucruri destul de arbitrare, dar „bineâ€, le avem\nintervale de timp curente pentru diverse activități. De ce avem un coleg de 60 de secunde\n\"timeout\" de neatins? De ce încercăm să trimitem prin alt tunel care a\nLeaseSet face reclame după 10 secunde? De ce sunt interogările bazei de date din reÈ›ea\ndelimitat cu 60 sau 20 de limite? De ce sunt configurate destinaÈ›iile pentru a cere a\nnou set de tunele la fiecare 10 minute? De ce permitem 60 de secunde pentru un coleg\nrăspundeÈ›i la solicitarea noastră de a se alătura unui tunel? De ce considerăm un tunel care\nnu ne trece testul în 60 de secunde „mortâ€?" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." -msgstr "" -"Fiecare dintre aceste necondiÈ›ionate poate fi adresat È™i cu un cod mai " -"adaptiv\n" -"ca parametri reglabili care să permită compensări mai adecvate între\n" -"lățimea de bandă, latenÈ›a È™i utilizarea procesorului." +msgstr "Fiecare dintre aceste necondiÈ›ionate poate fi adresat È™i cu un cod mai adaptiv\nca parametri reglabili care să permită compensări mai adecvate între\nlățimea de bandă, latenÈ›a È™i utilizarea procesorului." #: i2p2www/pages/site/about/performance/future.html:125 msgid "Full streaming protocol improvements" @@ -2158,51 +1795,33 @@ msgstr "ÃŽmbunătățirea completă a protocolului de streaming" msgid "" "Perhaps re-enable the interactive stream profile (the \n" "current implementation only uses the bulk stream profile)." -msgstr "" -"Poate reactivă profilul fluxului interactiv (\n" -"implementarea curentă foloseÈ™te doar profilul fluxului în vrac)." +msgstr "Poate reactivă profilul fluxului interactiv (\nimplementarea curentă foloseÈ™te doar profilul fluxului în vrac)." #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." -msgstr "" -"Limitarea lățimii de bandă la nivel de client (în oricare sau ambele " -"direcÈ›ii ale unui flux,\n" -"sau posibil împărtășit pe mai multe fluxuri). Acest lucru ar fi în plus " -"față de\n" -"limitarea generală a lățimii de bandă a routerului, desigur." +msgstr "Limitarea lățimii de bandă la nivel de client (în oricare sau ambele direcÈ›ii ale unui flux,\nsau posibil împărtășit pe mai multe fluxuri). Acest lucru ar fi în plus față de\nlimitarea generală a lățimii de bandă a routerului, desigur." #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." -msgstr "" -"Listele de control de acces (care permit doar fluxuri către sau din " -"anumite destinaÈ›ii altor persoane cunoscute)." +msgstr "Listele de control de acces (care permit doar fluxuri către sau din anumite destinaÈ›ii altor persoane cunoscute)." #: i2p2www/pages/site/about/performance/future.html:147 msgid "" "Web controls and monitoring the health of the various streams, as well \n" "as the ability to explicitly close or throttle them." -msgstr "" -"Controale web È™i monitorizarea stării de sănătate a diferitelor fluxuri\n" -"ca abilitatea de a le închide sau accelera explicit." +msgstr "Controale web È™i monitorizarea stării de sănătate a diferitelor fluxuri\nca abilitatea de a le închide sau accelera explicit." #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." -msgstr "" -"Idei suplimentare pentru îmbunătățirea bibliotecii de streaming sunt " -"descrise pe site\n" -" <a href=\"%(streaming)s#future\">pagina bibliotecii streaming</a>." +msgstr "Idei suplimentare pentru îmbunătățirea bibliotecii de streaming sunt descrise pe site\n <a href=\"%(streaming)s#future\">pagina bibliotecii streaming</a>." #: i2p2www/pages/site/about/performance/history.html:2 msgid "Performance History" @@ -2211,17 +1830,10 @@ msgstr "Istoricul performanÈ›elor" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." -msgstr "" -"Au fost realizate îmbunătățiri notabile ale performanÈ›ei folosind " -"tehnicile de mai jos.\n" -"Mai sunt multe de făcut, consultaÈ›i pagina<a " -"href=\"%(performance)s\">Performanță</a>\n" -"pentru problemele È™i gândurile actuale." +msgstr "Au fost realizate îmbunătățiri notabile ale performanÈ›ei folosind tehnicile de mai jos.\nMai sunt multe de făcut, consultaÈ›i pagina<a href=\"%(performance)s\">Performanță</a>\npentru problemele È™i gândurile actuale." #: i2p2www/pages/site/about/performance/history.html:10 msgid "Native math" @@ -2238,52 +1850,25 @@ msgstr "implementat" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" -msgstr "" -"Când am profilat ultima dată codul I2P, marea majoritate a timpului a " -"fost petrecută în interiorul\n" -"singure funcÈ›iei: java.math.BigInteger\n" -"<a href=\"%(modpow)s\">modPow</a>.\n" -"ÃŽn loc să încercaÈ›i să ajustaÈ›i această metodă, vă vom adresa\n" -"<a href=\"%(gmp)s\">GNU MP</a> - o bibliotecă matematică rapidă\n" -"(cu montator reglat pentru multe arhitecturi). (<i>Editor: vezi\n" -"<a href=\"%(jbigi)s\">NativeBigInteger pentru o criptografie rapidă cu " -"cheie publică</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" +msgstr "Când am profilat ultima dată codul I2P, marea majoritate a timpului a fost petrecută în interiorul\nsingure funcÈ›iei: java.math.BigInteger\n<a href=\"%(modpow)s\">modPow</a>.\nÃŽn loc să încercaÈ›i să ajustaÈ›i această metodă, vă vom adresa\n<a href=\"%(gmp)s\">GNU MP</a> - o bibliotecă matematică rapidă\n(cu montator reglat pentru multe arhitecturi). (<i>Editor: vezi\n<a href=\"%(jbigi)s\">NativeBigInteger pentru o criptografie rapidă cu cheie publică</a></i>)" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." -msgstr "" -"\n" -"ugha È™i raÈ›a lucrează la codul de clei C/JNI È™i la codul java existent\n" -"este deja implementat cu hooks pentru asta, ori de câte ori este gata. " -"Rezultate preliminare\n" -"arata fantastic - rularea routerului cu modPow-ul GMP autohton este de " -"acord\n" -"o viteză de 800% în performanÈ›ele de criptare, iar sarcina a fost " -"redusă la jumătate. Acest\n" -"a fost doar pe maÈ™ina unui utilizator, iar lucrurile nu sunt aproape gata" -" de ambalare\n" -"È™i implementare, încă." +msgstr "\nugha È™i raÈ›a lucrează la codul de clei C/JNI È™i la codul java existent\neste deja implementat cu hooks pentru asta, ori de câte ori este gata. Rezultate preliminare\narata fantastic - rularea routerului cu modPow-ul GMP autohton este de acord\no viteză de 800% în performanÈ›ele de criptare, iar sarcina a fost redusă la jumătate. Acest\na fost doar pe maÈ™ina unui utilizator, iar lucrurile nu sunt aproape gata de ambalare\nÈ™i implementare, încă." #: i2p2www/pages/site/about/performance/history.html:32 msgid "Garlic wrapping a \"reply\" LeaseSet" @@ -2295,95 +1880,42 @@ msgstr "implementat, dar are nevoie de reglare" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" -msgstr "" -"Acest tweak al algoritmului va fi relevant numai pentru aplicaÈ›iile care " -"își doresc\n" -"colegii să le răspundă (deÈ™i asta include tot ceea ce foloseÈ™te I2PTunnel" -" sau\n" -"Mihi's ministreaming lib):" +msgstr "Acest tweak al algoritmului va fi relevant numai pentru aplicaÈ›iile care își doresc\ncolegii să le răspundă (deÈ™i asta include tot ceea ce foloseÈ™te I2PTunnel sau\nMihi's ministreaming lib):" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." -msgstr "" -"Anterior, când Alice i-a trimis lui Bob un mesaj, când Bob i-a răspuns că" -" trebuie să facă o\n" -"căutare în baza de date a reÈ›elei - trimitând câteva solicitări pentru a " -"primi Alice\n" -"LeaseSet curent. Dacă are deja actualul LeaseSet al lui Alice, poate în " -"schimb\n" -"sa trimite imediat răspunsul său - acesta este (o parte din) de ce " -"durează de obicei \n" -"puÈ›in sa vorbeasca cu cineva prima dată când vă conectaÈ›i, dar ulterior\n" -"comunicarea este mai rapidă. ÃŽn prezent - pentru toÈ›i clienÈ›ii - ne " -"împachetăm\n" -"actualul LeaseSet al expeditorului în usturoiul care este livrat " -"destinatarului,\n" -"astfel încât, atunci când vor răspunde, vor avea întotdeauna LeaseSet " -"local\n" -"stocat - eliminând complet orice nevoie pentru o căutare în baza de date " -"a reÈ›elei la răspunsuri.\n" -"Aceasta tranzacÈ›ionează o mare parte din lățimea de bandă a expeditorului" -" pentru acea răspuns mai rapidă.\n" -"Dacă nu am face acest lucru foarte des,\n" -"utilizarea totală a lățimii de bandă a reÈ›elei ar scădea, deoarece " -"destinatarul nu\n" -"trebuie să efectueze căutarea în baza de date a reÈ›elei." +msgstr "Anterior, când Alice i-a trimis lui Bob un mesaj, când Bob i-a răspuns că trebuie să facă o\ncăutare în baza de date a reÈ›elei - trimitând câteva solicitări pentru a primi Alice\nLeaseSet curent. Dacă are deja actualul LeaseSet al lui Alice, poate în schimb\nsa trimite imediat răspunsul său - acesta este (o parte din) de ce durează de obicei \npuÈ›in sa vorbeasca cu cineva prima dată când vă conectaÈ›i, dar ulterior\ncomunicarea este mai rapidă. ÃŽn prezent - pentru toÈ›i clienÈ›ii - ne împachetăm\nactualul LeaseSet al expeditorului în usturoiul care este livrat destinatarului,\nastfel încât, atunci când vor răspunde, vor avea întotdeauna LeaseSet local\nstocat - eliminând complet orice nevoie pentru o căutare în baza de date a reÈ›elei la răspunsuri.\nAceasta tranzacÈ›ionează o mare parte din lățimea de bandă a expeditorului pentru acea răspuns mai rapidă.\nDacă nu am face acest lucru foarte des,\nutilizarea totală a lățimii de bandă a reÈ›elei ar scădea, deoarece destinatarul nu\ntrebuie să efectueze căutarea în baza de date a reÈ›elei." #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." -msgstr "" -"Pentru LeaseSet-urile nepublicate, cum ar fi „clienÈ›ii partajaÈ›iâ€, " -"aceasta este singura cale de a lua\n" -" LeaseSet la Bob. Din păcate, acest pachet se adaugă de fiecare dată\n" -"aproape 100% deasupra unei conexiuni cu lățime mare de bandă È™i mult mai " -"mult\n" -"o conexiune cu mesaje mai mici." +msgstr "Pentru LeaseSet-urile nepublicate, cum ar fi „clienÈ›ii partajaÈ›iâ€, aceasta este singura cale de a lua\n LeaseSet la Bob. Din păcate, acest pachet se adaugă de fiecare dată\naproape 100% deasupra unei conexiuni cu lățime mare de bandă È™i mult mai mult\no conexiune cu mesaje mai mici." #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." -msgstr "" -"Modificările programate pentru lansarea 0.6.2 vor include pachetul " -"LeaseSet doar atunci când\n" -"este necesar, la începutul unei conexiuni sau când se schimbă LeaseSet.\n" -"Acest lucru va reduce substanÈ›ial cheltuielile totale ale mesajelor I2P." +msgstr "Modificările programate pentru lansarea 0.6.2 vor include pachetul LeaseSet doar atunci când\neste necesar, la începutul unei conexiuni sau când se schimbă LeaseSet.\nAcest lucru va reduce substanÈ›ial cheltuielile totale ale mesajelor I2P." #: i2p2www/pages/site/about/performance/history.html:66 msgid "More efficient TCP rejection" @@ -2392,41 +1924,16 @@ msgstr "Respingerea TCP mai eficientă" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." -msgstr "" -"ÃŽn momentul de față, toate conexiunile TCP fac toate validarea colegilor " -"lor după\n" -"parcurgerea strângerii de mână completă (scumpă) a lui Diffie-Hellman " -"pentru a negocia o\n" -"cheia sesiunii private. Aceasta înseamnă că dacă ceasul cuiva este într-" -"adevăr greÈ™it sau\n" -"NAT / firewall / etc sunt necorespunzător configurate (sau pur È™i simplu " -"rulează o\n" -"versiunea incompatibilă a routerului), vor merge în mod constant (deÈ™i nu" -"\n" -"în mod constant, datorită listei ban)) provoca o criptografie inutilă " -"scumpă\n" -"operaÈ›iune pe toÈ›i colegii despre care È™tiu. ÃŽn timp ce vom dori să " -"păstrăm unele\n" -"verificari/validari în limita de criptare, vom dori să actualizăm\n" -"protocol pentru a face o parte din acesta mai întâi, astfel încât să le " -"putem respinge curat\n" -"fără a irosi mult procesor sau alte resurse." +msgstr "ÃŽn momentul de față, toate conexiunile TCP fac toate validarea colegilor lor după\nparcurgerea strângerii de mână completă (scumpă) a lui Diffie-Hellman pentru a negocia o\ncheia sesiunii private. Aceasta înseamnă că dacă ceasul cuiva este într-adevăr greÈ™it sau\nNAT / firewall / etc sunt necorespunzător configurate (sau pur È™i simplu rulează o\nversiunea incompatibilă a routerului), vor merge în mod constant (deÈ™i nu\nîn mod constant, datorită listei ban)) provoca o criptografie inutilă scumpă\noperaÈ›iune pe toÈ›i colegii despre care È™tiu. ÃŽn timp ce vom dori să păstrăm unele\nverificari/validari în limita de criptare, vom dori să actualizăm\nprotocol pentru a face o parte din acesta mai întâi, astfel încât să le putem respinge curat\nfără a irosi mult procesor sau alte resurse." #: i2p2www/pages/site/about/performance/history.html:81 msgid "Adjust the tunnel testing" @@ -2434,28 +1941,13 @@ msgstr "ReglaÈ›i testarea tunelului" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." -msgstr "" -"ÃŽn loc să mergem cu schema destul de aleatoare pe care o avem acum, ar " -"trebui să folosim un\n" -"algoritm mai conÈ™tient de context pentru testarea tunelurilor. de " -"exemplu. dacă deja îl È™tim\n" -"trecând corect datele valide, nu este nevoie să le testăm, deÈ™i dacă nu \n" -"Am văzut recent date prin ea recent, poate merită să aruncă unele date\n" -"cale. Acest lucru va reduce contenÈ›ia tunelului din cauza excesului de " -"mesaje, precum È™i\n" -"îmbunătățeÈ™te viteza cu care detectăm - È™i adresăm - tunelurile care nu " -"au reuÈ™it." +msgstr "ÃŽn loc să mergem cu schema destul de aleatoare pe care o avem acum, ar trebui să folosim un\nalgoritm mai conÈ™tient de context pentru testarea tunelurilor. de exemplu. dacă deja îl È™tim\ntrecând corect datele valide, nu este nevoie să le testăm, deÈ™i dacă nu \nAm văzut recent date prin ea recent, poate merită să aruncă unele date\ncale. Acest lucru va reduce contenÈ›ia tunelului din cauza excesului de mesaje, precum È™i\nîmbunătățeÈ™te viteza cu care detectăm - È™i adresăm - tunelurile care nu au reuÈ™it." #: i2p2www/pages/site/about/performance/history.html:92 msgid "Persistent Tunnel / Lease Selection" @@ -2463,30 +1955,17 @@ msgstr "SelecÈ›ia persistentă a tunelului / închirierii" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." -msgstr "" -"SelecÈ›ia tunelului de ieÈ™ire implementată în 0.6.1.30, selecÈ›ie de " -"închiriere la intrare\n" -"implementat în versiunea 0.6.2." +msgstr "SelecÈ›ia tunelului de ieÈ™ire implementată în 0.6.1.30, selecÈ›ie de închiriere la intrare\nimplementat în versiunea 0.6.2." #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." -msgstr "" -"Selectarea tunelurilor È™i închirierilor la întâmplare pentru fiecare " -"mesaj creează un număr mare\n" -"incidenÈ›a livrării în afara comenzii, ceea ce împiedică difuzarea " -"fluxului\n" -"crescându-È™i dimensiunea ferestrei cât a putut. Prin persistarea cu\n" -"aceleaÈ™i selecÈ›ii pentru o conexiune dată, rata de transfer este mult mai" -" rapidă." +msgstr "Selectarea tunelurilor È™i închirierilor la întâmplare pentru fiecare mesaj creează un număr mare\nincidenÈ›a livrării în afara comenzii, ceea ce împiedică difuzarea fluxului\ncrescându-È™i dimensiunea ferestrei cât a putut. Prin persistarea cu\naceleaÈ™i selecÈ›ii pentru o conexiune dată, rata de transfer este mult mai rapidă." #: i2p2www/pages/site/about/performance/history.html:104 msgid "Compress some data structures" @@ -2494,36 +1973,15 @@ msgstr "Compresează unele structuri de date" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." -msgstr "" -"Mesajele I2NP È™i datele pe care le conÈ›in sunt deja definite într-un mod " -"echitabil\n" -"structură compactă, deÈ™i un atribut al structurii RouterInfo nu este -\n" -"\"opÈ›iuni\" este un nume ASCII simplu = maparea valorilor. Momentan, îl " -"completăm\n" -"cu acele statistici publicate - în jur de 3300 de octeÈ›i pe egal. Trivial" -" la\n" -"implementarea compresiei GZip ar reduce aproape la 1/3 dimensiunea sa È™i " -"când\n" -"ia în considerare cât de des sunt trecute structurile RouterInfo prin " -"reÈ›ea, adică\n" -"economii semnificative - de fiecare dată când un router solicită unui alt" -" router o reÈ›eaDb\n" -"intrare pe care parerea nu o are, trimite înapoi 3-10 RouterInfo din ele." +msgstr "Mesajele I2NP È™i datele pe care le conÈ›in sunt deja definite într-un mod echitabil\nstructură compactă, deÈ™i un atribut al structurii RouterInfo nu este -\n\"opÈ›iuni\" este un nume ASCII simplu = maparea valorilor. Momentan, îl completăm\ncu acele statistici publicate - în jur de 3300 de octeÈ›i pe egal. Trivial la\nimplementarea compresiei GZip ar reduce aproape la 1/3 dimensiunea sa È™i când\nia în considerare cât de des sunt trecute structurile RouterInfo prin reÈ›ea, adică\neconomii semnificative - de fiecare dată când un router solicită unui alt router o reÈ›eaDb\nintrare pe care parerea nu o are, trimite înapoi 3-10 RouterInfo din ele." #: i2p2www/pages/site/about/performance/history.html:117 msgid "Update the ministreaming protocol" @@ -2535,46 +1993,17 @@ msgstr "înlocuit cu protocolul de streaming complet" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." -msgstr "" -"ÃŽn prezent, biblioteca de ministreaming a mihi are o negociere de flux " -"destul de simplă\n" -"protocol - Alice îi trimite lui Bob un mesaj SYN, apoi Bob răspunde cu un" -" mesaj ACK\n" -"Alice È™i Bob își transmit reciproc câteva date, până când unul dintre ei " -"îi trimite celuilalt a\n" -"Mesaj ÃŽNCHIS Pentru conexiuni de lungă durată (de exemplu, la un server " -"IRC),\n" -"că aerul general este neglijabil, dar pentru situaÈ›ii simple de " -"solicitare / răspuns\n" -"(de exemplu, o cerere / răspuns HTTP), adică mai mult de două ori mai " -"multe mesaje decât\n" -"necesar. Dacă totuÈ™i, Alice È™i-a asigurat prima sarcină utilă cu SYN\n" -"mesaj, iar Bob È™i-a exprimat prima replică cu ACK - È™i poate, de asemenea" -"\n" -"a inclus indicatorul CLOSE - fluxuri tranzitorii, cum ar fi cererile HTTP" -"\n" -"redus la o pereche de mesaje, în loc de SYN + ACK + cerere + răspuns + " -"ÃŽNCHIS." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." +msgstr "ÃŽn prezent, biblioteca de ministreaming a mihi are o negociere de flux destul de simplă\nprotocol - Alice îi trimite lui Bob un mesaj SYN, apoi Bob răspunde cu un mesaj ACK\nAlice È™i Bob își transmit reciproc câteva date, până când unul dintre ei îi trimite celuilalt a\nMesaj ÃŽNCHIS Pentru conexiuni de lungă durată (de exemplu, la un server IRC),\ncă aerul general este neglijabil, dar pentru situaÈ›ii simple de solicitare / răspuns\n(de exemplu, o cerere / răspuns HTTP), adică mai mult de două ori mai multe mesaje decât\nnecesar. Dacă totuÈ™i, Alice È™i-a asigurat prima sarcină utilă cu SYN\nmesaj, iar Bob È™i-a exprimat prima replică cu ACK - È™i poate, de asemenea\na inclus indicatorul CLOSE - fluxuri tranzitorii, cum ar fi cererile HTTP\nredus la o pereche de mesaje, în loc de SYN + ACK + cerere + răspuns + ÃŽNCHIS." #: i2p2www/pages/site/about/performance/history.html:132 msgid "Implement full streaming protocol" @@ -2582,59 +2011,26 @@ msgstr "ImplementaÈ›i protocolul de streaming complet" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." -msgstr "" -"Protocolul de ministreaming profită de o decizie de proiectare " -"deficitară în\n" -"Protocolul client I2P (I2CP) - expunerea „mode = GARANÈšIEâ€, permițând ce\n" -"altfel ar fi un protocol fiabil, cu cel mai bun efort, bazat pe mesaje " -"care trebuie utilizat\n" -"pentru o funcÈ›ionare fiabilă È™i de blocare (sub copertine, tot nu este " -"sigur È™i\n" -"bazat pe mesaje), routerul oferind garanÈ›ii de livrare prin ambalarea " -"usturoiului\n" -"un mesaj \"ACK\" cu sarcina utilă, astfel încât odată ce datele ajung la " -"È›intă,\n" -"Mesajul ACK este trimis înapoi către noi [prin tuneluri, desigur])." +msgstr "Protocolul de ministreaming profită de o decizie de proiectare deficitară în\nProtocolul client I2P (I2CP) - expunerea „mode = GARANÈšIEâ€, permițând ce\naltfel ar fi un protocol fiabil, cu cel mai bun efort, bazat pe mesaje care trebuie utilizat\npentru o funcÈ›ionare fiabilă È™i de blocare (sub copertine, tot nu este sigur È™i\nbazat pe mesaje), routerul oferind garanÈ›ii de livrare prin ambalarea usturoiului\nun mesaj \"ACK\" cu sarcina utilă, astfel încât odată ce datele ajung la È›intă,\nMesajul ACK este trimis înapoi către noi [prin tuneluri, desigur])." #: i2p2www/pages/site/about/performance/history.html:143 #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." -msgstr "" -"După cum <a href=\"%(link)s\">am spus</a>, a avea\n" -"I2PTunnel (È™i ministreaming lib ) merg pe această rută a fost cel mai bun" -" lucru\n" -"s-ar putea face, dar sunt disponibile mecanisme mai eficiente. Când vom " -"scoate\n" -"FuncÈ›ionalitatea „mode = GARANÈšIEâ€, ne lăsăm în esență un an\n" -"I2CP care arată ca un strat IP anonim È™i, ca atare, vom putea\n" -"implementaÈ›i biblioteca de streaming pentru a profita de experienÈ›ele de " -"proiectare ale\n" -"stratul TCP - ACK-uri selective, detecÈ›ie de congestionare, agitatie etc." +msgstr "După cum <a href=\"%(link)s\">am spus</a>, a avea\nI2PTunnel (È™i ministreaming lib ) merg pe această rută a fost cel mai bun lucru\ns-ar putea face, dar sunt disponibile mecanisme mai eficiente. Când vom scoate\nFuncÈ›ionalitatea „mode = GARANÈšIEâ€, ne lăsăm în esență un an\nI2CP care arată ca un strat IP anonim È™i, ca atare, vom putea\nimplementaÈ›i biblioteca de streaming pentru a profita de experienÈ›ele de proiectare ale\nstratul TCP - ACK-uri selective, detecÈ›ie de congestionare, agitatie etc." #: i2p2www/pages/site/about/performance/index.html:2 msgid "Performance" @@ -2644,103 +2040,44 @@ msgstr "Performanță" msgid "" "How does I2P work, why is it slow, and why does it not use my full " "bandwidth?" -msgstr "" -"Cum funcÈ›ionează I2P, de ce este lent È™i de ce nu foloseÈ™te lățimea de " -"bandă completă?" +msgstr "Cum funcÈ›ionează I2P, de ce este lent È™i de ce nu foloseÈ™te lățimea de bandă completă?" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." -msgstr "" -"Probabil unul dintre cele mai frecvente lucruri pe care oamenii le " -"întreabă este „cât de repede este I2P?â€,\n" -"È™i nimeni nu pare să-i placă răspunsul - „depindeâ€. După ce am încercat " -"I2P,\n" -"următorul lucru pe care îl întreabă este „se va face mai repede?â€, iar " -"răspunsul la acesta este cel mai mult\n" -"empatic <b>da</b>." +msgstr "Probabil unul dintre cele mai frecvente lucruri pe care oamenii le întreabă este „cât de repede este I2P?â€,\nÈ™i nimeni nu pare să-i placă răspunsul - „depindeâ€. După ce am încercat I2P,\nurmătorul lucru pe care îl întreabă este „se va face mai repede?â€, iar răspunsul la acesta este cel mai mult\nempatic <b>da</b>." #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." -msgstr "" -"I2P este o reÈ›ea dinamică completă. Fiecare client este cunoscut altor " -"noduri È™i testează nodurile cunoscute locale pentru accesibilitate È™i " -"capacitate.\n" -"Doar nodurile accesibile È™i capabile sunt salvate într-un NetDB local (în" -" general, este doar o porÈ›iune a reÈ›elei, aproximativ 500-1000).\n" -"Când I2P construieÈ™te tuneluri, selectează cea mai bună resursă din acest" -" pool. De exemplu, un mic subset de 20-50 de noduri sunt disponibile " -"numai pentru a construi tunele cu.\n" -"Deoarece testarea se întâmplă în fiecare minut, grupul de noduri folosite" -" se schimbă în fiecare minut.\n" -"Fiecare nod I2P cunoaÈ™te o parte diferită a plasei, ceea ce înseamnă că " -"fiecare router are un set diferit de noduri I2P pentru a fi utilizate " -"pentru tuneluri.\n" -"Chiar dacă două routere au acelaÈ™i subset de noduri cunoscute, testele " -"privind accesibilitatea È™i capacitatea vor arăta probabil rezultate " -"diferite, deoarece celelalte routere ar putea fi sub sarcină la fel ca " -"testele unui router, dar să fie gratuite dacă al doilea test de router." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." +msgstr "I2P este o reÈ›ea dinamică completă. Fiecare client este cunoscut altor noduri È™i testează nodurile cunoscute locale pentru accesibilitate È™i capacitate.\nDoar nodurile accesibile È™i capabile sunt salvate într-un NetDB local (în general, este doar o porÈ›iune a reÈ›elei, aproximativ 500-1000).\nCând I2P construieÈ™te tuneluri, selectează cea mai bună resursă din acest pool. De exemplu, un mic subset de 20-50 de noduri sunt disponibile numai pentru a construi tunele cu.\nDeoarece testarea se întâmplă în fiecare minut, grupul de noduri folosite se schimbă în fiecare minut.\nFiecare nod I2P cunoaÈ™te o parte diferită a plasei, ceea ce înseamnă că fiecare router are un set diferit de noduri I2P pentru a fi utilizate pentru tuneluri.\nChiar dacă două routere au acelaÈ™i subset de noduri cunoscute, testele privind accesibilitatea È™i capacitatea vor arăta probabil rezultate diferite, deoarece celelalte routere ar putea fi sub sarcină la fel ca testele unui router, dar să fie gratuite dacă al doilea test de router." #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." -msgstr "" -"Cele de mai sus descriu de ce fiecare nod I2P are noduri diferite pentru " -"a construi tuneluri.\n" -"Deoarece fiecare nod I2P are o latență È™i o bandă diferită, tunelurile " -"(care sunt construite prin acele noduri) au valori diferite de latență È™i" -" de lățime de bandă.\n" -"Și pentru că fiecare nod I2P are tuneluri diferite construite, nu există " -"două noduri I2P nu au aceleaÈ™i seturi de tunel." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." +msgstr "Cele de mai sus descriu de ce fiecare nod I2P are noduri diferite pentru a construi tuneluri.\nDeoarece fiecare nod I2P are o latență È™i o bandă diferită, tunelurile (care sunt construite prin acele noduri) au valori diferite de latență È™i de lățime de bandă.\nȘi pentru că fiecare nod I2P are tuneluri diferite construite, nu există două noduri I2P nu au aceleaÈ™i seturi de tunel." #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." -msgstr "" -"Un server / client este cunoscut sub numele de „destinaÈ›ie†și fiecare " -"destinaÈ›ie are cel puÈ›in un tun de intrare È™i unul de ieÈ™ire. Valoarea " -"implicită este de 3 hamei pe tunel.\n" -"Aceasta adaugă până la 12 hamei (de asemenea 12 noduri I2P diferite) " -"pentru un roundtrip complet client-server-client ." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." +msgstr "Un server / client este cunoscut sub numele de „destinaÈ›ie†și fiecare destinaÈ›ie are cel puÈ›in un tun de intrare È™i unul de ieÈ™ire. Valoarea implicită este de 3 hamei pe tunel.\nAceasta adaugă până la 12 hamei (de asemenea 12 noduri I2P diferite) pentru un roundtrip complet client-server-client ." #: i2p2www/pages/site/about/performance/index.html:34 msgid "" "Each data package is sent through 6 other I2P nodes until it reaches the " "server:" -msgstr "" -"Fiecare pachet de date este trimis prin 6 alte noduri I2P până când " -"ajunge la server:" +msgstr "Fiecare pachet de date este trimis prin 6 alte noduri I2P până când ajunge la server:" #: i2p2www/pages/site/about/performance/index.html:40 msgid "and on way back 6 different I2P nodes:" @@ -2748,182 +2085,62 @@ msgstr "È™i la întoarcere 6 noduri I2P diferite:" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." -msgstr "" -"Deoarece majoritatea traficului pe I2P (www, torrent, ...) au nevoie de " -"pachete ack până când sunt trimise date noi, trebuie să aÈ™tepte până când" -" un pachet ack se întoarce de pe server.\n" -"ÃŽn final: trimiteÈ›i date, aÈ™teptaÈ›i ack, trimiteÈ›i mai multe date, " -"aÈ™teptaÈ›i ack, ..\n" -"Pe măsură ce RTT (RoundTripTime) se adaugă din latenÈ›a fiecărui nod I2P " -"individual È™i a fiecărei conexiuni de pe acest roundtrip, durează de " -"obicei 1-3 secunde până când un pachet ack revine clientului.\n" -"Cu unele interne ale transportului TCP È™i I2P, un pachet de date are o " -"dimensiune limitată È™i nu poate fi la fel de mare pe cât ne dorim.\n" -"ÃŽmpreună, aceste condiÈ›ii stabilesc o limită de lățime de bandă maximă pe" -" tunel de 20-50 kbyte / sec.\n" -"Dar, dacă NUMAI UN singur salt în tunel are doar o lățime de bandă de 5 " -"kb / sec pentru a cheltui, întregul tunel este limitat la 5 kb / sec, " -"independent de\n" -"latenÈ›a È™i alte limitări." +msgstr "Deoarece majoritatea traficului pe I2P (www, torrent, ...) au nevoie de pachete ack până când sunt trimise date noi, trebuie să aÈ™tepte până când un pachet ack se întoarce de pe server.\nÃŽn final: trimiteÈ›i date, aÈ™teptaÈ›i ack, trimiteÈ›i mai multe date, aÈ™teptaÈ›i ack, ..\nPe măsură ce RTT (RoundTripTime) se adaugă din latenÈ›a fiecărui nod I2P individual È™i a fiecărei conexiuni de pe acest roundtrip, durează de obicei 1-3 secunde până când un pachet ack revine clientului.\nCu unele interne ale transportului TCP È™i I2P, un pachet de date are o dimensiune limitată È™i nu poate fi la fel de mare pe cât ne dorim.\nÃŽmpreună, aceste condiÈ›ii stabilesc o limită de lățime de bandă maximă pe tunel de 20-50 kbyte / sec.\nDar, dacă NUMAI UN singur salt în tunel are doar o lățime de bandă de 5 kb / sec pentru a cheltui, întregul tunel este limitat la 5 kb / sec, independent de\nlatenÈ›a È™i alte limitări." #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." -msgstr "" -"Datorită criptării utilizate È™i a altor setări în I2P (cum să construiÈ›i " -"tuneluri, latență, ...), este destul de scump în timpul procesorului să " -"construiÈ›i un tunel. Aceasta este\n" -"de ce o destinaÈ›ie este permisă doar să aibă maxim 6 tunele IN È™i 6 OUT " -"pentru a transporta date. Cu un maxim de 50 kb / sec pe tunel, o " -"destinaÈ›ie ar putea\n" -"utilizaÈ›i aproximativ 300 kb / sec trafic combinat (în realitate ar putea" -" fi mai mult dacă sunt utilizate tuneluri mai scurte cu anonimat scăzut " -"sau nu există).\n" -"Tunelurile folosite sunt aruncate la fiecare 10 minute È™i sunt construite" -" altele noi.\n" -"Această schimbare a tunelurilor (È™i uneori a clienÈ›ilor care se închid " -"din greu datorită utilizării „închise simultan†sau a situaÈ›iilor în care" -" există pierderi de energie)\n" -"uneori rupe tuneluri È™i conexiuni, aÈ™a cum se vede în reÈ›eaua IRC2P în " -"pierderea conexiunii (ping timeout) sau pornit atunci când utilizaÈ›i " -"eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." +msgstr "Datorită criptării utilizate È™i a altor setări în I2P (cum să construiÈ›i tuneluri, latență, ...), este destul de scump în timpul procesorului să construiÈ›i un tunel. Aceasta este\nde ce o destinaÈ›ie este permisă doar să aibă maxim 6 tunele IN È™i 6 OUT pentru a transporta date. Cu un maxim de 50 kb / sec pe tunel, o destinaÈ›ie ar putea\nutilizaÈ›i aproximativ 300 kb / sec trafic combinat (în realitate ar putea fi mai mult dacă sunt utilizate tuneluri mai scurte cu anonimat scăzut sau nu există).\nTunelurile folosite sunt aruncate la fiecare 10 minute È™i sunt construite altele noi.\nAceastă schimbare a tunelurilor (È™i uneori a clienÈ›ilor care se închid din greu datorită utilizării „închise simultan†sau a situaÈ›iilor în care există pierderi de energie)\nuneori rupe tuneluri È™i conexiuni, aÈ™a cum se vede în reÈ›eaua IRC2P în pierderea conexiunii (ping timeout) sau pornit atunci când utilizaÈ›i eepget." #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." -msgstr "" -"Cu un set limitat de destinaÈ›ii È™i un set limitat de tunele pe " -"destinaÈ›ie, un nod I2P foloseÈ™te doar un set limitat de tuneluri pe alte " -"noduri I2P.\n" -"De exemplu, dacă un nod I2P este \"hop1\" în exemplul mic de mai sus, vom" -" vedea doar 1 tunel participant provenind de la client.\n" -"Dacă însumăm întreaga reÈ›ea I2P, numai un număr destul de limitat de " -"tunele participante ar putea fi construite cu o cantitate limitată de " -"lățime de bandă împreună.\n" -"Dacă se distribuie aceste numere limitate între numărul de noduri I2P, " -"există doar o fracÈ›iune de lățime de bandă / capacitate disponibilă " -"pentru utilizare." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." +msgstr "Cu un set limitat de destinaÈ›ii È™i un set limitat de tunele pe destinaÈ›ie, un nod I2P foloseÈ™te doar un set limitat de tuneluri pe alte noduri I2P.\nDe exemplu, dacă un nod I2P este \"hop1\" în exemplul mic de mai sus, vom vedea doar 1 tunel participant provenind de la client.\nDacă însumăm întreaga reÈ›ea I2P, numai un număr destul de limitat de tunele participante ar putea fi construite cu o cantitate limitată de lățime de bandă împreună.\nDacă se distribuie aceste numere limitate între numărul de noduri I2P, există doar o fracÈ›iune de lățime de bandă / capacitate disponibilă pentru utilizare." #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." -msgstr "" -"Pentru a rămâne anonim un router nu trebuie utilizat de întreaga reÈ›ea " -"pentru construirea de tuneluri.\n" -"Dacă un router acÈ›ionează ca un router tunel pentru TOATE nodurile I2P, " -"acesta devine un punct central de eÈ™ec foarte real, precum È™i un punct " -"central pentru a apuca IP-uri È™i date de la clienÈ›i. Acest lucru nu este " -"bun.\n" -"I2P încearcă să răspândească încărcarea pe o mulÈ›ime de noduri I2P din " -"acest motiv." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." +msgstr "Pentru a rămâne anonim un router nu trebuie utilizat de întreaga reÈ›ea pentru construirea de tuneluri.\nDacă un router acÈ›ionează ca un router tunel pentru TOATE nodurile I2P, acesta devine un punct central de eÈ™ec foarte real, precum È™i un punct central pentru a apuca IP-uri È™i date de la clienÈ›i. Acest lucru nu este bun.\nI2P încearcă să răspândească încărcarea pe o mulÈ›ime de noduri I2P din acest motiv." #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." -msgstr "" -"Un alt punct este reÈ›eaua de plasă completă. Fiecare conexiune hop-hop " -"utilizează o conexiune TCP sau UDP pe nodurile I2P. Cu 1000 de conexiuni," -" se vede\n" -"1000 de conexiuni TCP. Acest lucru este destul de mult, iar unele routere" -" de birou pentru casă È™i pentru birouri mici (DSL, cablu, ..) permit doar" -" un număr mic de conexiuni (sau pur È™i simplu înnebuniÈ›i dacă utilizaÈ›i " -"mai mult de conexiuni X).\n" -"I2P încearcă să limiteze aceste conexiuni pentru a fi sub 1500 per UDP È™i" -" per tip TCP.\n" -"Acest lucru limitează È™i cantitatea de trafic parcursă pe nodul dvs. I2P." +msgstr "Un alt punct este reÈ›eaua de plasă completă. Fiecare conexiune hop-hop utilizează o conexiune TCP sau UDP pe nodurile I2P. Cu 1000 de conexiuni, se vede\n1000 de conexiuni TCP. Acest lucru este destul de mult, iar unele routere de birou pentru casă È™i pentru birouri mici (DSL, cablu, ..) permit doar un număr mic de conexiuni (sau pur È™i simplu înnebuniÈ›i dacă utilizaÈ›i mai mult de conexiuni X).\nI2P încearcă să limiteze aceste conexiuni pentru a fi sub 1500 per UDP È™i per tip TCP.\nAcest lucru limitează È™i cantitatea de trafic parcursă pe nodul dvs. I2P." #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." -msgstr "" -"ÃŽn rezumat, I2P este foarte complex È™i nu există o modalitate uÈ™oară de a" -" identifica de ce nodul dvs. nu este utilizat.\n" -"Dacă nodul dvs. este accesibil È™i are o setare de lățime de bandă> 128 " -"kbyte / sec partajată È™i este accesibil 24/7, ar trebui să fie utilizat " -"după ceva timp pentru traficul participant.\n" -"Dacă este în intervalul intermediar, testarea nodului dvs. I2P efectuată " -"de alÈ›i noduri le va spune: nu sunteÈ›i accesibil. Acest lucru vă " -"blochează cel puÈ›in nodul\n" -"24h pe alte noduri. Deci, celelalte noduri care v-au testat în jos nu vă " -"vor folosi nodul pentru 24 de ore pentru construirea de tuneluri. Acesta " -"este motivul pentru care traficul dvs. va\n" -"fiÈ›i mai jos după o repornire / oprire pentru cel puÈ›in 24 de ore." +msgstr "ÃŽn rezumat, I2P este foarte complex È™i nu există o modalitate uÈ™oară de a identifica de ce nodul dvs. nu este utilizat.\nDacă nodul dvs. este accesibil È™i are o setare de lățime de bandă> 128 kbyte / sec partajată È™i este accesibil 24/7, ar trebui să fie utilizat după ceva timp pentru traficul participant.\nDacă este în intervalul intermediar, testarea nodului dvs. I2P efectuată de alÈ›i noduri le va spune: nu sunteÈ›i accesibil. Acest lucru vă blochează cel puÈ›in nodul\n24h pe alte noduri. Deci, celelalte noduri care v-au testat în jos nu vă vor folosi nodul pentru 24 de ore pentru construirea de tuneluri. Acesta este motivul pentru care traficul dvs. va\nfiÈ›i mai jos după o repornire / oprire pentru cel puÈ›in 24 de ore." #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." -msgstr "" -"De asemenea: alte noduri I2P trebuie să-È›i cunoască routerul I2P pentru " -"a-l testa pentru disponibilitate È™i capacitate. Este nevoie de timp " -"pentru ca alte noduri să fie cunoscute de nodul dvs.\n" -"Va fi mai rapid dacă utilizaÈ›i I2P È™i construiÈ›i mai multe tuneluri, de " -"ex. folosiÈ›i un torrent sau www de ceva timp." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." +msgstr "De asemenea: alte noduri I2P trebuie să-È›i cunoască routerul I2P pentru a-l testa pentru disponibilitate È™i capacitate. Este nevoie de timp pentru ca alte noduri să fie cunoscute de nodul dvs.\nVa fi mai rapid dacă utilizaÈ›i I2P È™i construiÈ›i mai multe tuneluri, de ex. folosiÈ›i un torrent sau www de ceva timp." #: i2p2www/pages/site/about/performance/index.html:99 msgid "Performance Improvements" @@ -2934,7 +2151,4 @@ msgstr "Imbunatatiri ale performantei" msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." -msgstr "" -"Pentru posibile îmbunătățiri viitoare a performanÈ›ei, a se vedea\n" -"<a href=\"%(future)s\">ÃŽmbunătățirile viitoare ale performanÈ›ei</a>." - +msgstr "Pentru posibile îmbunătățiri viitoare a performanÈ›ei, a se vedea\n<a href=\"%(future)s\">ÃŽmbunătățirile viitoare ale performanÈ›ei</a>." diff --git a/i2p2www/translations/ro/LC_MESSAGES/blog.po b/i2p2www/translations/ro/LC_MESSAGES/blog.po index 1a7be8cabe41b361b11ec42f2993e6be6b109e19..2eae4c9ae401467d82b0e6f2cbfc45428e06e9c2 100644 --- a/i2p2www/translations/ro/LC_MESSAGES/blog.po +++ b/i2p2www/translations/ro/LC_MESSAGES/blog.po @@ -1,23 +1,23 @@ -# Romanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Predator <Predator@windowslive.com>, 2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: Inpresentia I.\n" +"POT-Creation-Date: 2021-10-11 16:26+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Predator <Predator@windowslive.com>, 2017\n" "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n" -"Plural-Forms: nplurals=3; " -"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ro\n" +"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n" #: i2p2www/blog/2011/10/11/0.8.9-Release.rst:24 #: i2p2www/blog/2011/10/20/0.8.10-Release.rst:11 @@ -90,6 +90,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:33 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:33 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:45 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:35 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:34 msgid "RELEASE DETAILS" msgstr "" @@ -161,6 +163,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:49 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:51 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:64 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:51 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:43 msgid "Bug Fixes" msgstr "" @@ -222,6 +226,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:62 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:65 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:76 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:74 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:52 msgid "Other" msgstr "Altul" @@ -284,6 +290,8 @@ msgstr "Altul" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:76 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:93 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:97 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:94 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:66 msgid "SHA256 Checksums:" msgstr "" @@ -314,11 +322,11 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:8 #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:10 msgid "" -"0.9.2 includes extensive low-level changes to improve the performance and" -" efficiency of the router. We have updated our UPnP library, to hopefully" -" make UPnP work for more people. I2PSnark now has DHT support, but it is " -"not yet enabled by default, as we plan to do more testing during the " -"upcoming 0.9.3 development cycle." +"0.9.2 includes extensive low-level changes to improve the performance and " +"efficiency of the router. We have updated our UPnP library, to hopefully " +"make UPnP work for more people. I2PSnark now has DHT support, but it is not " +"yet enabled by default, as we plan to do more testing during the upcoming " +"0.9.3 development cycle." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:13 @@ -330,8 +338,8 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:27 msgid "" -"SSU: Fix several problems in our UDP transport, to improve efficiency and" -" reliability for connection setup. Also improve defenses against various " +"SSU: Fix several problems in our UDP transport, to improve efficiency and " +"reliability for connection setup. Also improve defenses against various " "types of bad input." msgstr "" @@ -349,9 +357,9 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:30 msgid "" -"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered " -"are now much more flexible, which should lessen protocol overhead and " -"reduce stalls caused by dropped tags." +"Crypto: The thresholds and number of ElGamal/AES Session Tags delivered are " +"now much more flexible, which should lessen protocol overhead and reduce " +"stalls caused by dropped tags." msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:31 @@ -362,16 +370,18 @@ msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:35 msgid "" -"Fix various issues affecting memory usage and performance on high-" -"bandwidth routers" +"Fix various issues affecting memory usage and performance on high-bandwidth " +"routers" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:36 -msgid "Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" +msgid "" +"Fix problems in UDP for routers using a reduced-MTU connection, e.g. a VPN" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:37 -msgid "Fix i2psnark bug that prevented a completion announcement to the tracker" +msgid "" +"Fix i2psnark bug that prevented a completion announcement to the tracker" msgstr "" #: i2p2www/blog/2012/09/21/0.9.2-Release.rst:38 @@ -458,14 +468,14 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:8 #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:10 msgid "" -"0.9.3 includes extensive low-level changes to the queueing of messages in" -" the router. We implement the CoDel Active Queue Management (AQM) " -"algorithm. We also unify the queueing and priority mechanisms in the " -"transports to aid diagnosis and reduce network latency. Work continues " -"on fixing UDP transport bugs and making UDP more resistant to attacks. " -"There are more changes to improve the performance of the router and " -"reduce its memory usage. Also, we enable i2psnark's DHT support, " -"introduced last release, by default." +"0.9.3 includes extensive low-level changes to the queueing of messages in " +"the router. We implement the CoDel Active Queue Management (AQM) algorithm." +" We also unify the queueing and priority mechanisms in the transports to " +"aid diagnosis and reduce network latency. Work continues on fixing UDP " +"transport bugs and making UDP more resistant to attacks. There are more " +"changes to improve the performance of the router and reduce its memory " +"usage. Also, we enable i2psnark's DHT support, introduced last release, by " +"default." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:27 @@ -483,8 +493,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:33 msgid "" "Several SSU fixes including memory leak, and better handling of routers " -"behind firewalls that change UDP ports; additional defenses for malicious" -" packets." +"behind firewalls that change UDP ports; additional defenses for malicious " +"packets." msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:34 @@ -509,9 +519,8 @@ msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:42 msgid "" -"Fix streaming connection timeout back to 1 minute, was inadvertently " -"changed to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was" -" unlimited" +"Fix streaming connection timeout back to 1 minute, was inadvertently changed" +" to 5 minutes; set i2ptunnel server read timeout to 5 minutes, was unlimited" msgstr "" #: i2p2www/blog/2012/10/27/0.9.3-Release.rst:43 @@ -567,28 +576,24 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:8 #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:10 msgid "" -"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, " -"that was reducing network performance and reliability. It also includes " -"major changes in the in-network update system, and adds the capability to" -" update via in-network torrents." +"0.9.4 includes a fix for a network capacity bug, introduced in 0.9.2, that " +"was reducing network performance and reliability. It also includes major " +"changes in the in-network update system, and adds the capability to update " +"via in-network torrents." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:14 msgid "" -"We fixed several bugs in the i2psnark DHT implementation that was " -"introduced\n" +"We fixed several bugs in the i2psnark DHT implementation that was introduced\n" "last release. For those of you using console or http proxy passwords,\n" -"we converted to the more-secure digest method and improved the security " -"for console forms." +"we converted to the more-secure digest method and improved the security for console forms." msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:20 msgid "" -"For those of you already running development builds, your router should " -"automatically\n" +"For those of you already running development builds, your router should automatically\n" "update to 0.9.4-0 using the new in-network torrent facility.\n" -"For those running 0.9.3-0, you will update normally using in-network " -"HTTP, and\n" +"For those running 0.9.3-0, you will update normally using in-network HTTP, and\n" "we will have more information for you when we release 0.9.5." msgstr "" @@ -604,12 +609,13 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:42 msgid "" -"Fix major bug that reduced SSU connection limits which reduced tunnel " -"build success rates" +"Fix major bug that reduced SSU connection limits which reduced tunnel build " +"success rates" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:43 -msgid "Fix bug with external I2CP that prevented some external apps from working" +msgid "" +"Fix bug with external I2CP that prevented some external apps from working" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:44 @@ -642,8 +648,7 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:54 msgid "" -"More performance improvements, memory reduction, and object churn " -"reduction" +"More performance improvements, memory reduction, and object churn reduction" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:55 @@ -660,15 +665,15 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:58 msgid "" -"Convert http proxy and console from basic to digest authentication for " -"added security" +"Convert http proxy and console from basic to digest authentication for added" +" security" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:59 msgid "" "Improved verification of console form submissions, using jsp sessions. " -"Cookies may now be required on forms, except when the console password is" -" enabled" +"Cookies may now be required on forms, except when the console password is " +"enabled" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:60 @@ -687,8 +692,8 @@ msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:63 msgid "" -"Translation updates: Chinese, French, German, Italian, Polish, " -"Portuguese, Swedish, and Ukrainian" +"Translation updates: Chinese, French, German, Italian, Polish, Portuguese, " +"Swedish, and Ukrainian" msgstr "" #: i2p2www/blog/2012/12/17/0.9.4-Release.rst:65 @@ -706,24 +711,21 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:8 #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:10 msgid "" -"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities" -" that are being investigated by researchers at UCSB. We continue to work " -"with them on additional improvements. This is a good opportunity to " -"remind the community that while our network continues to grow rapidly, it" -" is still relatively small. There may be multiple weaknesses or bugs that" -" could compromise your anonymity. Help us grow the network by spreading " -"the word and contributing where you can." +"0.9.5 includes bug fixes and defenses for some issues and vulnerabilities " +"that are being investigated by researchers at UCSB. We continue to work with" +" them on additional improvements. This is a good opportunity to remind the " +"community that while our network continues to grow rapidly, it is still " +"relatively small. There may be multiple weaknesses or bugs that could " +"compromise your anonymity. Help us grow the network by spreading the word " +"and contributing where you can." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:14 #, python-format msgid "" -"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers " -"running a\n" -"development build) will attempt to update via the experimental in-network" -" bittorrent\n" -"with i2psnark. If this doesn't work, it should fall back to standard in-" -"network HTTP update." +"In this upgrade cycle, a random 1%(pc)s of routers, (plus all routers running a\n" +"development build) will attempt to update via the experimental in-network bittorrent\n" +"with i2psnark. If this doesn't work, it should fall back to standard in-network HTTP update." msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:28 @@ -768,8 +770,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:39 msgid "" -"Encrypt database lookup messages end-to-end when sent through exploratory" -" tunnels" +"Encrypt database lookup messages end-to-end when sent through exploratory " +"tunnels" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:40 @@ -814,8 +816,8 @@ msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:53 msgid "" -"Translation updates: French, German, Hungarian, Italian, Norwegian, " -"Polish, Portuguese, Russian, Swedish" +"Translation updates: French, German, Hungarian, Italian, Norwegian, Polish, " +"Portuguese, Russian, Swedish" msgstr "" #: i2p2www/blog/2013/03/08/0.9.5-Release.rst:55 @@ -830,17 +832,15 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:10 msgid "" "0.9.6 includes bug fixes and an update from Jetty 6.1.26 (2010-11-10) to " -"Jetty 7.6.10 (2013-03-12). See below for important information on the " -"Jetty update. The Jetty 7 series is actively maintained and we plan to " -"stay current with it in future I2P releases." +"Jetty 7.6.10 (2013-03-12). See below for important information on the Jetty " +"update. The Jetty 7 series is actively maintained and we plan to stay " +"current with it in future I2P releases." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:14 msgid "" -"Most users will update via HTTP. Those running development builds will " -"attempt to update via the\n" -"experimental in-network bittorrent with i2psnark. We've fixed some bugs " -"that will enable more users\n" +"Most users will update via HTTP. Those running development builds will attempt to update via the\n" +"experimental in-network bittorrent with i2psnark. We've fixed some bugs that will enable more users\n" "to update via torrent in the 0.9.7 update cycle." msgstr "" @@ -850,12 +850,9 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:28 msgid "" -"If you first installed I2P with version 0.9.5, on Windows only, we " -"recommend that you follow the\n" -"following instructions to fix your eepsite location **before** you update" -" to 0.9.6.\n" -"Only original installations of 0.9.5-0 on Windows are affected by this " -"issue. If your router version\n" +"If you first installed I2P with version 0.9.5, on Windows only, we recommend that you follow the\n" +"following instructions to fix your eepsite location **before** you update to 0.9.6.\n" +"Only original installations of 0.9.5-0 on Windows are affected by this issue. If your router version\n" "is 0.9.5-0-win1, you already have the fix and need not take any action." msgstr "" @@ -869,36 +866,29 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:43 msgid "" -"For most people, the update should just work. If you have multiple Jetty " -"eepsites,\n" -"OR have made changes to jetty.xml or other Jetty configuration files, " -"including changing the port\n" +"For most people, the update should just work. If you have multiple Jetty eepsites,\n" +"OR have made changes to jetty.xml or other Jetty configuration files, including changing the port\n" "from 7658, you MUST take manual action AFTER updating." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:49 msgid "" -"After update, the router will migrate your jetty.xml files to the new " -"Jetty 7 format." +"After update, the router will migrate your jetty.xml files to the new Jetty " +"7 format." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:51 msgid "" -"The migration resets the port to 7658. If you have more than one Jetty " -"eepsite, OR your eepsite\n" -" is NOT on port 7658, OR you have made other modifications to jetty.xml " -"(for example changing the\n" -" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml " -"file for each eepsite to fix them up\n" +"The migration resets the port to 7658. If you have more than one Jetty eepsite, OR your eepsite\n" +" is NOT on port 7658, OR you have made other modifications to jetty.xml (for example changing the\n" +" listen address from 127.0.0.1 to 0.0.0.0), you MUST edit the jetty.xml file for each eepsite to fix them up\n" " after updating, and restart again." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:56 msgid "" -"**The following files will be backed up with a ".jetty6" suffix" -" and then migrated.**\n" -"If you have made local changes, you may have to edit them manually and " -"restart.\n" +"**The following files will be backed up with a ".jetty6" suffix and then migrated.**\n" +"If you have made local changes, you may have to edit them manually and restart.\n" "See http://wiki.eclipse.org/Jetty for assistance in configuring Jetty 7." msgstr "" @@ -917,7 +907,8 @@ msgid "" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:78 -msgid "If a plugin does not work, please contact the maintainer for that plugin." +msgid "" +"If a plugin does not work, please contact the maintainer for that plugin." msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:84 @@ -946,14 +937,14 @@ msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:90 msgid "" -"Ignore unsupported IPs in RouterInfos when selecting an address (prep for" -" IPv6)" +"Ignore unsupported IPs in RouterInfos when selecting an address (prep for " +"IPv6)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:91 msgid "" -"Ignore unused option bits in Database Lookup Message (prep for requesting" -" encrypted response)" +"Ignore unused option bits in Database Lookup Message (prep for requesting " +"encrypted response)" msgstr "" #: i2p2www/blog/2013/05/28/0.9.6-Release.rst:92 @@ -1023,31 +1014,24 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:12 msgid "" -"For the first time, class 'N' routers (those with a minimumum of 128 " -"KBytes/sec of shared bandwidth)\n" -"will automatically become floodfill (previously it was only 'O' routers " -"with 256 KBps). This will\n" -"increase the floodfill population for additional resistance to certain " -"attacks (see below). Floodfill routers\n" -"don't consume much additional bandwidth, but they do tend to use " -"additional memory and concurrent\n" -"connections. If you do not wish your router to become floodfill, set the " -"advanced configuration\n" +"For the first time, class 'N' routers (those with a minimumum of 128 KBytes/sec of shared bandwidth)\n" +"will automatically become floodfill (previously it was only 'O' routers with 256 KBps). This will\n" +"increase the floodfill population for additional resistance to certain attacks (see below). Floodfill routers\n" +"don't consume much additional bandwidth, but they do tend to use additional memory and concurrent\n" +"connections. If you do not wish your router to become floodfill, set the advanced configuration\n" "router.floodfillParticipant=false ." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:21 #, python-format msgid "" -"As we think the last release fixed the experimental update-via-torrent " -"bugs, 3%(pc)s of routers should\n" +"As we think the last release fixed the experimental update-via-torrent bugs, 3%(pc)s of routers should\n" "update over in-network bittorrent this cycle." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:26 msgid "" -"Plugin update checks, possibly broken for several releases, are fixed. " -"Your plugins should once again\n" +"Plugin update checks, possibly broken for several releases, are fixed. Your plugins should once again\n" "auto-update after updating the router." msgstr "" @@ -1059,17 +1043,12 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:35 msgid "" -"This release contains additional mitigations for the `\"practical " -"attacks\" paper`__.\n" -"However, we have a lot more work to do to resist Sybil attacks on the " -"floodfills, and resist\n" +"This release contains additional mitigations for the `\"practical attacks\" paper`__.\n" +"However, we have a lot more work to do to resist Sybil attacks on the floodfills, and resist\n" "traffic analysis at the gateways and endpoints of exploratory tunnels.\n" -"It's a good reminder for everybody that our network is still relatively " -"small and vulnerable.\n" -"We don't currently recommend any uses that would put anybody in serious " -"jeopardy.\n" -"We'll keep working to improve it... please keep working to spread the " -"word. A bigger network is a better network." +"It's a good reminder for everybody that our network is still relatively small and vulnerable.\n" +"We don't currently recommend any uses that would put anybody in serious jeopardy.\n" +"We'll keep working to improve it... please keep working to spread the word. A bigger network is a better network." msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:48 @@ -1114,8 +1093,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:60 msgid "" -"Fix i2psnark bug that changed the infohash of torrents created by Robert " -"and fetched via magnet link" +"Fix i2psnark bug that changed the infohash of torrents created by Robert and" +" fetched via magnet link" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:61 @@ -1150,8 +1129,8 @@ msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:71 msgid "" -"Individual expiration times in leases, for efficiency on destinations " -"with a high number of tunnels" +"Individual expiration times in leases, for efficiency on destinations with a" +" high number of tunnels" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:72 @@ -1167,7 +1146,8 @@ msgid "Tomcat 6.0.37" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:75 -msgid "Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" +msgid "" +"Translation updates: Chinese, French, German, Portuguese, Russian, Spanish" msgstr "" #: i2p2www/blog/2013/07/15/0.9.7-Release.rst:76 @@ -1185,12 +1165,11 @@ msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:8 #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:10 msgid "" -"This unscheduled release disables the RouterInfo verification messages " -"that were used in the attack published in the UCSB paper, which should " -"make correlating a LeaseSet and a Router much more difficult. We have " -"also included a limited number of other fixes listed below. Our 0.9.8 " -"release, which will include IPv6 support, is still on-schedule for late " -"September." +"This unscheduled release disables the RouterInfo verification messages that " +"were used in the attack published in the UCSB paper, which should make " +"correlating a LeaseSet and a Router much more difficult. We have also " +"included a limited number of other fixes listed below. Our 0.9.8 release, " +"which will include IPv6 support, is still on-schedule for late September." msgstr "" #: i2p2www/blog/2013/08/10/0.9.7.1-Release.rst:12 @@ -1240,16 +1219,17 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:8 #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:10 msgid "" -"0.9.8 includes the long-awaited support for IPv6. It's enabled by " -"default, but of course you need a public IPv6 address to use it. " -"Configuration is on the 'network' configuration tab in your console. We " -"also have anonymity improvements including padding of SSU packets and " -"longer router private keys." +"0.9.8 includes the long-awaited support for IPv6. It's enabled by default, " +"but of course you need a public IPv6 address to use it. Configuration is on " +"the 'network' configuration tab in your console. We also have anonymity " +"improvements including padding of SSU packets and longer router private " +"keys." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:12 #, python-format -msgid "30%(pc)s of you will update via in-network torrent in this update cycle." +msgid "" +"30%(pc)s of you will update via in-network torrent in this update cycle." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:14 @@ -1258,41 +1238,30 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:16 msgid "" -"IPv6 is enabled and preferred by default. If you have a public IPv6 " -"address \n" -"and you are connecting to another router with a published IPv6 address, " -"it will \n" -"connect via IPv6. There is a new IPv6 configuration section on /confignet" -" in \n" +"IPv6 is enabled and preferred by default. If you have a public IPv6 address \n" +"and you are connecting to another router with a published IPv6 address, it will \n" +"connect via IPv6. There is a new IPv6 configuration section on /confignet in \n" "the router console. If IPv6 is causing problems you may disable it there." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:23 msgid "" "As a part of the IPv6 development effort, I2P now supports multiple \n" -"published IP addresses. If you have multiple public IP addresses (IPv4, " -"IPv6, \n" -"or both), you may enable or disable them individually on /confignet. The" -" \n" -"default is to use the first IPv4 and IPv6 addresses it discovers. If you " -"have \n" -"multiple addresses you should review the configuration on /confignet and " -"adjust \n" +"published IP addresses. If you have multiple public IP addresses (IPv4, IPv6, \n" +"or both), you may enable or disable them individually on /confignet. The \n" +"default is to use the first IPv4 and IPv6 addresses it discovers. If you have \n" +"multiple addresses you should review the configuration on /confignet and adjust \n" "it if necessary.\n" -"Note that while you may enable multiple IPv4 and IPv6 addresses on " -"/confignet,\n" +"Note that while you may enable multiple IPv4 and IPv6 addresses on /confignet,\n" "we recommend that you use only one IPv4 and one IPv6 address. There are\n" "bugs still to be fixed with multiple addresses of each type." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:35 msgid "" -"While IPv6 support was designed and developed over several years, it has" -" \n" -"only been tested by a limited number of users and is still beta. If you " -"do have \n" -"a public IPv6 address, please monitor your router and the logs for " -"problems, \n" +"While IPv6 support was designed and developed over several years, it has \n" +"only been tested by a limited number of users and is still beta. If you do have \n" +"a public IPv6 address, please monitor your router and the logs for problems, \n" "and disable it necessary. Please report any bugs on \n" "http://trac.i2p2.i2p." msgstr "" @@ -1303,26 +1272,19 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:45 msgid "" -"For those of you running I2P on faster hardware (generally, 64-bit x86) " -"the \n" -"router will generate a new identity using longer keys. This will " -"substantially \n" -"reduce your participating traffic for 48 hours or more, while your router" -" \n" -"re-integrates into the network. Due to the new keys, the large number of" -" \n" +"For those of you running I2P on faster hardware (generally, 64-bit x86) the \n" +"router will generate a new identity using longer keys. This will substantially \n" +"reduce your participating traffic for 48 hours or more, while your router \n" +"re-integrates into the network. Due to the new keys, the large number of \n" "torrent updates, and the recent network growth, we expect substantial \n" -"disruption to the network for a week or more after the update is " -"released. \n" +"disruption to the network for a week or more after the update is released. \n" "Please be patient and things should start to improve after a few days." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:55 msgid "" -"These changes may result in higher CPU usage for some of you. We're doing" -" \n" -"our best to increase efficiency, but stronger security generally requires" -" more \n" +"These changes may result in higher CPU usage for some of you. We're doing \n" +"our best to increase efficiency, but stronger security generally requires more \n" "computation. Performance may also be poor during the first week\n" "due to the network churn.\n" "We will evaluate the network performace before deciding whether to\n" @@ -1331,10 +1293,8 @@ msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:64 msgid "" -"We are experiencing rapid network growth in the last few weeks, which is" -" \n" -"causing a bit of a bumpy ride for some, especially on weekends. However, " -"the \n" +"We are experiencing rapid network growth in the last few weeks, which is \n" +"causing a bit of a bumpy ride for some, especially on weekends. However, the \n" "network is still performing fairly well, so keep spreading the word." msgstr "" @@ -1346,14 +1306,10 @@ msgstr "" msgid "" "We're in the initial stages of desiging major changes to strengthen our \n" "crypto. Stronger crypto will use more CPU and it may possibly \n" -"require a Java 7 JRE at a minimum. We understand your desire to run I2P " -"on low-power \n" -"and/or older hardware. We're working hard to minimize the impacts, but " -"some \n" -"loss of performance is inevitable. In addition, Java 5 and 6 are no " -"longer \n" -"supported by Oracle. Now is a good time to upgrade to Java 7. Any change " -"in \n" +"require a Java 7 JRE at a minimum. We understand your desire to run I2P on low-power \n" +"and/or older hardware. We're working hard to minimize the impacts, but some \n" +"loss of performance is inevitable. In addition, Java 5 and 6 are no longer \n" +"supported by Oracle. Now is a good time to upgrade to Java 7. Any change in \n" "minimum requirements will be announced well in advance." msgstr "" @@ -1380,8 +1336,7 @@ msgid "" "Last weekend, echelon attended the CTS IV conference in Berlin and\n" "psi attended the Tahoe-LAFS hackfest at GNU 30 in Cambridge, Mass.\n" "Several of us will be at 30C3 in Hamburg late this year.\n" -"It's great to see people participating at these events and representing " -"I2P." +"It's great to see people participating at these events and representing I2P." msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:106 @@ -1409,7 +1364,8 @@ msgid "Fix occasional runtime exception in NTCP" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:121 -msgid "Big rework of transport code to accommodate multiple addresses and IPv6" +msgid "" +"Big rework of transport code to accommodate multiple addresses and IPv6" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:122 @@ -1417,13 +1373,14 @@ msgid "Streaming: Improved recovery from lost acks, other fixes" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:123 -msgid "Use Transifex for translation of initial news and HTTP proxy error pages" +msgid "" +"Use Transifex for translation of initial news and HTTP proxy error pages" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:124 msgid "" -"Translation updates: Chinese, French, German, Portuguese, Russian, " -"Swedish, Turkish" +"Translation updates: Chinese, French, German, Portuguese, Russian, Swedish, " +"Turkish" msgstr "" #: i2p2www/blog/2013/09/30/0.9.8-Release.rst:125 @@ -1441,9 +1398,9 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:7 #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:9 msgid "" -"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some " -"people. New installs and non-Windows platforms are not affected, however " -"all platforms will automatically update even if running 0.9.8." +"0.9.8.1 fixes a problem with updating to 0.9.8 on Windows for some people. " +"New installs and non-Windows platforms are not affected, however all " +"platforms will automatically update even if running 0.9.8." msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:11 @@ -1454,10 +1411,8 @@ msgstr "" #: i2p2www/blog/2013/10/02/0.9.8.1-Release.rst:20 msgid "" -"Due to recent attacks, logins are disabled on `Trac`_ and new " -"registrations are\n" -"disabled on `zzz.i2p`_. Until those services are restored, please report " -"all\n" +"Due to recent attacks, logins are disabled on `Trac`_ and new registrations are\n" +"disabled on `zzz.i2p`_. Until those services are restored, please report all\n" "bugs on IRC freenode or IRC2P #i2p-dev." msgstr "" @@ -1470,9 +1425,9 @@ msgstr "" msgid "" "0.9.9 fixes a number of bugs in the netdb, streaming, and i2ptunnel, and " "starts work on a year-long plan to increase the strength of the " -"cryptographic signing algorithms used in the router, and support multiple" -" algorithms and key lengths simultaneously. Automatic update files will " -"now be signed with 4096-bit RSA keys." +"cryptographic signing algorithms used in the router, and support multiple " +"algorithms and key lengths simultaneously. Automatic update files will now " +"be signed with 4096-bit RSA keys." msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:11 @@ -1484,8 +1439,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:18 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release.\n" +"The best way to maintain security and help the network is to run the latest release.\n" "Several members of the I2P team will be at 30C3 in Hamburg this year.\n" "Come say hello and ask for an I2P sticker.\n" "Thanks to everyone for their support this year." @@ -1601,8 +1555,7 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:62 msgid "" -"Extend router info expiration and other changes to reduce load on " -"floodfills" +"Extend router info expiration and other changes to reduce load on floodfills" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:63 @@ -1639,8 +1592,8 @@ msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:71 msgid "" -"Translation updates: French, German, Italian, Romanian, Russian, Spanish," -" Swedish, and others" +"Translation updates: French, German, Italian, Romanian, Russian, Spanish, " +"Swedish, and others" msgstr "" #: i2p2www/blog/2013/12/07/0.9.9-Release.rst:73 @@ -1679,19 +1632,15 @@ msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:26 msgid "" "If you have a large database or an identity you wish to preserve,\n" -"you may wish to back up your entire ~/.syndie directory before you start." -"\n" -"The upgrade process does make its own backup, however you may find it " -"easier to use your own backup if the upgrade fails." +"you may wish to back up your entire ~/.syndie directory before you start.\n" +"The upgrade process does make its own backup, however you may find it easier to use your own backup if the upgrade fails." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:32 msgid "" -"Upgrades from 1.103b may fail for some people due to database corruption " -"due to bugs in the old HSQLDB.\n" +"Upgrades from 1.103b may fail for some people due to database corruption due to bugs in the old HSQLDB.\n" "Unfortunately, we don't know how to fix it.\n" -"Your alternatives are to start over with a clean database, or stay with " -"1.103b forever.\n" +"Your alternatives are to start over with a clean database, or stay with 1.103b forever.\n" "Sorry about that." msgstr "" @@ -1699,8 +1648,7 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:30 msgid "" "As usual, we recommend that you update to this release.\n" -"The best way to maintain security and help the network is to run the " -"latest release." +"The best way to maintain security and help the network is to run the latest release." msgstr "" #: i2p2www/blog/2014/01/21/Syndie-1.105b-Release.rst:57 @@ -1760,6 +1708,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:67 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:83 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:87 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:84 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:58 msgid "Translation updates" msgstr "" @@ -1778,19 +1728,15 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:12 msgid "" -"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more " -"difficult for an attacker\n" -"to correlate a Destination with a Router. It also fixes character " -"encoding bugs in susimail,\n" +"0.9.10 changes the mechanism for doing LeaseSet lookups, making it more difficult for an attacker\n" +"to correlate a Destination with a Router. It also fixes character encoding bugs in susimail,\n" "and includes lots of other bug fixes and translation updates.\n" -"Most of you will update via torrent, using the new \"su3\" update format " -"with stronger keys." +"Most of you will update via torrent, using the new \"su3\" update format with stronger keys." msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:19 msgid "" -"We recently attended `30C3`__ and `Real World Crypto`__, making several " -"new\n" +"We recently attended `30C3`__ and `Real World Crypto`__, making several new\n" "connections and formulating `big plans`__ for 2014. Thanks to those who\n" "supported our attendance with their `donations`__!" msgstr "" @@ -1801,8 +1747,8 @@ msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:43 msgid "" -"Flood netdb stores to new location before midnight to prevent lookup " -"fails after midnight" +"Flood netdb stores to new location before midnight to prevent lookup fails " +"after midnight" msgstr "" #: i2p2www/blog/2014/01/22/0.9.10-Release.rst:44 @@ -1879,24 +1825,19 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:12 #, python-format msgid "" -"0.9.11 continues improving LeaseSet lookup and storage to prevent an " -"attacker\n" +"0.9.11 continues improving LeaseSet lookup and storage to prevent an attacker\n" "from correlating a Destination with a Router. It adds support for the\n" "%(orchid)s outproxy plugin which is available at %(url)s. There is a\n" -"reduction in memory usage due to fixes in the transports. We have some " -"I2CP\n" +"reduction in memory usage due to fixes in the transports. We have some I2CP\n" "protocol improvements that will provide better lookup facilities and\n" -"authorization protection for external clients. Of course, there's also " -"the\n" +"authorization protection for external clients. Of course, there's also the\n" "usual collection of bug fixes. All users should update." msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:22 msgid "" -"This may be the last release that works with Java 5, which is very old " -"and\n" -"unsupported. If you are using a Java 5 or 6 runtime, we strongly " -"recommend that\n" +"This may be the last release that works with Java 5, which is very old and\n" +"unsupported. If you are using a Java 5 or 6 runtime, we strongly recommend that\n" "you upgrade to Java 7." msgstr "" @@ -1938,13 +1879,12 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:27 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:27 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:39 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:29 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:28 msgid "" "As usual, we recommend that you update to this release. The best way to\n" "maintain security and help the network is to run the latest release." -msgstr "" -"Ca de obicei, vă recomandăm ca toÈ›i utilizatorii să actualizeze la " -"această versiune. Cel mai bun mod de a ajuta reÈ›eua È™i a rămâne securizat" -" este de a rula ultima versiune." +msgstr "Ca de obicei, vă recomandăm ca toÈ›i utilizatorii să actualizeze la această versiune. Cel mai bun mod de a ajuta reÈ›eua È™i a rămâne securizat este de a rula ultima versiune." #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:40 msgid "More leaseset handling improvements" @@ -1976,8 +1916,8 @@ msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:53 msgid "" -"Stricter I2CP authorization enforcement of external clients (incompatible" -" change)" +"Stricter I2CP authorization enforcement of external clients (incompatible " +"change)" msgstr "" #: i2p2www/blog/2014/02/08/0.9.11-Release.rst:54 @@ -2001,23 +1941,21 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:9 msgid "" -"The site i2pbrowser.net is a fake I2P website mirror serving up malware " -"for Windows." +"The site i2pbrowser.net is a fake I2P website mirror serving up malware for " +"Windows." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:11 msgid "" -"We have recently been made aware of the existence of i2pbrowser.net. This" -"\n" -"website copies our homepage and download page, and attempts to trick " -"users into\n" +"We have recently been made aware of the existence of i2pbrowser.net. This\n" +"website copies our homepage and download page, and attempts to trick users into\n" "downloading Windows malware." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:17 msgid "" -"There are several indicators that point to i2pbrowser.net being a malware" -" site:" +"There are several indicators that point to i2pbrowser.net being a malware " +"site:" msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:21 @@ -2026,29 +1964,26 @@ msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:22 msgid "" -"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to " -"the same .exe file." +"The download URLs for Windows, Mac OSX, Linux, Android etc. all link to the " +"same .exe file." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:23 -msgid "The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." +msgid "" +"The .exe is only 741 KB; the official Windows installer for I2P is 13 MB." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:25 msgid "" -"We have not examined the malware ourselves, but it does not appear to be " -"very\n" -"sophisticated; it is not integrated into or bundled with the I2P " -"software.\n" -"Information security expert `Lance James`__ posted `a tweet`__ labelling " -"it as\n" +"We have not examined the malware ourselves, but it does not appear to be very\n" +"sophisticated; it is not integrated into or bundled with the I2P software.\n" +"Information security expert `Lance James`__ posted `a tweet`__ labelling it as\n" "\"a standard dark comet rat\"." msgstr "" #: i2p2www/blog/2014/02/16/i2pbrowser-malware.rst:35 msgid "" -"Spread the word. The only official download locations for I2P are linked " -"on our\n" +"Spread the word. The only official download locations for I2P are linked on our\n" "`download page`__. All I2P download packages are GPG-signed by the\n" "`release signing key`__." msgstr "" @@ -2069,31 +2004,21 @@ msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:12 msgid "" "**Somewhere, NH** -- Internet search company `DuckDuckGo`__ `donates`__\n" -"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly" -" open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" -"on the DuckDuckGo community portal. With an emphasis on privacy, " -"DuckDuckGo provides a search\n" -"engine which does not track its users or store personal data. I2P is an " -"anonymous network intended to\n" -"protect individuals from dragnet surveillance regularly performed by ISPs" -" and governments." +"$5000 to the `Invisible Internet Project`__ (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" +"on the DuckDuckGo community portal. With an emphasis on privacy, DuckDuckGo provides a search\n" +"engine which does not track its users or store personal data. I2P is an anonymous network intended to\n" +"protect individuals from dragnet surveillance regularly performed by ISPs and governments." msgstr "" #: i2p2www/blog/2014/03/12/press-release-ddg-donation.rst:26 #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:46 msgid "" -"This marks the single largest donation ever received by I2P and reflects " -"a growing interest in\n" -"privacy and security by the Internet community. The funding will help I2P" -" to reach more users, expand\n" -"development, and audit the code. It will also enable I2P developers to " -"attend conferences, such\n" -"as the `Real-World Cryptography`__ conference in New York City, where the" -" developers met and\n" -"collaborated with cryptography experts pursuant to I2P's goals of " -"providing anonymity to the\n" +"This marks the single largest donation ever received by I2P and reflects a growing interest in\n" +"privacy and security by the Internet community. The funding will help I2P to reach more users, expand\n" +"development, and audit the code. It will also enable I2P developers to attend conferences, such\n" +"as the `Real-World Cryptography`__ conference in New York City, where the developers met and\n" +"collaborated with cryptography experts pursuant to I2P's goals of providing anonymity to the\n" "public." msgstr "" @@ -2124,34 +2049,28 @@ msgstr "" msgid "" "I2P now requires Java 6 or higher.\n" "We strongly recommend that you upgrade to Java 7.\n" -"If you are still using Java 5, you must upgrade your Java before " -"installing I2P 0.9.12." +"If you are still using Java 5, you must upgrade your Java before installing I2P 0.9.12." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:19 msgid "" "0.9.12 adds preliminary support for ECDSA-signed Destinations.\n" -"It contains several fixes for the handling of Delivery Status Messages " -"(acknowledgements)\n" +"It contains several fixes for the handling of Delivery Status Messages (acknowledgements)\n" "and those messages are now end-to-end encrypted for increased security." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:24 msgid "" "We have upgraded to Jetty 8.\n" -"Jetty 8 is almost identical to Jetty 7, so there are no complex " -"configuration file conversions as there have been in past Jetty upgrades." -"\n" +"Jetty 8 is almost identical to Jetty 7, so there are no complex configuration file conversions as there have been in past Jetty upgrades.\n" "No manual changes should be necessary." msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:35 msgid "" "In early March, Internet search company `DuckDuckGo`__ `donated`__\n" -"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly " -"open-source\n" -"donation program. The award was granted on the basis of `nominations`__ " -"by members of the public\n" +"$5000 to the `Invisible Internet Project` (I2P) as part of their yearly open-source\n" +"donation program. The award was granted on the basis of `nominations`__ by members of the public\n" "on the DuckDuckGo community portal." msgstr "" @@ -2206,7 +2125,8 @@ msgid "Jetty 8.1.14.v20131031; Java 6 now required" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:88 -msgid "Reduce target connection count again to reduce tunnel reject rate further" +msgid "" +"Reduce target connection count again to reduce tunnel reject rate further" msgstr "" #: i2p2www/blog/2014/03/31/0.9.12-Release.rst:89 @@ -2254,10 +2174,8 @@ msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:13 msgid "" -"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, " -"and a big SusiMail update.\n" -"Of course, there's also the usual collection of bug fixes and translation" -" updates." +"0.9.13 includes fixes for firewalled routers, netdb lookup improvements, and a big SusiMail update.\n" +"Of course, there's also the usual collection of bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/05/22/0.9.13-Release.rst:23 @@ -2355,30 +2273,24 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:13 msgid "" -"0.9.14 includes critical fixes for XSS and remote execution " -"vulnerabilities reported by Exodus Intelligence.\n" -"As an added precaution, we have disabled several advanced configuration " -"features in the router console,\n" +"0.9.14 includes critical fixes for XSS and remote execution vulnerabilities reported by Exodus Intelligence.\n" +"As an added precaution, we have disabled several advanced configuration features in the router console,\n" "including installation of new plugins.\n" "We plan to re-enable these in a future release after additional review." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:20 msgid "" -"Due to I2P library changes, I2P-Bote users must upgrade their plugin to " -"version 0.2.10 to work with I2P 0.9.14.\n" -"Your router should update the plugin automatically after the router " -"restarts." +"Due to I2P library changes, I2P-Bote users must upgrade their plugin to version 0.2.10 to work with I2P 0.9.14.\n" +"Your router should update the plugin automatically after the router restarts." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:25 msgid "" -"The release also contains several bug fixes in i2ptunnel, i2psnark, and " -"other areas,\n" +"The release also contains several bug fixes in i2ptunnel, i2psnark, and other areas,\n" "and updates to the latest Jetty, Tomcat, and Wrapper.\n" "We've also implemented a faster and more secure method for reseeding.\n" -"Of course, there's also the usual collection of minor bug fixes and " -"translation updates." +"Of course, there's also the usual collection of minor bug fixes and translation updates." msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:32 @@ -2429,14 +2341,14 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:55 msgid "" -"Several i2psnark improvements and fixes (GUI and DHT), including changes " -"for better compatibility with Vuze" +"Several i2psnark improvements and fixes (GUI and DHT), including changes for" +" better compatibility with Vuze" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:60 msgid "" -"Reseeding now fetches a signed zip file containing router infos for " -"security and speed" +"Reseeding now fetches a signed zip file containing router infos for security" +" and speed" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:61 @@ -2449,8 +2361,8 @@ msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:63 msgid "" -"Per-message reliabilitiy settings in I2CP and error propagation back from" -" router to client" +"Per-message reliabilitiy settings in I2CP and error propagation back from " +"router to client" msgstr "" #: i2p2www/blog/2014/07/26/0.9.14-Release.rst:64 @@ -2482,33 +2394,23 @@ msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:13 msgid "" -"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some" -" other web forms.\n" -"We've restored the ability to install plugins via the console, but you " -"must first edit your router.config file\n" -"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the " -"line routerconsole.enablePluginInstall=true.\n" -"Other rarely-used advanced features that were removed in 0.9.14 may be " -"restored by adding the line routerconsole.advanced=true." +"0.9.14.1 includes fixes for the \"Add Torrent\" form in i2psnark and some other web forms.\n" +"We've restored the ability to install plugins via the console, but you must first edit your router.config file\n" +"(in ~/.i2p/ or /var/lib/i2p/i2p-config/ or %APPDATA%\\I2P\\) to add the line routerconsole.enablePluginInstall=true.\n" +"Other rarely-used advanced features that were removed in 0.9.14 may be restored by adding the line routerconsole.advanced=true." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:20 msgid "" -"As usual, if configured with the default \"Download and Verify\", the " -"router will automatically download the update and display a button to " -"restart.\n" -"However, due to a bug in 0.9.14, if your update is configured for " -"\"Notify only\", the download button will not be displayed.\n" -"You must change your configuration to \"Download and Verify\" or " -"\"Download, Verify, and Restart\" to update." +"As usual, if configured with the default \"Download and Verify\", the router will automatically download the update and display a button to restart.\n" +"However, due to a bug in 0.9.14, if your update is configured for \"Notify only\", the download button will not be displayed.\n" +"You must change your configuration to \"Download and Verify\" or \"Download, Verify, and Restart\" to update." msgstr "" #: i2p2www/blog/2014/08/09/0.9.14.1-Release.rst:26 msgid "" -"If you are still running 0.9.13 or older, we recommend that you update to" -" this release as soon as possible.\n" -"If you don't often check your router console, please consider changing " -"your configuration to \"Download, Verify, and Restart\"\n" +"If you are still running 0.9.13 or older, we recommend that you update to this release as soon as possible.\n" +"If you don't often check your router console, please consider changing your configuration to \"Download, Verify, and Restart\"\n" "to ensure you are always running the latest release." msgstr "" @@ -2562,10 +2464,7 @@ msgstr "" msgid "" "Hello all!\n" "\n" -"Today we announce the Privacy Solutions project, a new organization that " -"develops and maintains I2P software. Privacy Solutions includes several " -"new development efforts designed to enhance the privacy, security, and " -"anonymity for users, based on I2P protocols and technology.\n" +"Today we announce the Privacy Solutions project, a new organization that develops and maintains I2P software. Privacy Solutions includes several new development efforts designed to enhance the privacy, security, and anonymity for users, based on I2P protocols and technology.\n" "\n" "These efforts include\n" "\n" @@ -2575,40 +2474,23 @@ msgid "" "4) The Anoncoin crypto-coin project.\n" "5) The Monero crypto-coin project.\n" "\n" -"Privacy Solutions' initial funding was provided by the supporters of the " -"Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-" -"profit type of organization registered within the Norwegian government " -"registers. ( Kind of like US 501(c)3. )\n" +"Privacy Solutions' initial funding was provided by the supporters of the Anoncoin and Monero projects. Privacy Solutions is a Norway-based non-profit type of organization registered within the Norwegian government registers. ( Kind of like US 501(c)3. )\n" "\n" -"Privacy Solutions plans to apply for funding from the Norwegian goverment" -" for network research, because of BigBrother (We'll get back to what that" -" is) and the coins that are planned to use low-latency networks as " -"primary transport layer. Our research will support advances in software " -"technology for anonymity, security, and privacy.\n" +"Privacy Solutions plans to apply for funding from the Norwegian goverment for network research, because of BigBrother (We'll get back to what that is) and the coins that are planned to use low-latency networks as primary transport layer. Our research will support advances in software technology for anonymity, security, and privacy.\n" "\n" "\n" -"First a little bit about the Abscond Browser Bundle. This was first a " -"one-man project by Meeh, but later on friends started sending patches, " -"the project is now trying to create the same easy access to I2P as Tor " -"has with their browser bundle. Our first release isn't far away, it's " -"just some gitian script tasks left, including setup of the Apple " -"toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C" -" struct keeping vital proces information about an process) from the Java " -"instance to check on I2P before we declare it stable. I2pd will also " -"switch with the Java version once it's ready, and there is no point in " -"shipping a JRE in the bundle anymore. You can read more about the Abscond" -" Browser Bundle at https://hideme.today/dev" +"First a little bit about the Abscond Browser Bundle. This was first a one-man project by Meeh, but later on friends started sending patches, the project is now trying to create the same easy access to I2P as Tor has with their browser bundle. Our first release isn't far away, it's just some gitian script tasks left, including setup of the Apple toolchain. But again we will add monitoring with PROCESS_INFORMATION (A C struct keeping vital proces information about an process) from the Java instance to check on I2P before we declare it stable. I2pd will also switch with the Java version once it's ready, and there is no point in shipping a JRE in the bundle anymore. You can read more about the Abscond Browser Bundle at https://hideme.today/dev" msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:35 msgid "" -"We would also like to inform of the current status of i2pd. I2pd supports" -" bi-directional streaming now, that allows to use not only HTTP but long-" -"lived communication channels. Instant IRC support has been added. I2pd " -"users are able to use it same way as Java I2P for access to I2P IRC " -"network. I2PTunnel is one of key features of I2P network, allowing non-" -"I2P applications communicate transparently. That's why it's vital feature" -" for i2pd and one of key milestones." +"We would also like to inform of the current status of i2pd. I2pd supports " +"bi-directional streaming now, that allows to use not only HTTP but long-" +"lived communication channels. Instant IRC support has been added. I2pd users" +" are able to use it same way as Java I2P for access to I2P IRC network. " +"I2PTunnel is one of key features of I2P network, allowing non-I2P " +"applications communicate transparently. That's why it's vital feature for " +"i2pd and one of key milestones." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:39 @@ -2617,18 +2499,17 @@ msgid "" "Bigbrother.i2p, which is a metrics system Meeh made over a year back. " "Recently we noticed that Meeh actually have 100Gb of non-duplicated data " "from nodes reporting in since initial launch. This will also be moved to " -"Privacy Solutions and be rewritten with a NSPOF backend. With this we " -"will aslo start using the Graphite ( http://graphite.wikidot.com/screen-" -"shots ). This will give us a great overview over the network without " -"privacy issues for our end users. The clients filter all data except " -"country, router hash and success rate on tunnel buildings. The name of " -"this service is as always a little joke from Meeh." +"Privacy Solutions and be rewritten with a NSPOF backend. With this we will " +"aslo start using the Graphite ( http://graphite.wikidot.com/screen-shots ). " +"This will give us a great overview over the network without privacy issues " +"for our end users. The clients filter all data except country, router hash " +"and success rate on tunnel buildings. The name of this service is as always " +"a little joke from Meeh." msgstr "" #: i2p2www/blog/2014/08/15/The-privacy-solutions-project.rst:46 msgid "" -"We have shorted down a bit of the news here, if you're interested in more" -" information please visit https://blog.privacysolutions.no/\n" +"We have shorted down a bit of the news here, if you're interested in more information please visit https://blog.privacysolutions.no/\n" "We're still under construction and more content will come!\n" "\n" "\n" @@ -2652,67 +2533,50 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:11 msgid "" -"I2P Android and Bote have been released on Google Play in Norway, as a " -"test run for a future worldwide release." +"I2P Android and Bote have been released on Google Play in Norway, as a test " +"run for a future worldwide release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:13 msgid "" -"I2P Android has existed for over three years. In that time, it has " -"evolved from\n" -"a simple test project into a usable, useful Android port of the I2P " -"router. Our\n" -"eventual goal has been to release I2P Android on Google Play, to make it " -"easier\n" -"for users to discover, install and use I2P on their Android devices. " -"After much\n" -"work improving the user interface, fixing bugs and testing, we think that" -" I2P\n" +"I2P Android has existed for over three years. In that time, it has evolved from\n" +"a simple test project into a usable, useful Android port of the I2P router. Our\n" +"eventual goal has been to release I2P Android on Google Play, to make it easier\n" +"for users to discover, install and use I2P on their Android devices. After much\n" +"work improving the user interface, fixing bugs and testing, we think that I2P\n" "Android is finally ready to go where the users are." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:22 msgid "" -"Initially, we are only releasing to Android users in Norway, as a test " -"run. I2P\n" -"Android will have far more exposure on Google Play than it has ever had " -"before,\n" -"and there will be bugs and usability issues that we need to fix. It will " -"be much\n" -"easier (and less stressful!) to respond to feedback if we only need to " -"deal with\n" -"reports from hundreds of users instead of thousands (already orders of " -"magnitude\n" +"Initially, we are only releasing to Android users in Norway, as a test run. I2P\n" +"Android will have far more exposure on Google Play than it has ever had before,\n" +"and there will be bugs and usability issues that we need to fix. It will be much\n" +"easier (and less stressful!) to respond to feedback if we only need to deal with\n" +"reports from hundreds of users instead of thousands (already orders of magnitude\n" "more feedback than we have ever had)." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:31 msgid "" -"Simultaneously we are making the first public release of Bote, an Android" -" port\n" -"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. " -"It runs\n" -"on top of the I2P network, and while it works as a standalone app, it " -"will use\n" +"Simultaneously we are making the first public release of Bote, an Android port\n" +"of `I2P-Bote`__. Bote is private, distributed, secure email, made easy. It runs\n" +"on top of the I2P network, and while it works as a standalone app, it will use\n" "the I2P Android app by default if installed. As with I2P Android, we are\n" "initially only releasing Bote to Android users in Norway." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:41 msgid "" -"The apps are being released on Google Play by `The Privacy Solutions " -"Project`__.\n" -"See their `blog post`__ for further information, and links to the Google " -"Play\n" +"The apps are being released on Google Play by `The Privacy Solutions Project`__.\n" +"See their `blog post`__ for further information, and links to the Google Play\n" "page for Norway users." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:50 msgid "" -"As lead developer for I2P Android and Bote, I look forward to your " -"comments. You\n" -"are the people who will be using them, and your perspectives will help me" -" craft\n" +"As lead developer for I2P Android and Bote, I look forward to your comments. You\n" +"are the people who will be using them, and your perspectives will help me craft\n" "simple, intuitive apps that make privacy accessible to everyone." msgstr "" @@ -2722,28 +2586,22 @@ msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:59 msgid "" -"We have also updated I2P Android on the website to match the release " -"candidate\n" -"deployed in Norway. This version will be updated with changes as we " -"respond to\n" +"We have also updated I2P Android on the website to match the release candidate\n" +"deployed in Norway. This version will be updated with changes as we respond to\n" "feedback from Norwegian users, heading towards our next stable release." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:65 msgid "" -"Please note that we have upgraded the Android API to 9. This means that " -"Froyo\n" -"Android 2.2 will not be supported anymore; the minimum requirement is now" -"\n" +"Please note that we have upgraded the Android API to 9. This means that Froyo\n" +"Android 2.2 will not be supported anymore; the minimum requirement is now\n" "Gingerbread Android 2.3." msgstr "" #: i2p2www/blog/2014/08/23/Android-test-release-on-Google-Play-in-Norway.rst:71 msgid "" -"Also note that if you have an earlier version of I2P Android, you will " -"need to\n" -"uninstall and reinstall because we have changed the release keys. Further" -"\n" +"Also note that if you have an earlier version of I2P Android, you will need to\n" +"uninstall and reinstall because we have changed the release keys. Further\n" "information about this will be provided in a subsequent blog post." msgstr "" @@ -2761,31 +2619,23 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:13 msgid "" "0.9.15 adds preliminary support for Ed25519 EdDSA signatures.\n" -"It includes a new persistent configuration backend for i2psnark and fixes" -" several issues with i2psnark's handling of file names.\n" +"It includes a new persistent configuration backend for i2psnark and fixes several issues with i2psnark's handling of file names.\n" "There are several improvements to speed up SAM.\n" "Plugins now support stronger signatures in the su3 file format.\n" -"Plugin installation via the console, which was disabled in 0.9.14, is re-" -"enabled." +"Plugin installation via the console, which was disabled in 0.9.14, is re-enabled." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:21 msgid "" -"We have supported ECDSA signatures since 0.9.12, and we would like to " -"start using ECDSA by default.\n" -"Unfortunately, some of you are still running older I2P versions, and for " -"others,\n" +"We have supported ECDSA signatures since 0.9.12, and we would like to start using ECDSA by default.\n" +"Unfortunately, some of you are still running older I2P versions, and for others,\n" "their distribution or Java runtime does not support ECDSA. Red Hat\n" "(RHEL, Fedora) distributions are reported to be missing ECDSA.\n" "Some have fixed the Java issues by upgrading from Java 6 to Java 7;\n" -"others have had success with installing the \"unlimited strength policy " -"files\".\n" -"We've added information about missing crypto to the log file and the " -"/logs page in the console.\n" -"After you update to 0.9.15, please check if you are missing ECDSA " -"support, and attempt to fix it if necessary.\n" -"This is particularly important for those that run popular eepsites and " -"services." +"others have had success with installing the \"unlimited strength policy files\".\n" +"We've added information about missing crypto to the log file and the /logs page in the console.\n" +"After you update to 0.9.15, please check if you are missing ECDSA support, and attempt to fix it if necessary.\n" +"This is particularly important for those that run popular eepsites and services." msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:42 @@ -2822,6 +2672,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:35 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:35 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:47 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:37 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:36 msgid "Changes" msgstr "Schimbări" @@ -2893,8 +2745,8 @@ msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:68 msgid "" -"i2ptunnel add support for local SSL connections for standard and IRC " -"client tunnels" +"i2ptunnel add support for local SSL connections for standard and IRC client " +"tunnels" msgstr "" #: i2p2www/blog/2014/09/20/0.9.15-Release.rst:69 @@ -2931,26 +2783,21 @@ msgid "" "0.9.16 is a significant step forward in our plan to migrate\n" "from DSA to ECDSA and then EdDSA cryptographic signatures,\n" "and makes several other changes to increase your anonymity and security.\n" -"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures" -" by default.\n" -"In addition, we've fixed a large number of serious bugs, including " -"console lockups." +"Client tunnels for standard, IRC, and SOCKS IRC will use ECDSA signatures by default.\n" +"In addition, we've fixed a large number of serious bugs, including console lockups." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:21 msgid "" -"Changes in router data structures will require i2pcontrol plugin users to" -" update to version 0.0.9." +"Changes in router data structures will require i2pcontrol plugin users to " +"update to version 0.0.9." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:25 msgid "" -"If you run an eepsite or a service and you are not running a recent " -"release,\n" -"or your Java or OS does not support ECDSA (as noted in the logs and on " -"the /logs page in the console),\n" -"please fix the issue as soon as possible or your users will soon be " -"unable to connect." +"If you run an eepsite or a service and you are not running a recent release,\n" +"or your Java or OS does not support ECDSA (as noted in the logs and on the /logs page in the console),\n" +"please fix the issue as soon as possible or your users will soon be unable to connect." msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:42 @@ -2963,8 +2810,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:44 msgid "" -"Require I2CP authorization for all messages when enabled (requires 0.9.11" -" or higher client)" +"Require I2CP authorization for all messages when enabled (requires 0.9.11 or" +" higher client)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:45 @@ -2983,8 +2830,8 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:48 msgid "" -"New column sorting, set-all priority buttons, and upload ratio display in" -" i2psnark" +"New column sorting, set-all priority buttons, and upload ratio display in " +"i2psnark" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:49 @@ -3045,14 +2892,14 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:71 msgid "" -"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol" -" plugin)" +"Move router data structures from i2p.jar to router.jar (breaks i2pcontrol " +"plugin)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:72 msgid "" -"New router keys now stored in router.keys.dat (eepPriv.dat format) " -"instead of router.keys" +"New router keys now stored in router.keys.dat (eepPriv.dat format) instead " +"of router.keys" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:73 @@ -3087,8 +2934,7 @@ msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:80 msgid "" -"Change eepsite Jetty threadpool and queue configuration (new installs " -"only)" +"Change eepsite Jetty threadpool and queue configuration (new installs only)" msgstr "" #: i2p2www/blog/2014/11/01/0.9.16-Release.rst:81 @@ -3108,39 +2954,34 @@ msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:13 msgid "" -"0.9.17 is primarily a bugfix release, but it also continues our migration" -" to stronger cryptographic signatures." +"0.9.17 is primarily a bugfix release, but it also continues our migration to" +" stronger cryptographic signatures." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:17 msgid "" -"We have moved the news feed system used for the news on your console and " -"the latest router version indication\n" +"We have moved the news feed system used for the news on your console and the latest router version indication\n" "to a signed format using RSA 4096-bit keys for enhanced security." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:22 msgid "" -"New eepsites and servers will be ECDSA-signed by default, if ECDSA is " -"available.\n" +"New eepsites and servers will be ECDSA-signed by default, if ECDSA is available.\n" "There is now a warning in the console sidebar if ECDSA is not available.\n" -"For RedHat users, we have reports of successful installs of the " -"BouncyCastle Provider (bcprov) jar to add ECDSA support." +"For RedHat users, we have reports of successful installs of the BouncyCastle Provider (bcprov) jar to add ECDSA support." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:28 msgid "" -"We've fixed several serious bugs, including an SSU packet corruption " -"problem,\n" +"We've fixed several serious bugs, including an SSU packet corruption problem,\n" "and a SAM bug affecting i2p-messenger and other SAM applications.\n" -"There are several fixes for the preliminary ECDSA router signatures added" -" in the last release but not yet enabled." +"There are several fixes for the preliminary ECDSA router signatures added in the last release but not yet enabled." msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:34 msgid "" -"Many of us will be attending 31C3 in Hamburg in December. Stop by our " -"table and say hi!" +"Many of us will be attending 31C3 in Hamburg in December. Stop by our table " +"and say hi!" msgstr "" #: i2p2www/blog/2014/11/30/0.9.17-Release.rst:49 @@ -3240,16 +3081,14 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:11 msgid "" -"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google" -" Play and F-Droid." +"I2P Android 0.9.17 and Bote 0.3 have been released on the website, Google " +"Play and F-Droid." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:13 msgid "" -"It has been some time since I last posted updates about our Android " -"development,\n" -"and several I2P releases have gone by without any matching Android " -"releases.\n" +"It has been some time since I last posted updates about our Android development,\n" +"and several I2P releases have gone by without any matching Android releases.\n" "At last, the wait is over!" msgstr "" @@ -3261,47 +3100,31 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:24 msgid "" -"New versions of I2P Android and Bote have been released! They can be " -"downloaded\n" +"New versions of I2P Android and Bote have been released! They can be downloaded\n" "from these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:35 msgid "" -"The main change in these releases is the transition to Android's new " -"Material\n" -"design system. Material has made it much easier for app developers with, " -"shall\n" -"we say, \"minimalist\" design skills (like myself) to create apps that " -"are nicer\n" -"to use. I2P Android also updates its underlying I2P router to the just-" -"released\n" -"version 0.9.17. Bote brings in several new features along with many " -"smaller\n" -"improvements; for example, you can now add new email destinations via QR " -"codes." +"The main change in these releases is the transition to Android's new Material\n" +"design system. Material has made it much easier for app developers with, shall\n" +"we say, \"minimalist\" design skills (like myself) to create apps that are nicer\n" +"to use. I2P Android also updates its underlying I2P router to the just-released\n" +"version 0.9.17. Bote brings in several new features along with many smaller\n" +"improvements; for example, you can now add new email destinations via QR codes." msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:44 msgid "" -"As I mentioned in `my last update`__, the release key that signs the apps" -" has\n" -"changed. The reason for this was because we needed to change the package " -"name\n" -"of I2P Android. The old package name (``net.i2p.android.router``) had " -"already\n" -"been taken on Google Play (we still don't know who was using it), and we " -"wanted\n" -"to use the same package name and signing key for all distributions of I2P" -"\n" -"Android. Doing so means that a user could initially install the app from " -"the I2P\n" -"website, and then later if the website was blocked they could upgrade it " -"using\n" -"Google Play. Android OS considers an application to be completely " -"different when\n" -"its package name changes, so we took the opportunity to increase the " -"strength of\n" +"As I mentioned in `my last update`__, the release key that signs the apps has\n" +"changed. The reason for this was because we needed to change the package name\n" +"of I2P Android. The old package name (``net.i2p.android.router``) had already\n" +"been taken on Google Play (we still don't know who was using it), and we wanted\n" +"to use the same package name and signing key for all distributions of I2P\n" +"Android. Doing so means that a user could initially install the app from the I2P\n" +"website, and then later if the website was blocked they could upgrade it using\n" +"Google Play. Android OS considers an application to be completely different when\n" +"its package name changes, so we took the opportunity to increase the strength of\n" "the signing key." msgstr "" @@ -3317,25 +3140,18 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:73 msgid "" -"A few months ago we `released`__ both I2P Android and Bote on Google Play" -" in\n" -"Norway, to test the release process there. We are pleased to announce " -"that both\n" -"apps are now being released globally by `Privacy Solutions`__. The apps " -"can be\n" +"A few months ago we `released`__ both I2P Android and Bote on Google Play in\n" +"Norway, to test the release process there. We are pleased to announce that both\n" +"apps are now being released globally by `Privacy Solutions`__. The apps can be\n" "found at these URLs:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:89 msgid "" -"The global release is being done in several stages, starting with the " -"countries\n" -"for which we have translations. The notable exception to this is France; " -"due to\n" -"import regulations on cryptographic code, we are unable yet to distribute" -" these\n" -"apps on Google Play France. This is the same issue that has affected " -"other apps\n" +"The global release is being done in several stages, starting with the countries\n" +"for which we have translations. The notable exception to this is France; due to\n" +"import regulations on cryptographic code, we are unable yet to distribute these\n" +"apps on Google Play France. This is the same issue that has affected other apps\n" "like TextSecure and Orbot." msgstr "" @@ -3347,39 +3163,28 @@ msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:103 msgid "" -"Don't think we have forgotten about you, F-Droid users! In addition to " -"the two\n" -"locations above, we have set up our own F-Droid repository. If you are " -"reading\n" -"this post on your phone, `click here`__ to add it to F-Droid (this only " -"works in\n" -"some Android browsers). Or, you can manually add the URL below to your " -"F-Droid\n" +"Don't think we have forgotten about you, F-Droid users! In addition to the two\n" +"locations above, we have set up our own F-Droid repository. If you are reading\n" +"this post on your phone, `click here`__ to add it to F-Droid (this only works in\n" +"some Android browsers). Or, you can manually add the URL below to your F-Droid\n" "repository list:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:115 msgid "" -"If you would like to manually verify the fingerprint (SHA-256) of the " -"repository\n" +"If you would like to manually verify the fingerprint (SHA-256) of the repository\n" "signing key, or type it in when adding the repository, here it is:" msgstr "" #: i2p2www/blog/2014/12/01/Android-app-releases.rst:124 msgid "" -"Unfortunately the I2P app in the main F-Droid repository has not been " -"updated\n" -"because our F-Droid maintainer has disappeared. We hope that by " -"maintaining this\n" +"Unfortunately the I2P app in the main F-Droid repository has not been updated\n" +"because our F-Droid maintainer has disappeared. We hope that by maintaining this\n" "binary repository, we can better support our F-Droid users and keep them\n" -"up-to-date. If you have already installed I2P from the main F-Droid " -"repository,\n" -"you will need to uninstall it if you want to upgrade, because the signing" -" key\n" -"will be different. The apps in our F-Droid repository are the same APKs " -"that are\n" -"provided on our website and on Google Play, so in future you will be able" -" to\n" +"up-to-date. If you have already installed I2P from the main F-Droid repository,\n" +"you will need to uninstall it if you want to upgrade, because the signing key\n" +"will be different. The apps in our F-Droid repository are the same APKs that are\n" +"provided on our website and on Google Play, so in future you will be able to\n" "upgrade using any of these sources." msgstr "" @@ -3398,25 +3203,18 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:21 msgid "" -"We were, for the second year in a row, at a great location in the " -"Congress, in\n" -"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square " -"has\n" -"really increased our visibility and helped many people find us. Thanks to" -" Noisy\n" +"We were, for the second year in a row, at a great location in the Congress, in\n" +"`Noisy Square`_, right next to the EFF table. Being part of Noisy Square has\n" +"really increased our visibility and helped many people find us. Thanks to Noisy\n" "Square and the 31C3 organizers for a great Congress." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:30 msgid "" -"We also thank Gabriel Weinberg and his fabulous search engine " -"`DuckDuckGo`__ for\n" -"their support of open source anonymity tools and their `generous " -"contribution`__\n" -"to I2P in 2014. Funding from DuckDuckGo and others helped support our " -"attendance\n" -"at CCC. This is the primary annual meetup for I2P developers and it is " -"critical\n" +"We also thank Gabriel Weinberg and his fabulous search engine `DuckDuckGo`__ for\n" +"their support of open source anonymity tools and their `generous contribution`__\n" +"to I2P in 2014. Funding from DuckDuckGo and others helped support our attendance\n" +"at CCC. This is the primary annual meetup for I2P developers and it is critical\n" "to our success." msgstr "" @@ -3428,127 +3226,88 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:49 msgid "" -"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved " -"himself\n" -"and the project from TU Munich to `Inria`__ in France. He has a large " -"number of\n" -"`open positions`__. This is a great opportunity to get paid to work on " -"open\n" +"We spoke at length with Christian Grothoff of `GNUnet`__. He has moved himself\n" +"and the project from TU Munich to `Inria`__ in France. He has a large number of\n" +"`open positions`__. This is a great opportunity to get paid to work on open\n" "source anonymity tools, we encourage everybody to contact him about it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:60 msgid "" -"The prospect of an invigorated GNUnet with a large amount of new funding " -"is\n" -"quite interesting. We discussed more ways to work together. In early " -"2014, we\n" -"worked hard to understand the GnuNet DNS replacement, but we were unable " -"to\n" -"figure out a good fit for it in I2P. One of his new ideas is a " -"distributed,\n" -"anonymous statistics gathering subsystem, for detecting problems or " -"attacks on\n" +"The prospect of an invigorated GNUnet with a large amount of new funding is\n" +"quite interesting. We discussed more ways to work together. In early 2014, we\n" +"worked hard to understand the GnuNet DNS replacement, but we were unable to\n" +"figure out a good fit for it in I2P. One of his new ideas is a distributed,\n" +"anonymous statistics gathering subsystem, for detecting problems or attacks on\n" "the network. We'd definitely be interested in that." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:69 msgid "" -"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems " -"draft`__.\n" -"A new, greatly simplified version 3 was posted in December. The prospects" -" for\n" +"We also discussed the `Special-Use Domain Names of Peer-to-Peer Systems draft`__.\n" +"A new, greatly simplified version 3 was posted in December. The prospects for\n" "approval remain unclear. The best way to monitor or participate in the\n" -"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to " -"do so\n" +"discussion is via the `IETF DNSOP WG mailing list`__. We will attempt to do so\n" "on our side, and also give Hellekin a new point-of-contact for this topic." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:80 msgid "" -"We apologized to Christian for not being organized enough to have a talk " -"at his\n" -"`We Fix The Net assembly`__. One of our biggest failures as a project is " -"our\n" -"seeming inability to submit talks at conferences. We'll have to do better" -" in the\n" +"We apologized to Christian for not being organized enough to have a talk at his\n" +"`We Fix The Net assembly`__. One of our biggest failures as a project is our\n" +"seeming inability to submit talks at conferences. We'll have to do better in the\n" "new year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:92 msgid "" -"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in " -"with\n" -"other anonymity tools into this new Debian \"superpackage\" of some sort," -" and\n" -"would love to get I2P into Debian in 2015. He claims the process is now " -"easy,\n" +"Iain Learmonth, a Debian participant, stopped by. He wants to put I2P in with\n" +"other anonymity tools into this new Debian \"superpackage\" of some sort, and\n" +"would love to get I2P into Debian in 2015. He claims the process is now easy,\n" "just `follow the instructions`__. We said that's funny, we've been\n" "`stuck in the process for over 7 years`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:103 msgid "" -"He said, well, try the new process, it works great, should be no problem " -"at all\n" -"if your package is in good shape. The people in Debian that run this " -"process are\n" -"eager volunteers who want nothing more than to get more packages in. We " -"said our\n" -"package is indeed in fantastic shape, and we would try out the new " -"process as\n" -"soon as possible. If all this is true, we will be in the next Debian " -"release in\n" +"He said, well, try the new process, it works great, should be no problem at all\n" +"if your package is in good shape. The people in Debian that run this process are\n" +"eager volunteers who want nothing more than to get more packages in. We said our\n" +"package is indeed in fantastic shape, and we would try out the new process as\n" +"soon as possible. If all this is true, we will be in the next Debian release in\n" "late 2015. This would be very very cool." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:115 msgid "" -"We had a nice discussion with BitingBird of Tails. They are very happy " -"with our\n" -"rapid response to the `vulnerability disclosure`__ last summer, resulting" -" in our\n" -"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and " -"they\n" -"took `great offense`__ to that and the lack of private notification. We " -"thanked\n" +"We had a nice discussion with BitingBird of Tails. They are very happy with our\n" +"rapid response to the `vulnerability disclosure`__ last summer, resulting in our\n" +"`0.9.14 release`__. Our vulnerability was initially blamed on Tails, and they\n" +"took `great offense`__ to that and the lack of private notification. We thanked\n" "them for taking the heat and fighting back." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:127 msgid "" -"BitingBird also handles support, and she tells us the number one issue is" -" how\n" -"long I2P takes to start up and be useful for browsing I2P sites. Her " -"standard\n" -"answer is \"wait ten more minutes\" and that seems to be effective. I2P " -"is\n" -"particularly slow to startup on Tails since it does not persist peer data" -" by\n" -"default. It would be nice to change that, but there's also things we can " -"do on\n" -"the I2P side to make things start faster. Expect some improvement in our " -"0.9.18\n" +"BitingBird also handles support, and she tells us the number one issue is how\n" +"long I2P takes to start up and be useful for browsing I2P sites. Her standard\n" +"answer is \"wait ten more minutes\" and that seems to be effective. I2P is\n" +"particularly slow to startup on Tails since it does not persist peer data by\n" +"default. It would be nice to change that, but there's also things we can do on\n" +"the I2P side to make things start faster. Expect some improvement in our 0.9.18\n" "release." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:140 msgid "" -"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The " -"upcoming\n" -"Tor Hidden Services changes mean that their keys will no longer fit into " -"a\n" -"portion of an IPv6 address, and he was working on a solution. We reminded" -" him\n" -"that this has always been the case for I2P (with \"GarliCat\"), that it's" -" not a\n" -"new problem. He pointed us to `a presentation`__ of his proposal. It " -"involves\n" +"Longtime friend of I2P Bernhard Fischer of `OnionCat`__ stopped by. The upcoming\n" +"Tor Hidden Services changes mean that their keys will no longer fit into a\n" +"portion of an IPv6 address, and he was working on a solution. We reminded him\n" +"that this has always been the case for I2P (with \"GarliCat\"), that it's not a\n" +"new problem. He pointed us to `a presentation`__ of his proposal. It involves\n" "storing an extra record in the hidden service directory (equivalent of a\n" -"leaseset I2P's network database). It wasn't completely clear how this " -"would\n" -"work, or if we would consider it abuse of the netDb. We'll follow up with" -" him\n" +"leaseset I2P's network database). It wasn't completely clear how this would\n" +"work, or if we would consider it abuse of the netDb. We'll follow up with him\n" "as he gets further." msgstr "" @@ -3560,23 +3319,15 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:160 msgid "" -"We spent hours and hours explaining I2P to people stopping by our table. " -"Some\n" -"had heard of I2P before, some had not; everybody had heard of Tor and had" -" at\n" -"least a vague idea of what hidden services are. As usual, introducing " -"people to\n" -"I2P was a struggle. By the end of the Congress, we became convinced that " -"a part\n" -"of the problem was a difference in terminology. Back 12 years ago, when " -"I2P and\n" -"Tor were both getting started, we each came up with terms for the various" -" parts\n" +"We spent hours and hours explaining I2P to people stopping by our table. Some\n" +"had heard of I2P before, some had not; everybody had heard of Tor and had at\n" +"least a vague idea of what hidden services are. As usual, introducing people to\n" +"I2P was a struggle. By the end of the Congress, we became convinced that a part\n" +"of the problem was a difference in terminology. Back 12 years ago, when I2P and\n" +"Tor were both getting started, we each came up with terms for the various parts\n" "of our systems. Today, the Tor terminology such as \"hidden service\" is\n" -"well-understood and commonplace. The I2P terminology such as \"eepsite\" " -"is\n" -"neither. We agreed to review our documentation, router console, and other" -" places\n" +"well-understood and commonplace. The I2P terminology such as \"eepsite\" is\n" +"neither. We agreed to review our documentation, router console, and other places\n" "for opportunities to simplify it and use common terms." msgstr "" @@ -3595,66 +3346,65 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:182 msgid "" -"* *Toronto meetup:* CCC is such a productive time for us, and it seems " -"that a second meetup in the year would be quite helpful. We have proposed" -" it for August 2015 in Toronto, Canada, in conjunction with `Toronto " -"Crypto`__. It would include developer meetings together with " -"presentations and tutorials, all open to the public. We are attempting to" -" gauge interest and research possible venues. If you are considering " -"attending, please let us know by `tweeting @i2p`__ or posting `on the dev" -" forum thread`__." +"* *Toronto meetup:* CCC is such a productive time for us, and it seems that " +"a second meetup in the year would be quite helpful. We have proposed it for " +"August 2015 in Toronto, Canada, in conjunction with `Toronto Crypto`__. It " +"would include developer meetings together with presentations and tutorials, " +"all open to the public. We are attempting to gauge interest and research " +"possible venues. If you are considering attending, please let us know by " +"`tweeting @i2p`__ or posting `on the dev forum thread`__." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:190 msgid "" -"* We discussed Meeh's workload and the state of the various services he " -"is running. We made some plans to reduce his load and have some other " -"people help out." +"* We discussed Meeh's workload and the state of the various services he is " +"running. We made some plans to reduce his load and have some other people " +"help out." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:194 msgid "" -"* We reviewed our critieria for placing links to `i2pd`__ on our download" -" page. We agreed that the only remaining item is to have a nice page on " -"the `Privacy Solutions web site`__ or elsewhere with binary packages for " +"* We reviewed our critieria for placing links to `i2pd`__ on our download " +"page. We agreed that the only remaining item is to have a nice page on the " +"`Privacy Solutions web site`__ or elsewhere with binary packages for " "Windows, Linux, and Mac, and source packages. It's not clear who is " -"responsible for building the packages and where the \"official\" version " -"is. Once there's an established process for building and signing packages" -" and an official place to put them, we're ready to link to it. If it is " -"not feasible to host it on the Privacy Solutions website, we will discuss" -" alternatives with orignal, including possible migration to our download " +"responsible for building the packages and where the \"official\" version is." +" Once there's an established process for building and signing packages and " +"an official place to put them, we're ready to link to it. If it is not " +"feasible to host it on the Privacy Solutions website, we will discuss " +"alternatives with orignal, including possible migration to our download " "servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:201 msgid "" -"* Lots of people coming by the table asked if we had a non-Java version. " -"It was great to finally answer \"yes\" and we're eager to get the word " -"out and get more users, testers, and developers on it." +"* Lots of people coming by the table asked if we had a non-Java version. It " +"was great to finally answer \"yes\" and we're eager to get the word out and " +"get more users, testers, and developers on it." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:205 msgid "" -"* `Vuze`__ continues to make good progress on their I2P integration. We " -"look forward to working with them in the new year on a managed rollout to" -" more users." +"* `Vuze`__ continues to make good progress on their I2P integration. We look" +" forward to working with them in the new year on a managed rollout to more " +"users." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:211 msgid "" "* We discussed the state of Meeh's and Sindu's reseed servers. They made " -"several improvements while at the congress and are investigating " -"migration to `Matt Drollette's Go implementation`__. The security and " -"reliability of our reseed servers is vital to new users and network " -"operation. `User 'backup'`__ is doing a great job monitoring and managing" -" the pool of reseed servers." +"several improvements while at the congress and are investigating migration " +"to `Matt Drollette's Go implementation`__. The security and reliability of " +"our reseed servers is vital to new users and network operation. `User " +"'backup'`__ is doing a great job monitoring and managing the pool of reseed " +"servers." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:218 msgid "" -"* We agreed to purchase a second root server for development, testing, " -"and services. Echelon will be adminstering it. Contact him if you would " -"like a VM." +"* We agreed to purchase a second root server for development, testing, and " +"services. Echelon will be adminstering it. Contact him if you would like a " +"VM." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:222 @@ -3665,26 +3415,26 @@ msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:226 msgid "" -"* We met with Welterde about the state of his services including his " -"`open tracker`__. These services are not being adequately maintained and " -"will soon become inaccessible due to crypto changes if they are not " -"upgraded. He committed to upgrading them soon." +"* We met with Welterde about the state of his services including his `open " +"tracker`__. These services are not being adequately maintained and will soon" +" become inaccessible due to crypto changes if they are not upgraded. He " +"committed to upgrading them soon." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:232 msgid "" -"* We met lots of people interested in our `Android app`__. We passed " -"several ideas and bug reports back to str4d. We plan to make a big push " -"to give the app some development love early in the year." +"* We met lots of people interested in our `Android app`__. We passed several" +" ideas and bug reports back to str4d. We plan to make a big push to give the" +" app some development love early in the year." msgstr "" #: i2p2www/blog/2015/01/20/31C3-trip-report.rst:238 msgid "" -"* Regrettably, we didn't get to see too many talks at the Congress, as we" -" were so busy meeting with people. We plan to catch up and `watch them " -"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and" -" Jacob's talk was great. We hear that the cryptography talks were good as" -" well." +"* Regrettably, we didn't get to see too many talks at the Congress, as we " +"were so busy meeting with people. We plan to catch up and `watch them " +"online`__. As usual, Tor's \"State of the Onion\" talk was excellent, and " +"Jacob's talk was great. We hear that the cryptography talks were good as " +"well." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:1 @@ -3701,13 +3451,11 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:13 msgid "" "0.9.18 contains several bug fixes and performance improvements.\n" -"We have shortened the startup time, and reduced latency throughout our " -"network protocols.\n" +"We have shortened the startup time, and reduced latency throughout our network protocols.\n" "We've increased the default connection limits for the fastest routers,\n" "and reduced the thread usage in i2ptunnel.\n" "UPnP fixes should improve handling of external device changes.\n" -"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP " -"fixes." +"CPU usage in high-bandwidth routers may be reduced thanks to some NTCP fixes." msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:33 @@ -3715,7 +3463,8 @@ msgid "Fix parsing of ECDSA address helper in HTTP client proxy" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:34 -msgid "Fix news last-modified processing which prevented notification of update" +msgid "" +"Fix news last-modified processing which prevented notification of update" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:35 @@ -3752,8 +3501,7 @@ msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:46 msgid "" -"Add startup browser configuration with advanced config " -"routerconsole.browser" +"Add startup browser configuration with advanced config routerconsole.browser" msgstr "" #: i2p2www/blog/2015/02/22/0.9.18-Release.rst:47 @@ -3815,21 +3563,16 @@ msgstr "" msgid "" "0.9.19 has several fixes and improvements for floodfill performance.\n" "Many of you saw high CPU usage after 0.9.18 was released.\n" -"This was caused by a combination of increased encryption usage, the big " -"influx of Vuze users into the network,\n" -"reduced floodfills due to tighter performance requirements, and some " -"longstanding bugs.\n" +"This was caused by a combination of increased encryption usage, the big influx of Vuze users into the network,\n" +"reduced floodfills due to tighter performance requirements, and some longstanding bugs.\n" "Things should be a lot better after most of the network has updated.\n" -"As always, the best way to reduce CPU usage is to lower your bandwidth " -"limits." +"As always, the best way to reduce CPU usage is to lower your bandwidth limits." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:21 msgid "" -"We've also added new ways to reseed manually, and to generate a reseed " -"file you can easily share with others who need it.\n" -"See the reseed configuration page in the router console for more " -"information." +"We've also added new ways to reseed manually, and to generate a reseed file you can easily share with others who need it.\n" +"See the reseed configuration page in the router console for more information." msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:35 @@ -3895,7 +3638,8 @@ msgid "Increase min and default bandwidth for i2psnark" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:58 -msgid "Improved strategies for dropping jobs on high job lag to prevent overload" +msgid "" +"Improved strategies for dropping jobs on high job lag to prevent overload" msgstr "" #: i2p2www/blog/2015/04/12/0.9.19-Release.rst:59 @@ -3935,37 +3679,28 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:13 msgid "" -"0.9.20 contains many important bug fixes, and several changes to increase" -" floodfill capacity in the network." -msgstr "" -"0.9.20 conÅ£ine multe remedieri importate de erori ÅŸi câteva schimbări " -"pentru a creÅŸte capacitatea de adăugare în reÅ£ea." +"0.9.20 contains many important bug fixes, and several changes to increase " +"floodfill capacity in the network." +msgstr "0.9.20 conÅ£ine multe remedieri importate de erori ÅŸi câteva schimbări pentru a creÅŸte capacitatea de adăugare în reÅ£ea." #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:17 msgid "" -"Routers configured for 32-64 KB of shared bandwidth may now become " -"floodfill,\n" -"and routers configured for 512 KB or more of shared bandwidth will have " -"higher connection limits.\n" +"Routers configured for 32-64 KB of shared bandwidth may now become floodfill,\n" +"and routers configured for 512 KB or more of shared bandwidth will have higher connection limits.\n" "These changes may cause your router to use more resources.\n" -"If the router becomes too busy, the best way to reduce usage is to lower " -"the bandwidth settings in your console.\n" -"If that doesn't help, you may now disable automatic floodfill on the " -"advanced configuration page in the console." +"If the router becomes too busy, the best way to reduce usage is to lower the bandwidth settings in your console.\n" +"If that doesn't help, you may now disable automatic floodfill on the advanced configuration page in the console." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:25 msgid "" -"We're hopeful that these changes will increase network capacity and " -"performance,\n" -"and reduce the congestion that's been affecting the network the last " -"three months." +"We're hopeful that these changes will increase network capacity and performance,\n" +"and reduce the congestion that's been affecting the network the last three months." msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:35 msgid "" -"Finally, we're excited to announce our first-ever I2P meetup, in Toronto " -"August 15-16.\n" +"Finally, we're excited to announce our first-ever I2P meetup, in Toronto August 15-16.\n" "There will be lots of presentations and tutorials. All are welcome.\n" "For more information, see the `announcement`_." msgstr "" @@ -3984,8 +3719,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:53 msgid "" -"Raise connection limits for new classes 'P' (512-2000 KBps share " -"bandwidth) and 'X' (over 2000 KBps)" +"Raise connection limits for new classes 'P' (512-2000 KBps share bandwidth) " +"and 'X' (over 2000 KBps)" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:54 @@ -3997,7 +3732,8 @@ msgid "Clock skew fixes" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:62 -msgid "Fixes and configuration for when IPv4 is firewalled but IPv6 still works" +msgid "" +"Fixes and configuration for when IPv4 is firewalled but IPv6 still works" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:63 @@ -4070,8 +3806,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:86 msgid "" -"Add Bloom filter warning when configured for high bandwidth but not " -"enough memory" +"Add Bloom filter warning when configured for high bandwidth but not enough " +"memory" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:87 @@ -4084,8 +3820,7 @@ msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:89 msgid "" -"Better error handling and user feedback when HTTP client tunnel is " -"disabled" +"Better error handling and user feedback when HTTP client tunnel is disabled" msgstr "" #: i2p2www/blog/2015/06/02/0.9.20-Release.rst:90 @@ -4118,19 +3853,13 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:13 msgid "" -"The I2P team is proud to announce that we are going to host a meetup in " -"Toronto on August 15-16.\n" -"A number of members of our community will be attending and are going to " -"host talks, workshops and discussions about and relating to I2P. This " -"event is not just for I2P people though, it's meant for everyone." +"The I2P team is proud to announce that we are going to host a meetup in Toronto on August 15-16.\n" +"A number of members of our community will be attending and are going to host talks, workshops and discussions about and relating to I2P. This event is not just for I2P people though, it's meant for everyone." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:18 msgid "" -"If you're curious about I2P, interested in privacy/cryptography/anonymity" -" or just want to come by and talk to us, please do. This is an event for " -"everyone. If you're not familiar with any of these topics, come by anyway" -" and we'll show you how I2P works and what you can do with it.\n" +"If you're curious about I2P, interested in privacy/cryptography/anonymity or just want to come by and talk to us, please do. This is an event for everyone. If you're not familiar with any of these topics, come by anyway and we'll show you how I2P works and what you can do with it.\n" "\n" "The event is entirely free, you don't need to sign up or register." msgstr "" @@ -4138,9 +3867,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:24 msgid "" "The meetup couldn't have been arranged without our friends at `Toronto " -"Crypto <https://torontocrypto.org/>`_ which have been helping us organize" -" the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are" -" providing us with a very nice space." +"Crypto <https://torontocrypto.org/>`_ which have been helping us organize " +"the event, and our friends at `Hacklab <https://hacklab.to/>`_ which are " +"providing us with a very nice space." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:28 @@ -4168,9 +3897,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:55 msgid "" -"The focus will be on an introduction to topics surrounding I2P, privacy " -"and anonymity online. People of all backgrounds and knowledge levels are " -"welcome to attend." +"The focus will be on an introduction to topics surrounding I2P, privacy and " +"anonymity online. People of all backgrounds and knowledge levels are welcome" +" to attend." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:59 @@ -4187,9 +3916,9 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:63 msgid "" -"The crypto party will contain a number of stations where " -"privacy/anonymity software will be demoed. The goal is to provide people " -"with the tools they need to communicate securely." +"The crypto party will contain a number of stations where privacy/anonymity " +"software will be demoed. The goal is to provide people with the tools they " +"need to communicate securely." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:67 @@ -4210,11 +3939,10 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:72 msgid "" -"We're currently looking for help staffing the stations. If you want to " -"help out, you can! Bring a monitor/laptop and run a station. The station " -"could be any of the ones listed above, or any other privacy/anonymity " -"related one you would like to run. Please contact us at `@geti2p`_ if " -"you're interested." +"We're currently looking for help staffing the stations. If you want to help " +"out, you can! Bring a monitor/laptop and run a station. The station could be" +" any of the ones listed above, or any other privacy/anonymity related one " +"you would like to run. Please contact us at `@geti2p`_ if you're interested." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:81 @@ -4224,8 +3952,8 @@ msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:86 msgid "" "The focus will be on in-depth topics surrounding I2P, the roadmap and " -"development. Anyone is welcome to attend, but the content will be " -"somewhat technical." +"development. Anyone is welcome to attend, but the content will be somewhat " +"technical." msgstr "" #: i2p2www/blog/2015/06/02/Toronto-Meetup.rst:90 @@ -4261,35 +3989,26 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:14 msgid "" -"I2PCon is the first event of its kind. It has two short term goals. Where" -" the\n" -"first one is to provide the general public with an event where knowledge " -"about\n" -"privacy and privacy concerns can be obtained. The second goal is to " -"further the\n" -"I2P project and its community. This will take the shape of technical " -"discussions\n" +"I2PCon is the first event of its kind. It has two short term goals. Where the\n" +"first one is to provide the general public with an event where knowledge about\n" +"privacy and privacy concerns can be obtained. The second goal is to further the\n" +"I2P project and its community. This will take the shape of technical discussions\n" "about cryptography, anonymity and I2P centric topics." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:22 msgid "" -"There is a larger and more long-term goal of this event, and it is to " -"build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we would like to provide a forum where this " -"community\n" +"There is a larger and more long-term goal of this event, and it is to build a\n" +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we would like to provide a forum where this community\n" "can grow." msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:29 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" -"`Toronto Crypto`_. The venue and everything relating to it is provided by" -"\n" -"`Hacklab`_. Without either of them this event would not have been " -"possible, so\n" +"`Toronto Crypto`_. The venue and everything relating to it is provided by\n" +"`Hacklab`_. Without either of them this event would not have been possible, so\n" "thank you both." msgstr "" @@ -4299,12 +4018,9 @@ msgstr "" #: i2p2www/blog/2015/07/16/I2PCon.rst:49 msgid "" -"I2PCon is entirely free to attend! We ask you to register `here`__, to " -"give us\n" -"an estimate of how many people will be attending. No identifying " -"information has\n" -"to be given in order to register, but if you have any concerns, please " -"let us\n" +"I2PCon is entirely free to attend! We ask you to register `here`__, to give us\n" +"an estimate of how many people will be attending. No identifying information has\n" +"to be given in order to register, but if you have any concerns, please let us\n" "know." msgstr "" @@ -4349,26 +4065,15 @@ msgstr "" #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:13 msgid "" -"0.9.21 contains several changes to add capacity to the network, increase " -"the efficiency of the floodfills,\n" +"0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,\n" "and use bandwidth more effectively.\n" -"We have migrated the shared clients tunnels to ECDSA signatures and added" -" a DSA fallback\n" -"using the new \"multisession\" capability for those sites that don't " -"support ECDSA." -msgstr "" -"0.9.21 conÈ›ine mai multe modificări pentru a adăuga capacitate la reÈ›ea, " -"creÈ™te eficienÈ›a impotriva inundaÈ›iilor in retea\n" -"È™i utilizarea lățimii de bandă mai eficient.\n" -"Am migrat clienÈ›ii partajaÈ›i a tunelurilor pentru semnături ECDSA È™i am " -"adăugat ca soluÈ›ie de rezervă semnături DSA\n" -"folosind noua capacitate \"multi-sesiune\" pentru acele site-uri care nu " -"acceptă ECDSA." +"We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback\n" +"using the new \"multisession\" capability for those sites that don't support ECDSA." +msgstr "0.9.21 conÈ›ine mai multe modificări pentru a adăuga capacitate la reÈ›ea, creÈ™te eficienÈ›a impotriva inundaÈ›iilor in retea\nÈ™i utilizarea lățimii de bandă mai eficient.\nAm migrat clienÈ›ii partajaÈ›i a tunelurilor pentru semnături ECDSA È™i am adăugat ca soluÈ›ie de rezervă semnături DSA\nfolosind noua capacitate \"multi-sesiune\" pentru acele site-uri care nu acceptă ECDSA." #: i2p2www/blog/2015/07/31/0.9.21-Release.rst:20 msgid "" -"The speakers and the schedule of the I2PCon in Toronto 2015 have been " -"announced.\n" +"The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.\n" "Have a look on the `I2PCon page`_ for details.\n" "Reserve your seat on `Eventbrite`_." msgstr "" @@ -4480,21 +4185,15 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:14 msgid "" -"I2PCon has been a giant success. For us, the I2P contributors, it " -"represents a\n" -"leap forward in terms of what we're capable of pulling off as a " -"community, how we\n" -"communicate the usecases of I2P and reach out to privacy conscious " -"individuals.\n" +"I2PCon has been a giant success. For us, the I2P contributors, it represents a\n" +"leap forward in terms of what we're capable of pulling off as a community, how we\n" +"communicate the usecases of I2P and reach out to privacy conscious individuals.\n" "\n" -"By arranging this event, we've also grown our community. People who've " -"previously\n" -"only lurked on our irc channels, or run our software or possibly hadn't " -"even heard\n" +"By arranging this event, we've also grown our community. People who've previously\n" +"only lurked on our irc channels, or run our software or possibly hadn't even heard\n" "of I2P are now a part of our comminuty.\n" "\n" -"This event has been our first active step towards building a large and " -"inclusive\n" +"This event has been our first active step towards building a large and inclusive\n" "community, and as such it's been great success." msgstr "" @@ -4502,11 +4201,9 @@ msgstr "" msgid "" "Minutiae\n" "========\n" -"On day 2 we had two short discussion sessions. A more general discussion " -"and a roadmapping discussion.\n" +"On day 2 we had two short discussion sessions. A more general discussion and a roadmapping discussion.\n" "\n" -"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P " -"Discussion session minutiae`_." +"The minutiae can be found here: `I2P Roadmap session minutiae`_ and `I2P Discussion session minutiae`_." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:37 @@ -4535,32 +4232,25 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:62 msgid "" -"We've had some wonderful speakers, from both inside- and outside of our " -"community.\n" +"We've had some wonderful speakers, from both inside- and outside of our community.\n" "\n" -"`David Dagon`_ talked to us about the way forward and how I2P could " -"handle potential abuse.\n" +"`David Dagon`_ talked to us about the way forward and how I2P could handle potential abuse.\n" "\n" -"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us" -" his thoughts about how far I2P has come.\n" +"`Lance James`_ - the creator of our predecessor iip - said Hi and gave us his thoughts about how far I2P has come.\n" "\n" -"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and " -"why you should care." +"`Nick Johnston`_ gave us a wonderful talk about why privacy matters and why you should care." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:72 msgid "" -"I would also like to thank the speakers from our community. `psi`_, " -"`@str4d`_ and `zzz`_ who all had\n" -"wonderful talks. Improving our ability to inform people about I2P is " -"something that\n" +"I would also like to thank the speakers from our community. `psi`_, `@str4d`_ and `zzz`_ who all had\n" +"wonderful talks. Improving our ability to inform people about I2P is something that\n" "is going to be important for us going forward." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:78 msgid "" -"I would like to thank `Sadie`_ and Siew for helping us out with marketing" -" and graphics.\n" +"I would like to thank `Sadie`_ and Siew for helping us out with marketing and graphics.\n" "Without you I2PCon would've been a very different event." msgstr "" @@ -4572,43 +4262,39 @@ msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:87 msgid "" -"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto " -"Crypto`_ for their help during the event." +"I would like to thank `@darknetj`_, P and `@hizeena`_ of `Toronto Crypto`_ " +"for their help during the event." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:91 msgid "" -"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV " -"and doing all of the post-production\n" +"I would like to thank `@z3r0fox`_ for doing a wonderful job with the AV and doing all of the post-production\n" "work for the videos of all the talks." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:96 msgid "" -"I would like to thank `@killyourtv_i2p`_ for hosting a very popular " -"crypto party station." +"I would like to thank `@killyourtv_i2p`_ for hosting a very popular crypto " +"party station." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:100 msgid "" -"Thanks to our new favorite journalist `@robinlevinson`_, for showing an " -"interest in our cause and\n" +"Thanks to our new favorite journalist `@robinlevinson`_, for showing an interest in our cause and\n" "educating yourself about the technologies involved." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:105 msgid "" -"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very " -"much made this event better." +"Thanks for all the pizza `@Panago_Pizza`_, it keept us going. You very much " +"made this event better." msgstr "" #: i2p2www/blog/2015/08/20/I2PCon_Mission_Accomplished.rst:109 msgid "" -"Finally I would like to thank everyone else who just showed up to the " -"event and helped out in any way\n" +"Finally I would like to thank everyone else who just showed up to the event and helped out in any way\n" "they could.\n" -"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was " -"most excellent to hang out\n" +"ComradeNosebleed, LazyGravy, `cacapo`_, Xmz, ZeroRax, `echelon`_, it was most excellent to hang out\n" "with you." msgstr "" @@ -4625,26 +4311,11 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:13 msgid "" -"0.9.22 contains fixes for i2psnark getting stuck before completion, and " -"begins the migration of router infos to new, stronger Ed25519 signatures." -"\n" -"To reduce network churn, your router will have only a small probability " -"of converting to Ed25519 at each restart.\n" -"When it does rekey, expect to see lower bandwidth usage for a couple of " -"days as it reintegrates into the network with its new identity.\n" -"If all goes well, we will accelerate the rekeying process in the next " -"release." -msgstr "" -"0.9.22 conÈ›ine remedieri pentru i2psnark care se bloca inainte de " -"finalizare, È™i începe migrarea informaÅ£ilor routerului la noi, mai " -"puternice semnături Ed25519.\n" -"Pentru a reduce abandonul de reÈ›ea, router-ul va avea doar o mică " -"probabilitate de conversie la Ed25519 la fiecare repornire.\n" -"Atunci când se recodifică, vă puteÅ£i aÈ™teapta să vedeÅ£i utilizarea " -"lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in" -" reÈ›ea cu noua identitate.\n" -"Dacă totul merge bine, vom accelera procesul de recodificare în " -"următoarea lansare." +"0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.\n" +"To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.\n" +"When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.\n" +"If all goes well, we will accelerate the rekeying process in the next release." +msgstr "0.9.22 conÈ›ine remedieri pentru i2psnark care se bloca inainte de finalizare, È™i începe migrarea informaÅ£ilor routerului la noi, mai puternice semnături Ed25519.\nPentru a reduce abandonul de reÈ›ea, router-ul va avea doar o mică probabilitate de conversie la Ed25519 la fiecare repornire.\nAtunci când se recodifică, vă puteÅ£i aÈ™teapta să vedeÅ£i utilizarea lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in reÈ›ea cu noua identitate.\nDacă totul merge bine, vom accelera procesul de recodificare în următoarea lansare." #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:20 msgid "" @@ -4662,14 +4333,13 @@ msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:46 msgid "" -"Fix i2psnark getting stuck before download complete, and not deleting " -"temp files" +"Fix i2psnark getting stuck before download complete, and not deleting temp " +"files" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:47 msgid "" -"Fix starting of torrents added by copying torrent file to i2psnark " -"directory" +"Fix starting of torrents added by copying torrent file to i2psnark directory" msgstr "" #: i2p2www/blog/2015/09/12/0.9.22-Release.rst:48 @@ -4698,10 +4368,8 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:15 msgid "" "Greetings!\n" -"This is the first in a long series of blogs to help the community see " -"what is happening in the I2P community.\n" -"Since many awesome events are happening *inside* the network, we think it" -" will be worthwhile to talk about some of activities here." +"This is the first in a long series of blogs to help the community see what is happening in the I2P community.\n" +"Since many awesome events are happening *inside* the network, we think it will be worthwhile to talk about some of activities here." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:21 @@ -4712,16 +4380,14 @@ msgstr "" msgid "" "Let's face it -- our console needs improvement.\n" "Our site could use an update as well.\n" -"We are looking for feedback on how to improve the usability of I2P for " -"new and existing users!" +"We are looking for feedback on how to improve the usability of I2P for new and existing users!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:29 msgid "" "Any and all feedback is welcome.\n" "Please contact `@GetI2P`_, `@str4d`_, or `@YrB1rd`_.\n" -"If you don't feel comfortable using Twitter, we are always available via " -"the in-network IRC channel.\n" +"If you don't feel comfortable using Twitter, we are always available via the in-network IRC channel.\n" "You don't have to be a long time user.\n" "We want to hear from all sorts of people!" msgstr "" @@ -4733,36 +4399,27 @@ msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:43 msgid "" "On 03 November there was an I2P developer meeting (`log`_).\n" -"This meeting focused on adding new links to the router console, " -"preparation for CCC, finding a replacement for forum.i2p, and website " -"improvements." +"This meeting focused on adding new links to the router console, preparation for CCC, finding a replacement for forum.i2p, and website improvements." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:50 msgid "" "The consensus was to not add dogecoindark.i2p.\n" -"There are concerns about usability due to many images being included on " -"the page.\n" -"Exchanged.i2p is conditionally added, as long as the maintainer adds a " -"disclaimer on the site.\n" -"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was " -"lenta.i2p (a russian news site)." +"There are concerns about usability due to many images being included on the page.\n" +"Exchanged.i2p is conditionally added, as long as the maintainer adds a disclaimer on the site.\n" +"I2Pwiki.i2p (a backup of ugha.i2p, an older wiki) was accepted, as was lenta.i2p (a russian news site)." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:57 msgid "" -"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used" -" for developer's services.\n" -"He also suggested a more formalized technical proposal system, with more " -"prominence on the main website." +"str4d proposed blocking off the \\*.i2p.i2p namespace so they can be used for developer's services.\n" +"He also suggested a more formalized technical proposal system, with more prominence on the main website." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:62 msgid "" -"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos " -"Computer Congress.\n" -"More details are to come on this, but we can promise there will be " -"stickers." +"The I2P Team is going to be in Hamburg, Germany for the 32nd Chaos Computer Congress.\n" +"More details are to come on this, but we can promise there will be stickers." msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:67 @@ -4770,13 +4427,14 @@ msgid "General Announcements" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:69 -msgid "Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" +msgid "" +"Thank you to `TorontoCrypto`_ for hosting the newest I2P reseed server!" msgstr "" #: i2p2www/blog/2015/11/15/Community-Outreach.rst:75 msgid "" -"Translation deadline Thursday, 12 November, translators please update. " -"All translations are done via `Transifex`_ ." +"Translation deadline Thursday, 12 November, translators please update. All " +"translations are done via `Transifex`_ ." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:1 @@ -4790,22 +4448,14 @@ msgstr "" msgid "" "0.9.23 contains a variety of bug fixes, and some minor improvements in " "I2PSnark" -msgstr "" -"0.9.23 conÈ›ine o varietate de erori remediate, È™i unele îmbunătățiri " -"minore în I2PSnark" +msgstr "0.9.23 conÈ›ine o varietate de erori remediate, È™i unele îmbunătățiri minore în I2PSnark" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:13 msgid "" -"Hello I2P! This is the first release signed by me (str4d), after 49 " -"releases\n" -"signed by zzz. This is an important test of our redundancy for all " -"things,\n" +"Hello I2P! This is the first release signed by me (str4d), after 49 releases\n" +"signed by zzz. This is an important test of our redundancy for all things,\n" "including people." -msgstr "" -"Salut I2P! Aceasta este prima lansare semnata de mine (str4d), după 49 " -"lansari\n" -"semnate de zzz. Acesta este un test important al redundanÈ›ei noastre " -"pentru toate lucrurile, inclusiv a oameniilor." +msgstr "Salut I2P! Aceasta este prima lansare semnata de mine (str4d), după 49 lansari\nsemnate de zzz. Acesta este un test important al redundanÈ›ei noastre pentru toate lucrurile, inclusiv a oameniilor." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:19 msgid "Housekeeping" @@ -4813,29 +4463,20 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:24 msgid "" -"My signing key has been in router updates for over two years (since " -"0.9.9), so\n" -"if you are on a recent version of I2P this update should be just as easy " -"as\n" -"every other update. However, if you are running an older version than " -"0.9.9, you\n" -"will first need to manually update to a recent version. Update files for " -"recent\n" -"versions `can be downloaded here`__, and instructions on how to manually " -"update\n" -"`are provided here`__. Once you have manually updated, your router will " -"then find\n" +"My signing key has been in router updates for over two years (since 0.9.9), so\n" +"if you are on a recent version of I2P this update should be just as easy as\n" +"every other update. However, if you are running an older version than 0.9.9, you\n" +"will first need to manually update to a recent version. Update files for recent\n" +"versions `can be downloaded here`__, and instructions on how to manually update\n" +"`are provided here`__. Once you have manually updated, your router will then find\n" "and download the 0.9.23 update as usual." msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:38 msgid "" -"If you installed I2P via a package manager, you are not affected by the " -"change,\n" +"If you installed I2P via a package manager, you are not affected by the change,\n" "and can update as usual." -msgstr "" -"ÃŽn cazul în care instalaÈ›i I2P printr-un manager de pachete, nu sunteÈ›i " -"afectat de modificare, È™i puteÈ›i actualiza ca de obicei." +msgstr "ÃŽn cazul în care instalaÈ›i I2P printr-un manager de pachete, nu sunteÈ›i afectat de modificare, È™i puteÈ›i actualiza ca de obicei." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:43 msgid "" @@ -4845,49 +4486,26 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:48 msgid "" -"The migration of RouterInfos to new, stronger Ed25519 signatures is going" -" well,\n" -"with at least half of the network already estimated to have rekeyed. This" -"\n" -"release accelerates the rekeying process. To reduce network churn, your " -"router\n" -"will have a small probability of converting to Ed25519 at each restart. " -"When it\n" -"does rekey, expect to see lower bandwidth usage for a couple of days as " -"it\n" +"The migration of RouterInfos to new, stronger Ed25519 signatures is going well,\n" +"with at least half of the network already estimated to have rekeyed. This\n" +"release accelerates the rekeying process. To reduce network churn, your router\n" +"will have a small probability of converting to Ed25519 at each restart. When it\n" +"does rekey, expect to see lower bandwidth usage for a couple of days as it\n" "reintegrates into the network with its new identity." -msgstr "" -"Migrarea informaÅ£ilor routerului la noi, mai puternice Ed25519 semnături " -"merge bine,\n" -"cu cel puÈ›in jumătate din reÅ£eaua deja estimată a fi recodificată. " -"Această versiune accelerează procesul de recodificare. Pentru a reduce " -"abandonul de reÅ£ea, routerul dumneavoastră va avea o probabilitate mică " -"de conversie la Ed25519 la fiecare repornire. Atunci când se recodifică, " -"vă puteÅ£i aÈ™teapta să vedeÅ£i utilizarea lățimii de bandă mai mică pentru " -"câteva zile, deoarece se reintegrează in reÈ›ea cu noua identitate." +msgstr "Migrarea informaÅ£ilor routerului la noi, mai puternice Ed25519 semnături merge bine,\ncu cel puÈ›in jumătate din reÅ£eaua deja estimată a fi recodificată. Această versiune accelerează procesul de recodificare. Pentru a reduce abandonul de reÅ£ea, routerul dumneavoastră va avea o probabilitate mică de conversie la Ed25519 la fiecare repornire. Atunci când se recodifică, vă puteÅ£i aÈ™teapta să vedeÅ£i utilizarea lățimii de bandă mai mică pentru câteva zile, deoarece se reintegrează in reÈ›ea cu noua identitate." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:57 msgid "" -"Note that this will be the last release to support Java 6. Please update " -"to\n" -"Java 7 or 8 as soon as possible. We are already working to make I2P " -"compatible\n" +"Note that this will be the last release to support Java 6. Please update to\n" +"Java 7 or 8 as soon as possible. We are already working to make I2P compatible\n" "with the upcoming Java 9, and some of that work is in this release." -msgstr "" -"ReÈ›ineÈ›i că acest lucru va fi ultima versiune care mai suportă Java 6. Vă" -" rugăm să actualizaÈ›i la Java 7 sau 8 cât mai curând posibil. Noi deja " -"lucrăm pentru a face I2P compatibil cu viitorul Java 9, È™i o parte din " -"această muncă se regăseÈ™te in această versiune." +msgstr "ReÈ›ineÈ›i că acest lucru va fi ultima versiune care mai suportă Java 6. Vă rugăm să actualizaÈ›i la Java 7 sau 8 cât mai curând posibil. Noi deja lucrăm pentru a face I2P compatibil cu viitorul Java 9, È™i o parte din această muncă se regăseÈ™te in această versiune." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:63 msgid "" -"We have also made some minor improvements in I2PSnark, and added a new " -"page in\n" +"We have also made some minor improvements in I2PSnark, and added a new page in\n" "the routerconsole for viewing older news items." -msgstr "" -"Am făcut, de asemenea, unele îmbunătățiri minore în I2PSnark, È™i am " -"adăugat o nouă pagină în consola router-ului pentru vizualizarea È™tirilor" -" mai vechi." +msgstr "Am făcut, de asemenea, unele îmbunătățiri minore în I2PSnark, È™i am adăugat o nouă pagină în consola router-ului pentru vizualizarea È™tirilor mai vechi." #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:78 msgid "Accelerate transition to Ed25519" @@ -4895,14 +4513,13 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:83 msgid "" -"Fix some bugs soft restarting after a large clock shift (e.g. resume) " -"(but more to do)" +"Fix some bugs soft restarting after a large clock shift (e.g. resume) (but " +"more to do)" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:84 msgid "" -"Fix streaming retransmission timers that were dying, and related timer " -"bugs" +"Fix streaming retransmission timers that were dying, and related timer bugs" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:85 @@ -4946,7 +4563,8 @@ msgid "Detect for broken ECDSA support in Gentoo" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:98 -msgid "Console: Add a Java 6 warning, this is the last release to support Java 6" +msgid "" +"Console: Add a Java 6 warning, this is the last release to support Java 6" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:99 @@ -4955,8 +4573,8 @@ msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:100 msgid "" -"Pass Accept-Encoding header through client and server proxies, to allow " -"end-to-end compression" +"Pass Accept-Encoding header through client and server proxies, to allow end-" +"to-end compression" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:103 @@ -4972,7 +4590,8 @@ msgid "Save magnet parameters across restart" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:106 -msgid "Don't delete .torrent file on errors at startup, rename to .torrent.BAD" +msgid "" +"Don't delete .torrent file on errors at startup, rename to .torrent.BAD" msgstr "" #: i2p2www/blog/2015/11/19/0.9.23-Release.rst:107 @@ -5004,8 +4623,7 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:13 msgid "" -"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and " -"eche|on." +"Attending: Sadie, Colin, lazygravy, zzz, hottuna, kytv, cacapo, and eche|on." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:17 @@ -5013,21 +4631,15 @@ msgid "" "Start\n" "=====\n" "The project has had another successful year at CCC.\n" -"We would like to thank the volunteers at `32C3`__ for all of their help " -"in organizing this event and for being accommodating hosts for us.\n" -"Many I2P contributors were able to attend this year's Congress due to " -"many of the generous donations from supporters like you to the project.\n" -"If you would like to fund I2P, please see `our donation page`__ for more " -"information." +"We would like to thank the volunteers at `32C3`__ for all of their help in organizing this event and for being accommodating hosts for us.\n" +"Many I2P contributors were able to attend this year's Congress due to many of the generous donations from supporters like you to the project.\n" +"If you would like to fund I2P, please see `our donation page`__ for more information." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:29 msgid "" -"Just like previous years we were located in Noisy Square, located near " -"the EFF's table.\n" -"This proved to be an ideal spot for us as our table was almost always " -"busy with current and new users who were interested in I2P, many of whom " -"we wouldn't have otherwise had the ability to talk to." +"Just like previous years we were located in Noisy Square, located near the EFF's table.\n" +"This proved to be an ideal spot for us as our table was almost always busy with current and new users who were interested in I2P, many of whom we wouldn't have otherwise had the ability to talk to." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:63 @@ -5042,13 +4654,10 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:72 msgid "" -"If you don't know what a reseed server is, it is first the connection new" -" routers use to find peers.\n" -"There was a lot of discussion around the current status of the reseed " -"network right now.\n" +"If you don't know what a reseed server is, it is first the connection new routers use to find peers.\n" +"There was a lot of discussion around the current status of the reseed network right now.\n" "As always, more reseed operators are needed!\n" -"If you would like to strengthen the reseed infrastructure, (or if you're " -"talented with Go) email `backup -at- i2pmail.org`__." +"If you would like to strengthen the reseed infrastructure, (or if you're talented with Go) email `backup -at- i2pmail.org`__." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:81 @@ -5059,16 +4668,11 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:86 msgid "" -"Due to the decentralized nature of I2P detecting Sybil attacks is not as " -"straight forward as on other networks (i.e. Tor).\n" -"To mitigate this zzz has been working on a new router-based Sybil " -"detection tool.\n" -"To be brief, the tool runs in the router, and collects information on " -"floodfills your router is currently aware of.\n" -"Currently the tool is mainly collecting a baseline and does not act on " -"any of the information it is collecting.\n" -"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as " -"it is still in active development" +"Due to the decentralized nature of I2P detecting Sybil attacks is not as straight forward as on other networks (i.e. Tor).\n" +"To mitigate this zzz has been working on a new router-based Sybil detection tool.\n" +"To be brief, the tool runs in the router, and collects information on floodfills your router is currently aware of.\n" +"Currently the tool is mainly collecting a baseline and does not act on any of the information it is collecting.\n" +"Expect to see a writeup on this more as 0.9.25 or 0.9.26 approaches, as it is still in active development" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:94 @@ -5080,21 +4684,15 @@ msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:99 msgid "" "On the 30th we held an in person `meeting`__ at our table.\n" -"The meeting focused on organizationally preparing for more project " -"management, and public relations (both from Sadie)." +"The meeting focused on organizationally preparing for more project management, and public relations (both from Sadie)." msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:106 msgid "" -"We discussed how much of the work done on I2P is lost in the commits and " -"there is not much to see for our users.\n" -"To remedy this lazygravy plans on preparing a series of posts explaining " -"some technical topics in I2P.\n" -"The initial ideas that we discussed writing posts on are what encrypted " -"lease sets are, why different tunnel types are needed, and some " -"observations seen in `I2Spy`__.\n" -"But these are just the start and we would like to hear feedback on topics" -" we should write about!" +"We discussed how much of the work done on I2P is lost in the commits and there is not much to see for our users.\n" +"To remedy this lazygravy plans on preparing a series of posts explaining some technical topics in I2P.\n" +"The initial ideas that we discussed writing posts on are what encrypted lease sets are, why different tunnel types are needed, and some observations seen in `I2Spy`__.\n" +"But these are just the start and we would like to hear feedback on topics we should write about!" msgstr "" #: i2p2www/blog/2016/01/23/32C3.rst:115 @@ -5161,42 +4759,32 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:11 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:11 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:11 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:11 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:11 msgid "Update details" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:18 msgid "" -"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and " -"efficiency improvements.\n" +"0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.\n" "Note that this release is the first to require Java 7.\n" "Please update to Java 7 or 8 as soon as possible.\n" "Your router will not automatically update if you are using Java 6." -msgstr "" -"0.9.24 conÈ›ine o nouă versiune de SAM (v3.2), precum È™i numeroase " -"remedieri de erori dar È™i îmbunătățiri ale eficienÈ›ei.\n" -"ReÈ›ineÈ›i că această versiune este prima care necesită Java 7.\n" -"Vă rugăm să actualizaÈ›i la Java 7 sau 8, cât mai curând posibil.\n" -"Router-ul nu se va actualiza automat dacă utilizaÈ›i Java 6." +msgstr "0.9.24 conÈ›ine o nouă versiune de SAM (v3.2), precum È™i numeroase remedieri de erori dar È™i îmbunătățiri ale eficienÈ›ei.\nReÈ›ineÈ›i că această versiune este prima care necesită Java 7.\nVă rugăm să actualizaÈ›i la Java 7 sau 8, cât mai curând posibil.\nRouter-ul nu se va actualiza automat dacă utilizaÈ›i Java 6." #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:25 msgid "" -"To prevent the problems caused by the ancient commons-logging library, we" -" have removed it.\n" -"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by " -"HungryHobo) to crash if they have IMAP enabled.\n" -"The recommended fix is to replace your old I2P-Bote plugin with the " -"current one signed by str4d.\n" +"To prevent the problems caused by the ancient commons-logging library, we have removed it.\n" +"This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.\n" +"The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.\n" "For more details, see `this post`__." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:34 msgid "" -"We had a great `32C3 Congress`__ and are making good progress on our 2016" -" project plans.\n" -"Echelon gave a talk on I2P's history and current status, and his slides " -"are `available here`__ (pdf).\n" -"Str4d attended `Real World Crypto`__ and gave a talk on our crypto " -"migration, his slides are `here`__ (pdf)." +"We had a great `32C3 Congress`__ and are making good progress on our 2016 project plans.\n" +"Echelon gave a talk on I2P's history and current status, and his slides are `available here`__ (pdf).\n" +"Str4d attended `Real World Crypto`__ and gave a talk on our crypto migration, his slides are `here`__ (pdf)." msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:58 @@ -5205,8 +4793,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:59 msgid "" -"SAM 3.2, with several new advanced features, command parser improvements," -" and lots of bug fixes" +"SAM 3.2, with several new advanced features, command parser improvements, " +"and lots of bug fixes" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:60 @@ -5231,8 +4819,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:69 msgid "" -"Don't remove tunnel on next-hop failure indication from transport, it " -"isn't reliable" +"Don't remove tunnel on next-hop failure indication from transport, it isn't " +"reliable" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:70 @@ -5240,13 +4828,13 @@ msgid "Fix formatting in summary bar to prevent overflow" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:71 -msgid "Fix console links in i2ptunnel error pages when on nonstandard host/port" +msgid "" +"Fix console links in i2ptunnel error pages when on nonstandard host/port" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:72 msgid "" -"Don't query floodfills whose version is too old to support encrypted " -"replies" +"Don't query floodfills whose version is too old to support encrypted replies" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:73 @@ -5293,8 +4881,8 @@ msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:87 msgid "" -"Don't offer to introduce unless requested, to introduce only those that " -"need it" +"Don't offer to introduce unless requested, to introduce only those that need" +" it" msgstr "" #: i2p2www/blog/2016/01/27/0.9.24-Release.rst:88 @@ -5359,6 +4947,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:71 #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:88 #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:92 +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:89 +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:61 msgid "Full list of fixed bugs" msgstr "" @@ -5375,30 +4965,17 @@ msgstr "0.9.25 conÈ›ine SAM 3.3, coduri QR, È™i erori remediate" #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:18 msgid "" -"0.9.25 contains a major new version of SAM, v3.3, to support " -"sophisticated multiprotocol applications.\n" +"0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.\n" "It adds QR codes for sharing hidden service addresses with others,\n" "and \"identicon\" images for visually distinguishing addresses." -msgstr "" -"0.9.25 conÈ›ine o nouă versiune majoră a SAM, v3.3, pentru a sprijini " -"aplicaÈ›iile Multiprotocol sofisticate.\n" -"Aceasta adaugă codurile QR pentru partajarea adreselor de servicii " -"ascunse cu alte persoane È™i imagini \"identicon\" pentru adrese vizuale " -"distinctive." +msgstr "0.9.25 conÈ›ine o nouă versiune majoră a SAM, v3.3, pentru a sprijini aplicaÈ›iile Multiprotocol sofisticate.\nAceasta adaugă codurile QR pentru partajarea adreselor de servicii ascunse cu alte persoane È™i imagini \"identicon\" pentru adrese vizuale distinctive." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:24 msgid "" "We've added a new \"router family\" configuration page in the console,\n" -"to make it easier to declare that your group of routers is run by a " -"single person.\n" -"There are several changes to increase the capacity of the network and " -"hopefully improve tunnel build success." -msgstr "" -"Am adăugat o nouă pagină de configurare \"familie router\", în consolă, \n" -"pentru a face mai uÈ™or de a declara că grupul dvs. de routere este " -"administrat de o singură persoană.\n" -"Există mai multe modificări pentru a creÈ™te capacitatea reÈ›elei È™i, " -"sperăm, a îmbunătăți construirea tunelelor cu succes." +"to make it easier to declare that your group of routers is run by a single person.\n" +"There are several changes to increase the capacity of the network and hopefully improve tunnel build success." +msgstr "Am adăugat o nouă pagină de configurare \"familie router\", în consolă, \npentru a face mai uÈ™or de a declara că grupul dvs. de routere este administrat de o singură persoană.\nExistă mai multe modificări pentru a creÈ™te capacitatea reÈ›elei È™i, sperăm, a îmbunătăți construirea tunelelor cu succes." #: i2p2www/blog/2016/03/22/0.9.25-Release.rst:40 msgid "Display of identicons and QR codes in address book and i2ptunnel" @@ -5490,34 +5067,26 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:11 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a " -"development program aimed at improving the privacy software ecosystem for" -" both developers and users." +"development program aimed at improving the privacy software ecosystem for " +"both developers and users." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:13 msgid "" -"Over the last few years, the need for users to be in control of their own" -" data\n" -"has become increasingly apparent. Some excellent progress had been made " -"in this\n" -"regard with the rise of messaging apps like Signal_, and file storage " -"systems\n" -"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to " -"the\n" +"Over the last few years, the need for users to be in control of their own data\n" +"has become increasingly apparent. Some excellent progress had been made in this\n" +"regard with the rise of messaging apps like Signal_, and file storage systems\n" +"like Tahoe-LAFS_. The ongoing work of `Let's Encrypt`_ to bring HTTPS to the\n" "whole world is steadily gaining traction." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:21 msgid "" -"But building privacy and anonymity into applications is not trivial. Much" -" of the\n" -"software people use every day was not designed to be privacy-preserving, " -"and the\n" +"But building privacy and anonymity into applications is not trivial. Much of the\n" +"software people use every day was not designed to be privacy-preserving, and the\n" "tools developers have available are generally not easy to work with. The\n" -"recently-published OnionScan_ survey gives some insight into just how " -"easy it is\n" -"for even technical users to mis-configure their services, completely " -"undermining\n" +"recently-published OnionScan_ survey gives some insight into just how easy it is\n" +"for even technical users to mis-configure their services, completely undermining\n" "their intentions." msgstr "" @@ -5530,16 +5099,14 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:41 msgid "" "We are pleased to announce that this summer, I2P will be embarking on a\n" -"development program aimed at improving the privacy software ecosystem. " -"Our goal\n" -"is to make life easier both for developers wanting to leverage I2P in " -"their\n" -"applications, and for users trying to configure and run their apps " -"through I2P." +"development program aimed at improving the privacy software ecosystem. Our goal\n" +"is to make life easier both for developers wanting to leverage I2P in their\n" +"applications, and for users trying to configure and run their apps through I2P." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:48 -msgid "We will be focusing our time this summer into three complementary areas:" +msgid "" +"We will be focusing our time this summer into three complementary areas:" msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:52 @@ -5550,19 +5117,15 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:57 msgid "" -"In June, we will be updating the various libraries that exist for " -"interfacing\n" -"with I2P. We have made significant progress this year on extending our " -"SAM_ API\n" -"with additional features, such as support for datagrams and ports. We " -"plan to\n" +"In June, we will be updating the various libraries that exist for interfacing\n" +"with I2P. We have made significant progress this year on extending our SAM_ API\n" +"with additional features, such as support for datagrams and ports. We plan to\n" "make these features easily accessible in our C++ and Python libraries." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:64 msgid "" -"We will also soon be making it much easier for Java and Android " -"developers to\n" +"We will also soon be making it much easier for Java and Android developers to\n" "add I2P support to their applications. Stay tuned!" msgstr "" @@ -5574,18 +5137,12 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:76 msgid "" -"In July we will be working with applications that have expressed interest" -" in\n" -"adding support for I2P. There are some really neat ideas being developed " -"in the\n" -"privacy space right now, and we want to help their communities leverage " -"over a\n" -"decade of research and development on peer-to-peer anonymity. Extending " -"these\n" -"applications to work natively over I2P is a good step forward for " -"usability, and\n" -"in the process will improve how these applications think about and handle" -" user\n" +"In July we will be working with applications that have expressed interest in\n" +"adding support for I2P. There are some really neat ideas being developed in the\n" +"privacy space right now, and we want to help their communities leverage over a\n" +"decade of research and development on peer-to-peer anonymity. Extending these\n" +"applications to work natively over I2P is a good step forward for usability, and\n" +"in the process will improve how these applications think about and handle user\n" "information." msgstr "" @@ -5597,12 +5154,9 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:91 msgid "" -"Finally, in August we will turn out attention to the apps we bundle " -"inside I2P,\n" -"and the wider array of plugins. Some of these are due for some love, to " -"make\n" -"them more user-friendly - as well as fix any outstanding bugs! We hope " -"that\n" +"Finally, in August we will turn out attention to the apps we bundle inside I2P,\n" +"and the wider array of plugins. Some of these are due for some love, to make\n" +"them more user-friendly - as well as fix any outstanding bugs! We hope that\n" "longtime I2P supporters will enjoy the outcome of this work." msgstr "" @@ -5617,14 +5171,10 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:104 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:131 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -" usable\n" -"websites or interfaces, or writing guides for users: come and chat with " -"us on\n" -"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our " -"community, both\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing usable\n" +"websites or interfaces, or writing guides for users: come and chat with us on\n" +"IRC or Twitter! We are always happy to \"see\" new \"faces\" in our community, both\n" "inside and outside I2P. We'll be sending I2P stickers out to all new\n" "contributors taking part (or possibly other pending I2P goodies)!" msgstr "" @@ -5632,24 +5182,18 @@ msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:113 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:140 msgid "" -"Likewise, if you are an application developer who wants a hand with " -"integrating\n" -"I2P, or even just to chat about the concepts or details: get in touch! If" -" you\n" -"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ " -"or\n" -"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or " -"FreeNode." +"Likewise, if you are an application developer who wants a hand with integrating\n" +"I2P, or even just to chat about the concepts or details: get in touch! If you\n" +"want to get involved in our July Apps month, contact `@GetI2P`_, `@i2p`_ or\n" +"`@str4d`_ on Twitter. You can also find us in #i2p-dev on OFTC or FreeNode." msgstr "" #: i2p2www/blog/2016/06/01/I2P-Summer-Dev.rst:120 #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:147 #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:131 msgid "" -"We'll be posting here as we go, but you can also follow our progress, and" -" share\n" -"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring" -" on the\n" +"We'll be posting here as we go, but you can also follow our progress, and share\n" +"your own ideas and work, with the hashtag `#I2PSummer`_ on Twitter. Bring on the\n" "summer!" msgstr "" @@ -5662,11 +5206,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:11 msgid "" -"0.9.26 contains crypto updates, Debian packaging improvements, and bug " -"fixes" -msgstr "" -"0.9.26 conÈ›ine actualizări criptografice, îmbunătățiri de instalare pe " -"Debian, È™i remedieri de erori" +"0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes" +msgstr "0.9.26 conÈ›ine actualizări criptografice, îmbunătățiri de instalare pe Debian, È™i remedieri de erori" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:13 msgid "" @@ -5679,41 +5220,22 @@ msgid "" "0.9.26 contains a major upgrade to our native crypto library,\n" "a new addressbook subscription protocol with signatures,\n" "and major improvements to the Debian/Ubuntu packaging." -msgstr "" -"0.9.26 conÈ›ine o actualizare majoră pentru biblioteca criptografică " -"nativă,\n" -"un nou protocol de abonament cu semnături în Addressbook,\n" -"È™i îmbunătățiri majore pentru instalarea in sistemele Debian / Ubuntu." +msgstr "0.9.26 conÈ›ine o actualizare majoră pentru biblioteca criptografică nativă,\nun nou protocol de abonament cu semnături în Addressbook,\nÈ™i îmbunătățiri majore pentru instalarea in sistemele Debian / Ubuntu." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:31 msgid "" -"For crypto, we have upgraded to GMP 6.0.0, and added support for newer " -"processors,\n" +"For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,\n" "which will speed up crypto operations considerably.\n" -"Also, we are now using constant-time GMP functions to prevent side-" -"channel attacks.\n" -"For caution, the GMP changes are enabled for new installs and " -"Debian/Ubuntu builds only;\n" +"Also, we are now using constant-time GMP functions to prevent side-channel attacks.\n" +"For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;\n" "we will include them for in-net updates in the 0.9.27 release." -msgstr "" -"Pentru criptografie, am actualizat la GMP 6.0.0, È™i am adăugat suport " -"pentru procesoare mai noi,\n" -"care va accelera operaÈ›iunile criptografice considerabil.\n" -"De asemenea, de acum folosim funcÈ›ii GMP constante de timp pentru a " -"preveni atacurile de canal lateral.\n" -"Pentru precauÈ›ie, modificările GMP sunt activate pentru noi instalări È™i " -"doar de instalare în Debian / Ubuntu;\n" -"noi le vom include în actualizările de reÈ›ea în versiunea 0.9.27." +msgstr "Pentru criptografie, am actualizat la GMP 6.0.0, È™i am adăugat suport pentru procesoare mai noi,\ncare va accelera operaÈ›iunile criptografice considerabil.\nDe asemenea, de acum folosim funcÈ›ii GMP constante de timp pentru a preveni atacurile de canal lateral.\nPentru precauÈ›ie, modificările GMP sunt activate pentru noi instalări È™i doar de instalare în Debian / Ubuntu;\nnoi le vom include în actualizările de reÈ›ea în versiunea 0.9.27." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:39 msgid "" -"For Debian/Ubuntu builds, we have added dependencies on several packages," -"\n" +"For Debian/Ubuntu builds, we have added dependencies on several packages,\n" "including Jetty 8 and geoip, and removed the equivalent bundled code." -msgstr "" -"Pentru construcÈ›ia pachetelor în Debian / Ubuntu, am adăugat dependinÈ›e " -"la mai multe pachete, inclusiv Jetty 8 È™i GeoIP, È™i am eliminat codul " -"pachet echivalent." +msgstr "Pentru construcÈ›ia pachetelor în Debian / Ubuntu, am adăugat dependinÈ›e la mai multe pachete, inclusiv Jetty 8 È™i GeoIP, È™i am eliminat codul pachet echivalent." #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:44 msgid "" @@ -5723,10 +5245,10 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:59 msgid "" -"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant " -"speedups on newer architectures, and constant-time crypto operations " -"(new installs and Debian/Ubuntu builds only, will include in the updates " -"in the next release, 0.9.27)" +"GMP 6.0.0 and jbigi/jcpuid native libraries, enabling significant speedups " +"on newer architectures, and constant-time crypto operations (new installs " +"and Debian/Ubuntu builds only, will include in the updates in the next " +"release, 0.9.27)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:60 @@ -5739,8 +5261,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:62 msgid "" -"Enhance hosts blockfile format to allow for multiple destinations per " -"entry" +"Enhance hosts blockfile format to allow for multiple destinations per entry" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:63 @@ -5749,8 +5270,7 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:64 msgid "" -"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu " -"packages" +"Remove systray4j.jar from non-Windows installers and Debian/Ubuntu packages" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:65 @@ -5768,8 +5288,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:67 msgid "" -"Enhancements to the desktopgui system tray feature, to be enabled by " -"default in next release" +"Enhancements to the desktopgui system tray feature, to be enabled by default" +" in next release" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:68 @@ -5784,8 +5304,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:75 msgid "" -"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual" -" fix)" +"Fix wrapper on FreeBSD 10 (new installs only, see ticket #1118 for manual " +"fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:76 @@ -5794,8 +5314,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:77 msgid "" -"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 " -"for manual fix)" +"Fix setting JAVA_HOME on Mac OS X (new installs only, see ticket #1783 for " +"manual fix)" msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:78 @@ -5816,8 +5336,8 @@ msgstr "" #: i2p2www/blog/2016/06/07/0.9.26-Release.rst:87 msgid "" -"Rework resource bundle generation for 20x speedup in build time (requires" -" gettext version 0.19)" +"Rework resource bundle generation for 20x speedup in build time (requires " +"gettext version 0.19)" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:1 @@ -5833,10 +5353,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:13 msgid "" -"We're nearly half-way into the APIs month of Summer Dev, and making great" -"\n" -"progress on a number of fronts. I'm happy to announce that the first of " -"these is\n" +"We're nearly half-way into the APIs month of Summer Dev, and making great\n" +"progress on a number of fronts. I'm happy to announce that the first of these is\n" "complete: the I2P client libraries are now available on Maven Central!" msgstr "" @@ -5844,10 +5362,8 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:51 msgid "" "This should make it much simpler for Java developers to use I2P in their\n" -"applications. Instead of needing to obtain the libraries from a current " -"install,\n" -"they can simply add I2P to their dependencies. Upgrading to new versions " -"will\n" +"applications. Instead of needing to obtain the libraries from a current install,\n" +"they can simply add I2P to their dependencies. Upgrading to new versions will\n" "similarly be much easier." msgstr "" @@ -5871,25 +5387,21 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:39 msgid "" -"Add one or both of these to your project's dependencies, and you're good " -"to go!" +"Add one or both of these to your project's dependencies, and you're good to " +"go!" msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:67 msgid "" -"For other build systems, see the Maven Central pages for the `core`__ and" -"\n" +"For other build systems, see the Maven Central pages for the `core`__ and\n" "`streaming`__ libraries." msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:72 msgid "" -"Android developers should use the `I2P Android client library`__, which " -"contains\n" -"the same libraries along with Android-specific helpers. I'll be updating " -"it soon\n" -"to depend on the new I2P libraries, so that cross-platform applications " -"can work\n" +"Android developers should use the `I2P Android client library`__, which contains\n" +"the same libraries along with Android-specific helpers. I'll be updating it soon\n" +"to depend on the new I2P libraries, so that cross-platform applications can work\n" "natively with either I2P Android or desktop I2P." msgstr "" @@ -5901,10 +5413,8 @@ msgstr "" #: i2p2www/blog/2016/06/13/I2P-on-Maven-Central.rst:89 msgid "" -"See our `application development`__ guide for help getting started with " -"these\n" -"libraries. You can also chat with us about them in #i2p-dev on IRC. And " -"if you\n" +"See our `application development`__ guide for help getting started with these\n" +"libraries. You can also chat with us about them in #i2p-dev on IRC. And if you\n" "do start using them, let us know what you're working on with the hashtag\n" "`#I2PSummer`__ on Twitter!" msgstr "" @@ -5918,26 +5428,22 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:11 msgid "" -"In the first month of Summer Dev, we have improved the usability of our " -"APIs for Java, Android, and Python developers." +"In the first month of Summer Dev, we have improved the usability of our APIs" +" for Java, Android, and Python developers." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:13 msgid "" -"Summer Dev is in full swing: we've been busy greasing wheels, sanding " -"edges, and\n" -"tidying the place up. Now it's time for our first roundup, where we bring" -" you up\n" +"Summer Dev is in full swing: we've been busy greasing wheels, sanding edges, and\n" +"tidying the place up. Now it's time for our first roundup, where we bring you up\n" "to speed on the progress we are making!" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:19 msgid "" "\n" -"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us" -" the\n" -"fantastic logo you see above. It adds a cheerful personality to our " -"development\n" +"But first, a big thank you to `Elio Qoshi`__ and `ura`__ for designing us the\n" +"fantastic logo you see above. It adds a cheerful personality to our development\n" "program (and is going to look great on t-shirts)." msgstr "" @@ -5949,48 +5455,37 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:33 msgid "" -"Our goal for this month was to \"blend in\" - to make our APIs and " -"libraries work\n" -"within the existing infrastructure of various communities, so that " -"application\n" -"developers can work with I2P more efficiently, and users don't need to " -"worry\n" +"Our goal for this month was to \"blend in\" - to make our APIs and libraries work\n" +"within the existing infrastructure of various communities, so that application\n" +"developers can work with I2P more efficiently, and users don't need to worry\n" "about the details." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:43 msgid "" -"The I2P client libraries are now available on `Maven Central`__ ! See our" -"\n" +"The I2P client libraries are now available on `Maven Central`__ ! See our\n" "`previous blog post`__ for full details.\n" msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:58 msgid "" -"The `I2P Android client library`__ has also been updated to use the new " -"I2P\n" -"libraries. This means that cross-platform applications can work natively " -"with\n" +"The `I2P Android client library`__ has also been updated to use the new I2P\n" +"libraries. This means that cross-platform applications can work natively with\n" "either I2P Android or desktop I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:71 msgid "" -"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work" -"\n" +"The `Twisted`__ plugin ``txi2p`` now supports in-I2P ports, and will work\n" "seamlessly over local, remote, and port-forwarded `SAM APIs`__. See its\n" -"`documentation`__ for usage instructions, and report any issues on " -"`GitHub`__." +"`documentation`__ for usage instructions, and report any issues on `GitHub`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:84 msgid "" -"The first (beta) version of ``i2psocket`` has been released! This is a " -"direct\n" -"replacement for the standard Python ``socket`` library that extends it " -"with I2P\n" -"support over the SAM API. See its `GitHub page`__ for usage instructions," -" and\n" +"The first (beta) version of ``i2psocket`` has been released! This is a direct\n" +"replacement for the standard Python ``socket`` library that extends it with I2P\n" +"support over the SAM API. See its `GitHub page`__ for usage instructions, and\n" "to report any issues." msgstr "" @@ -6002,15 +5497,15 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:98 msgid "" -"zzz has been hard at work on Syndie, getting a headstart on Plugins " -"month. You can follow his progress on `the development forum thread`__." +"zzz has been hard at work on Syndie, getting a headstart on Plugins month. " +"You can follow his progress on `the development forum thread`__." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:100 msgid "" -"psi has been creating an I2P test network using i2pd, and in the process " -"has found and fixed several i2pd bugs that will improve its compatibility" -" with Java I2P." +"psi has been creating an I2P test network using i2pd, and in the process has" +" found and fixed several i2pd bugs that will improve its compatibility with " +"Java I2P." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:104 @@ -6021,21 +5516,16 @@ msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:109 msgid "" -"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a " -"long time\n" -"been home to one of the `largest public grids`__, using a patched version" -" of\n" -"Tahoe-LAFS. During Apps month we will be helping them with their ongoing " -"work to\n" -"add native support for I2P and Tor, so that I2P users can benefit from " -"all of\n" +"We are excited to be working with `Tahoe-LAFS`__ in July! I2P has for a long time\n" +"been home to one of the `largest public grids`__, using a patched version of\n" +"Tahoe-LAFS. During Apps month we will be helping them with their ongoing work to\n" +"add native support for I2P and Tor, so that I2P users can benefit from all of\n" "the improvements upstream." msgstr "" #: i2p2www/blog/2016/07/02/Summer-Dev-roundup-APIs.rst:117 msgid "" -"There are several other projects that we will be talking with about their" -" plans\n" +"There are several other projects that we will be talking with about their plans\n" "for I2P integration, and helping with design. Stay tuned!" msgstr "" @@ -6053,19 +5543,9 @@ msgstr "0.9.27 conÈ›ine remedieri de erori" #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:18 msgid "" "0.9.27 contains a number of bug fixes.\n" -"The updated GMP library for crypto acceleration, which was bundled in the" -" 0.9.26 release for new installs and Debian builds only, is now included " -"in the in-network update for 0.9.27.\n" -"There are improvements in IPv6 transports, SSU peer testing, and hidden " -"mode." -msgstr "" -"0.9.27 conÈ›ine o serie de remedieri de erori.\n" -"Biblioteca GMP actualizată pentru accelerarea criptografică, care a fost " -"inclusă în \n" -"versiunea 0.9.26 pentru noi instalări È™i doar pentru sistemele Debian, " -"este acum inclusă în actualizarea în reÈ›ea pentru 0.9.27.\n" -"Există îmbunătățiri în domeniul transporturilor IPv6, testarea " -"partenerului SSU, È™i a modului ascuns." +"The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.\n" +"There are improvements in IPv6 transports, SSU peer testing, and hidden mode." +msgstr "0.9.27 conÈ›ine o serie de remedieri de erori.\nBiblioteca GMP actualizată pentru accelerarea criptografică, care a fost inclusă în \nversiunea 0.9.26 pentru noi instalări È™i doar pentru sistemele Debian, este acum inclusă în actualizarea în reÈ›ea pentru 0.9.27.\nExistă îmbunătățiri în domeniul transporturilor IPv6, testarea partenerului SSU, È™i a modului ascuns." #: i2p2www/blog/2016/10/17/0.9.27-Release.rst:24 msgid "" @@ -6162,34 +5642,17 @@ msgstr "0.9.28 conÈ›ine remedieri de erori" #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:18 msgid "" -"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number " -"of bundled software packages including Jetty.\n" -"There are fixes for the IPv6 peer testing feature introduced last " -"release.\n" -"We continue improvements to detect and block peers that are potentially " -"malicious.\n" -"There are preliminary fixes for Java 9, although we do not yet recommend " -"Java 9 for general use." -msgstr "" -"0.9.28 conÈ›ine remedieri pentru peste 25 de bilete Trac, È™i actualizări " -"pentru un număr de pachete de programe incluse, inclusiv Jetty.\n" -"CorecÈ›ii pentru funcÈ›ia de testare a partener la partener IPv6 introdusă " -"la ultima lansare.\n" -"Vom continua să îmbunătățim detectarea È™i blocarea partenerilor de reÈ›ea," -" care sunt potenÈ›ial rău intenÈ›ionaÈ›i.\n" -"Aici sunt corecÈ›ii preliminare pentru Java 9, cu toate că nu recomandăm " -"încă Java 9 pentru uz general." +"0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.\n" +"There are fixes for the IPv6 peer testing feature introduced last release.\n" +"We continue improvements to detect and block peers that are potentially malicious.\n" +"There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "0.9.28 conÈ›ine remedieri pentru peste 25 de bilete Trac, È™i actualizări pentru un număr de pachete de programe incluse, inclusiv Jetty.\nCorecÈ›ii pentru funcÈ›ia de testare a partener la partener IPv6 introdusă la ultima lansare.\nVom continua să îmbunătățim detectarea È™i blocarea partenerilor de reÈ›ea, care sunt potenÈ›ial rău intenÈ›ionaÈ›i.\nAici sunt corecÈ›ii preliminare pentru Java 9, cu toate că nu recomandăm încă Java 9 pentru uz general." #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:25 msgid "" -"I2P will be at 33C3, please stop by our table and give us your ideas on " -"how to improve the network.\n" +"I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.\n" "We will review our 2017 roadmap and priorities 2017 at the Congress." -msgstr "" -"I2P va fi la 33C3, vă rugăm să vă opriÈ›i la masa noastră È™i să ne daÈ›i " -"idei cu privire la modul de îmbunătățire a reÈ›elei.\n" -"Vom analiza foaia noastră de parcurs a lui 2017 È™i prioritățile lui 2017 " -"la Congres." +msgstr "I2P va fi la 33C3, vă rugăm să vă opriÈ›i la masa noastră È™i să ne daÈ›i idei cu privire la modul de îmbunătățire a reÈ›elei.\nVom analiza foaia noastră de parcurs a lui 2017 È™i prioritățile lui 2017 la Congres." #: i2p2www/blog/2016/12/12/0.9.28-Release.rst:50 msgid "Fix version test for SSU IPv6 peer testing" @@ -6364,24 +5827,13 @@ msgstr "0.9.29 conÈ›ine remedieri de erori" #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:18 msgid "" -"0.9.29 contains fixes for numerous Trac tickets, including workarounds " -"for corrupt compressed messages.\n" +"0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.\n" "We now support NTP over IPv6.\n" "We've added preliminary Docker support.\n" "We now have translated man pages.\n" "We now pass same-origin Referer headers through the HTTP proxy.\n" -"There are more fixes for Java 9, although we do not yet recommend Java 9 " -"for general use." -msgstr "" -"0.9.29 conÈ›ine remedieri pentru numeroase bilete Trac, inclusiv soluÈ›ii " -"pentru mesajele comprimate corupte.\n" -"Acum suportăm NTP peste IPv6.\n" -"Am adăugat suport preliminar Docker.\n" -"Am tradus acum paginile man.\n" -"Acum trecem antetele adresei URL sursă de acelaÈ™i origine prin proxy " -"HTTP.\n" -"Există mai multe corecÈ›ii pentru Java 9, cu toate că nu recomandăm încă " -"Java 9 pentru uz general." +"There are more fixes for Java 9, although we do not yet recommend Java 9 for general use." +msgstr "0.9.29 conÈ›ine remedieri pentru numeroase bilete Trac, inclusiv soluÈ›ii pentru mesajele comprimate corupte.\nAcum suportăm NTP peste IPv6.\nAm adăugat suport preliminar Docker.\nAm tradus acum paginile man.\nAcum trecem antetele adresei URL sursă de acelaÈ™i origine prin proxy HTTP.\nExistă mai multe corecÈ›ii pentru Java 9, cu toate că nu recomandăm încă Java 9 pentru uz general." #: i2p2www/blog/2017/02/27/0.9.29-Release.rst:37 msgid "BOB database refactor" @@ -6492,11 +5944,9 @@ msgstr "" #: i2p2www/blog/2017/03/04/0.9.29-Windows-Installer-Fix.rst:18 msgid "" -"The 0.9.29 Windows installer posted on our website two days ago fails " -"during install with an Exception.\n" +"The 0.9.29 Windows installer posted on our website two days ago fails during install with an Exception.\n" "We have fixed the bug and posted the new installer to our website.\n" -"This does not affect upgrades from previous releases or non-Windows " -"installers.\n" +"This does not affect upgrades from previous releases or non-Windows installers.\n" "We apologize for the issue." msgstr "" @@ -6514,53 +5964,39 @@ msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:18 msgid "" "0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.\n" -"The previous versions are no longer supported, and are not available in " -"the upcoming Debian Stretch and Ubuntu Zesty releases." +"The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:23 msgid "" -"The router will migrate the jetty.xml configuration file for each Jetty " -"website to the new Jetty 9 setup.\n" -"This should work for recent, unmodified configurations but may not work " -"for modified or very old setups.\n" -"Verify that your Jetty website works after upgrading, and contact us on " -"IRC if you need assistance." +"The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.\n" +"This should work for recent, unmodified configurations but may not work for modified or very old setups.\n" +"Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:29 msgid "" "Several plugins are not compatible with Jetty 9 and must be updated.\n" -"The following plugins have been updated to work with 0.9.30, and your " -"router should update them after restart:" +"The following plugins have been updated to work with 0.9.30, and your router should update them after restart:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:35 msgid "" -"The following plugins (with current versions listed) will not work with " -"0.9.30.\n" +"The following plugins (with current versions listed) will not work with 0.9.30.\n" "Contact the appropriate plugin developer for the status of new versions:" msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:41 msgid "" -"This release also supports migration of old (2014 and earlier) DSA-SHA1 " -"hidden services to the more-secure EdDSA signature type.\n" -"See http://zzz.i2p/topics/2271 for further information, including a guide" -" and FAQ." +"This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.\n" +"See http://zzz.i2p/topics/2271 for further information, including a guide and FAQ." msgstr "" #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:46 msgid "" -"Note: On non-Android ARM platforms such as the Raspberry Pi, the " -"blockfile database will upgrade on restart, which may take several " -"minutes.\n" +"Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.\n" "Please be patient." -msgstr "" -"Notă: pe platforme non-Android ARM, cum ar fi Raspberry Pi, baza de date " -"blocfile va face upgrade la repornire, ceea ce poate dura câteva minute." -"\n" -"Te rog fii rabdator." +msgstr "Notă: pe platforme non-Android ARM, cum ar fi Raspberry Pi, baza de date blocfile va face upgrade la repornire, ceea ce poate dura câteva minute.\nTe rog fii rabdator." #: i2p2www/blog/2017/05/03/0.9.30-Release.rst:61 msgid "Jetty 9, Tomcat 8" @@ -6671,41 +6107,32 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:11 msgid "" -"This year's Summer Dev will be focused on metrics collection and " -"performance improvements for the network." +"This year's Summer Dev will be focused on metrics collection and performance" +" improvements for the network." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:13 msgid "" "It's that time of year again! We're embarking on our summer development\n" -"programme, where we focus on a particular aspect of I2P to push it " -"forward. For\n" -"the next three months, we'll be encouraging both new contributors and " -"existing\n" +"programme, where we focus on a particular aspect of I2P to push it forward. For\n" +"the next three months, we'll be encouraging both new contributors and existing\n" "community members to pick a task and have fun with it!" msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:20 msgid "" -"`Last year`__, we focused on helping users and developers leverage I2P, " -"by\n" -"improving API tooling and giving some love to applications that run over " -"I2P.\n" -"This year, we want to improve the user experience by working on an aspect" -" that\n" +"`Last year`__, we focused on helping users and developers leverage I2P, by\n" +"improving API tooling and giving some love to applications that run over I2P.\n" +"This year, we want to improve the user experience by working on an aspect that\n" "affects everyone: performance." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:29 msgid "" -"Despite onion-routing networks often being called \"low-latency\" " -"networks, there\n" -"is significant overhead created by routing traffic through additional " -"computers.\n" -"I2P's unidirectional tunnel design means that by default, a round trip " -"between\n" -"two Destinations will involve twelve participants! Improving the " -"performance of\n" +"Despite onion-routing networks often being called \"low-latency\" networks, there\n" +"is significant overhead created by routing traffic through additional computers.\n" +"I2P's unidirectional tunnel design means that by default, a round trip between\n" +"two Destinations will involve twelve participants! Improving the performance of\n" "these participants will help to both reduce the latency of end-to-end\n" "connections [1]_, and increase the quality of tunnels network-wide." msgstr "" @@ -6728,11 +6155,9 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:52 msgid "" -"We can't tell if we improve performance without a baseline! We'll be " -"creating a\n" +"We can't tell if we improve performance without a baseline! We'll be creating a\n" "metrics system for collecting usage and performance data about I2P in a\n" -"privacy-preserving way, as well as porting various benchmarking tools to " -"run\n" +"privacy-preserving way, as well as porting various benchmarking tools to run\n" "over I2P (e.g. iperf3_)." msgstr "" @@ -6744,10 +6169,8 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:66 msgid "" -"There's a lot of scope for improving the performance of our existing " -"code, to\n" -"e.g. reduce the overhead of participating in tunnels. We will be looking " -"at\n" +"There's a lot of scope for improving the performance of our existing code, to\n" +"e.g. reduce the overhead of participating in tunnels. We will be looking at\n" "potential improvements to:" msgstr "" @@ -6777,14 +6200,10 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:86 msgid "" -"We have several open proposals for improving the scalability of the I2P " -"network\n" -"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We " -"will be\n" -"working on these proposals, and begin implementing the finalised ones in " -"the\n" -"various network routers. The more feedback these proposals receive, the " -"sooner\n" +"We have several open proposals for improving the scalability of the I2P network\n" +"(e.g. Prop115_, Prop123_, Prop124_, Prop125_, Prop138_, Prop140_). We will be\n" +"working on these proposals, and begin implementing the finalised ones in the\n" +"various network routers. The more feedback these proposals receive, the sooner\n" "we can roll them out, and the sooner I2P services can start using them!" msgstr "" @@ -6796,46 +6215,36 @@ msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:106 msgid "" -"I2P is a packet-switched network, like the internet it runs on top of. " -"This\n" -"gives us significant flexibility in how we route packets, both for " -"performance\n" +"I2P is a packet-switched network, like the internet it runs on top of. This\n" +"gives us significant flexibility in how we route packets, both for performance\n" "and privacy. The majority of this flexibility is unexplored! We want to\n" -"encourage research into how various clearnet techniques for improving " -"bandwidth\n" +"encourage research into how various clearnet techniques for improving bandwidth\n" "can be applied to I2P, and how they might affect the privacy of network\n" "participants." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:120 msgid "" -"We have many more ideas for things we'd like to get done in these areas. " -"If\n" -"you're interested in hacking on privacy and anonymity software, designing" -"\n" -"protocols (cryptographic or otherwise), or researching future ideas - " -"come and\n" -"chat with us on IRC or Twitter! We are always happy to welcome newcomers " -"into\n" -"our community, both inside and outside the I2P network. We'll also be " -"sending\n" -"I2P stickers out to all new contributors taking part! If you want to chat" -" about\n" -"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You" -" can\n" +"We have many more ideas for things we'd like to get done in these areas. If\n" +"you're interested in hacking on privacy and anonymity software, designing\n" +"protocols (cryptographic or otherwise), or researching future ideas - come and\n" +"chat with us on IRC or Twitter! We are always happy to welcome newcomers into\n" +"our community, both inside and outside the I2P network. We'll also be sending\n" +"I2P stickers out to all new contributors taking part! If you want to chat about\n" +"a specific idea, contact `@GetI2P`_, `@i2p`_ or `@str4d`_ on Twitter. You can\n" "also find us in #i2p-dev on OFTC or Freenode." msgstr "" #: i2p2www/blog/2017/06/01/Summer-Dev-2017-MOAR-Speed.rst:142 msgid "" -"Low-latency onion-routing networks are vulnerable to traffic confirmation" -" attacks, so it would be reasonable to ask whether improved performance " +"Low-latency onion-routing networks are vulnerable to traffic confirmation " +"attacks, so it would be reasonable to ask whether improved performance " "equates to reduced privacy. Some latency can help privacy if applied " "correctly via random delays or batching (neither of which are currently " -"employed by any general-purpose onion-routing network). However, if a " -"tunnel has uniform overall latency, then traffic confirmation attacks " -"should be just as viable with or without that latency; thus there should " -"be little statistical difference when the latency is reduced uniformly." +"employed by any general-purpose onion-routing network). However, if a tunnel" +" has uniform overall latency, then traffic confirmation attacks should be " +"just as viable with or without that latency; thus there should be little " +"statistical difference when the latency is reduced uniformly." msgstr "" #: i2p2www/blog/2017/08/07/0.9.31-Release.rst:1 @@ -6855,8 +6264,7 @@ msgid "" "We have refreshed the router console to make it easier to understand,\n" "improve accessibility and cross-browser support,\n" "and generally tidy things up.\n" -"This is the first step in a longer-term plan to make the router console " -"more user-friendly.\n" +"This is the first step in a longer-term plan to make the router console more user-friendly.\n" "We have also added torrent ratings and comments support to i2psnark." msgstr "" @@ -6926,19 +6334,10 @@ msgstr "" #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:18 msgid "" -"0.9.32 contains a number of fixes in the router console and associated " -"webapps (addressbook, i2psnark, and susimail).\n" -"We have also changed the way we handle configured hostnames for published" -" router infos, to eliminate some network enumeration attacks via DNS.\n" +"0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).\n" +"We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.\n" "We have added some checks in the console to resist rebinding attacks." -msgstr "" -"0.9.32 conÈ›ine un număr de remedii în consola routerului È™i în " -"aplicaÈ›iile web asociate (addressbook, i2psnark È™i susimail).\n" -"De asemenea, am schimbat modul în care gestionăm numele de gazdă " -"configurat pentru informaÈ›iile publicate despre router, pentru a elimina " -"unele atacuri de enumerare a reÈ›elei prin DNS.\n" -"Am adăugat câteva verificări în consola pentru a rezista atacurilor de " -"reconectare." +msgstr "0.9.32 conÈ›ine un număr de remedii în consola routerului È™i în aplicaÈ›iile web asociate (addressbook, i2psnark È™i susimail).\nDe asemenea, am schimbat modul în care gestionăm numele de gazdă configurat pentru informaÈ›iile publicate despre router, pentru a elimina unele atacuri de enumerare a reÈ›elei prin DNS.\nAm adăugat câteva verificări în consola pentru a rezista atacurilor de reconectare." #: i2p2www/blog/2017/11/07/0.9.32-Release.rst:34 msgid "Disallow hostnames in router addresses (proposal 141)" @@ -6978,22 +6377,11 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:17 msgid "" -"0.9.33 contains a large number of bug fixes, including i2psnark, " -"i2ptunnel, streaming, and SusiMail.\n" -"For those who cannot access the reseed sites directly, we now support " -"several types of proxies for reseeding.\n" +"0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.\n" +"For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.\n" "We now set rate limits by default in the hidden services manager.\n" -"For those that run high-traffic servers, please review and adjust the " -"limits as necessary." -msgstr "" -"0.9.33 conÈ›ine un număr mare de remediere a erorilor, incluzând i2psnark," -" i2ptunnel, streaming È™i SusiMail.\n" -"Pentru cei care nu pot accesa direct site-urile de reseed, suportăm acum" -" mai multe tipuri de proxy-uri pentru reseeding.\n" -"Acum setăm limitele ratei în mod implicit în managerul de servicii " -"ascunse.\n" -"Pentru cei care rulează servere cu trafic ridicat, vă rugăm să consultaÈ›i" -" È™i să ajustaÈ›i limitele după cum este necesar." +"For those that run high-traffic servers, please review and adjust the limits as necessary." +msgstr "0.9.33 conÈ›ine un număr mare de remediere a erorilor, incluzând i2psnark, i2ptunnel, streaming È™i SusiMail.\nPentru cei care nu pot accesa direct site-urile de reseed, suportăm acum mai multe tipuri de proxy-uri pentru reseeding.\nAcum setăm limitele ratei în mod implicit în managerul de servicii ascunse.\nPentru cei care rulează servere cu trafic ridicat, vă rugăm să consultaÈ›i È™i să ajustaÈ›i limitele după cum este necesar." #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:34 msgid "DesktopGui: Enable on OSX" @@ -7080,7 +6468,8 @@ msgid "SusiMail: Fix several issues when using multiple browser tabs" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:62 -msgid "SusuMail: Fix bugs corrupting text attachments and large message bodies" +msgid "" +"SusuMail: Fix bugs corrupting text attachments and large message bodies" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:63 @@ -7147,8 +6536,7 @@ msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:83 msgid "" -"Debian: Remove ecj dependency; replace glassfish with libtaglibs where " -"able" +"Debian: Remove ecj dependency; replace glassfish with libtaglibs where able" msgstr "" #: i2p2www/blog/2018/01/30/0.9.33-Release.rst:84 @@ -7218,12 +6606,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:13 msgid "" -"One of the many things we discussed at 34C3 was what we should focus on " -"for the\n" -"coming year. In particular, we wanted a roadmap that was clear about what" -" we\n" -"want to ensure we get done, vs what would be really nice to have, and be " -"able to\n" +"One of the many things we discussed at 34C3 was what we should focus on for the\n" +"coming year. In particular, we wanted a roadmap that was clear about what we\n" +"want to ensure we get done, vs what would be really nice to have, and be able to\n" "help onboard newcomers to either category. Here is what we came up with:" msgstr "" @@ -7235,14 +6620,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:25 msgid "" -"Many of the current primitives and protocols still retain their original " -"designs\n" -"from circa 2005, and need improvement. We have had a number of open " -"proposals\n" -"for several years with ideas, but forward progress has been slow. We all " -"agreed\n" -"that this needs to be our top priority for 2018. The core components are:" -"\n" +"Many of the current primitives and protocols still retain their original designs\n" +"from circa 2005, and need improvement. We have had a number of open proposals\n" +"for several years with ideas, but forward progress has been slow. We all agreed\n" +"that this needs to be our top priority for 2018. The core components are:\n" "\n" "- New transport protocols (to replace NTCP and SSU). See Prop111_.\n" "- New onion-encryption protocol for building and using tunnels.\n" @@ -7261,8 +6642,7 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:50 msgid "" -"We cannot release new protocol specifications across the entire network " -"without\n" +"We cannot release new protocol specifications across the entire network without\n" "work on all of these areas." msgstr "" @@ -7274,31 +6654,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:60 msgid "" -"One of the benefits of starting the above work now, is that over the last" -" few\n" +"One of the benefits of starting the above work now, is that over the last few\n" "years there have been independent efforts to create simple protocols and\n" -"protocol frameworks that achieve many of the aims we have for our own " -"protocols,\n" -"and have gained traction with the wider community. By leveraging this " -"work, we\n" +"protocol frameworks that achieve many of the aims we have for our own protocols,\n" +"and have gained traction with the wider community. By leveraging this work, we\n" "get a \"force multiplier\" effect:\n" "\n" -"- We benefit from protocol designs, security proofs, and code written by " -"others,\n" +"- We benefit from protocol designs, security proofs, and code written by others,\n" " reducing the amount of work we need to do for the same level of\n" " feature-completeness and security assurances.\n" "\n" -"- Work we do can be leveraged by other communities, increasing their " -"interest in\n" +"- Work we do can be leveraged by other communities, increasing their interest in\n" " collaborating with us, and thinking about I2P as a whole." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:76 msgid "" -"My proposals in particular will be leveraging the `Noise Protocol " -"Framework`_,\n" -"and the `SPHINX packet format`_. I have collaborations lined up with " -"several\n" +"My proposals in particular will be leveraging the `Noise Protocol Framework`_,\n" +"and the `SPHINX packet format`_. I have collaborations lined up with several\n" "people outside I2P for these!" msgstr "" @@ -7310,16 +6683,11 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:90 msgid "" -"On that topic, we've been slowly building interest over the last six " -"months or\n" -"so. Across PETS2017, 34C3, and RWC2018, I've had some very good " -"discussions\n" -"about ways in which we can improve collaboration with the wider " -"community. This\n" -"is really important to ensure we can garner as much review as possible " -"for new\n" -"protocols. The biggest blocker I've seen is the fact that the majority of" -" I2P\n" +"On that topic, we've been slowly building interest over the last six months or\n" +"so. Across PETS2017, 34C3, and RWC2018, I've had some very good discussions\n" +"about ways in which we can improve collaboration with the wider community. This\n" +"is really important to ensure we can garner as much review as possible for new\n" +"protocols. The biggest blocker I've seen is the fact that the majority of I2P\n" "development collaboration currently happens inside I2P itself, which\n" "significantly increases the effort required to contribute." msgstr "" @@ -7328,8 +6696,7 @@ msgstr "" msgid "" "The two priorities in this area are:\n" "\n" -"- Set up a project-run development forum that is accessible both inside " -"and\n" +"- Set up a project-run development forum that is accessible both inside and\n" " outside I2P.\n" "\n" "- Set up mailing lists for review and discussion of proposals (possibly\n" @@ -7340,21 +6707,17 @@ msgstr "" msgid "" "Other goals which are classed as nice-to-have:\n" "\n" -"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit" -"\n" -" clearnet contributions on GitHub while keeping the canonical dev " -"environment\n" +"- Set up a usable git-to-mtn pathway, to enable us to effectively solicit\n" +" clearnet contributions on GitHub while keeping the canonical dev environment\n" " on Monotone.\n" "\n" -"- Write a \"position paper\" that accurately explains I2P to academic " -"audiences,\n" +"- Write a \"position paper\" that accurately explains I2P to academic audiences,\n" " and puts it in context with existing literature." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:123 msgid "" -"I expect that collaborations with people outside I2P will be done " -"entirely on\n" +"I expect that collaborations with people outside I2P will be done entirely on\n" "GitHub, for minimal friction." msgstr "" @@ -7366,24 +6729,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:133 msgid "" -"I2P is now in Debian Sid (their unstable repo) which will stablilise in " -"around a\n" +"I2P is now in Debian Sid (their unstable repo) which will stablilise in around a\n" "year and a half, and has also been pulled into the Ubuntu repository for\n" -"inclusion in the next LTS release in April. We are going to start having " -"I2P\n" -"versions that end up hanging around for years, and we need to ensure we " -"can\n" +"inclusion in the next LTS release in April. We are going to start having I2P\n" +"versions that end up hanging around for years, and we need to ensure we can\n" "handle their presence in the network." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:141 msgid "" -"The primary goal here is to roll out as many of the new protocols as we " -"feasibly\n" -"can in the next year, to hit the next Debian stable release. For those " -"that\n" -"require multi-year rollouts, we should incorporate the forward-" -"compatability\n" +"The primary goal here is to roll out as many of the new protocols as we feasibly\n" +"can in the next year, to hit the next Debian stable release. For those that\n" +"require multi-year rollouts, we should incorporate the forward-compatability\n" "changes as early as we can." msgstr "" @@ -7395,32 +6752,24 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:153 msgid "" -"The Debian model encourages having separate packages for separate " -"components. We\n" -"agreed that decoupling the currently-bundled Java applications from the " -"core\n" +"The Debian model encourages having separate packages for separate components. We\n" +"agreed that decoupling the currently-bundled Java applications from the core\n" "Java router would be beneficial for several reasons:\n" "\n" "- It codifies the boundary between the applications and the router.\n" "\n" -"- It should make it easier to get these apps running with non-Java " -"routers.\n" +"- It should make it easier to get these apps running with non-Java routers.\n" "\n" -"- It would enable third parties to create \"I2P bundles\" containing just" -" the\n" +"- It would enable third parties to create \"I2P bundles\" containing just the\n" " applications they want." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:167 msgid "" -"In combination with the earlier priorities, this moves the main I2P " -"project more\n" -"in the direction of e.g. the Linux kernel. We will spend more time " -"focusing on\n" -"the network itself, leaving third-party developers to focus on " -"applications that\n" -"use the network (something that is significantly easier to do after our " -"work in\n" +"In combination with the earlier priorities, this moves the main I2P project more\n" +"in the direction of e.g. the Linux kernel. We will spend more time focusing on\n" +"the network itself, leaving third-party developers to focus on applications that\n" +"use the network (something that is significantly easier to do after our work in\n" "the last few years on APIs and libraries)." msgstr "" @@ -7432,25 +6781,18 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:180 msgid "" -"There are a bunch of app-level improvements that we want to work on, but " -"do not\n" -"currently have the developer time to do so, given our other priorities. " -"This is\n" -"an area we would love to see new contributors for! Once the above " -"decoupling is\n" -"complete, it will be significantly easier for someone to work on a " -"specific\n" +"There are a bunch of app-level improvements that we want to work on, but do not\n" +"currently have the developer time to do so, given our other priorities. This is\n" +"an area we would love to see new contributors for! Once the above decoupling is\n" +"complete, it will be significantly easier for someone to work on a specific\n" "application independently of the main Java router." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:188 msgid "" -"One such application we would love to have help with is I2P Android. We " -"will be\n" -"keeping it up-to-date with the core I2P releases, and fixing bugs as we " -"can, but\n" -"there is much that could be done to improve the underlying code as well " -"as the\n" +"One such application we would love to have help with is I2P Android. We will be\n" +"keeping it up-to-date with the core I2P releases, and fixing bugs as we can, but\n" +"there is much that could be done to improve the underlying code as well as the\n" "usability." msgstr "" @@ -7462,14 +6804,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:200 msgid "" -"Having said that, we do want to work specifically on Susimail and I2P-" -"Bote fixes\n" -"in the near term (some of which have landed in 0.9.33). They have had " -"less work\n" -"over the last few years than other I2P apps, and so we want to spend some" -" time\n" -"bringing their codebases up to par, and making them easier for new " -"contributors\n" +"Having said that, we do want to work specifically on Susimail and I2P-Bote fixes\n" +"in the near term (some of which have landed in 0.9.33). They have had less work\n" +"over the last few years than other I2P apps, and so we want to spend some time\n" +"bringing their codebases up to par, and making them easier for new contributors\n" "to jump into!" msgstr "" @@ -7481,14 +6819,10 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:213 msgid "" -"We have a large backlog of tickets in a number of I2P subsystems and " -"apps. As\n" -"part of the above stabilisation effort, we would love to clean up some of" -" our\n" -"older long-standing issues. More importantly, we want to ensure that our " -"tickets\n" -"are correctly organised, so that new contributors can find good tickets " -"to work\n" +"We have a large backlog of tickets in a number of I2P subsystems and apps. As\n" +"part of the above stabilisation effort, we would love to clean up some of our\n" +"older long-standing issues. More importantly, we want to ensure that our tickets\n" +"are correctly organised, so that new contributors can find good tickets to work\n" "on." msgstr "" @@ -7500,12 +6834,9 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:226 msgid "" -"One aspect of the above we will be focusing on is keeping in touch with " -"users\n" -"who take the time to report issues. Thank you! The smaller we can make " -"the\n" -"feedback loop, the quicker we can resolve problems that new users face, " -"and the\n" +"One aspect of the above we will be focusing on is keeping in touch with users\n" +"who take the time to report issues. Thank you! The smaller we can make the\n" +"feedback loop, the quicker we can resolve problems that new users face, and the\n" "more likely it is that they keep participating in the community." msgstr "" @@ -7517,15 +6848,13 @@ msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:238 msgid "" -"That all looks very ambitious, and it is! But many of the items above " -"overlap,\n" +"That all looks very ambitious, and it is! But many of the items above overlap,\n" "and with careful planning we can make a serious dent in them." msgstr "" #: i2p2www/blog/2018/02/11/high-level-roadmap.rst:243 msgid "" -"If you are interested in helping with any of the goals above, come chat " -"to us!\n" +"If you are interested in helping with any of the goals above, come chat to us!\n" "You can find us on OFTC and Freenode (#i2p-dev), and Twitter (@GetI2P)." msgstr "" @@ -7551,18 +6880,10 @@ msgstr "" #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:17 msgid "" "0.9.34 contains a lot of bug fixes!\n" -"It also has improvements in SusiMail, IPv6 handling, and tunnel peer " -"selection.\n" +"It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.\n" "We add support for IGD2 schemas in UPnP.\n" -"There's also preparation for more improvements you will see in future " -"releases." -msgstr "" -"0.9.34 conÈ›ine o mulÈ›ime de remedieri a erorilor!\n" -"De asemenea, are îmbunătățiri pentru SusiMail, manipularea IPv6 È™i " -"selecÈ›ia peer-tunel.\n" -"Adăugăm suport pentru schemele IGD2 în UPnP.\n" -"Există, de asemenea, pregătiri pentru mai multe îmbunătățiri pe care le " -"veÈ›i vedea în versiunile viitoare." +"There's also preparation for more improvements you will see in future releases." +msgstr "0.9.34 conÈ›ine o mulÈ›ime de remedieri a erorilor!\nDe asemenea, are îmbunătățiri pentru SusiMail, manipularea IPv6 È™i selecÈ›ia peer-tunel.\nAdăugăm suport pentru schemele IGD2 în UPnP.\nExistă, de asemenea, pregătiri pentru mai multe îmbunătățiri pe care le veÈ›i vedea în versiunile viitoare." #: i2p2www/blog/2018/04/10/0.9.34-Release.rst:34 msgid "SusiMail: Improved startup and memory management" @@ -7624,26 +6945,19 @@ msgstr "0.9.35 cu dosare SusiMail È™i Expert SSL" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:16 msgid "" -"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for " -"setting up HTTPS on your Hidden Service website.\n" +"0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.\n" "We also have the usual collection of bug fixes, especially in SusiMail." -msgstr "" -"0.9.35 adaugă suport pentru dosare în SusiMail È™i un nou expert SSL " -"pentru configurarea HTTPS pe site-ul dvs. de servicii ascunse.\n" -"De asemenea, avem colecÈ›ia uzuală pentru remedierea erorilor, în special " -"în SusiMail." +msgstr "0.9.35 adaugă suport pentru dosare în SusiMail È™i un nou expert SSL pentru configurarea HTTPS pe site-ul dvs. de servicii ascunse.\nDe asemenea, avem colecÈ›ia uzuală pentru remedierea erorilor, în special în SusiMail." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:21 msgid "" "We're hard at work on several things for 0.9.36, including a new OSX " "installer and a faster, more secure transport protocol called NTCP2." -msgstr "" -"Lucram din greu la mai multe lucruri pentru 0.9.36, incluzând un nou " -"program de instalare OSX È™i un protocol de transport mai rapid È™i mai " -"sigur, numit NTCP2." +msgstr "Lucram din greu la mai multe lucruri pentru 0.9.36, incluzând un nou program de instalare OSX È™i un protocol de transport mai rapid È™i mai sigur, numit NTCP2." #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:25 -msgid "I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" +msgid "" +"I2P will be at HOPE in New York City, July 20-22. Find us and say hello!" msgstr "I2P va fi la HOPE în New York City, 20-22 iulie. GăsiÈ›i-ne È™i salutaÈ›i-ne!" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:39 @@ -7663,7 +6977,8 @@ msgid "CPUID: Fix TBM detection" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:48 -msgid "i2psnark: Fix torrents ignoring priority settings when autostart enabled" +msgid "" +"i2psnark: Fix torrents ignoring priority settings when autostart enabled" msgstr "" #: i2p2www/blog/2018/06/26/0.9.35-Release.rst:49 @@ -7739,25 +7054,16 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:20 msgid "" -"I2P's transport protocols were originally developed around 15 years ago. " -"Back \n" -"then, the main goal was to hide the transferred data, not to hide the " -"fact that \n" -"one was using the protocol itself. Nobody thought seriously about " -"protecting \n" -"against DPI (deep packets inspection) and protocols censorship. Times " -"change, \n" -"and even though original transport protocols are still providing strong " -"security, \n" -"there was a demand for a new transport protocol. NTCP2 is designed to " -"resist \n" -"current censorship threats. Mainly, DPI analysis of packets length. Plus," -" the new \n" -"protocol uses the most modern cryptography developments. NTCP2 is based " -"on the \n" +"I2P's transport protocols were originally developed around 15 years ago. Back \n" +"then, the main goal was to hide the transferred data, not to hide the fact that \n" +"one was using the protocol itself. Nobody thought seriously about protecting \n" +"against DPI (deep packets inspection) and protocols censorship. Times change, \n" +"and even though original transport protocols are still providing strong security, \n" +"there was a demand for a new transport protocol. NTCP2 is designed to resist \n" +"current censorship threats. Mainly, DPI analysis of packets length. Plus, the new \n" +"protocol uses the most modern cryptography developments. NTCP2 is based on the \n" "`Noise Protocol Framework`_, with SHA256 \n" -"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) " -"key \n" +"as a hash function and x25519 as an elliptic curve Diffie-Hellman (DH) key \n" "exchange." msgstr "" @@ -7779,23 +7085,17 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:59 msgid "" -"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of " -"ElGamal \n" -"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, " -"and uses \n" -"SipHash for obfuscating the packet's length information. The key " -"derivation \n" +"Compared to our original protocol, NTCP, NTCP2 uses x25519 instead of ElGamal \n" +"for DH function, AEAD/Chaha20/Poly1305 instead of AES-256-CBC/Adler32, and uses \n" +"SipHash for obfuscating the packet's length information. The key derivation \n" "function used in NTCP2 is more complex, now using many HMAC-SHA256 calls." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:66 msgid "" -"i2pd (C++) implementation note: All of the algorithms mentioned above, " -"except \n" -"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the " -"coming \n" -"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is " -"used in \n" +"i2pd (C++) implementation note: All of the algorithms mentioned above, except \n" +"SipHash, are implemented in OpenSSL 1.1.0. SipHash will be added to the coming \n" +"OpenSSL 1.1.1 release. For compatibility with OpenSSL 1.0.2, which is used in \n" "most of the current systems, core i2pd developer \n" "`Jeff Becker`_ has contributed standalone \n" "implementations of missing cryptographic algorithms." @@ -7809,40 +7109,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:82 msgid "" -"NTCP2 requires having a third (x25519) key in addition to existing two " -"(the \n" -"encryption and signature keys). It is called a static key and it has to " -"be added \n" -"to any of RouterInfo addresses as an \"s\" parameter. It is required for " -"both \n" -"NTCP2 initiator (Alice) and responder (Bob). If more than one address " -"supports \n" -"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for " -"all of \n" -"them. Alice's address is allowed to have just the \"s\" parameter without" -" \"host\" \n" -"and \"port\" set. Also, a \"v\" parameter is required, that is currently " -"always set \n" +"NTCP2 requires having a third (x25519) key in addition to existing two (the \n" +"encryption and signature keys). It is called a static key and it has to be added \n" +"to any of RouterInfo addresses as an \"s\" parameter. It is required for both \n" +"NTCP2 initiator (Alice) and responder (Bob). If more than one address supports \n" +"NTCP2, for example, IPv4 and IPv6, \"s\" is required to be the same for all of \n" +"them. Alice's address is allowed to have just the \"s\" parameter without \"host\" \n" +"and \"port\" set. Also, a \"v\" parameter is required, that is currently always set \n" "to \"2\"." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:93 msgid "" -"NTCP2 address can be declared as a separate NTCP2 address or as an old-" -"style \n" -"NTCP address with additional parameters, in which case it will accept " -"both \n" -"NTCP and NTCP2 connections. Java I2P implementation uses the second " -"approach, \n" +"NTCP2 address can be declared as a separate NTCP2 address or as an old-style \n" +"NTCP address with additional parameters, in which case it will accept both \n" +"NTCP and NTCP2 connections. Java I2P implementation uses the second approach, \n" "i2pd (C++ implementation) uses the first." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:100 msgid "" -"If a node accepts NTCP2 connections, it has to publish its RouterInfo " -"with the \n" -"\"i\" parameter, which is used as an initialization vector (IV) for the " -"public \n" +"If a node accepts NTCP2 connections, it has to publish its RouterInfo with the \n" +"\"i\" parameter, which is used as an initialization vector (IV) for the public \n" "encryption key when that node establishes new connections." msgstr "" @@ -7854,14 +7142,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:111 msgid "" -"To establish a connection both sides need to generate pairs of ephemeral " -"x25519 \n" -"keys. Based on those keys and \"static\" keys they derive a set of keys " -"for data \n" -"transferring. Both parties must verify that the other side actually has a" -" \n" -"private key for that static key, and that static key is the same as in " -"RouterInfo." +"To establish a connection both sides need to generate pairs of ephemeral x25519 \n" +"keys. Based on those keys and \"static\" keys they derive a set of keys for data \n" +"transferring. Both parties must verify that the other side actually has a \n" +"private key for that static key, and that static key is the same as in RouterInfo." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:118 @@ -7870,29 +7154,23 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:131 msgid "" -"A common x25519 key, called «input key material», is computed for each " -"message, \n" -"after which message encryption key is generated with a MixKey function. A" -" value \n" +"A common x25519 key, called «input key material», is computed for each message, \n" +"after which message encryption key is generated with a MixKey function. A value \n" "ck (chaining key) is kept while messages are being exchanged. \n" -"That value is used as a final input when generating keys for data " -"transferring." +"That value is used as a final input when generating keys for data transferring." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:138 msgid "" -"MixKey function looks something like this in the C++ implementation of " -"I2P:" +"MixKey function looks something like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:159 msgid "" -"**SessionRequest** message is made of a public x25519 Alice key (32 " -"bytes), a \n" +"**SessionRequest** message is made of a public x25519 Alice key (32 bytes), a \n" "block of data encrypted with AEAD/Chacha20/Poly1305 (16 bytes), a hash \n" "(16 bytes) and some random data in the end (padding). Padding length is \n" -"defined in the encrypted block of data. Encrypted block also contains " -"length of \n" +"defined in the encrypted block of data. Encrypted block also contains length of \n" "the second part of the **SessionConfirmed** message. A block of data is \n" "encrypted and signed with a key derived from Alice's ephemeral key and \n" "Bob's static key. Initial ck value for MixKey function is set to SHA256 \n" @@ -7901,38 +7179,28 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:170 msgid "" -"Since 32 bytes of public x25519 key can be detected by DPI, it is " -"encrypted with \n" -"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" " -"parameter \n" +"Since 32 bytes of public x25519 key can be detected by DPI, it is encrypted with \n" +"AES-256-CBC algorithm using hash of Bob's address as a key and \"i\" parameter \n" "from RouterInfo as an initialization vector (IV)." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:176 msgid "" -"**SessionCreated** message has the same structure as **SessionRequest**, " -"except \n" -"the key is computed based on ephemeral keys of both sides. IV generated " -"after \n" -"encrypting/decrypting public key from **SessionRequest** message is used " -"as IV \n" +"**SessionCreated** message has the same structure as **SessionRequest**, except \n" +"the key is computed based on ephemeral keys of both sides. IV generated after \n" +"encrypting/decrypting public key from **SessionRequest** message is used as IV \n" "for encrypting/decrypting ephemeral public key." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:183 msgid "" "**SessionConfirmed** message has 2 parts: public static key and Alice's \n" -"RouterInfo. The difference from previous messages is that ephemeral " -"public key \n" -"is encrypted with AEAD/Chaha20/Poly1305 using the same key as " -"**SessionCreated**. \n" +"RouterInfo. The difference from previous messages is that ephemeral public key \n" +"is encrypted with AEAD/Chaha20/Poly1305 using the same key as **SessionCreated**. \n" "It leads to increasing first part of the message from 32 to 48 bytes. \n" -"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a" -" new \n" -"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo" -" part \n" -"can also be appended with random data padding, but it is not required, " -"since \n" +"The second part is also encrypted with AEAD/Chaha20/Poly1305, but using a new \n" +"key, computed from Bob's ephemeral key and Alice's static key. RouterInfo part \n" +"can also be appended with random data padding, but it is not required, since \n" "RouterInfo usually has various length." msgstr "" @@ -7944,29 +7212,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:199 msgid "" -"If every hash and key verification has succeeded, a common ck value must " -"be \n" -"present after the last MixKey operation on both sides. This value is used" -" to \n" -"generate two sets of keys <k, sipk, sipiv> for each side of a connection." -" \"k\" is \n" -"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an " -"initial \n" +"If every hash and key verification has succeeded, a common ck value must be \n" +"present after the last MixKey operation on both sides. This value is used to \n" +"generate two sets of keys <k, sipk, sipiv> for each side of a connection. \"k\" is \n" +"a AEAD/Chaha20/Poly1305 key, \"sipk\" is a SipHash key, \"sipiv\" is an initial \n" "value for SipHash IV, that is changed after each use." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:207 msgid "" -"Code used to generate keys looks like this in the C++ implementation of " -"I2P:" +"Code used to generate keys looks like this in the C++ implementation of I2P:" msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:246 msgid "" -"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array " -"are a \n" -"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, " -"but i2pd \n" +"i2pd (C++) implementation note: First 16 bytes of the \"sipkeys\" array are a \n" +"SipHash key, the last 8 bytes are IV. SipHash requires two 8 byte keys, but i2pd \n" "handles them as a single 16 bytes key." msgstr "" @@ -7993,28 +7254,22 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:271 msgid "" -"Message length is obfuscated by applying the XOR function with two first " -"bytes \n" +"Message length is obfuscated by applying the XOR function with two first bytes \n" "of the current SipHash IV." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:276 msgid "" -"Encrypted data part contains blocks of data. Each block is prepended with" -" 3 \n" -"bytes header, that defines block type and block length. Generally, I2NP " -"type \n" -"blocks are transferred, that are I2NP messages with an altered header. " -"One NTCP2 \n" +"Encrypted data part contains blocks of data. Each block is prepended with 3 \n" +"bytes header, that defines block type and block length. Generally, I2NP type \n" +"blocks are transferred, that are I2NP messages with an altered header. One NTCP2 \n" "frame can transfer multiple I2NP blocks." msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:283 msgid "" -"The other important data block type is a random data block. It is " -"recommended to \n" -"add a random data block to every NTCP2 frame. Only one random data block " -"can be \n" +"The other important data block type is a random data block. It is recommended to \n" +"add a random data block to every NTCP2 frame. Only one random data block can be \n" "added and it must be the last block." msgstr "" @@ -8024,12 +7279,8 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:293 msgid "" -"- RouterInfo — usually contains Bob's RouterInfo after the connection " -"has been established, but it can also contain RouterInfo of a random node" -" for the purpose of speeding up floodfills (there is a flags field for " -"that case). \n" -"- Termination — is used when a host explicitly terminates a connection " -"and specifies a reason for that.\n" +"- RouterInfo — usually contains Bob's RouterInfo after the connection has been established, but it can also contain RouterInfo of a random node for the purpose of speeding up floodfills (there is a flags field for that case). \n" +"- Termination — is used when a host explicitly terminates a connection and specifies a reason for that.\n" "- DateTime — a current time in seconds." msgstr "" @@ -8041,14 +7292,10 @@ msgstr "" #: i2p2www/blog/2018/08/20/NTCP2.rst:305 msgid "" -"The new I2P transport protocol NTCP2 provides effective resistance " -"against DPI \n" -"censorship. It also results in reduced CPU load because of the faster, " -"modern \n" -"cryptography used. It makes I2P more likely to run on low-end devices, " -"such as \n" -"smartphones and home routers. Both major I2P implementations have full " -"support \n" +"The new I2P transport protocol NTCP2 provides effective resistance against DPI \n" +"censorship. It also results in reduced CPU load because of the faster, modern \n" +"cryptography used. It makes I2P more likely to run on low-end devices, such as \n" +"smartphones and home routers. Both major I2P implementations have full support \n" "for NTCP2 and it make NTCP2 available for use starting with version \n" "0.9.36 (Java) and 2.20 (i2pd, C++)." msgstr "" @@ -8134,7 +7381,8 @@ msgid "i2psnark: Add icon for comments" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:60 -msgid "i2ptunnel: Change read timeout defaults to account for streaming changes" +msgid "" +"i2ptunnel: Change read timeout defaults to account for streaming changes" msgstr "" #: i2p2www/blog/2018/08/23/0.9.36-Release.rst:61 @@ -8159,7 +7407,8 @@ msgid "0.9.37 with NTCP2 enabled" msgstr "0.9.37 cu NTCP2 activat" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:16 -msgid "0.9.37 enables the faster, more secure transport protocol called NTCP2." +msgid "" +"0.9.37 enables the faster, more secure transport protocol called NTCP2." msgstr "" #: i2p2www/blog/2018/10/04/0.9.37-Release.rst:30 @@ -8200,27 +7449,19 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:18 msgid "" "`Invisible Internet Project`_ (I2P) provides a framework for\n" -"developing privacy-aware applications. It is a virtual network working on" -" top of\n" -"the regular Internet, in which hosts can exchange data without disclosing" -" their\n" -"\"real\" IP addresses. Connections inside I2P network are established " -"between \n" -"virtual addresses called *I2P destinations*. It's possible to have as " -"many\n" -"of destinations as one needs, even use a new destination for each " -"connection,\n" -"they don't disclose any information about the real IP address to the " -"other\n" +"developing privacy-aware applications. It is a virtual network working on top of\n" +"the regular Internet, in which hosts can exchange data without disclosing their\n" +"\"real\" IP addresses. Connections inside I2P network are established between \n" +"virtual addresses called *I2P destinations*. It's possible to have as many\n" +"of destinations as one needs, even use a new destination for each connection,\n" +"they don't disclose any information about the real IP address to the other\n" "side." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:31 msgid "" -"This article describes basic concepts one needs to know when developing " -"I2P\n" -"applications. Code samples are written in Python with the use of built-in" -"\n" +"This article describes basic concepts one needs to know when developing I2P\n" +"applications. Code samples are written in Python with the use of built-in\n" "asynchronous framework asyncio." msgstr "" @@ -8233,15 +7474,11 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:42 msgid "" "I2P provides many different APIs to the client applications. Regular\n" -"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java " -"applications \n" -"usually use I2CP. For developing with other languages, like Python, the " -"best \n" +"client-server apps can use I2PTunnel, HTTP and Socks proxies, Java applications \n" +"usually use I2CP. For developing with other languages, like Python, the best \n" "option is `SAM`_. SAM is disabled by \n" -"default in the original Java client implementation, so we need to enable " -"it. \n" -"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run " -"at Startup\" \n" +"default in the original Java client implementation, so we need to enable it. \n" +"Go to Router Console, page \"I2P internals\" -> \"Clients\". Check \"Run at Startup\" \n" "and press \"Start\", then \"Save Client Configuration\"." msgstr "" @@ -8262,12 +7499,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:79 msgid "" -"This library works with the Python's built-in `asynchronous framework " -"asyncio`_,\n" -"so please note that code samples are taken from async functions " -"(coroutines)\n" -"which are running inside the event loop. Additional examples of i2plib " -"usage can\n" +"This library works with the Python's built-in `asynchronous framework asyncio`_,\n" +"so please note that code samples are taken from async functions (coroutines)\n" +"which are running inside the event loop. Additional examples of i2plib usage can\n" "be found in the `source code repository`_." msgstr "" @@ -8279,10 +7513,8 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:94 msgid "" -"I2P destination is literally a set of encryption and cryptographic " -"signature\n" -"keys. Public keys from this set are published to the I2P network and are " -"used to\n" +"I2P destination is literally a set of encryption and cryptographic signature\n" +"keys. Public keys from this set are published to the I2P network and are used to\n" "make connections instead of IP addresses." msgstr "" @@ -8292,28 +7524,22 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:112 msgid "" -"base32 address is a hash which is used by other peers to discover your " -"full\n" -"Destination in the network. If you plan to use this destination as a " -"permanent\n" -"address in your program, save the binary data from " -"*dest.private\\_key.data* \n" +"base32 address is a hash which is used by other peers to discover your full\n" +"Destination in the network. If you plan to use this destination as a permanent\n" +"address in your program, save the binary data from *dest.private\\_key.data* \n" "to a local file." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:119 msgid "" -"Now you can create a SAM session, which literally means to make the " -"Destination\n" +"Now you can create a SAM session, which literally means to make the Destination\n" "online in I2P:" msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:130 msgid "" -"Important note here: Destination will remain online while " -"*session\\_writer* socket\n" -"is kept open. If you wish to switch it off, you can call " -"*session\\_writer.close()*." +"Important note here: Destination will remain online while *session\\_writer* socket\n" +"is kept open. If you wish to switch it off, you can call *session\\_writer.close()*." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:135 @@ -8324,11 +7550,9 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:140 msgid "" -"Now when the Destination is online, you can use it to connect to other " -"peers.\n" +"Now when the Destination is online, you can use it to connect to other peers.\n" "For example, this is how you connect to\n" -"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send " -"HTTP GET\n" +"\"udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p\", send HTTP GET\n" "request and read the response (it is \"i2p-projekt.i2p\" web server):" msgstr "" @@ -8340,20 +7564,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:171 msgid "" -"While making outgoing connections is trivial, when you accept connections" -" there\n" -"is one important detail. After a new client is connected, SAM API sends " -"an ASCII\n" -"string with base64-encoded client's Destination to the socket. Since " -"Destination \n" +"While making outgoing connections is trivial, when you accept connections there\n" +"is one important detail. After a new client is connected, SAM API sends an ASCII\n" +"string with base64-encoded client's Destination to the socket. Since Destination \n" "and data can come in one chunk, you should be aware of it." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:178 msgid "" "This is how a simple PING-PONG server looks like. It accepts incoming\n" -"connection, saves client's Destination to a *remote\\_destination* " -"variable and\n" +"connection, saves client's Destination to a *remote\\_destination* variable and\n" "sends back \"PONG\" string:" msgstr "" @@ -8365,21 +7585,16 @@ msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:208 msgid "" -"This article describes the usage of a TCP-like Streaming protocol. SAM " -"API also\n" -"provides a UDP-like protocol to send and receive datagrams. This feature " -"will\n" +"This article describes the usage of a TCP-like Streaming protocol. SAM API also\n" +"provides a UDP-like protocol to send and receive datagrams. This feature will\n" "be added to i2plib later." msgstr "" #: i2p2www/blog/2018/10/23/application-development-basics.rst:214 msgid "" -"This is just a basic information, but it's enough to start your own " -"project with\n" -"the use of I2P. Invisible Internet is a great tool to develop all kinds " -"of\n" -"privacy-aware applications. There are no design constraints by the " -"network,\n" +"This is just a basic information, but it's enough to start your own project with\n" +"the use of I2P. Invisible Internet is a great tool to develop all kinds of\n" +"privacy-aware applications. There are no design constraints by the network,\n" "those applications can be client-server as well as P2P." msgstr "" @@ -8395,25 +7610,15 @@ msgstr "0.9.38 cu un nou asistent de configurare" msgid "" "0.9.38 includes a new first-install wizard with a bandwidth tester.\n" "We've added support for the latest GeoIP database format.\n" -"There's a new Firefox profile installer and a new, native Mac OSX " -"installer on our website.\n" +"There's a new Firefox profile installer and a new, native Mac OSX installer on our website.\n" "Work continues on supporting the new \"LS2\" netdb format." -msgstr "" -"0.9.38 include un nou asistent de configurare la prima instalare cu un " -"tester pentru lățimea de bandă.\n" -"Am adăugat suport pentru cel mai recent format de bază de date GeoIP.\n" -"Există un nou program de instalare a profilului Firefox È™i un nou " -"instalator Mac OSX nativ pe site-ul nostru.\n" -"Lucrul continuă la sprijinirea noului format netdb \"LS2\"." +msgstr "0.9.38 include un nou asistent de configurare la prima instalare cu un tester pentru lățimea de bandă.\nAm adăugat suport pentru cel mai recent format de bază de date GeoIP.\nExistă un nou program de instalare a profilului Firefox È™i un nou instalator Mac OSX nativ pe site-ul nostru.\nLucrul continuă la sprijinirea noului format netdb \"LS2\"." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:23 msgid "" "This release also contains plenty of bug fixes, including several issues " "with susimail attachments, and a fix for IPv6-only routers." -msgstr "" -"Această versiune conÈ›ine, de asemenea, o mulÈ›ime de corecÈ›ii de erori, " -"inclusiv câteva probleme cu ataÈ™amentele susimail È™i o remediere pentru " -"routerele numai cu IPv6." +msgstr "Această versiune conÈ›ine, de asemenea, o mulÈ›ime de corecÈ›ii de erori, inclusiv câteva probleme cu ataÈ™amentele susimail È™i o remediere pentru routerele numai cu IPv6." #: i2p2www/blog/2019/01/22/0.9.38-Release.rst:37 msgid "New setup wizard with bandwidth testing" @@ -8497,25 +7702,25 @@ msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:16 msgid "" -"There are many projects in the I2P world that we are excited about, but " -"not all of them are ready for prime-time. We decided to create a place " -"where we can make those available for anyone interested in trying them " -"out, that will serve as proving grounds for projects that may one day " -"become official I2P products. This place is the `I2P Laboratory`_." +"There are many projects in the I2P world that we are excited about, but not " +"all of them are ready for prime-time. We decided to create a place where we" +" can make those available for anyone interested in trying them out, that " +"will serve as proving grounds for projects that may one day become official " +"I2P products. This place is the `I2P Laboratory`_." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:22 msgid "" -"In the lab we will be offering downoads ready for you to try. Keep in " -"mind that they are not going to be \"release\" quality, and some may not " -"even be \"beta\" quality. We do not offer official support for them. " -"Any of the lab projects may get discontinued at any time." +"In the lab we will be offering downoads ready for you to try. Keep in mind " +"that they are not going to be \"release\" quality, and some may not even be " +"\"beta\" quality. We do not offer official support for them. Any of the " +"lab projects may get discontinued at any time." msgstr "" #: i2p2www/blog/2019/02/14/i2p-lab.rst:26 msgid "" -"If you are feeling adventurous we invite you to try our ideas. We " -"welcome your feedback at the `I2P Lab Forum`_." +"If you are feeling adventurous we invite you to try our ideas. We welcome " +"your feedback at the `I2P Lab Forum`_." msgstr "" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:2 @@ -8528,32 +7733,17 @@ msgstr "0.9.39 cu îmbunătățiri de performanță" #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:16 msgid "" -"0.9.39 includes extensive changes for the new network database types " -"(proposal 123).\n" -"We've bundled the i2pcontrol plugin as a webapp to support development of" -" RPC applications.\n" +"0.9.39 includes extensive changes for the new network database types (proposal 123).\n" +"We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.\n" "There are numerous performance improvements and bug fixes." -msgstr "" -"\n" -"0.9.39 include schimbări extensive pentru noile tipuri de baze de date de" -" reÈ›ea (propunerea 123).\n" -"Am legat pluginul i2pcontrol ca un webapp pentru a sprijini dezvoltarea " -"aplicaÈ›iilor.\n" -"Există numeroase îmbunătățiri de performanță È™i corecÈ›ii de erori." +msgstr "\n0.9.39 include schimbări extensive pentru noile tipuri de baze de date de reÈ›ea (propunerea 123).\nAm legat pluginul i2pcontrol ca un webapp pentru a sprijini dezvoltarea aplicaÈ›iilor.\nExistă numeroase îmbunătățiri de performanță È™i corecÈ›ii de erori." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:22 msgid "" -"We've removed the midnight and classic themes to reduce the maintenance " -"burden;\n" +"We've removed the midnight and classic themes to reduce the maintenance burden;\n" "previous users of those themes will now see the dark or light theme.\n" "There's also new home page icons, a first step in updating the console." -msgstr "" -"Am eliminat temele midnight È™i clasic pentru a reduce povara " -"întreÈ›inerii;\n" -"utilizatorii anteriori ai acestor teme vor vedea acum tema întunecată sau" -" luminoasă.\n" -"Există È™i noi pictograme pentru pagina de pornire, un prim pas în " -"actualizarea consolei." +msgstr "Am eliminat temele midnight È™i clasic pentru a reduce povara întreÈ›inerii;\nutilizatorii anteriori ai acestor teme vor vedea acum tema întunecată sau luminoasă.\nExistă È™i noi pictograme pentru pagina de pornire, un prim pas în actualizarea consolei." #: i2p2www/blog/2019/03/21/0.9.39-Release.rst:38 msgid "I2PControl RPC plugin bundled as a webapp" @@ -8627,18 +7817,12 @@ msgstr "0.9.40 cu iconite noi" msgid "" "0.9.40 includes support for the new encrypted leaseset format.\n" "We disabled the old NTCP 1 transport protocol.\n" -"There's a new SusiDNS import feature, and a new scripted filtering " -"mechanism for incoming connections." -msgstr "" -"0.9.40 include suport pentru noul format de închiriere criptat.\n" -"Am dezactivat vechiul protocol de transport NTCP 1.\n" -"Există o nouă caracteristică de import SusiDNS È™i un nou mecanism de " -"filtrare scriptic pentru conexiunile primite." +"There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections." +msgstr "0.9.40 include suport pentru noul format de închiriere criptat.\nAm dezactivat vechiul protocol de transport NTCP 1.\nExistă o nouă caracteristică de import SusiDNS È™i un nou mecanism de filtrare scriptic pentru conexiunile primite." #: i2p2www/blog/2019/05/07/0.9.40-Release.rst:22 msgid "" -"We've made a lot of improvements to the OSX native installer, and we've " -"updated the IzPack installer as well.\n" +"We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.\n" "The work continues on refreshing the console with new icons.\n" "As usual, we've fixed lots of bugs as well!" msgstr "" @@ -8741,24 +7925,16 @@ msgid "" "::\n" "\n" " What is I2P-bote?\n" -" I2P-bote is a private messaging system built on i2p, which has " -"additional\n" -" features to make it even more difficult to discern information " -"about the\n" -" messages that are transmitted. Because of this, it can be used " -"to transmit\n" -" private messages securely while tolerating high latency and not" -" relying on\n" -" a centralized relay to send messages when the sender goes " -"offline. This is\n" -" in contrast to almost every other popular private messaging " -"system, which\n" -" either require both parties to be online or rely on a semi-" -"trusted service\n" +" I2P-bote is a private messaging system built on i2p, which has additional\n" +" features to make it even more difficult to discern information about the\n" +" messages that are transmitted. Because of this, it can be used to transmit\n" +" private messages securely while tolerating high latency and not relying on\n" +" a centralized relay to send messages when the sender goes offline. This is\n" +" in contrast to almost every other popular private messaging system, which\n" +" either require both parties to be online or rely on a semi-trusted service\n" " which transmits messages on behalf of senders who go offline.\n" "\n" -" or, ELI5: It's used similarly to e-mail, but it suffers from " -"none of e-mail's\n" +" or, ELI5: It's used similarly to e-mail, but it suffers from none of e-mail's\n" " privacy defects." msgstr "" @@ -8840,11 +8016,9 @@ msgid "" " character set into binary.\n" "2. Second, take bytes 386 and 387 and convert them to a single\n" " Big-Endian integer.\n" -"3. Add the number you computed from the two bytes in step two to 387. " -"This is\n" +"3. Add the number you computed from the two bytes in step two to 387. This is\n" " the length of the base64 destination.\n" -"4. Take that nummber of bytes from the front of the full destination to " -"get\n" +"4. Take that nummber of bytes from the front of the full destination to get\n" " the destination as a range of bytes.\n" "5. Convert back to a base64 representation using i2p's base64 character\n" " set." @@ -8895,8 +8069,7 @@ msgid "" "\n" "::\n" "\n" -" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-" -"config/i2pbote/local_dest.key" +" sudo -u i2psvc head -c 516 /var/lib/i2p/i2p-config/i2pbote/local_dest.key" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:149 @@ -8951,8 +8124,7 @@ msgid "" "\n" "Now that you've got the correct destination for your I2P-Bote node, the\n" "final step is to add yourself to the default peers list for `I2P-Bote\n" -"here <https://github.com/i2p/i2p.i2p-" -"bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" +"here <https://github.com/i2p/i2p.i2p-bote/tree/master/core/src/main/resources/i2p/bote/network>`__\n" "here. You can do this by forking the repository, adding yourself to the\n" "list with your name commented out, and your 516-char destination\n" "directly below it, like this:" @@ -8965,12 +8137,7 @@ msgid "" "::\n" "\n" " # idk\n" -" QuabT3H5ljZyd-PXCQjvDzdfCec-" -"2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-" -"bkSo0gEhB-" -"GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA" -"~z0Nus-" -"VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" +" QuabT3H5ljZyd-PXCQjvDzdfCec-2yv8E9i6N71I5WHAtSEZgazQMReYNhPWakqOEj8BbpRvnarpHqbQjoT6yJ5UObKv2hA2M4XrroJmydPV9CLJUCqgCqFfpG-bkSo0gEhB-GRCUaugcAgHxddmxmAsJVRj3UeABLPHLYiakVz3CG2iBMHLJpnC6H3g8TJivtqabPYOxmZGCI-P~R-s4vwN2st1lJyKDl~u7OG6M6Y~gNbIzIYeQyNggvnANL3t6cUqS4v0Vb~t~CCtXgfhuK5SK65Rtkt2Aid3s7mrR2hDxK3SIxmAsHpnQ6MA~z0Nus-VVcNYcbHUBNpOcTeKlncXsuFj8vZL3ssnepmr2DCB25091t9B6r5~681xGEeqeIwuMHDeyoXIP0mhEcy3aEB1jcchLBRLMs6NtFKPlioxz0~Vs13VaNNP~78bTjFje5ya20ahWlO0Md~x5P5lWLIKDgaqwNdIrijtZAcILn1h18tmABYauYZQtYGyLTOXAAAA" msgstr "" #: i2p2www/blog/2019/05/25/help-bootstrap-bote.rst:205 @@ -8991,38 +8158,25 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:10 msgid "" -"Although the Java I2P router comes pre-configured with a static web " -"server,\n" -"jetty, to provide the user's first eepSite, many require more " -"sophisticated\n" -"functionality from their web server and would rather create an eepSite " -"with a\n" -"different server. This is of course possible, and actually is really easy" -" once\n" +"Although the Java I2P router comes pre-configured with a static web server,\n" +"jetty, to provide the user's first eepSite, many require more sophisticated\n" +"functionality from their web server and would rather create an eepSite with a\n" +"different server. This is of course possible, and actually is really easy once\n" "you've done it one time." msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:18 msgid "" -"Although it is easy to do, there are a few things you should consider " -"before\n" -"doing it. You will want to remove identifying characteristics from your " -"web\n" -"server, like potentially identifying headers and default error pages that" -"\n" -"report the server/distro type. More information about threats to " -"anonymity\n" +"Although it is easy to do, there are a few things you should consider before\n" +"doing it. You will want to remove identifying characteristics from your web\n" +"server, like potentially identifying headers and default error pages that\n" +"report the server/distro type. More information about threats to anonymity\n" "posed by improperly configured applications see:\n" -"`Riseup here: <https://riseup.net/en/security/network-security/tor" -"/onionservices-best-practices>`__,\n" +"`Riseup here: <https://riseup.net/en/security/network-security/tor/onionservices-best-practices>`__,\n" "`Whonix Here: <https://www.whonix.org/wiki/Onion_Services>`__,\n" -"`This blog article for some opsec fails: " -"<https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__," -"\n" -"`and the I2P applications page here " -"<https://geti2p.net/en/docs/applications/supported>`__.\n" -"Although much of this information is expressed for Tor Onion Services, " -"the same\n" +"`This blog article for some opsec fails: <https://blog.0day.rocks/securing-a-web-hidden-service-89d935ba1c1d>`__,\n" +"`and the I2P applications page here <https://geti2p.net/en/docs/applications/supported>`__.\n" +"Although much of this information is expressed for Tor Onion Services, the same\n" "procedures and principles apply to hosting applications over I2P." msgstr "" @@ -9033,8 +8187,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:35 msgid "" "Go to the I2P web interface at 127.0.0.1:7657 and open the\n" -"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links" -" to\n" +"`Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\\ (links to\n" "localhost). Click the button that says \"Tunnel Wizard\" to begin." msgstr "" @@ -9044,8 +8197,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:48 msgid "" -"The tunnel wizard is very simple. Since we're setting up an http " -"*server*, all\n" +"The tunnel wizard is very simple. Since we're setting up an http *server*, all\n" "we need to do is select a *server* tunnel." msgstr "" @@ -9055,15 +8207,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:60 msgid "" -"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP " -"services.\n" +"An HTTP tunnel is the tunnel type that is optimized for hosting HTTP services.\n" "It has filtering and rate-limiting features enabled that are tailored\n" -"specifically to that purpose. A standard tunnel may work as well, but if " -"you\n" -"select a atandard tunnel you'll need to take care of those security " -"features\n" -"yourself. A more in-depth dive into the HTTP Tunnel configuration is " -"available\n" +"specifically to that purpose. A standard tunnel may work as well, but if you\n" +"select a atandard tunnel you'll need to take care of those security features\n" +"yourself. A more in-depth dive into the HTTP Tunnel configuration is available\n" "in the next tutorial." msgstr "" @@ -9073,12 +8221,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:76 msgid "" -"For your own benefit and ability to remeber and distinguish the what you " -"are\n" -"using the tunnel for, give it a good nickname and description. If you " -"need to\n" -"come back and do more management later, then this is how you will " -"identify the\n" +"For your own benefit and ability to remeber and distinguish the what you are\n" +"using the tunnel for, give it a good nickname and description. If you need to\n" +"come back and do more management later, then this is how you will identify the\n" "tunnel in the hidden services manager." msgstr "" @@ -9088,12 +8233,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:90 msgid "" -"In this step, you point the web server at the TCP port where your web " -"server is\n" -"listening. Since most web servers listen on port 80 or port 8080, the " -"example\n" -"shows that. If you use alternate ports or virtual machines or containers " -"to\n" +"In this step, you point the web server at the TCP port where your web server is\n" +"listening. Since most web servers listen on port 80 or port 8080, the example\n" +"shows that. If you use alternate ports or virtual machines or containers to\n" "isolate your web services, you may need to adjust the host, port, or both." msgstr "" @@ -9111,12 +8253,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:115 msgid "" -"Finally, take a look at the settings you have selected. If you approve, " -"save\n" -"them. If you did not choose to start the tunnel automatically, go to the " -"hidden\n" -"services manager and start it manually when you wish to make your service" -"\n" +"Finally, take a look at the settings you have selected. If you approve, save\n" +"them. If you did not choose to start the tunnel automatically, go to the hidden\n" +"services manager and start it manually when you wish to make your service\n" "available." msgstr "" @@ -9126,10 +8265,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/basic-tunnel-tutorial.rst:129 msgid "" -"I2P provides a detailed panel for configuring the http server tunnel in " -"custom\n" -"ways. I'll finish this tutorial by walking through all of them. " -"Eventually." +"I2P provides a detailed panel for configuring the http server tunnel in custom\n" +"ways. I'll finish this tutorial by walking through all of them. Eventually." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:4 @@ -9142,38 +8279,28 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:10 msgid "" -"This blog post is intended as a general guide to running a mirror of a " -"clear-net\n" -"service as an eepSite. It elaborates on the previous blog post about " -"basic\n" +"This blog post is intended as a general guide to running a mirror of a clear-net\n" +"service as an eepSite. It elaborates on the previous blog post about basic\n" "I2PTunnel tunnels." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:16 msgid "" -"Unfortunately, it's probably impossible to *completely* cover all " -"possible cases\n" -"of making an existing web site available as an eepSite, there's simply " -"too\n" +"Unfortunately, it's probably impossible to *completely* cover all possible cases\n" +"of making an existing web site available as an eepSite, there's simply too\n" "diverse an array of server-side software, not to mention the in-practice\n" -"peculiarities of any particular deployment of software. Instead, I'm " -"going to\n" -"try and convey, as specifically as possible, the general process " -"preparing a\n" +"peculiarities of any particular deployment of software. Instead, I'm going to\n" +"try and convey, as specifically as possible, the general process preparing a\n" "service for deployment to the eepWeb or other hidden services." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:25 msgid "" -"Much of this guide will be treating the reader as a conversational " -"participant,\n" -"in particular If I really mean it I will address the reader directly(i.e." -" using\n" -"\"you\" instead of \"one\") and I'll frequently head sections with " -"questions I think\n" +"Much of this guide will be treating the reader as a conversational participant,\n" +"in particular If I really mean it I will address the reader directly(i.e. using\n" +"\"you\" instead of \"one\") and I'll frequently head sections with questions I think\n" "the reader might be asking. This is, after all, a \"process\" that an\n" -"administrator must consider themselves \"involved\" in just like hosting " -"any other\n" +"administrator must consider themselves \"involved\" in just like hosting any other\n" "service." msgstr "" @@ -9183,16 +8310,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:37 msgid "" -"While it would be wonderful, it's probably impossible for me to put " -"specific\n" -"instructions for every single kind of software that one might use to host" -" web\n" -"sites. As such, this tutorial requires some assumptions on the part of " -"the\n" -"writer and some critical thinking and common sense on the part of the " -"reader.\n" -"To be clear, **I have assumed that the person following this tutorial " -"is**\n" +"While it would be wonderful, it's probably impossible for me to put specific\n" +"instructions for every single kind of software that one might use to host web\n" +"sites. As such, this tutorial requires some assumptions on the part of the\n" +"writer and some critical thinking and common sense on the part of the reader.\n" +"To be clear, **I have assumed that the person following this tutorial is**\n" "**already operating a clear-web service linkable to a real identity or**\n" "**organization** and thus is simply offering anonymous access and not\n" "anonymizing themselves." @@ -9200,22 +8322,17 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:48 msgid "" -"Thus, **it makes no attempt whatsoever to anonymize** a connection from " -"one\n" -"server to another. If you want to run a new, un-linkable hidden service " -"that\n" -"makes server-to-server connections, additional steps will be required and" -" will\n" +"Thus, **it makes no attempt whatsoever to anonymize** a connection from one\n" +"server to another. If you want to run a new, un-linkable hidden service that\n" +"makes server-to-server connections, additional steps will be required and will\n" "be covered in another tutorial." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:55 msgid "" "That said: If you can be sure that a *brand new service* which is *not*\n" -"*available to the clear-web* will never make a server-to-server " -"connection and\n" -"will not leak server metadata in responses to clients, then services " -"configured\n" +"*available to the clear-web* will never make a server-to-server connection and\n" +"will not leak server metadata in responses to clients, then services configured\n" "in this way will be anonymous." msgstr "" @@ -9229,16 +8346,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:68 msgid "" -"In practice, your web service probably uses a number of things to enhance" -" it's\n" -"reliability and security. These things could be proxies, reverse proxies," -"\n" -"containers, tunnels, Intrusion Detection Systems, rate-limiters, load " -"balancers,\n" -"among many other things. When you get started, you should go through your" -"\n" -"deployment and determine which software you are using, and what you are " -"using it\n" +"In practice, your web service probably uses a number of things to enhance it's\n" +"reliability and security. These things could be proxies, reverse proxies,\n" +"containers, tunnels, Intrusion Detection Systems, rate-limiters, load balancers,\n" +"among many other things. When you get started, you should go through your\n" +"deployment and determine which software you are using, and what you are using it\n" "for." msgstr "" @@ -9248,8 +8360,7 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:80 msgid "" -"These questions should help you evaluate what parts of your software " -"stack are\n" +"These questions should help you evaluate what parts of your software stack are\n" "relevant to your I2P eepSite." msgstr "" @@ -9259,16 +8370,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:88 msgid "" -"If you are using software which alters the behavior of traffic based on " -"the IP\n" -"address of the sender, these things will probably not work with I2P, or " -"may work\n" -"in complicated or unexpected ways. This is because the address will " -"usually be\n" -"the localhost, or at least the host where your I2P router is running. " -"Software\n" -"which sometimes does things based on IP addresses could be Fail2Ban, " -"iptables,\n" +"If you are using software which alters the behavior of traffic based on the IP\n" +"address of the sender, these things will probably not work with I2P, or may work\n" +"in complicated or unexpected ways. This is because the address will usually be\n" +"the localhost, or at least the host where your I2P router is running. Software\n" +"which sometimes does things based on IP addresses could be Fail2Ban, iptables,\n" "and similar applications." msgstr "" @@ -9278,10 +8384,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:100 msgid "" -"Some software may be configured to add information to the traffic it " -"handles.\n" -"Obviously, if this information is identifying it should not be part of " -"the chain\n" +"Some software may be configured to add information to the traffic it handles.\n" +"Obviously, if this information is identifying it should not be part of the chain\n" "of services that is exposed to the I2P network." msgstr "" @@ -9293,37 +8397,27 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:109 msgid "" -"Some software may also draw from remote resources, to find up-to-date " -"rules and\n" -"block lists which can be used to prevent attacks. Some of these might be " -"useful\n" -"as part of the service that is exposed to I2P, but you should make sure " -"that the\n" -"rules are applicable and that a rules update cannot be triggered as a " -"result of\n" -"a normal client request. This would create a server-to-server " -"communication\n" +"Some software may also draw from remote resources, to find up-to-date rules and\n" +"block lists which can be used to prevent attacks. Some of these might be useful\n" +"as part of the service that is exposed to I2P, but you should make sure that the\n" +"rules are applicable and that a rules update cannot be triggered as a result of\n" +"a normal client request. This would create a server-to-server communication\n" "which could reveal the timing of an I2P communication to a third party." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:118 msgid "" -"Step two: Determine which port to Forward to I2P and Optionally locate " -"your TLS certificate" +"Step two: Determine which port to Forward to I2P and Optionally locate your " +"TLS certificate" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:121 msgid "" -"Now you've gathered all the information that you will require to forward " -"your\n" -"service to I2P. Once you've selected the point at which you would like to" -" make\n" -"your site available to I2P, you will need to note the port you wish to " -"foward.\n" -"In simple scenarios, this will probably just be port 80 or port 8080. In " -"more\n" -"sophisticated scenarios, this might be a reverse proxy or something like " -"that.\n" +"Now you've gathered all the information that you will require to forward your\n" +"service to I2P. Once you've selected the point at which you would like to make\n" +"your site available to I2P, you will need to note the port you wish to foward.\n" +"In simple scenarios, this will probably just be port 80 or port 8080. In more\n" +"sophisticated scenarios, this might be a reverse proxy or something like that.\n" "Make a note of the port." msgstr "" @@ -9333,18 +8427,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:133 msgid "" -"Should you be a non-anonymous organization that wishes to provide " -"enhanced\n" -"privacy to your users by providing a hidden service, you may wish to " -"establish\n" -"a common identity between versions of your site. However, since we can't " -"add\n" -"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we " -"have to do\n" -"this in another way. To do this, **even if you are forwarding the HTTP " -"port**\n" -"**and not HTTPS**, make a note of the location of your TLS certificate " -"for use\n" +"Should you be a non-anonymous organization that wishes to provide enhanced\n" +"privacy to your users by providing a hidden service, you may wish to establish\n" +"a common identity between versions of your site. However, since we can't add\n" +"`.i2p domains to clearnet TLS certificates </IDENTITY/tls.html>`__, we have to do\n" +"this in another way. To do this, **even if you are forwarding the HTTP port**\n" +"**and not HTTPS**, make a note of the location of your TLS certificate for use\n" "in the final step." msgstr "" @@ -9354,10 +8442,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:146 msgid "" -"Congratulations! You've completed the most difficult part. From here on, " -"the\n" -"decisions you must make, and the consequences that they will have, are " -"much\n" +"Congratulations! You've completed the most difficult part. From here on, the\n" +"decisions you must make, and the consequences that they will have, are much\n" "more straightforward and easy to enumerate. Such is the beauty of a\n" "cryptographically secure network layer like I2P!" msgstr "" @@ -9369,20 +8455,13 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:158 msgid "" "For eepSites, you will need to create an HTTP Server Tunnel. This is\n" -"an I2P destination with a few special features for hosting HTTP services " -"to\n" -"enable things like rate-limiting, filtering, and the inclusion of headers" -" to\n" -"identify the destination of the client to the server. These enable " -"flexibility\n" -"in how you handle connections in terms of load-balancing and rate-" -"limiting on\n" -"a case-by-case basis, among other things. Explore these options and how " -"they\n" -"relate to the applications which you considered in step one, even though " -"a very\n" -"simple setup is easy, larger sites may benefit from taking advantage of " -"these\n" +"an I2P destination with a few special features for hosting HTTP services to\n" +"enable things like rate-limiting, filtering, and the inclusion of headers to\n" +"identify the destination of the client to the server. These enable flexibility\n" +"in how you handle connections in terms of load-balancing and rate-limiting on\n" +"a case-by-case basis, among other things. Explore these options and how they\n" +"relate to the applications which you considered in step one, even though a very\n" +"simple setup is easy, larger sites may benefit from taking advantage of these\n" "features." msgstr "" @@ -9392,98 +8471,70 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:173 msgid "" -"If you've configured a reverse proxy or an SSH tunnel before, then the " -"general\n" +"If you've configured a reverse proxy or an SSH tunnel before, then the general\n" "idea here should be very familiar to you. I2PTunnel, in essence, is just\n" -"forwarding ports from the host to the I2P Network. To set this up using " -"the web\n" +"forwarding ports from the host to the I2P Network. To set this up using the web\n" "interface, go to the I2PTunnel configuration page." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:180 msgid "" -"At the bottom of the \"I2P Hidden Services\" section of the page, select " -"an HTTP\n" +"At the bottom of the \"I2P Hidden Services\" section of the page, select an HTTP\n" "Service from the drop-down and click \"Create.\"" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:189 msgid "" -"It will immediately drop you into the granular tunnel configuration page," -" which\n" -"we're about to explore from top-to-bottom. The first, most essential " -"settings\n" -"are the tunnel name and the target host:port. **The target host:port is**" -"\n" -"**the place where you input the address of the service you are forwarding" -" to**\n" -"**I2P**. Once you've configured that, your web site will become available" -" over\n" +"It will immediately drop you into the granular tunnel configuration page, which\n" +"we're about to explore from top-to-bottom. The first, most essential settings\n" +"are the tunnel name and the target host:port. **The target host:port is**\n" +"**the place where you input the address of the service you are forwarding to**\n" +"**I2P**. Once you've configured that, your web site will become available over\n" "i2p. However, there are probably a few things that we can improve." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:202 msgid "" -"Next, you may want to pick a hostname to use for your eepSite. This " -"hostname\n" -"doesn't need to be universally unique, for now, it will only be used " -"locally.\n" -"We'll publish it to an address helper later. **If** the *Local " -"Destination*\n" -"field isn't populated with your Base64 Destination yet, you should scroll" -" down\n" +"Next, you may want to pick a hostname to use for your eepSite. This hostname\n" +"doesn't need to be universally unique, for now, it will only be used locally.\n" +"We'll publish it to an address helper later. **If** the *Local Destination*\n" +"field isn't populated with your Base64 Destination yet, you should scroll down\n" "to the bottom, save the tunnel configuration, and return to the tunnel\n" "configuration." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:215 msgid "" -"A little further down the configuration page, the tunnel options are " -"available.\n" -"Since you've got a site which is not intended to be anonymous, but rather" -" to\n" -"provide anonymous access to others by an alternate gateway, it may be " -"good to\n" +"A little further down the configuration page, the tunnel options are available.\n" +"Since you've got a site which is not intended to be anonymous, but rather to\n" +"provide anonymous access to others by an alternate gateway, it may be good to\n" "reduce the number of hops the tunnel takes on the I2P network." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:226 msgid "" -"Next are the encrypted leaseset options. You can probably leave these as " -"the\n" -"defaults, since your site isn't anonymous it probably doesn't need " -"features like\n" -"blinding or encrypted leasesets. If you were to choose encrypted " -"leasesets, you\n" -"would not be accessible to anyone unless you shared a key with them in " -"advance." +"Next are the encrypted leaseset options. You can probably leave these as the\n" +"defaults, since your site isn't anonymous it probably doesn't need features like\n" +"blinding or encrypted leasesets. If you were to choose encrypted leasesets, you\n" +"would not be accessible to anyone unless you shared a key with them in advance." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:237 msgid "" -"The next few parts may be especially useful to you if you run a high-" -"traffic\n" -"site or find yourself subject to DDOS attacks. Here you can configure " -"various\n" +"The next few parts may be especially useful to you if you run a high-traffic\n" +"site or find yourself subject to DDOS attacks. Here you can configure various\n" "kinds of connection limits." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:247 msgid "" -"After that, there are a few other ways of filtering connections by client" -"\n" -"characteristics. First, you can block access via inproxies like I2P.to " -"and\n" -"similar. Since you have a clearnet presence already, changing this may be" -" better\n" -"if you want to encourage I2P users to only use your eepSite. You can also" -" block\n" -"accesses via specific user-agents, for instance blocking wget may be " -"helpful if\n" -"you want to prevent spidering. Finally, and of particular interest to " -"Fail2Ban\n" -"users, the \"Unique local address per client\" will give each client it's" -" own\n" +"After that, there are a few other ways of filtering connections by client\n" +"characteristics. First, you can block access via inproxies like I2P.to and\n" +"similar. Since you have a clearnet presence already, changing this may be better\n" +"if you want to encourage I2P users to only use your eepSite. You can also block\n" +"accesses via specific user-agents, for instance blocking wget may be helpful if\n" +"you want to prevent spidering. Finally, and of particular interest to Fail2Ban\n" +"users, the \"Unique local address per client\" will give each client it's own\n" "local IP address instead of them all appearing to the server to be from\n" "127.0.0.1." msgstr "" @@ -9494,10 +8545,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:271 msgid "" -"Lastly, you can set up an advanced filter definition. Writing filters is " -"beyond\n" -"what I'm prepared to do in this document, for more information see the " -"format\n" +"Lastly, you can set up an advanced filter definition. Writing filters is beyond\n" +"what I'm prepared to do in this document, for more information see the format\n" "specification for now." msgstr "" @@ -9507,22 +8556,16 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:284 msgid "" -"One interesting thing that I2P can do is host the same site on multiple " -"servers\n" -"at the same time transparently, which is referred to as \"Multihoming.\" " -"In order\n" -"to multihome your application, you will need to return to the tunnel menu" -" and\n" -"change the location of your private key file to it's own, non-shared " -"location." +"One interesting thing that I2P can do is host the same site on multiple servers\n" +"at the same time transparently, which is referred to as \"Multihoming.\" In order\n" +"to multihome your application, you will need to return to the tunnel menu and\n" +"change the location of your private key file to it's own, non-shared location." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:295 msgid "" -"When you're done, copy the new key file for your new multihomed service " -"to a\n" -"storage device. Now, you can re-produce your service/tunnel configuration" -" with\n" +"When you're done, copy the new key file for your new multihomed service to a\n" +"storage device. Now, you can re-produce your service/tunnel configuration with\n" "those same keys on any I2P router and increase your service's redundancy." msgstr "" @@ -9532,11 +8575,9 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:304 msgid "" -"Since you're running an anonymously accessible instance of an existing " -"clear-net\n" +"Since you're running an anonymously accessible instance of an existing clear-net\n" "service, you'll probably want to leverage some existing form of trust to\n" -"distribute your eepSite URL, like a TLS Certificate signed by a " -"recognized and\n" +"distribute your eepSite URL, like a TLS Certificate signed by a recognized and\n" "reputable authority. What can I say we live in an imperfect world." msgstr "" @@ -9546,29 +8587,23 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:316 msgid "" -"The simplest way to provide a link to your eepSite using an existing site" -" to\n" -"distribute the link is to distribute a so-called \"Base32\" address. The " -"Base32\n" -"address is the hash of the public key of your I2P destination, so it " -"cannot be\n" -"forged if it is provided by a reliable source. In the case of a clear-net" -" site\n" +"The simplest way to provide a link to your eepSite using an existing site to\n" +"distribute the link is to distribute a so-called \"Base32\" address. The Base32\n" +"address is the hash of the public key of your I2P destination, so it cannot be\n" +"forged if it is provided by a reliable source. In the case of a clear-net site\n" "with a hidden service presence, one of those places is likely to be that\n" "clear-net site." msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:325 msgid "" -"Your base32 address is visible on the main i2ptunnel configuration page " -"and it\n" +"Your base32 address is visible on the main i2ptunnel configuration page and it\n" "looks like this:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:334 msgid "" -"Your users can copy-and-paste this link directly into their I2P browsers " -"and\n" +"Your users can copy-and-paste this link directly into their I2P browsers and\n" "it will just work, no additional configuration required." msgstr "" @@ -9578,17 +8613,12 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:342 msgid "" -"You can also distribute a human-readable link to suggest to your " -"potential users\n" -"by taking advantage of I2P's \"Address Book\" feature, which allows the " -"users to\n" +"You can also distribute a human-readable link to suggest to your potential users\n" +"by taking advantage of I2P's \"Address Book\" feature, which allows the users to\n" "decide to assign a human-readable domain name to your cryptographically\n" -"assured identity. You can do this by distributing a specially crafted " -"link\n" -"containing the domain name that you want to suggest, followed by a slash," -"\n" -"followed by ?i2paddresshelper=, followed by the Local Destination of the " -"tunnel\n" +"assured identity. You can do this by distributing a specially crafted link\n" +"containing the domain name that you want to suggest, followed by a slash,\n" +"followed by ?i2paddresshelper=, followed by the Local Destination of the tunnel\n" "you just created, which you can see here:" msgstr "" @@ -9598,14 +8628,10 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:364 msgid "" -"I keep saying suggest because when the such a link is visited, I2P asks " -"for the\n" -"user's consent to add this human-readable name to the user's local " -"address book.\n" -"That means there is no expectation that this domain be universally agreed" -" upon\n" -"by all visitors on the I2P network, whereas in the case of base32 " -"addresses,\n" +"I keep saying suggest because when the such a link is visited, I2P asks for the\n" +"user's consent to add this human-readable name to the user's local address book.\n" +"That means there is no expectation that this domain be universally agreed upon\n" +"by all visitors on the I2P network, whereas in the case of base32 addresses,\n" "the opposite is true." msgstr "" @@ -9615,16 +8641,11 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:375 msgid "" -"Nonetheless, there do exist publicly available address subscription " -"feeds, and\n" -"special services for discovering new human-readable addresses, such as " -"no.i2p,\n" -"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or " -"Jump\n" -"Services, and can also be subscribed to automatically. This may be " -"espescially\n" -"helpful to users of your service who wish to acquire the address without " -"leaving\n" +"Nonetheless, there do exist publicly available address subscription feeds, and\n" +"special services for discovering new human-readable addresses, such as no.i2p,\n" +"inr.i2p, and stats.i2p. These are sometimes known as Address helpers or Jump\n" +"Services, and can also be subscribed to automatically. This may be espescially\n" +"helpful to users of your service who wish to acquire the address without leaving\n" "I2P or visiting your clearnet service." msgstr "" @@ -9642,10 +8663,8 @@ msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:405 msgid "" -"Most of the security issues of hosting Tor hidden services also apply to " -"I2P. It\n" -"would be advisable to take advantage of their resources as well as this " -"one:" +"Most of the security issues of hosting Tor hidden services also apply to I2P. It\n" +"would be advisable to take advantage of their resources as well as this one:" msgstr "" #: i2p2www/blog/2019/06/02/mirroring-guide.rst:410 @@ -9698,27 +8717,19 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:10 msgid "" -"This is a tutorial on how to set up and tweak an I2P tunnel in order to " -"use it\n" -"to access an SSH server remotely, using either I2P or i2pd. For now, it " -"assumes\n" -"you will install your SSH server from a package manager and that it's " -"running\n" +"This is a tutorial on how to set up and tweak an I2P tunnel in order to use it\n" +"to access an SSH server remotely, using either I2P or i2pd. For now, it assumes\n" +"you will install your SSH server from a package manager and that it's running\n" "as a service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:17 msgid "" -"Considerations: In this guide, I'm assuming a few things. They will need " -"to be\n" -"adjusted depending on the complications that arise in your particular " -"setup,\n" -"especially if you use VM's or containers for isolation. This assumes that" -" the\n" -"I2P router and the ssh server are running on the same localhost. You " -"should be\n" -"using newly-generated SSH host keys, either by using a freshly installed " -"sshd,\n" +"Considerations: In this guide, I'm assuming a few things. They will need to be\n" +"adjusted depending on the complications that arise in your particular setup,\n" +"especially if you use VM's or containers for isolation. This assumes that the\n" +"I2P router and the ssh server are running on the same localhost. You should be\n" +"using newly-generated SSH host keys, either by using a freshly installed sshd,\n" "or by deleting old keys and forcing their re-generation. For example:" msgstr "" @@ -9733,9 +8744,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:41 msgid "" -"Using java I2P's web interface, navigate to the (Links to your Router " -"Console)\\ `Hidden Services Manager " -"<http://127.0.0.1:7657/i2ptunnelmgr>`__\n" +"Using java I2P's web interface, navigate to the (Links to your Router Console)\\ `Hidden Services Manager <http://127.0.0.1:7657/i2ptunnelmgr>`__\n" "and start the tunnel wizard." msgstr "" @@ -9746,15 +8755,13 @@ msgstr "Expert tunel" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:49 msgid "" -"Since you are setting up this tunnel for the SSH server, you need to " -"select the\n" +"Since you are setting up this tunnel for the SSH server, you need to select the\n" "\"Server\" tunnel type." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:58 msgid "" -"You should fine-tune it later, but the Standard tunnel type is easiest to" -" start\n" +"You should fine-tune it later, but the Standard tunnel type is easiest to start\n" "with." msgstr "" @@ -9777,23 +8784,17 @@ msgstr "Setări avansate" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:92 msgid "" -"Now head back over the the Hidden Services Manager, and look over the " -"available\n" -"advanced settings. One thing you'll definitely want to change is to set " -"it up\n" +"Now head back over the the Hidden Services Manager, and look over the available\n" +"advanced settings. One thing you'll definitely want to change is to set it up\n" "for interactive connections intstead of bulk connections." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:102 msgid "" -"Besides that, these other options can affect performance when accessing " -"your SSH\n" -"server. If you aren't that concerned about your anonymity, then you could" -" reduce\n" -"the number of hops you take. If you have trouble with speed, a higher " -"tunnel\n" -"count might help. A few backup tunnels are probably a good idea. You " -"might have\n" +"Besides that, these other options can affect performance when accessing your SSH\n" +"server. If you aren't that concerned about your anonymity, then you could reduce\n" +"the number of hops you take. If you have trouble with speed, a higher tunnel\n" +"count might help. A few backup tunnels are probably a good idea. You might have\n" "to dial-it-in a bit." msgstr "" @@ -9803,10 +8804,8 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:118 msgid "" -"Another interesting setting, especially if you choose to run a high " -"number of\n" -"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels " -"that run\n" +"Another interesting setting, especially if you choose to run a high number of\n" +"tunnels is \"Reduce on Idle\" which will reduce the number of tunnels that run\n" "when the serve has experienced extended inactivity." msgstr "" @@ -9817,12 +8816,9 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:131 msgid "" -"With i2pd, all configuration is done with files instead of via a web " -"interface.\n" -"In order to configure an SSH Service tunnel for i2pd, tweak the following" -"\n" -"example settings to your anonymity and performance needs and copy them " -"into\n" +"With i2pd, all configuration is done with files instead of via a web interface.\n" +"In order to configure an SSH Service tunnel for i2pd, tweak the following\n" +"example settings to your anonymity and performance needs and copy them into\n" "tunnels.conf" msgstr "" @@ -9836,21 +8832,16 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:158 msgid "" -"Depending on how you want to access your SSH Server, you may want to make" -" a few\n" -"changes to the settings. Besides the obvious SSH hardening stuff you " -"should do\n" -"on all SSH servers(Public-Key Authentication, no login as root, etc), if " -"you\n" -"don't want your SSH server to listen on any addresses except your server " -"tunnel,\n" +"Depending on how you want to access your SSH Server, you may want to make a few\n" +"changes to the settings. Besides the obvious SSH hardening stuff you should do\n" +"on all SSH servers(Public-Key Authentication, no login as root, etc), if you\n" +"don't want your SSH server to listen on any addresses except your server tunnel,\n" "you should change AddressFamily to inet and ListenAddress to 127.0.0.1." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:171 msgid "" -"If you choose to use a port other than 22 for your SSH server, you will " -"need to\n" +"If you choose to use a port other than 22 for your SSH server, you will need to\n" "change the port in your I2P tunnel configuration." msgstr "" @@ -9860,27 +8851,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:179 msgid "" -"You will need to be able to see the I2P router console of the SSH server " -"in\n" -"order to configure your client connection. One neat thing about this " -"setup is\n" +"You will need to be able to see the I2P router console of the SSH server in\n" +"order to configure your client connection. One neat thing about this setup is\n" "that the initial connection to the I2P tunnel is authenticated, somewhat\n" -"reducing the risk of your initial connection to the SSH server being " -"MITM'ed,\n" +"reducing the risk of your initial connection to the SSH server being MITM'ed,\n" "as is a risk in Trust-On-First-Use scenarios." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:197 msgid "" -"First, start the tunnel configuration wizard from the hidden services " -"manager\n" +"First, start the tunnel configuration wizard from the hidden services manager\n" "and select a client tunnel." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:206 msgid "" -"Next, select the standard tunnel type. You will fine-tune this " -"configuration\n" +"Next, select the standard tunnel type. You will fine-tune this configuration\n" "later." msgstr "" @@ -9890,27 +8876,22 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:223 msgid "" -"This is the only slightly tricky part. Go to the hidden services manager " -"of the\n" -"I2P router console and find the base64 \"local destination\" of the SSH " -"server\n" -"tunnel. You'll need to find a way to copy this information into the next " -"step.\n" +"This is the only slightly tricky part. Go to the hidden services manager of the\n" +"I2P router console and find the base64 \"local destination\" of the SSH server\n" +"tunnel. You'll need to find a way to copy this information into the next step.\n" "I generally `Tox <https://tox.chat>`__ it to myself, any off-the-record\n" "should be sufficient for most people." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:235 msgid "" -"Once you've found the base64 destination you want to connect to " -"transmitted to\n" +"Once you've found the base64 destination you want to connect to transmitted to\n" "your client device, then paste it into the client destination field." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:244 msgid "" -"Lastly, set a local port to connect your ssh client to. This will local " -"port\n" +"Lastly, set a local port to connect your ssh client to. This will local port\n" "will be connected to the base64 destination and thus the SSH server." msgstr "" @@ -9920,19 +8901,15 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:266 msgid "" -"Like before, you'll want to change the settings to be optimized for " -"interactive\n" -"connections. Additionally, if you want to set up client whiteliting on " -"the\n" -"server, you should check the \"Generate key to enable persistent client " -"tunnel\n" +"Like before, you'll want to change the settings to be optimized for interactive\n" +"connections. Additionally, if you want to set up client whiteliting on the\n" +"server, you should check the \"Generate key to enable persistent client tunnel\n" "identity\" radial button." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:282 msgid "" -"You can set this up by adding the following lines to your tunnels.conf " -"and\n" +"You can set this up by adding the following lines to your tunnels.conf and\n" "adjust it for your performance/anonymity needs." msgstr "" @@ -9946,14 +8923,10 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:309 msgid "" -"There are lots of ways to set up an SSH client to connect to your server " -"on I2P,\n" -"but there are a few things you should do to secure your SSH client for " -"anonymous\n" -"use. First, you should configure it to only identify itself to SSH server" -" with\n" -"a single, specific key so that you don't risk contaminating your " -"anonymous and\n" +"There are lots of ways to set up an SSH client to connect to your server on I2P,\n" +"but there are a few things you should do to secure your SSH client for anonymous\n" +"use. First, you should configure it to only identify itself to SSH server with\n" +"a single, specific key so that you don't risk contaminating your anonymous and\n" "non-anonymous SSH connections." msgstr "" @@ -9963,8 +8936,7 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:328 msgid "" -"Alternatively, you could make a .bash_alias entry to enforce your options" -" and\n" +"Alternatively, you could make a .bash_alias entry to enforce your options and\n" "automatically connect to I2P. You get the idea, you need to enforce\n" "IdentitiesOnly and provide an identity file." msgstr "" @@ -9975,26 +8947,21 @@ msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:343 msgid "" -"This is more-or-less optional, but it's pretty cool and will prevent " -"anyone who\n" -"happens to come across your destination from being able to tell you are " -"hosting\n" +"This is more-or-less optional, but it's pretty cool and will prevent anyone who\n" +"happens to come across your destination from being able to tell you are hosting\n" "an SSH service." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:349 msgid "" -"First, retrieve the persistent client tunnel destination and transmit it " -"to the\n" +"First, retrieve the persistent client tunnel destination and transmit it to the\n" "server." msgstr "" #: i2p2www/blog/2019/06/15/i2p-i2pd-ssh-config.rst:358 msgid "" -"Add the client's base64 destination to the server's destination " -"whitelist. Now\n" -"you'll only be able to connect to the server tunnel from that specific " -"client\n" +"Add the client's base64 destination to the server's destination whitelist. Now\n" +"you'll only be able to connect to the server tunnel from that specific client\n" "tunnel and no one else will be able to connect to that destination." msgstr "" @@ -10012,28 +8979,19 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:12 msgid "" -"One of the best features of I2P, in my opinion, is it's SAM API, which " -"can be\n" -"used to build a bridge between I2P and your application or language of " -"choice.\n" -"Currently, dozens of SAM libraries exist for a variety of languages, " -"including:" +"One of the best features of I2P, in my opinion, is it's SAM API, which can be\n" +"used to build a bridge between I2P and your application or language of choice.\n" +"Currently, dozens of SAM libraries exist for a variety of languages, including:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:32 msgid "" -"If you're using any of these languages, you may be able to port your " -"application\n" -"to I2P already, using an existing library. That's not what this tutorial " -"is\n" -"about, though. This tutorial is about what to do if you want to create a " -"SAM\n" -"library in a new language. In this tutorial, I will implement a new SAM " -"library\n" -"in Java. I chose Java because there isn't a Java library that connects " -"you to\n" -"SAM yet, because of Java's use in Android, and because it's a language " -"almost\n" +"If you're using any of these languages, you may be able to port your application\n" +"to I2P already, using an existing library. That's not what this tutorial is\n" +"about, though. This tutorial is about what to do if you want to create a SAM\n" +"library in a new language. In this tutorial, I will implement a new SAM library\n" +"in Java. I chose Java because there isn't a Java library that connects you to\n" +"SAM yet, because of Java's use in Android, and because it's a language almost\n" "everybody has at least a *little* experience with, so hopefully you can\n" "translate it into a language of your choice." msgstr "" @@ -10044,10 +9002,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:46 msgid "" -"How you set up your own library will vary depending on the language you " -"wish\n" -"to use. For this example library, we'll be using java so we can create a " -"library\n" +"How you set up your own library will vary depending on the language you wish\n" +"to use. For this example library, we'll be using java so we can create a library\n" "like this:" msgstr "" @@ -10061,10 +9017,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:69 msgid "" -"There are a few pieces of data that almost any SAM library should " -"probably\n" -"manage. It will at least need to store the address of the SAM Bridge you " -"intend\n" +"There are a few pieces of data that almost any SAM library should probably\n" +"manage. It will at least need to store the address of the SAM Bridge you intend\n" "to use and the signature type you wish to use." msgstr "" @@ -10074,8 +9028,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:78 msgid "" -"I prefer to store the SAM address as a String and an Integer, and re-" -"combine\n" +"I prefer to store the SAM address as a String and an Integer, and re-combine\n" "them in a function at runtime." msgstr "" @@ -10085,15 +9038,11 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:94 msgid "" -"The valid signature types for an I2P Tunnel are DSA_SHA1, " -"ECDSA_SHA256_P256,\n" +"The valid signature types for an I2P Tunnel are DSA_SHA1, ECDSA_SHA256_P256,\n" "ECDSA_SHA384_P384, ECDSA_SHA512_P521, EdDSA_SHA512_Ed25519, but it is\n" -"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if " -"you\n" -"implement at least SAM 3.1. In java, the 'enum' datastructure lends " -"itself to\n" -"this task, as it is intended to contain a group of constants. Add the " -"enum, and\n" +"strongly recommended that you use EdDSA_SHA512_Ed25519 as a default if you\n" +"implement at least SAM 3.1. In java, the 'enum' datastructure lends itself to\n" +"this task, as it is intended to contain a group of constants. Add the enum, and\n" "an instance of the enum, to your java class definition." msgstr "" @@ -10104,8 +9053,7 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:117 msgid "" "That takes care of reliably storing the signature type in use by the SAM\n" -"connection, but you've still got to retrieve it as a string to " -"communicate it\n" +"connection, but you've still got to retrieve it as a string to communicate it\n" "to the bridge." msgstr "" @@ -10115,10 +9063,8 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:156 msgid "" -"Once that's done, begin creating your constructor. Note that we've given " -"our\n" -"library defaults which will be useful in default situations on all " -"existing I2P\n" +"Once that's done, begin creating your constructor. Note that we've given our\n" +"library defaults which will be useful in default situations on all existing I2P\n" "routers so far." msgstr "" @@ -10128,14 +9074,10 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:173 msgid "" -"Finally, the good part. Interaction with the SAM bridge is done by " -"sending a\n" -"\"command\" to the address of the SAM bridge, and you can parse the " -"result of the\n" -"command as a set of string-based key-value pairs. So bearing that in " -"mind, let's\n" -"estabish a read-write connection to the SAM Address we defined before, " -"then\n" +"Finally, the good part. Interaction with the SAM bridge is done by sending a\n" +"\"command\" to the address of the SAM bridge, and you can parse the result of the\n" +"command as a set of string-based key-value pairs. So bearing that in mind, let's\n" +"estabish a read-write connection to the SAM Address we defined before, then\n" "write a \"CommandSAM\" Function and a reply parser." msgstr "" @@ -10145,17 +9087,14 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:184 msgid "" -"We're communicating with SAM via a Socket, so in order to connect to, " -"read from,\n" -"and write to the socket, you'll need to create the following private " -"variables\n" +"We're communicating with SAM via a Socket, so in order to connect to, read from,\n" +"and write to the socket, you'll need to create the following private variables\n" "in the Jsam class:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:196 msgid "" -"You will also want to instantiate those variables in your Constructors by" -"\n" +"You will also want to instantiate those variables in your Constructors by\n" "creating a function to do so." msgstr "" @@ -10165,23 +9104,17 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:222 msgid "" -"Now you're all set up to finally start talking to SAM. In order to keep " -"things\n" -"nicely organized, let's create a function which sends a single command to" -" SAM,\n" -"terminated by a newline, and which returns a Reply object, which we will " -"create\n" +"Now you're all set up to finally start talking to SAM. In order to keep things\n" +"nicely organized, let's create a function which sends a single command to SAM,\n" +"terminated by a newline, and which returns a Reply object, which we will create\n" "in the next step:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:241 msgid "" -"Note that we are using the writer and reader we created from the socket " -"in the\n" -"previous step as our inputs and outputs to the socket. When we get a " -"reply from\n" -"the reader, we pass the string to the Reply constructor, which parses it " -"and\n" +"Note that we are using the writer and reader we created from the socket in the\n" +"previous step as our inputs and outputs to the socket. When we get a reply from\n" +"the reader, we pass the string to the Reply constructor, which parses it and\n" "returns the Reply object." msgstr "" @@ -10192,37 +9125,29 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:253 msgid "" "In order to more easily handle replies, we'll use a Reply object to\n" -"automatically parse the results we get from the SAM bridge. A reply has " -"at least\n" -"a topic, a type, and a result, as well as an arbitrary number of key-" -"value\n" +"automatically parse the results we get from the SAM bridge. A reply has at least\n" +"a topic, a type, and a result, as well as an arbitrary number of key-value\n" "pairs." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:268 msgid "" -"As you can see, we will be storing the \"result\" as an enum, " -"REPLY_TYPES. This\n" -"enum contains all the possible reply results which the SAM bridge might " -"respond\n" +"As you can see, we will be storing the \"result\" as an enum, REPLY_TYPES. This\n" +"enum contains all the possible reply results which the SAM bridge might respond\n" "with." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:335 msgid "" -"Now let's create our constructor, which takes the reply string recieved " -"from the\n" -"socket as a parameter, parses it, and uses the information to set up the " -"reply\n" -"object. The reply is space-delimited, with key-value pairs joined by an " -"equal\n" +"Now let's create our constructor, which takes the reply string recieved from the\n" +"socket as a parameter, parses it, and uses the information to set up the reply\n" +"object. The reply is space-delimited, with key-value pairs joined by an equal\n" "sign and terminated by a newline." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:364 msgid "" -"Lastly, for the sake of convenience, let's give the reply object a " -"toString()\n" +"Lastly, for the sake of convenience, let's give the reply object a toString()\n" "function which returns a string representation of the Reply object." msgstr "" @@ -10232,30 +9157,21 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:379 msgid "" -"Now we're ready to establish communication with SAM by sending a " -"\"Hello\"\n" -"message. If you're writing a new SAM library, you should probably target " -"at\n" -"least SAM 3.1, since it's available in both I2P and i2pd and introduces " -"support\n" +"Now we're ready to establish communication with SAM by sending a \"Hello\"\n" +"message. If you're writing a new SAM library, you should probably target at\n" +"least SAM 3.1, since it's available in both I2P and i2pd and introduces support\n" "for the SIGNATURE_TYPE parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:397 msgid "" -"As you can see, we use the CommandSAM function we created before to send " -"the\n" -"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This " -"tells\n" -"SAM that you want to start communicating with the API, and that you know " -"how\n" +"As you can see, we use the CommandSAM function we created before to send the\n" +"newline-terminated command ``HELLO VERSION MIN=3.0 MAX=3.1 \\n``. This tells\n" +"SAM that you want to start communicating with the API, and that you know how\n" "to speak SAM version 3.0 and 3.1. The router, in turn, will respond with\n" -"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass" -" to\n" -"the Reply constructor to get a valid Reply object. From now on, we can " -"use our\n" -"CommandSAM function and Reply object to deal with all our communication " -"across\n" +"like ``HELLO REPLY RESULT=OK VERSION=3.1`` which is a string you can pass to\n" +"the Reply constructor to get a valid Reply object. From now on, we can use our\n" +"CommandSAM function and Reply object to deal with all our communication across\n" "the SAM bridge." msgstr "" @@ -10265,66 +9181,46 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:423 msgid "" -"Now that you've negotiated your connection to SAM and agreed on a SAM " -"version\n" -"you both speak, you can set up peer-to-peer connections for your " -"application\n" -"to connect to other i2p applications. You do this by sending a \"SESSION " -"CREATE\"\n" -"command to the SAM Bridge. To do that, we'll use a CreateSession function" -" that\n" +"Now that you've negotiated your connection to SAM and agreed on a SAM version\n" +"you both speak, you can set up peer-to-peer connections for your application\n" +"to connect to other i2p applications. You do this by sending a \"SESSION CREATE\"\n" +"command to the SAM Bridge. To do that, we'll use a CreateSession function that\n" "accepts a session ID and a destination type parameter." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:444 msgid "" -"That was easy, right? All we had to do was adapt the pattern we used in " -"our\n" -"HelloSAM function to the ``SESSION CREATE`` command. A good reply from " -"the\n" -"bridge will still return OK, and in that case we return the ID of the " -"newly\n" -"created SAM connection. Otherwise, we return an empty string because " -"that's an\n" -"invalid ID anyway and it failed, so it's easy to check. Let's see if this" -"\n" +"That was easy, right? All we had to do was adapt the pattern we used in our\n" +"HelloSAM function to the ``SESSION CREATE`` command. A good reply from the\n" +"bridge will still return OK, and in that case we return the ID of the newly\n" +"created SAM connection. Otherwise, we return an empty string because that's an\n" +"invalid ID anyway and it failed, so it's easy to check. Let's see if this\n" "function works by writing a test for it:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:461 msgid "" -"Note that in this test, we *must* call HelloSAM first to establish " -"communication\n" -"with SAM before starting our session. If not, the bridge will reply with " -"an\n" +"Note that in this test, we *must* call HelloSAM first to establish communication\n" +"with SAM before starting our session. If not, the bridge will reply with an\n" "error and the test will fail." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:472 msgid "" -"Now you have your session established and your local destination, and " -"need to\n" -"decide what you want to do with them. Your session can now be commanded " -"to\n" -"connect to a remote service over I2P, or to wait for incoming connections" -" to\n" -"respond to. However, before you can connect to a remote destination, you " -"may\n" -"need to obtain the base64 of the destination, which is what the API " -"expects. In\n" -"order to do this, we'll create a LookupName function, which will return " -"the\n" +"Now you have your session established and your local destination, and need to\n" +"decide what you want to do with them. Your session can now be commanded to\n" +"connect to a remote service over I2P, or to wait for incoming connections to\n" +"respond to. However, before you can connect to a remote destination, you may\n" +"need to obtain the base64 of the destination, which is what the API expects. In\n" +"order to do this, we'll create a LookupName function, which will return the\n" "base64 in a usable form." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:494 msgid "" -"Again, this is almost the same as our HelloSAM and CreateSession " -"functions,\n" -"with one difference. Since we're looking for the VALUE specifically and " -"the NAME\n" -"field will be the same as the ``name`` argument, it simply returns the " -"base64\n" +"Again, this is almost the same as our HelloSAM and CreateSession functions,\n" +"with one difference. Since we're looking for the VALUE specifically and the NAME\n" +"field will be the same as the ``name`` argument, it simply returns the base64\n" "string of the destination requested." msgstr "" @@ -10334,50 +9230,39 @@ msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:516 msgid "" -"At last, we are going to establish a connection to another service with " -"our new\n" +"At last, we are going to establish a connection to another service with our new\n" "library. This part confused me a bit at first, but the most astute Java\n" "developers were probably wondering why we didn't extend the socket class\n" -"instead of creating a Socket variable inside of the Jsam class. That's " -"because\n" -"until now, we've been communicating with the \"Control Socket\" and we " -"need to\n" -"create a new socket to do the actual communication. So we've waited to " -"extend\n" +"instead of creating a Socket variable inside of the Jsam class. That's because\n" +"until now, we've been communicating with the \"Control Socket\" and we need to\n" +"create a new socket to do the actual communication. So we've waited to extend\n" "the the Socket class with the Jsam class until now:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:530 msgid "" -"Also, let's alter our startConnection function so that we can use it to " -"switch\n" -"over from the control socket to the socket we'll be using in our " -"application. It\n" +"Also, let's alter our startConnection function so that we can use it to switch\n" +"over from the control socket to the socket we'll be using in our application. It\n" "will now take a Socket argument." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:556 msgid "" -"This allows us to quickly and easily open a new socket to communicate " -"over,\n" +"This allows us to quickly and easily open a new socket to communicate over,\n" "perform the \"Hello SAM\" handshake over again, and connect the stream." msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:579 msgid "" -"And now you have a new Socket for communicating over SAM! Let's do the " -"same\n" +"And now you have a new Socket for communicating over SAM! Let's do the same\n" "thing for Accepting remote connections:" msgstr "" #: i2p2www/blog/2019/06/23/sam-library-basics.rst:599 msgid "" -"There you have it. That's how you build a SAM library, step-by-step. In " -"the\n" -"future, I will cross-reference this with the working version of the " -"library,\n" -"Jsam, and the SAM v3 specification but for now I've got to get some other" -" stuff\n" +"There you have it. That's how you build a SAM library, step-by-step. In the\n" +"future, I will cross-reference this with the working version of the library,\n" +"Jsam, and the SAM v3 specification but for now I've got to get some other stuff\n" "done." msgstr "" @@ -10395,22 +9280,13 @@ msgid "" "including per-client authentication for encrypted leasesets.\n" "The console has an updated I2P logo and several new icons.\n" "We've updated the Linux installer." -msgstr "" -"0.9.41 continuă lucrările pentru implementarea noilor funcÈ›ii pentru " -"propunerea 123,\n" -"inclusiv autentificarea per client pentru închirieri criptate.\n" -"Consola are un logo I2P actualizat È™i câteva pictograme noi.\n" -"Am actualizat instalatorul Linux." +msgstr "0.9.41 continuă lucrările pentru implementarea noilor funcÈ›ii pentru propunerea 123,\ninclusiv autentificarea per client pentru închirieri criptate.\nConsola are un logo I2P actualizat È™i câteva pictograme noi.\nAm actualizat instalatorul Linux." #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:23 msgid "" "Startup should be faster on platforms such as Raspberry Pi.\n" -"We've fixed several bugs, including some serious ones affecting low-level" -" network messages." -msgstr "" -"Pornirea ar trebui să fie mai rapidă pe platforme precum Raspberry Pi.\n" -"Am rezolvat mai multe bug-uri, inclusiv unele grave care afectează mesaje" -" de reÈ›ea la nivel scăzut." +"We've fixed several bugs, including some serious ones affecting low-level network messages." +msgstr "Pornirea ar trebui să fie mai rapidă pe platforme precum Raspberry Pi.\nAm rezolvat mai multe bug-uri, inclusiv unele grave care afectează mesaje de reÈ›ea la nivel scăzut." #: i2p2www/blog/2019/07/02/0.9.41-Release.rst:38 msgid "" @@ -10503,58 +9379,39 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:11 msgid "" -"*This post is adapted directly from material originally created for " -"mhatta's*\n" -"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-" -"c08ec9de225d>`__\\ *.*\n" -"*He deserves the credit for the OP. It has been updated in certain places" -" where*\n" -"*it refers to old versions of I2P as current and has undergone some " -"light*\n" +"*This post is adapted directly from material originally created for mhatta's*\n" +"`medium blog <https://medium.com/@mhatta/speeding-up-your-i2p-network-c08ec9de225d>`__\\ *.*\n" +"*He deserves the credit for the OP. It has been updated in certain places where*\n" +"*it refers to old versions of I2P as current and has undergone some light*\n" "*editing. -idk*" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:17 msgid "" -"Right after it starts up, I2P is often seen as a little bit slow. It's " -"true, and\n" -"we all know why, by nature, `garlic routing " -"<https://en.wikipedia.org/wiki/Garlic_routing>`__\n" -"adds overhead to the familiar experience of using the internet so that " -"you can\n" -"have privacy, but this means that for many or most I2P services, your " -"data will\n" +"Right after it starts up, I2P is often seen as a little bit slow. It's true, and\n" +"we all know why, by nature, `garlic routing <https://en.wikipedia.org/wiki/Garlic_routing>`__\n" +"adds overhead to the familiar experience of using the internet so that you can\n" +"have privacy, but this means that for many or most I2P services, your data will\n" "need to go through 12 hops by default." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:28 msgid "" -"Also, unlike Tor, I2P was primarily designed as a closed network. You can" -"\n" -"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-" -"untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources " -"inside I2P, but you are not supposed\n" -"to access `clearnet " -"<https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" +"Also, unlike Tor, I2P was primarily designed as a closed network. You can\n" +"easily access `eepsites <https://medium.com/@mhatta/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d>`__ or other resources inside I2P, but you are not supposed\n" +"to access `clearnet <https://en.wikipedia.org/wiki/Clearnet_(networking)>`__\n" "websites through I2P. There exist a few I2P “outproxies†similar to\n" -"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit" -" nodes to\n" -"access clearnet, but most of them are very slow to use as going to the " -"clearnet\n" -"is effectively *another* hop in the already 6 hops in, six hops out " -"connection." +"`Tor <https://en.wikipedia.org/wiki/Tor_(anonymity_network)>`__\\ ’s exit nodes to\n" +"access clearnet, but most of them are very slow to use as going to the clearnet\n" +"is effectively *another* hop in the already 6 hops in, six hops out connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:36 msgid "" -"Until a few versions ago, this problem was even harder to deal with " -"because many\n" -"I2P router users were having difficulties configuring the bandwidth " -"settings for\n" -"their routers. If everyone who can takes the time to adjust their " -"bandwidth\n" -"settings properly, they will improve not only your connection but also " -"the I2P\n" +"Until a few versions ago, this problem was even harder to deal with because many\n" +"I2P router users were having difficulties configuring the bandwidth settings for\n" +"their routers. If everyone who can takes the time to adjust their bandwidth\n" +"settings properly, they will improve not only your connection but also the I2P\n" "network as a whole." msgstr "" @@ -10564,8 +9421,7 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:45 msgid "" -"Since I2P is a peer-to-peer network, you have to share some of your " -"network\n" +"Since I2P is a peer-to-peer network, you have to share some of your network\n" "bandwidth with other peers. You see choose how much in “I2P Bandwidth\n" "Configuration†(“Configure Bandwidth†button in the “Applications and\n" "Configuration†section of I2P Router Console, or\n" @@ -10574,47 +9430,34 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:55 msgid "" -"If you see a shared bandwidth limit of 48 KBps, which is very low, then " -"you\n" -"may not have adjusted your shared bandwidth from the default. As the " -"original\n" -"author of the material this blog post is adapted from noted, I2P has a " -"default\n" -"shared bandwidth limit that is very low until the user adjusts it to " -"avoid\n" +"If you see a shared bandwidth limit of 48 KBps, which is very low, then you\n" +"may not have adjusted your shared bandwidth from the default. As the original\n" +"author of the material this blog post is adapted from noted, I2P has a default\n" +"shared bandwidth limit that is very low until the user adjusts it to avoid\n" "causing issues with the user's connection." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:61 msgid "" -"However, since many users may not know exactly which bandwidth settings " -"to\n" -"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ " -"introduced a\n" -"New Install Wizard. It contains a Bandwidth Test, which automatically " -"detects\n" -"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) " -"and adjusts\n" +"However, since many users may not know exactly which bandwidth settings to\n" +"adjust, the `I2P 0.9.38 release <https://geti2p.net/en/download>`__ introduced a\n" +"New Install Wizard. It contains a Bandwidth Test, which automatically detects\n" +"(thanks to M-Lab’s `NDT <https://www.measurementlab.net/tests/ndt/>`__) and adjusts\n" "I2P’s bandwidth settings accordingly." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:67 msgid "" -"If you want to re-run the wizard, for instance following a change in your" -"\n" -"service provider or bcause you installed I2P before version 0.9.38, you " -"can\n" -"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply " -"access\n" +"If you want to re-run the wizard, for instance following a change in your\n" +"service provider or bcause you installed I2P before version 0.9.38, you can\n" +"re-launch it from the 'Setup' link on the 'Help & FAQ' page, or simply access\n" "the wizard directly at http://localhost:7657/welcome" msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:76 msgid "" -"Using the Wizard is straightforward, simply keep clicking “Nextâ€. " -"Sometimes\n" -"M-Lab’s chosen measurement servers are down and the test fails. In such " -"case,\n" +"Using the Wizard is straightforward, simply keep clicking “Nextâ€. Sometimes\n" +"M-Lab’s chosen measurement servers are down and the test fails. In such case,\n" "click “Previous†(do not use your web browser’s “back†button), then\n" "try it again." msgstr "" @@ -10625,27 +9468,19 @@ msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:88 msgid "" -"Even after adjusted the bandwidth, your connection might still be slow As" -" I\n" -"said, I2P is a P2P network. It will take some time for your I2P router to" -" be\n" -"discovered by other peers and integrated into the I2P network. If your " -"router\n" -"not up long enough to become well integrated, or if you shut down un-" -"gracefully\n" -"too often, the network will remain fairly slow. On the other hand, the " -"longer\n" -"you run your I2P router continuously, the faster and more stable your " -"connection\n" +"Even after adjusted the bandwidth, your connection might still be slow As I\n" +"said, I2P is a P2P network. It will take some time for your I2P router to be\n" +"discovered by other peers and integrated into the I2P network. If your router\n" +"not up long enough to become well integrated, or if you shut down un-gracefully\n" +"too often, the network will remain fairly slow. On the other hand, the longer\n" +"you run your I2P router continuously, the faster and more stable your connection\n" "becomes, and more of your bandwidth share will be used in the network." msgstr "" #: i2p2www/blog/2019/07/27/mhatta-post-one.rst:96 msgid "" -"However, many people might not be able to stay your I2P router up. In " -"such\n" -"case, you can still run the I2P router on a remote server such as VPS, " -"then use\n" +"However, many people might not be able to stay your I2P router up. In such\n" +"case, you can still run the I2P router on a remote server such as VPS, then use\n" "SSH port forwarding." msgstr "" @@ -10661,21 +9496,10 @@ msgstr "0.9.42 cu remedierea erorilor " msgid "" "0.9.42 continues the work to make I2P faster and more reliable.\n" "It includes several changes to speed up our UDP transport.\n" -"We have split up the configuration files to enable future work for more " -"modular packaging.\n" -"We continue work to implement new proposals for faster and more secure " -"encryption.\n" +"We have split up the configuration files to enable future work for more modular packaging.\n" +"We continue work to implement new proposals for faster and more secure encryption.\n" "There are, of course, a lot of bug fixes also." -msgstr "" -"0.9.42 continuă activitatea pentru ca I2P să fie mai rapid È™i mai fiabil." -"\n" -"Acesta include mai multe modificări pentru a accelera transportul nostru " -"UDP.\n" -"Am împărÈ›it fiÈ™ierele de configurare pentru a permite lucrările viitoare " -"pentru ambalaje mai modulare.\n" -"Continuăm munca pentru implementarea de noi propuneri pentru o criptare " -"mai rapidă È™i mai sigură.\n" -"Există, de asemenea, o mulÈ›ime de remedieri de erori." +msgstr "0.9.42 continuă activitatea pentru ca I2P să fie mai rapid È™i mai fiabil.\nAcesta include mai multe modificări pentru a accelera transportul nostru UDP.\nAm împărÈ›it fiÈ™ierele de configurare pentru a permite lucrările viitoare pentru ambalaje mai modulare.\nContinuăm munca pentru implementarea de noi propuneri pentru o criptare mai rapidă È™i mai sigură.\nExistă, de asemenea, o mulÈ›ime de remedieri de erori." #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:34 msgid "Console: Split up help page, tag text for translation" @@ -10702,7 +9526,8 @@ msgid "JBigI: GMP 6.1.2 (Linux 64-bit only)" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:40 -msgid "NetDB: Choose alternate gateway for store replies to reduce connections" +msgid "" +"NetDB: Choose alternate gateway for store replies to reduce connections" msgstr "" #: i2p2www/blog/2019/08/27/0.9.42-Release.rst:41 @@ -10749,134 +9574,91 @@ msgstr "" msgid "Def Con Trip Report- zzz" msgstr "" -#: i2p2www/blog/2019/08/30/defcon.rst:11 i2p2www/blog/2019/08/30/defcon2.rst:11 +#: i2p2www/blog/2019/08/30/defcon.rst:11 +#: i2p2www/blog/2019/08/30/defcon2.rst:11 msgid "Def Con Trip Report" msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:14 msgid "" -"idk and I attended DEFCON 27 and presented two workshops on I2P for " -"application\n" -"developers, with support from mhatta and Alex. I gave the workshop at " -"Monero\n" -"Village and idk gave the one at Crypto/Privacy Village. Here, I will " -"summarize\n" -"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will" -" post a\n" +"idk and I attended DEFCON 27 and presented two workshops on I2P for application\n" +"developers, with support from mhatta and Alex. I gave the workshop at Monero\n" +"Village and idk gave the one at Crypto/Privacy Village. Here, I will summarize\n" +"the Monero Village workshop, and a Tor talk by Roger Dingledine. idk will post a\n" "trip report covering his workshop." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:22 msgid "" -"We had about 8 attendees for the Monero Village workshop, entitled \"I2P " -"for\n" -"Cryptocurrency Developers\". We planned to discuss the particular " -"networking\n" -"needs for each application and work through the various i2ptunnel and SAM" -"\n" -"options available. However, all attendees were relatively unfamiliar with" -" I2P,\n" -"so we pivoted and gave an overview of I2P. As none of the attendees had a" -" laptop\n" -"with them, we helped several of them install I2P on their Android phone " -"and\n" -"walked through some of the features of the app. For all users, the app " -"appeared\n" +"We had about 8 attendees for the Monero Village workshop, entitled \"I2P for\n" +"Cryptocurrency Developers\". We planned to discuss the particular networking\n" +"needs for each application and work through the various i2ptunnel and SAM\n" +"options available. However, all attendees were relatively unfamiliar with I2P,\n" +"so we pivoted and gave an overview of I2P. As none of the attendees had a laptop\n" +"with them, we helped several of them install I2P on their Android phone and\n" +"walked through some of the features of the app. For all users, the app appeared\n" "to reseed and build tunnels fairly quickly." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:33 msgid "" -"One common question after installing the app was \"what do I do now?\". " -"The app\n" -"doesn't have a 'hidden services of interest' section or first-run wizard " -"like\n" -"our desktop application does, and most of the default addressbook entries" -" are\n" -"long-dead. There's improvements we could make to the first-run " -"experience.\n" +"One common question after installing the app was \"what do I do now?\". The app\n" +"doesn't have a 'hidden services of interest' section or first-run wizard like\n" +"our desktop application does, and most of the default addressbook entries are\n" +"long-dead. There's improvements we could make to the first-run experience.\n" "Also, some of the more interesting parts of the app are hidden behind an\n" -"advanced setting; we should review those items and consider un-hiding " -"some of\n" +"advanced setting; we should review those items and consider un-hiding some of\n" "them." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:43 msgid "" -"It's always useful to go to Tor talks, not so much to find out what " -"they're\n" -"doing, but to hear how they explain things to people, and what " -"terminology they\n" -"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large " -"room\n" -"attended by about two thousand people. He gave a very brief overview of " -"Tor\n" -"with only three or four slides. He says they now have \"two to eight " -"million\n" -"users a day\". Most of the talk was a review of national blocking " -"attempts over\n" -"the years, starting with Thailand and Iran in '06-'07 through Tunisia, " -"china,\n" -"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He " -"showed a\n" -"new form to be showed to new users, with a checkbox \"Tor is censored in " -"my\n" +"It's always useful to go to Tor talks, not so much to find out what they're\n" +"doing, but to hear how they explain things to people, and what terminology they\n" +"are using. Roger's talk \"The Tor Censorship Arms Race\" was in a large room\n" +"attended by about two thousand people. He gave a very brief overview of Tor\n" +"with only three or four slides. He says they now have \"two to eight million\n" +"users a day\". Most of the talk was a review of national blocking attempts over\n" +"the years, starting with Thailand and Iran in '06-'07 through Tunisia, china,\n" +"and Ethiopia in 2011. He called Tor bridges a \"crappy arms race\". He showed a\n" +"new form to be showed to new users, with a checkbox \"Tor is censored in my\n" "country\"." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:56 msgid "" "Their new pluggable transport \"snowflake\" uses a combination of domain\n" -"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. " -"Roger\n" -"only had one slide on it, and I wasn't familiar with it, so we should do " -"more\n" -"research on what it's all about. He briefly mentioned some things they " -"may be\n" -"working on next, including \"salmon\" distribution of bridges, " -"FTE/Marionette,\n" -"decoy routing, and \"cupcake\" which is an extension of snowflake. While " -"I don't\n" -"have any further information about them, they may be good buzzwords to " -"keep an\n" +"fronting, webrtc, javascript, brokers and proxies to reach a Tor bridge. Roger\n" +"only had one slide on it, and I wasn't familiar with it, so we should do more\n" +"research on what it's all about. He briefly mentioned some things they may be\n" +"working on next, including \"salmon\" distribution of bridges, FTE/Marionette,\n" +"decoy routing, and \"cupcake\" which is an extension of snowflake. While I don't\n" +"have any further information about them, they may be good buzzwords to keep an\n" "eye out for on their mailing lists." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:67 msgid "" "Much of Tor's censorship woes is due to Tor's popularity, but their TLS\n" -"handshake is a particular issue and it's been the focus of much of the " -"\"arms\n" -"race\" over the years. In some ways we're in better shape, as we've taken" -"\n" -"several features of their current-best obfs4 pluggable transport and " -"build them\n" -"into NTCP2. However, we do have issues with our website and reseeds being" -"\n" +"handshake is a particular issue and it's been the focus of much of the \"arms\n" +"race\" over the years. In some ways we're in better shape, as we've taken\n" +"several features of their current-best obfs4 pluggable transport and build them\n" +"into NTCP2. However, we do have issues with our website and reseeds being\n" "blocked, as Sadie and Phong will be presenting at USENIX FOCI this week." msgstr "" #: i2p2www/blog/2019/08/30/defcon.rst:76 msgid "" -"Notes for next time: I do recommend DEFCON, as long as we find a village " -"to\n" -"call our home. It's an enormous conference and the limited general " -"hangout\n" +"Notes for next time: I do recommend DEFCON, as long as we find a village to\n" +"call our home. It's an enormous conference and the limited general hangout\n" "spaces are massively overcrowded. Both Monero Village and Crypto/Privacy\n" -"Village were fantastic hosts and we had several hours at each spot to " -"meet with\n" -"people. We should find more opportunities to work with both " -"organizations.\n" -"There were also ZCash people at the Monero Village and we should work " -"with them\n" -"also. Any future workshop should be targeted at a more general audience. " -"We do\n" -"need a standard \"Intro to I2P\" slide deck; it would have been helpful " -"at the\n" -"workshops. Don't expect attendees to have laptops with them, focus on " -"Android\n" -"for any hands-on exercises. There's several improvements to be made in " -"our\n" +"Village were fantastic hosts and we had several hours at each spot to meet with\n" +"people. We should find more opportunities to work with both organizations.\n" +"There were also ZCash people at the Monero Village and we should work with them\n" +"also. Any future workshop should be targeted at a more general audience. We do\n" +"need a standard \"Intro to I2P\" slide deck; it would have been helpful at the\n" +"workshops. Don't expect attendees to have laptops with them, focus on Android\n" +"for any hands-on exercises. There's several improvements to be made in our\n" "Android app. Drink lots of water in Vegas... and stay away from the slot\n" "machines." msgstr "" @@ -10893,95 +9675,67 @@ msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:19 msgid "" -"My workshop went well, we even had a few application developers attend! " -"In\n" -"particular I had a pretty lengthy conversation with a person named Mary " -"about\n" +"My workshop went well, we even had a few application developers attend! In\n" +"particular I had a pretty lengthy conversation with a person named Mary about\n" "how I2P could be used to eliminate centralization and enhance privacy in\n" -"a \"Magic Wormhole\" type of application. While I wasn't totally familiar" -" with\n" -"Magic Wormhole at the time, I think most of my advice was usable. I think" -" Mary\n" -"had some very interesting and workable ideas about sharing information in" -" more\n" -"human-centric ways that could be interesting in I2P applications, and am " -"looking\n" +"a \"Magic Wormhole\" type of application. While I wasn't totally familiar with\n" +"Magic Wormhole at the time, I think most of my advice was usable. I think Mary\n" +"had some very interesting and workable ideas about sharing information in more\n" +"human-centric ways that could be interesting in I2P applications, and am looking\n" "forward to experimenting with some of those." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:30 msgid "" -"The materials I made for the application development workshop are " -"available on\n" -"Github! https://github.com/eyedeekay/defcon Please consider it a living " -"document,\n" -"your input is desired! As it is licensed permissively, you are free to " -"fork it\n" -"and make it your own as well. Share your examples, your hacks, or correct" -" my\n" -"comma use, complain about my document preparation style, or just print " -"off your\n" +"The materials I made for the application development workshop are available on\n" +"Github! https://github.com/eyedeekay/defcon Please consider it a living document,\n" +"your input is desired! As it is licensed permissively, you are free to fork it\n" +"and make it your own as well. Share your examples, your hacks, or correct my\n" +"comma use, complain about my document preparation style, or just print off your\n" "own copy in booklet form!" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:39 msgid "" -"I also talked to a guy who gives advice to the government about the " -"differences\n" -"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in " -"which\n" -"peers in a P2P application might want to have enhanced privacy from each-" -"other,\n" +"I also talked to a guy who gives advice to the government about the differences\n" +"between I2P and Tor, why I2P is more P2P-friendly, and some scenarios in which\n" +"peers in a P2P application might want to have enhanced privacy from each-other,\n" "and why I2P is perhaps uniquely suited to accomplish that." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:46 msgid "" -"In general, both the application development workshops went well, even " -"though\n" -"they didn't go entirely according to plan in that only a small proportion" -" of the\n" -"audience were application developers. The impression I got was that many " -"people\n" -"are very interested in I2P, but also many people are confused by how " -"interacting\n" -"with I2P works. By re-focusing on their questions and by teaming off with" -" zzz,\n" -"mhatta, and Alex we were fairly successful at dealing with our audience, " -"which\n" +"In general, both the application development workshops went well, even though\n" +"they didn't go entirely according to plan in that only a small proportion of the\n" +"audience were application developers. The impression I got was that many people\n" +"are very interested in I2P, but also many people are confused by how interacting\n" +"with I2P works. By re-focusing on their questions and by teaming off with zzz,\n" +"mhatta, and Alex we were fairly successful at dealing with our audience, which\n" "was more varied in terms of occupation, interest, and I2P knowledge than\n" "expected." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:57 msgid "" -"Besides that, I also talked to Alex about my experimental contextual-" -"identity\n" -"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to" -" talk\n" -"a little about bundling, but not too much, as it was a very busy " -"convention. I'm\n" +"Besides that, I also talked to Alex about my experimental contextual-identity\n" +"driven I2P proxy plugin for Firefox and eventually, Brave Browser. Got to talk\n" +"a little about bundling, but not too much, as it was a very busy convention. I'm\n" "looking forward to following up with him on that soon." msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:64 msgid "" "mhatta and I almost won a lobster from a claw machine, but it was a real\n" -"fighter and got away at the last second. Really thought I had it for a " -"moment\n" +"fighter and got away at the last second. Really thought I had it for a moment\n" "though. :)" msgstr "" #: i2p2www/blog/2019/08/30/defcon2.rst:70 msgid "" -"To add to zzz's notes for next time, aside from being more general I " -"believe our\n" -"workshops would not have been as able to adapt to the needs of the " -"audience\n" -"without the support of mhatta and Alex. Having people who can help " -"particpants\n" -"individually or in small groups was immensely helpful, many, many thanks " -"to both\n" +"To add to zzz's notes for next time, aside from being more general I believe our\n" +"workshops would not have been as able to adapt to the needs of the audience\n" +"without the support of mhatta and Alex. Having people who can help particpants\n" +"individually or in small groups was immensely helpful, many, many thanks to both\n" "of them for helping us out." msgstr "" @@ -10992,95 +9746,71 @@ msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:14 msgid "" -"Over the past year I have had the good fortune to participate in the " -"research\n" -"Nguyen Phong Hoang from Stony Brook University has been doing regarding " -"I2P\n" -"censorship. The infrastructure used for this research provided numerous " -"and\n" -"geographically diverse vantage points, and also the ability to conduct " -"in-depth\n" -"measurements across all levels of the network stack. I2P services which " -"were\n" -"measured for availability included official homepage, mirror site, reseed" -"\n" +"Over the past year I have had the good fortune to participate in the research\n" +"Nguyen Phong Hoang from Stony Brook University has been doing regarding I2P\n" +"censorship. The infrastructure used for this research provided numerous and\n" +"geographically diverse vantage points, and also the ability to conduct in-depth\n" +"measurements across all levels of the network stack. I2P services which were\n" +"measured for availability included official homepage, mirror site, reseed\n" "servers and active relays." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:24 msgid "" -"The presentation on Tuesday went very well, and Phong was very busy " -"afterwards\n" -"answering questions about his work. I was busy too answering questions " -"about\n" -"I2P and what it does. The new stickers featuring the updated logo by Ura " -"Design\n" -"got rave reviews! It was a very positive experience and I will be looking" -"\n" -"forward to continuing to work with Phong and monitoring I2P censorship. I" -" would\n" -"encourage anyone who has encountered blocking, or has had success using " -"I2P to\n" +"The presentation on Tuesday went very well, and Phong was very busy afterwards\n" +"answering questions about his work. I was busy too answering questions about\n" +"I2P and what it does. The new stickers featuring the updated logo by Ura Design\n" +"got rave reviews! It was a very positive experience and I will be looking\n" +"forward to continuing to work with Phong and monitoring I2P censorship. I would\n" +"encourage anyone who has encountered blocking, or has had success using I2P to\n" "communicate in restricted environments to reach out if you can. I2P is\n" -"currently working on new solutions to circumvent internet blocking. " -"Having met\n" +"currently working on new solutions to circumvent internet blocking. Having met\n" "people this year who have given me first hand accounts of the effects of\n" -"censorship and the need to stay connected, makes the need for I2P to be " -"more\n" -"resilient where it needs to be and for the team to be creating guides for" -" using\n" +"censorship and the need to stay connected, makes the need for I2P to be more\n" +"resilient where it needs to be and for the team to be creating guides for using\n" "I2P in these situations." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:39 msgid "" -"I will be putting together better resources for researchers interested in" -" I2P,\n" +"I will be putting together better resources for researchers interested in I2P,\n" "as well." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:44 msgid "" "I also had the good fortune to spend time with Mhatta, who is an I2P\n" -"contributor, and to make connections for future funding. A huge thank you" -" to\n" -"the community builders I met in Tunis who I met again and who are " -"offering so\n" -"much support to the project. This has been an exciting year so far, and " -"I2P has\n" -"so much work to do. Please consider donating your time or funding the " -"project\n" +"contributor, and to make connections for future funding. A huge thank you to\n" +"the community builders I met in Tunis who I met again and who are offering so\n" +"much support to the project. This has been an exciting year so far, and I2P has\n" +"so much work to do. Please consider donating your time or funding the project\n" "as it needs to scale quickly to new challenges." msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:53 msgid "" -"If you have an opportunity to, you can read the full report Measuring I2P" -"\n" +"If you have an opportunity to, you can read the full report Measuring I2P\n" "Censorship at a Global Scale here\n" "https://www.usenix.org/conference/foci19/presentation/hoang" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:59 msgid "" -"Another great workshop in the measurements workshop was On the Importance" -" of\n" +"Another great workshop in the measurements workshop was On the Importance of\n" "Encrypted-SNI (ESNI) to Censorship Circumvention\n" "https://www.usenix.org/conference/foci19/presentation/chai" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:65 msgid "" -"There are so many great workshops that I attended - anyone who would like" -" too\n" +"There are so many great workshops that I attended - anyone who would like too\n" "can access the program and related materials here:\n" "https://www.usenix.org/conference/foci19/workshop-program" msgstr "" #: i2p2www/blog/2019/08/30/foci.rst:71 msgid "" -"I will be attending Our Networks in Toronto next month " -"https://ournetworks.ca/\n" +"I will be attending Our Networks in Toronto next month https://ournetworks.ca/\n" "- and so should you! The program can be viewed here\n" "https://ournetworks.ca/program/" msgstr "" @@ -11092,63 +9822,43 @@ msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:14 msgid "" -"This was my first time attending IFF, and what a great experience for I2P" -" this\n" -"was! I met with human rights defenders, people who work on censorship " -"metrics,\n" +"This was my first time attending IFF, and what a great experience for I2P this\n" +"was! I met with human rights defenders, people who work on censorship metrics,\n" "and of course UX and security professionals." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:20 msgid "" "My goal was to connect with people to further support I2P’s UX overhaul,\n" -"keeping in mind security and UX considerations for frontline workers. As " -"it was\n" -"pointed out to me, people see I2P as a very important and powerful " -"resource to\n" -"circumvent censorship and support safe communication, however the " -"interface\n" -"suffers from some usability concerns. People were happy with our initial " -"steps\n" -"to make first time users have a better experience, such as our set up " -"wizard\n" -"and bandwidth detection tool. I also received positive reviews on our " -"changes\n" -"to the website and /home icons. It was very encouraging to hear directly " -"from\n" +"keeping in mind security and UX considerations for frontline workers. As it was\n" +"pointed out to me, people see I2P as a very important and powerful resource to\n" +"circumvent censorship and support safe communication, however the interface\n" +"suffers from some usability concerns. People were happy with our initial steps\n" +"to make first time users have a better experience, such as our set up wizard\n" +"and bandwidth detection tool. I also received positive reviews on our changes\n" +"to the website and /home icons. It was very encouraging to hear directly from\n" "the community that small changes we have made are in the right direction." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:32 msgid "" -"Things like having configuration happen out of the box and not having to " -"put\n" -"people in the position where they need to rely on reading so much " -"documentation\n" -"or chasing documentation were discussed. Also, improved documentation for" -"\n" -"setting up outproxies and and site mirroring were requested and " -"suggested.\n" -"Please see Mikal’s very good instructions on setting up an I2P outproxy " -"that\n" +"Things like having configuration happen out of the box and not having to put\n" +"people in the position where they need to rely on reading so much documentation\n" +"or chasing documentation were discussed. Also, improved documentation for\n" +"setting up outproxies and and site mirroring were requested and suggested.\n" +"Please see Mikal’s very good instructions on setting up an I2P outproxy that\n" "came out of the suggestions this week —\n" -"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to " -"make\n" +"https://0xcc.re/howto-setup-an-i2p-outproxy/. Another suggestion was to make\n" "bug reporting easier." msgstr "" #: i2p2www/blog/2019/08/30/freedom.rst:43 msgid "" -"To this point, I truly hope that the project will secure resources to " -"continue\n" -"the improvements to its usability that it requires to meet the growing " -"demand\n" -"for I2P services. It is humbling to to be working with such talented " -"people and\n" -"to be able to work together with our community during a time when people " -"all\n" -"over the globe need all of the privacy protecting resources we as people " -"who\n" +"To this point, I truly hope that the project will secure resources to continue\n" +"the improvements to its usability that it requires to meet the growing demand\n" +"for I2P services. It is humbling to to be working with such talented people and\n" +"to be able to work together with our community during a time when people all\n" +"over the globe need all of the privacy protecting resources we as people who\n" "develop, design and educate can offer." msgstr "" @@ -11159,58 +9869,40 @@ msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:14 msgid "" -"The messages from activists in Syria during the Access No\\_! session on " -"the\n" +"The messages from activists in Syria during the Access No\\_! session on the\n" "first day were deeply moving and really drove home why I work in digital\n" -"rights. We listened to the experiences of activists who are unable to " -"travel\n" -"due to lack of status, documentation and active conflict. For these " -"people\n" +"rights. We listened to the experiences of activists who are unable to travel\n" +"due to lack of status, documentation and active conflict. For these people\n" "“the internet is the only passport (they) carry.†Human rights defenders\n" -"spoke of the importance of digital training to keep people protected " -"when they\n" -"are communicating with family inside of the country, as well as with " -"family and\n" -"friends who have left. They had created digital clinics to show people " -"how to\n" +"spoke of the importance of digital training to keep people protected when they\n" +"are communicating with family inside of the country, as well as with family and\n" +"friends who have left. They had created digital clinics to show people how to\n" "use services securely, for instance, how to use features like Signal’s\n" -"disappearing messages so that those messages could not be used against " -"them\n" +"disappearing messages so that those messages could not be used against them\n" "when devices are searched at security check points. Continuing to pursue\n" -"education was also very important, the internet being relied on to access" -"\n" +"education was also very important, the internet being relied on to access\n" "resources." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:30 msgid "" -"The following days we met with people who had both questions about I2P " -"and\n" -"suggestions for potential use cases. We also discussed overhauling the " -"project\n" +"The following days we met with people who had both questions about I2P and\n" +"suggestions for potential use cases. We also discussed overhauling the project\n" "documentation for threat models, improving guides for users with little\n" -"technical background, and ensuring that these guides are easily " -"translatable. I\n" -"made a note that I should go through the proposals and connect then to " -"human\n" -"use cases and solutions. This will be part of the projects’ continued " -"effort\n" +"technical background, and ensuring that these guides are easily translatable. I\n" +"made a note that I should go through the proposals and connect then to human\n" +"use cases and solutions. This will be part of the projects’ continued effort\n" "to improve its user guides and onboarding." msgstr "" #: i2p2www/blog/2019/08/30/rights.rst:40 msgid "" -"The opportunity to meet face to face with people who are using I2P and " -"have\n" -"successfully used it to circumvent internet blockages was inspiring. As " -"the\n" +"The opportunity to meet face to face with people who are using I2P and have\n" +"successfully used it to circumvent internet blockages was inspiring. As the\n" "project has began working on its own browser and is examining outproxy\n" -"packaging, it needs as much feedback and testing as possible to create " -"secure\n" -"and frictionless experiences for people. Also, the I2P network needs more" -"\n" -"hosted content and mirrored sites in order to expand resources for its " -"users." +"packaging, it needs as much feedback and testing as possible to create secure\n" +"and frictionless experiences for people. Also, the I2P network needs more\n" +"hosted content and mirrored sites in order to expand resources for its users." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:2 @@ -11224,47 +9916,35 @@ msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:14 msgid "" -"The weekend of September 20th I traveled to Toronto to meet with Sadie to" -" take\n" -"part in the Our Networks conference. The Our Networks conference " -"encompasses a\n" -"wide variety of topic including many peer-to-peer technologies with an " -"eye\n" +"The weekend of September 20th I traveled to Toronto to meet with Sadie to take\n" +"part in the Our Networks conference. The Our Networks conference encompasses a\n" +"wide variety of topic including many peer-to-peer technologies with an eye\n" "toward their potential to make the world a better place." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:21 msgid "" -"The conference was fascinating, full of very smart people working on " -"everything\n" -"from physical mesh networks to the distributed web to, of course, " -"anonymity. We\n" -"got to talk to some great people from Tor, Protocol Labs, Parity Labs, " -"the Dat\n" -"Project, as well as a variety of artists and social scientists. Lots of " -"fun too,\n" +"The conference was fascinating, full of very smart people working on everything\n" +"from physical mesh networks to the distributed web to, of course, anonymity. We\n" +"got to talk to some great people from Tor, Protocol Labs, Parity Labs, the Dat\n" +"Project, as well as a variety of artists and social scientists. Lots of fun too,\n" "and a great environment. Dat in particular presents some pretty cool\n" "opportunities for future co-operation I think." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:30 msgid "" -"I hadn't planned on giving a talk, but we were having so much fun that " -"when\n" -"we were asked, Sadie and I put something together and I gave a quick " -"lightning\n" +"I hadn't planned on giving a talk, but we were having so much fun that when\n" +"we were asked, Sadie and I put something together and I gave a quick lightning\n" "talk about I2P and how it's design choices are relevant to Peer-to-Peer\n" -"application development. The talk was recorded and when the video becomes" -"\n" -"available, I'll make sure to add it to this blog. Next year, I'll have " -"some\n" +"application development. The talk was recorded and when the video becomes\n" +"available, I'll make sure to add it to this blog. Next year, I'll have some\n" "submissions for their Zine Library about I2P." msgstr "" #: i2p2www/blog/2019/10/05/ournetworks-idk.rst:39 msgid "" -"Besides that, I really enjoyed my time visiting Toronto, it was a great " -"place\n" +"Besides that, I really enjoyed my time visiting Toronto, it was a great place\n" "to visit." msgstr "" @@ -11278,23 +9958,11 @@ msgstr "0.9.43 cu remedieri de erori" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:16 msgid "" -"In the 0.9.43 release, we continue work on stronger security and privacy " -"features and performance improvements.\n" -"Our implementation of the new leaseset specification (LS2) is now " -"complete.\n" -"We are beginning our implementation of stronger and faster end-to-end " -"encryption (proposal 144) for a future release.\n" -"Several IPv6 address detection issues have been fixed, and there of " -"course are several other bug fixes." -msgstr "" -"ÃŽn versiunea 0.9.43, continuăm să lucrăm la caracteristici mai puternice " -"de securitate È™i confidenÈ›ialitate È™i îmbunătățiri ale performanÈ›ei.\n" -"Implementarea noastră a noului caiet de sarcini (LS2) este acum completă." -"\n" -"ÃŽncepem implementarea noastră pentru o criptare end-to-end mai puternică " -"È™i mai rapidă (propunerea 144) pentru o versiune viitoare.\n" -"Mai multe probleme de detectare a adreselor IPv6 au fost remediate, È™i " -"există, desigur, câteva alte remedieri ale erorilor." +"In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.\n" +"Our implementation of the new leaseset specification (LS2) is now complete.\n" +"We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.\n" +"Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes." +msgstr "ÃŽn versiunea 0.9.43, continuăm să lucrăm la caracteristici mai puternice de securitate È™i confidenÈ›ialitate È™i îmbunătățiri ale performanÈ›ei.\nImplementarea noastră a noului caiet de sarcini (LS2) este acum completă.\nÃŽncepem implementarea noastră pentru o criptare end-to-end mai puternică È™i mai rapidă (propunerea 144) pentru o versiune viitoare.\nMai multe probleme de detectare a adreselor IPv6 au fost remediate, È™i există, desigur, câteva alte remedieri ale erorilor." #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:33 msgid "Console setup wizard improvements" @@ -11337,7 +10005,8 @@ msgid "i2ptunnel support for quoted custom options" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:51 -msgid "i2psnark now starts with reduced tunnel count then increases as necessary" +msgid "" +"i2psnark now starts with reduced tunnel count then increases as necessary" msgstr "" #: i2p2www/blog/2019/10/22/0.9.43-Release.rst:52 @@ -11368,47 +10037,33 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:11 msgid "" -"Highlighting Research - An Empirical Study of the I2P Anonymity Network " -"and its Censorship Resistance" +"Highlighting Research - An Empirical Study of the I2P Anonymity Network and " +"its Censorship Resistance" msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:16 msgid "" -"The following blog post is authored by Information Controls Fellow Hoà ng " -"Nguyên\n" -"Phong. As an ICFP fellow, Phong's research focused on analyzing different" -"\n" -"aspects of the I2P network, a privacy-enhancing Internet tool that can be" -" used\n" +"The following blog post is authored by Information Controls Fellow Hoà ng Nguyên\n" +"Phong. As an ICFP fellow, Phong's research focused on analyzing different\n" +"aspects of the I2P network, a privacy-enhancing Internet tool that can be used\n" "to access online content over an anonymity-enhancing network helpful in\n" -"circumventing state-imposed censorship. Working with his host " -"organization, the\n" -"University of Massachusetts Amherst, Phong studied the I2P network's " -"censorship\n" -"resilience, including identifying what blocking methods a state censor " -"might use\n" -"to inhibit access to I2P and investigating potential solutions to make " -"I2P more\n" +"circumventing state-imposed censorship. Working with his host organization, the\n" +"University of Massachusetts Amherst, Phong studied the I2P network's censorship\n" +"resilience, including identifying what blocking methods a state censor might use\n" +"to inhibit access to I2P and investigating potential solutions to make I2P more\n" "resistant to such blockage." msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:28 msgid "" "Phong found blocking attempts on the I2P network (specifically via DNS\n" -"poisoning, SNI-based blocking, TCP packet injection, and page-specific " -"blocks)\n" -"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. " -"Phong\n" -"posits that because the blocks are usually imposed on the I2P download " -"page and\n" -"reseed servers, such blocking could be mitigated by hosting download " -"links to\n" -"this content on large cloud service providers - raising the collateral " -"cost of\n" -"blocking. Phong also built a metrics portal for the platform so that " -"researchers\n" -"and others can better understand who is using I2P, finding that there are" -" about\n" +"poisoning, SNI-based blocking, TCP packet injection, and page-specific blocks)\n" +"emanating from five countries: China, Oman, Qatar, Iran, and Kuwait. Phong\n" +"posits that because the blocks are usually imposed on the I2P download page and\n" +"reseed servers, such blocking could be mitigated by hosting download links to\n" +"this content on large cloud service providers - raising the collateral cost of\n" +"blocking. Phong also built a metrics portal for the platform so that researchers\n" +"and others can better understand who is using I2P, finding that there are about\n" "20,000 relays in the network on a daily basis." msgstr "" @@ -11422,10 +10077,8 @@ msgstr "" #: i2p2www/blog/2019/10/25/research-highlights.rst:55 msgid "" -"We thank Phong and his collaborators for their excellent study as we move" -" to\n" -"address the issues that were identified. It's exciting to see more " -"academic\n" +"We thank Phong and his collaborators for their excellent study as we move to\n" +"address the issues that were identified. It's exciting to see more academic\n" "study of I2P and are excited to keep working with him." msgstr "" @@ -11439,34 +10092,18 @@ msgstr "0.9.44 cu remedieri de erori" #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:16 msgid "" -"0.9.44 contains an important fix for a denial of service issue in hidden " -"services handling of new encryption types.\n" +"0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.\n" "All users should update as soon as possible." -msgstr "" -"0.9.44 conÈ›ine o soluÈ›ie importantă pentru o problemă de refuz a " -"serviciului în gestionarea serviciilor ascunse de noi tipuri de criptare." -"\n" -"ToÈ›i utilizatorii ar trebui să se actualizeze cât mai curând posibil." +msgstr "0.9.44 conÈ›ine o soluÈ›ie importantă pentru o problemă de refuz a serviciului în gestionarea serviciilor ascunse de noi tipuri de criptare.\nToÈ›i utilizatorii ar trebui să se actualizeze cât mai curând posibil." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:21 msgid "" -"The release includes initial support for new end-to-end encryption " -"(proposal 144).\n" +"The release includes initial support for new end-to-end encryption (proposal 144).\n" "Work continues on this project, and it is not yet ready for use.\n" -"There are changes to the console home page, and new embedded HTML5 media " -"players in i2psnark.\n" +"There are changes to the console home page, and new embedded HTML5 media players in i2psnark.\n" "Additional fixes for firewalled IPv6 networks are included.\n" "Tunnel build fixes should result in faster startup for some users." -msgstr "" -"Versiunea include suportul iniÈ›ial pentru noua criptare end-to-end " -"(propunerea 144).\n" -"Lucrările continuă pentru acest proiect È™i încă nu este gata de " -"utilizare.\n" -"Există modificări la pagina principală a consolei È™i la noi playere HTML5" -" integrate în i2psnark.\n" -"Sunt incluse soluÈ›ii suplimentare pentru reÈ›elele IPv6 firewalled.\n" -"CorecÈ›iile de construire a tunelului ar trebui să conducă la o pornire " -"mai rapidă pentru unii utilizatori." +msgstr "Versiunea include suportul iniÈ›ial pentru noua criptare end-to-end (propunerea 144).\nLucrările continuă pentru acest proiect È™i încă nu este gata de utilizare.\nExistă modificări la pagina principală a consolei È™i la noi playere HTML5 integrate în i2psnark.\nSunt incluse soluÈ›ii suplimentare pentru reÈ›elele IPv6 firewalled.\nCorecÈ›iile de construire a tunelului ar trebui să conducă la o pornire mai rapidă pentru unii utilizatori." #: i2p2www/blog/2019/12/01/0.9.44-Release.rst:39 msgid "Console home page changes" @@ -11546,11 +10183,9 @@ msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:16 msgid "" -"0.9.45 contains important fixes for hidden mode and the bandwidth tester." -"\n" +"0.9.45 contains important fixes for hidden mode and the bandwidth tester.\n" "There's an update to the console dark theme.\n" -"We continue work on improving performance and the development of new end-" -"to-end encryption (proposal 144)." +"We continue work on improving performance and the development of new end-to-end encryption (proposal 144)." msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:32 @@ -11562,7 +10197,8 @@ msgid "Console icon changes" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:34 -msgid "Move some translations from console to router and core for embedded uses" +msgid "" +"Move some translations from console to router and core for embedded uses" msgstr "" #: i2p2www/blog/2020/02/25/0.9.45-Release.rst:37 @@ -11616,24 +10252,20 @@ msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:10 msgid "" "Tutorial for setting up git access through an I2P Tunnel. This tunnel\n" -"will act as your access point to a single git service on I2P. It is part " -"of the\n" +"will act as your access point to a single git service on I2P. It is part of the\n" "overall effort to transition I2P from monotone to Git." msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:16 msgid "" -"Before anything else: Know the capabilities the service offers to the " -"public" +"Before anything else: Know the capabilities the service offers to the public" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:19 msgid "" "Depending on how the git service is configured, it may or may not offer\n" "all services on the same address. In the case of git.idk.i2p, there is a\n" -"public HTTP URL, and an SSH " -"URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to " -"configure for your Git SSH client. Either\n" +"public HTTP URL, and an SSH URL(g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p) to configure for your Git SSH client. Either\n" "can be used to push or pull, but SSH is recommended." msgstr "" @@ -11684,10 +10316,8 @@ msgid "" "Then, add the address you will be pushing and pulling from. Note that\n" "this example address is for Read-Only HTTP-over-I2P clones, if your\n" "admin does not allow the git HTTP(Smart HTTP) protocol, then you will\n" -"need to get the SSH clone base32 from them. Use this Base32 to connect " -"the\n" -"client tunnel to the Git SSH service: " -"**g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" +"need to get the SSH clone base32 from them. Use this Base32 to connect the\n" +"client tunnel to the Git SSH service: **g6u4vqiuy6bdc3dbu6a7gmi3ip45sqwgtbgrr6uupqaaqfyztrka.b32.i2p**" msgstr "" #: i2p2www/blog/2020/03/06/git-over-i2p.rst:109 @@ -11815,7 +10445,8 @@ msgid "Gitlab over I2P Setup" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:7 -msgid "Mirror I2P Git repositories and Bridge Clearnet repositories for others." +msgid "" +"Mirror I2P Git repositories and Bridge Clearnet repositories for others." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:9 @@ -11870,14 +10501,13 @@ msgid "" "images. Since there are no third-party images involved here, updates\n" "should come as soon as they are available in the host images. To review\n" "the Dockerfile for yourself, visit the `Gitlab source\n" -"code <https://gitlab.com/gitlab-org/omnibus-" -"gitlab/-/blob/master/docker/Dockerfile>`__." +"code <https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile>`__." msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:70 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/blog/2020/03/16/gitlab-over-i2p.rst:73 @@ -12106,21 +10736,10 @@ msgid "" "generated for you. A recent, correctly-generated bundle of the mainline\n" "i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside\n" "of I2P at my pastebin\n" -"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also " -"use a\n" -"`magnet link " -"<magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__," -"\n" +"`paste.idk.i2p/f/4hq37i <http://paste.idk.i2p/f/4hq37i>`__. You can also use a\n" +"`magnet link <magnet:?xt=urn:btih:72be6b12fdb38529acc3a22ad7e927842fdaa04f&tr=http://zviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p/announce>`__,\n" "and if you're a BiglyBT user who wants to bridge the torrent, use \n" -"`this magnet link instead " -"<magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker" -".leechers-" -"paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker" -".lanta-" -"net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker" -".tiny-" -"vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__" -"\n" +"`this magnet link instead <magnet:?xt=urn:btih:OK7GWEX5WOCSTLGDUIVNP2JHQQX5VICP&dn=i2p.i2p.bundle&net=Public&net=I2P&net=Tor&tr=http%3A%2F%2Fzviyq72xcmjupynn5y2f5qa3u7bxyu34jnqmwt6czte2l7idxm7q.b32.i2p%2Fannounce&tr=http%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker1.itzmx.com%3A8080%2Fannounce&tr=http%3A%2F%2Ftracker2.postman.i2p%2Fannounce.php&tr=http%3A%2F%2Fs5ikrdyjwbcgxmqetxb3nyheizftms7euacuub2hic7defkh3xhq.b32.i2p%2Fa&tr=http%3A%2F%2Fuajd4nctepxpac4c4bdyrdw7qvja2a5u3x25otfhkptcjgd53ioq.b32.i2p%2Fannounce&tr=http%3A%2F%2Fw7tpbzncbcocrqtwwm3nezhnnsw4ozadvi2hmvzdhrqzfxfum7wa.b32.i2p%2Fa&tr=udp%3A%2F%2Fp4p.arenabg.com%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fretracker.lanta-net.ru%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.sbsub.com%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.nyap2p.com%3A8080%2Fannounce&tr=udp%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker3.itzmx.com%3A6961%2Fannounce&tr=udp%3A%2F%2Fbt2.archive.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2940%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2790%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce>`__\n" "to announce to clearnet trackers as well." msgstr "" @@ -12214,33 +10833,29 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:16 msgid "" -"0.9.46 contains significant performance improvements in the streaming " -"library.\n" -"We have completed development of ECIES encryption (proposal 144) and " -"there is now an option to enable it for testing." +"0.9.46 contains significant performance improvements in the streaming library.\n" +"We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing." msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:21 msgid "" "Windows users only:\n" "This release fixes a local privilege escalation vulnerability\n" -"which could be exploited by a local user that has the ability to run " -"programs.\n" +"which could be exploited by a local user that has the ability to run programs.\n" "Please apply the update as soon as possible.\n" "Thanks to Blaze Infosec for their responsible disclosure of the issue." msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:29 msgid "" -"This is the last release to support Java 7, Debian packages Wheezy and " -"Stretch, and Ubuntu packages Precise and Trusty.\n" +"This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.\n" "Users on those platforms must upgrade to receive future I2P updates." msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:44 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing " -"(proposal 144)" +"ECIES-X25519-AEAD-Ratchet encryption complete, ready for testing (proposal " +"144)" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:45 @@ -12265,8 +10880,8 @@ msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:54 msgid "" -"Hidden Services Manager: Fixes for changing shared client options, " -"prevent changing certain options while tunnel is running" +"Hidden Services Manager: Fixes for changing shared client options, prevent " +"changing certain options while tunnel is running" msgstr "" #: i2p2www/blog/2020/05/25/0.9.46-Release.rst:55 @@ -12427,18 +11042,15 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:16 msgid "" -"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by " -"default for some services.\n" +"0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.\n" "The Sybil analysis and blocking tool is now enabled by default." msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:21 msgid "" "Java 8 or higher is now required.\n" -"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and " -"Precise, are no longer supported.\n" -"Users on those platforms should upgrade so you may continue to receive " -"I2P updates." +"Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.\n" +"Users on those platforms should upgrade so you may continue to receive I2P updates." msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:37 @@ -12447,8 +11059,8 @@ msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:42 msgid "" -"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared " -"clients, HTTP proxy, and new tunnels" +"ECIES-X25519-AEAD-Ratchet encryption enabled for i2psnark, shared clients, " +"HTTP proxy, and new tunnels" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:43 @@ -12460,7 +11072,8 @@ msgid "Enable Sybil analysis and blocking tool by default" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:51 -msgid "Hidden Services Manager: Fix missing server tunnel length configuration" +msgid "" +"Hidden Services Manager: Fix missing server tunnel length configuration" msgstr "" #: i2p2www/blog/2020/08/24/0.9.47-Release.rst:52 @@ -12509,18 +11122,15 @@ msgstr "" #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:16 msgid "" -"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for " -"most services.\n" -"We have added preliminary support for new tunnel build message encryption" -" (proposal 152).\n" +"0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.\n" +"We have added preliminary support for new tunnel build message encryption (proposal 152).\n" "There are significant performance improvements throughout the router." msgstr "" #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:22 msgid "" "Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.\n" -"Users on that platform should upgrade so you may continue to receive I2P " -"updates." +"Users on that platform should upgrade so you may continue to receive I2P updates." msgstr "" #: i2p2www/blog/2020/11/30/0.9.48-Release.rst:37 @@ -12670,33 +11280,25 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:21 msgid "" -"For over a decade, I2P has relied on the venerable Monotone service to " -"support\n" -"its version control needs, but during the past few years, most of the " -"world has\n" +"For over a decade, I2P has relied on the venerable Monotone service to support\n" +"its version control needs, but during the past few years, most of the world has\n" "moved on to the now-universal Git version control system. In that same\n" -"time, the I2P Network has become faster and more reliable, and accessible" -"\n" +"time, the I2P Network has become faster and more reliable, and accessible\n" "workarounds to Git's non-resumability have been developed." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:29 msgid "" -"Today marks a significant occasion for I2P, as we switched off the old " -"mtn\n" -"i2p.i2p branch, and moved the development of the core Java I2P libraries " -"from\n" +"Today marks a significant occasion for I2P, as we switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries from\n" "Monotone to Git officially." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:35 msgid "" -"While our use of mtn has been questioned in the past, and it's not always" -" been a\n" -"popular choice, I'd like to take this moment, as perhaps the very last " -"project to use\n" -"Monotone to thank the Monotone developers, current and former, wherever " -"they are,\n" +"While our use of mtn has been questioned in the past, and it's not always been a\n" +"popular choice, I'd like to take this moment, as perhaps the very last project to use\n" +"Monotone to thank the Monotone developers, current and former, wherever they are,\n" "for the software they created." msgstr "" @@ -12706,12 +11308,9 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:49 msgid "" -"Checkins to the I2P Project repositories require you to configure GPG " -"signing for\n" -"your git commits, including Merge Requests and Pull Requests. Please " -"configure\n" -"your git client for GPG signing before you fork i2p.i2p and check " -"anything in." +"Checkins to the I2P Project repositories require you to configure GPG signing for\n" +"your git commits, including Merge Requests and Pull Requests. Please configure\n" +"your git client for GPG signing before you fork i2p.i2p and check anything in." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:55 @@ -12720,32 +11319,24 @@ msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:60 msgid "" -"The official repository is the one hosted at https://i2pgit.org/i2p-" -"hackers/i2p.i2p\n" -"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\"" -" available\n" +"The official repository is the one hosted at https://i2pgit.org/i2p-hackers/i2p.i2p\n" +"and at https://git.idk.i2p/i2p-hackers/i2p.i2p, but there is a \"Mirror\" available\n" "at Github at https://github.com/i2p/i2p.i2p." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:66 msgid "" -"Now that we're on git, we can synchronize repositories from our own self-" -"hosted Gitlab\n" -"instance, to Github, and back again. This means that it is possible to " -"create and submit\n" -"a merge request on Gitlab and when it is merged, the result will be " -"synced with Github,\n" +"Now that we're on git, we can synchronize repositories from our own self-hosted Gitlab\n" +"instance, to Github, and back again. This means that it is possible to create and submit\n" +"a merge request on Gitlab and when it is merged, the result will be synced with Github,\n" "and a Pull Request on Github, when merged, will appear on Gitlab." msgstr "" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:73 msgid "" -"This means that it's possible to submit code to us through our Gitlab " -"instance or through\n" -"Github depending on what you prefer, however, more of the I2P developers " -"are regularly\n" -"monitoring Gitlab than Github. MR's to Gitlab are more likely to be " -"merged sooner\n" +"This means that it's possible to submit code to us through our Gitlab instance or through\n" +"Github depending on what you prefer, however, more of the I2P developers are regularly\n" +"monitoring Gitlab than Github. MR's to Gitlab are more likely to be merged sooner\n" "than PR's to Github." msgstr "" @@ -12755,14 +11346,10 @@ msgstr "MulÈ›umesc" #: i2p2www/blog/2020/12/10/Hello-git-goodbye-mtn.rst:85 msgid "" -"Congratulations and thanks to everyone who helped in the git migration, " -"especially\n" -"zzz, eche|on, nextloop, and our site mirror operators! While some of us " -"will miss\n" -"Monotone, it has become a barrier for new and existing participants in " -"I2P development\n" -"and we're excited to join the world of developers using Git to manage " -"their distributed\n" +"Congratulations and thanks to everyone who helped in the git migration, especially\n" +"zzz, eche|on, nextloop, and our site mirror operators! While some of us will miss\n" +"Monotone, it has become a barrier for new and existing participants in I2P development\n" +"and we're excited to join the world of developers using Git to manage their distributed\n" "projects." msgstr "" @@ -12777,33 +11364,25 @@ msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:16 msgid "" "0.9.49 continues the work to make I2P faster and more secure.\n" -"We have several improvements and fixes for the SSU (UDP) transport that " -"should result in faster speeds.\n" -"This release also starts the migration to new, faster ECIES-X25519 " -"encryption for routers.\n" +"We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.\n" +"This release also starts the migration to new, faster ECIES-X25519 encryption for routers.\n" "(Destinations have been using this encryption for a few releases now)\n" -"We've been working on the specifications and protocols for new encryption" -" for several years,\n" -"and we are getting close to the end of it! The migration will take " -"several releases to complete." +"We've been working on the specifications and protocols for new encryption for several years,\n" +"and we are getting close to the end of it! The migration will take several releases to complete." msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:25 msgid "" -"For this release, to minimize disruption, only new installs and a very " -"small percentage of existing installs\n" +"For this release, to minimize disruption, only new installs and a very small percentage of existing installs\n" "(randomly selected at restart) will be using the new encryption.\n" -"If your router does \"rekey\" to use the new encryption, it may have " -"lower traffic or less reliability than usual for several days after you " -"restart.\n" +"If your router does \"rekey\" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.\n" "This is normal, because your router has generated a new identity.\n" "Your performance should recover after a while." msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:33 msgid "" -"We have \"rekeyed\" the network twice before, when changing the default " -"signature type,\n" +"We have \"rekeyed\" the network twice before, when changing the default signature type,\n" "but this is the first time we've changed the default encryption type.\n" "Hopefully it will all go smoothly, but we're starting slowly to be sure." msgstr "" @@ -12869,7 +11448,8 @@ msgid "Crypto: Increase ratchet tag window to prevent message loss" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:68 -msgid "I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" +msgid "" +"I2CP: Fix encrypted leaseset combined with ECIES crypto or offline keys" msgstr "" #: i2p2www/blog/2021/02/17/0.9.49-Release.rst:69 @@ -12928,3 +11508,1442 @@ msgstr "" msgid "Util: New unit tests" msgstr "" +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:2 +msgid "0.9.50 Release" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:9 +msgid "0.9.50 with IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:16 +msgid "" +"0.9.50 continues the transition to ECIES-X25519 for router encryption keys.\n" +"We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.\n" +"There are numerous fixes and improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:22 +msgid "" +"We have finally fixed some longstanding SusiMail corruption bugs.\n" +"Changes to the bandwidth limiter should improve network tunnel performance.\n" +"There are several improvements in our Docker containers.\n" +"We have improved our defenses for possible malicious and buggy routers in the network." +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:39 +msgid "Docker improvements" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:40 +msgid "NTCP: Remove support for version 1" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:41 +msgid "Reseed: Use DNSOverHTTPS" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:42 +msgid "Router: Increase ECIES rekey probability" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:43 +msgid "Router: Persist Sybil blocklist" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:44 +msgid "SSU: Enable introducers and introductions via IPv6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:46 +msgid "Transports: Publish support for outbound IPv4/v6 (proposal 158)" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:47 +msgid "UPnP: Add support for IPv6" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:53 +msgid "Debian: Fix link to compiler jar" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:54 +msgid "i2psnark: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:55 +msgid "Jetty: Fix detection of SSL connector" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:56 +msgid "NetDB: Fix NPE when validating expired blinded leaseset" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:57 +msgid "NTP: Year 2036 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:58 +msgid "Router: Fix rekeying every restart on ARM" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:59 +msgid "Router: Fix decryption of encrypted leasesets" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:60 +msgid "SAM: Fix removal of subsessions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:61 +msgid "SSU: Fix excessive dropping by the bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:62 +msgid "SSU: Fix publishing 'C' capability when not an introducer" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:63 +msgid "SSU: Fixes for firewalled/not firewalled state transitions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:64 +msgid "SSU: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:65 +msgid "SSU: Peer test fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:66 +msgid "SusiMail: Fix theme selection" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:67 +msgid "SusiMail: Fix stream closed errors" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:68 +msgid "SusiMail: Fix corruption in display of large, new messages" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:69 +msgid "Tunnels: Several fixes in the participating tunnel bandwidth limiter" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:70 +msgid "UPnP: Fix leases not being renewed before expiration" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:76 +msgid "Build: Remove empty jars and wars from installers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:77 +msgid "Build: Prep for different release and API versions" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:78 +msgid "Build: Remove launcher code" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:79 +msgid "Gradle build fixes" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:80 +msgid "Profiles: Disable tunnel peer test" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:81 +msgid "Profiles: Remove unused tunnel test response time stat" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:82 +msgid "SSU: Avoid outbound connections to buggy routers" +msgstr "" + +#: i2p2www/blog/2021/05/17/0.9.50-Release.rst:83 +msgid "Transports: Increase connection limits for some platforms" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:2 +msgid "1.5.0 Release" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:9 +msgid "1.5.0 with new tunnel build messages" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:16 +msgid "" +"Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.\n" +"This does not signify a major API change, or a claim that development is now complete.\n" +"It is simply a recognition of almost 20 years of work to provide anonymity and security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:22 +msgid "" +"This release finishes implementation of smaller tunnel build messages to reduce bandwidth.\n" +"We continue the transition of the network's routers to X25519 encryption.\n" +"Of course there are also numerous bug fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:39 +msgid "Tunnels: Finish support for new build messages (proposal 157)" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:40 +msgid "Updates: Support for .dmg and .exe updates" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:45 +msgid "Console: Fix generation of SSL keys on Java 17" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:46 +msgid "i2psnark: Fix autostart for magnets" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:47 +msgid "Router: Fix rare deadlock in publishing our RI" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:48 +msgid "SSU: Fix handling of bad peer test responses" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:49 +msgid "UPnP: IPv6 fixes" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:54 +msgid "Jetty: Improve sort in directory listings" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:55 +msgid "Jetty: Add X-I2P-Location header" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:56 +msgid "Router: Increase probability to rekey to ECIES" +msgstr "" + +#: i2p2www/blog/2021/08/23/1.5.0-Release.rst:57 +msgid "Streaming: Performance improvements for low-latency connections" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:2 +msgid "I2P Celebrates its 20th Year" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:9 +msgid "I2P has been around for 20 years, let's take a look back" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:11 +msgid "20 Years of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:16 +msgid "" +"It's hard to believe, but I2P has been around for nearly 20 years! From its\n" +"beginning as a C project which provided anonymous access to IRC, we've had\n" +"hundreds of contributors, accepted checkins from dozens of coders, used 2\n" +"main languages, 3 version control systems, experienced a migration of its\n" +"crypography, and multiple soft-forks. There have been around 500 registered\n" +"sites on the Invisible Web, and countless unregistered I2P sites that were only\n" +"accessible via their cryptographic hostnames." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:26 +msgid "" +"Thanks to the participation of users like you, the network has grown from a tiny\n" +"group of power users to over 75,000 nodes operated from all over the world,\n" +"made of I2P routers bundled in perhaps dozens of applications. Today I2P is\n" +"available in on Windows, Mac OSX, Linux, and has ports for FreeBSD, OpenBSD, and\n" +"many other systems. I2P can run on phones and even in SOHO routers (thanks to the\n" +"independent C++ implementation of the protocol, i2pd)." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:35 +msgid "A Routing Protocol with Flagship Applications" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:40 +msgid "" +"Even before other anonymity projects were providing their own application\n" +"bundles, I2P was a tool for building applications that were configured for\n" +"anonymity. Over the years, we've leaned on this strength, by expanding our\n" +"APIs to support more and more versatile applications. Today, we're still\n" +"developing new ways of building I2P into applications." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:48 +msgid "" +"Using the power of the Hidden Services Manager or the SAM API, developers of all\n" +"kinds of applications can empower their users with anonymity using I2P. Exciting\n" +"downstream projects like Monero's I2P-Zero have made it very easy for developers\n" +"to help their users get connected to I2P. Today, I2P helps provide anonymity to\n" +"dozens of applications including Bitcoin, IRC, email and multiple file-sharing\n" +"protocols." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:57 +msgid "An Anonymous Network By Everyone, For Everyone" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:62 +msgid "" +"I2P has always been a decentralized network, because its obvious that providing\n" +"an anonymity network is an intrinsically collaborative process. To illustrate\n" +"with the most extreme example, a single computer cannot provide itself\n" +"with anonymity, nor can it be a useful network, by definiton. However, building\n" +"I2P in this fully-decentralized manner hasn't always been easy." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:70 +msgid "" +"From the beginning, I2P would need to be scalable, and be able to balance itself\n" +"so that high-bandwidth nodes wouldn't be able to easily take over the network.\n" +"Sybil attacks would leave the realm of academia and we would need to develop\n" +"new defenses against them." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:77 +msgid "" +"We've worked very hard to never compromise on this stance, and today every I2P\n" +"router helps participate in providing the network with bandwidth resources and\n" +"providing the users with anonymity. In doing so, we've learned incredible things\n" +"and produced a network which at times has seemed inconceivable." +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:84 +msgid "Celebrating I2P" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:89 +msgid "" +"Over the next 2 weeks, we've planned some blog posts where we'll explore the past,\n" +"present, and future of I2P, highlight applications and tools that build on\n" +"and enhance I2P, and showcase the best of our community. Check back here for\n" +"more in the coming days!" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:96 +msgid "" +"`The History of I2P\n" +" </en/blog/post/2021/08/28/History-of-I2P>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:98 +msgid "" +"`Dependency-Free I2P of the Future - Jpackage Bundles and I2P-Zero (from Monero)\n" +" </en/blog/post/2021/09/08/I2P-Jpackage-Bundles-and-Zero>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:100 +msgid "" +"`Level-Up your I2P use with Encrypted LeaseSets\n" +" </en/blog/post/2021/09/07/Level-Up-Encrypted-Leasesets>`_" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:102 +msgid "" +"Dividing the Triangle: How I2P Eases Naming and Increases Flexibility for " +"End-Users" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:103 +msgid "I2P's Usability Journey" +msgstr "" + +#: i2p2www/blog/2021/08/26/20-Years-of-I2P.rst:104 +msgid "Building Bridges - Making Connections with Other Privacy Projects" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:2 +msgid "20 Years of Privacy: A brief History of I2P" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:9 +msgid "A history of I2P As We Know It" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:11 +msgid "" +"Invisibility is the best defense: building an internet within an internet" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:16 +msgid "" +"I believe most people want this technology so they can express\n" +" themselves freely. It’s a comfortable feeling when you know you can\n" +" do that. At the same time we can conquer some of the problems seen\n" +" within the Internet by changing the way security and privacy is\n" +" viewed, as well as the extent to what it is valued." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:23 +msgid "" +"In October 2001, 0x90 ( Lance James) had a dream. It started as a\n" +"“desire for instant communication with other Freenet users to talk about\n" +"Freenet issues, and exchange Freenet keys while still maintaining\n" +"anonymity, privacy and security.†It was called IIP — the Invisible IRC\n" +"Project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:35 +msgid "" +"The Invisible IRC Project was based on an ideal and framework behind The\n" +"InvisibleNet:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:38 +msgid "In an interview from 2002, 0x90 described the project:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:40 +msgid "" +"“InvisibleNet is a research & development driven organization whose main\n" +" focus is the innovation of intelligent network technology. Our goal is\n" +" to provide the highest standards in security and privacy on the widely\n" +" used, yet notoriously insecure Internet.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:45 +msgid "" +"\"The InvisibleNet team is comprised of a talented group of developers and\n" +" architects entirely dedicated to providing its users with both\n" +" convenience and the very best in secure communication.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:49 +msgid "" +"\"Our technological ideals are reflected in the implementation of a\n" +" framework that is solid in design, and transparent in its application.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:52 +msgid "" +"\"Here at InvisibleNet we strive towards the greatest level of quality\n" +" possible by keeping all areas of our research & development open and\n" +" available to the public for peer review, feedback, suggestions and new\n" +" ideas.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:57 +msgid "" +"\"The Invisible Internet Project: Defined as the “New Internetâ€.\n" +" Peer 2 Peer Internet. Using your peers to protect you. It is a\n" +" similar concept to the Invisible IRC Project, with its design as our\n" +" test model. We plan to re-design the Internet by taking it a step\n" +" further and having security and privacy be first priority.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:63 +msgid "" +"\"The Invisible Internet Project or Protocol will be utilizing the\n" +" tests and research/development concepts of the Invisible IRC Project\n" +" to give us the scalability that we need and leverage this to take it\n" +" to the next level.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:68 +msgid "" +"\"This, in essence will be an impenetrable neural-network, that is\n" +" self-driven, self-defensed, and completely seamless to already\n" +" applied protocols, specifically client to server (or agents as I call\n" +" them). It will be THE next transport layer, a layer on top of the\n" +" notoriously insecure Internet, to deliver full anonymity, privacy,\n" +" and security at the highest level possible. Decentralized and peer to\n" +" peer Internet, by the way, means no more worrying about your ISP\n" +" controlling your traffic. This will allow you to do seamless\n" +" activities and change the way we look at security and even the\n" +" Internet, utilizing public key cryptography, IP steganography, and\n" +" message authentication. The Internet that should have been, will be\n" +" soon.\"" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:85 +msgid "All citations and quotes are from the interviews found here:" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:90 +msgid "" +"By 2003, several other similar projects had started, the largest being\n" +"Freenet, GNUNet, and Tor. All of these projects had broad goals to\n" +"encrypt and anonymize a variety of traffic. For IIP, it became clear\n" +"that IRC alone was not a big-enough target. What was needed was an\n" +"anonymizing layer for all protocols. IIP by now was also being called\n" +"“InvisibleNetâ€." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:97 +msgid "" +"In early 2003, a new anonymous developer, “jrandom†joined the project.\n" +"His explicit goal was to broaden the charter of IIP." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:100 +msgid "" +"jrandom wished to rewrite the IIP code base in Java, a language he was\n" +"familiar with, and the same language Freenet was using. He also wished\n" +"to redesign the IIP protocols based on recent papers and the early\n" +"design decisions that Tor and Freenet were making. Some of these\n" +"concepts and naming conventions, such as “onion routingâ€, were modified\n" +"to become “garlic routingâ€. For several of the design decisions, jrandom\n" +"made different choices than Tor did, including selecting different\n" +"cryptographic primitives in a number of places. Many (but not all) of\n" +"these choices turned out quite well. For some others, such as using\n" +"unidirectional tunnels rather than Tor’s bidirectional tunnels, the\n" +"benefits and trade-offs are still not well-studied." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:112 +msgid "" +"jrandom also set out a clear vision for the architecture of the code. It\n" +"would be a client/server model, with the server (i.e. the router)\n" +"isolated from any “client†protocols. Clients such as web browsers, web\n" +"servers, IRC clients and servers, and others, would communicate through\n" +"the router using I2CP, the I2P Client Protocol." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:118 +msgid "" +"jrandom also had strong opinions on the direction of the project and its\n" +"philosophy. He was strongly committed to open source and free software.\n" +"He explicitly set a goal of protection from organizations with\n" +"“unlimited financial and political resources.â€" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:123 +msgid "" +"By late summer 2003, jrandom had taken control of the project, and\n" +"renamed it the Invisible Internet Project or “I2Pâ€. He published a\n" +"document outlining the philosophy of the project, and placed its\n" +"technical goals and design in the context of mixnets and anonymizing\n" +"layers. He also published the specification of two protocols (I2CP and\n" +"I2NP) and their underlying data structures, that formed the basis of the\n" +"network I2P uses today. Lance (“nopâ€) was last seen in a project meeting\n" +"on November 11, 2003." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:138 +msgid "" +"By fall 2003, I2P, Freenet, and Tor were rapidly developing. Business\n" +"Week published an article on “The Underground Internet†which referenced\n" +"InvisibleNet and discussed “darknets†extensively. jrandom released I2P\n" +"version 0.2 on November 1, 2003, and continued rapid releases for the\n" +"next 3 years. He maintained regular weekly meetings and status notes\n" +"during this time. Several popular services and “respites†emerged during\n" +"this time. Auto updates via clearnet HTTP became available in 2004." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:146 +msgid "" +"Through 2004 and 2005, router development continued, and several\n" +"“clients†or applications were added to the I2P package. “Mihi†wrote\n" +"the first streaming protocol implementation and the i2ptunnel interface\n" +"for configuring and starting client tunnels. “Susi†wrote the web mail\n" +"and address book applications SusiMail and SusiDNS. Many people worked\n" +"on the router console web interface. A bridge to make it easier for\n" +"non-I2P clients to communicate over I2P, called “SAM†(Simple Anonymous\n" +"Messaging) was added." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:155 +msgid "In February 2005, zzz installed I2P for the first time." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:156 +msgid "" +"Anonymity projects were in the news. After surveying the field, he\n" +" installed Freenet, and found it ambiguous, and difficult to explore.\n" +" Not only that, it was very resource heavy and it was difficult to get\n" +" anything to load. Tor and I2P were the other options, and he tried\n" +" I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:162 +msgid "" +"zzz had no preconceived plans to contribute to the project, and had\n" +"never written a line of Java. He had maybe used IRC once. At this time,\n" +"I2P was at version 0.5, with maybe a thousand users and three hard-coded\n" +"floodfills. Forum.i2p and postman’s tracker were up and running at the\n" +"time, and weekly meetings and status notes, and releases every couple of\n" +"week were happening." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:169 +msgid "" +"By summer 2005, zzz had set up two websites. The first was zzz.i2p,\n" +"which over the years became a central resource for I2P development, and\n" +"still is. The second was stats.i2p, the first site to gather statistics\n" +"on I2P network performance and present graphs on both the network and\n" +"individual routers. While the individual router statistics eventually\n" +"had to be shut down due to the tremendous growth of the network, the\n" +"overall performance graphs remain. We are not sure that he ever planned\n" +"to become the release manger for almost 2 decades, but we are happy he\n" +"did. The project has not only stayed active, it has thrived and scaled\n" +"to the demands of its growth." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:184 +msgid "" +"On July 27, 2005, jrandom released I2P version 0.6, including an\n" +"innovative new UDP transport protocol he designed called “SSUâ€, for\n" +"Secure Semi-reliable UDP. It contained features for IP discovery and\n" +"firewall traversal." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:189 +msgid "" +"In September 2005, jrandom bundled “Syndieâ€, his new high-latency\n" +"anonymous messaging system. In October 2005, jrandom ported Snark, a\n" +"Java BitTorrent client, to become an I2P application and bundled it with\n" +"the I2P package. This completed the collection of client applications\n" +"that are still bundled with I2P today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:195 +msgid "" +"In late 2005 and early 2006, jrandom redesigned the way that I2P built\n" +"tunnels. This was a major effort that was done to increase the security\n" +"of the tunnel building, which is crucial to maintain anonymity and\n" +"resist attacks. He worked closely with the Freenet developers, including\n" +"“Toadâ€, on this design. The new build protocol required new I2NP\n" +"messages and a hard cut-over or “flag dayâ€. These changes were released\n" +"in version 0.6.1.10 on February 16, 2006. This is significant as it is\n" +"the last flag day I2P has had. While, in practice, an 0.6.1.10 router\n" +"would not work well, if at all, in today’s network, we are, technically\n" +"speaking, backwards-compatible with this ten-year-old version today." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:206 +msgid "" +"By early 2006, the I2P software was at least feature-complete, but it\n" +"was still not widely-known. jrandom’s view was that it shouldn’t be\n" +"marketed publicly until it was near-perfect, and labeled as version 1.0.\n" +"The network had perhaps a thousand users at the time. Project members\n" +"were discouraged from talking about it online, and the website\n" +"(`i2p.net <http://i2p.net>`__) was unpolished and incomplete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:213 +msgid "" +"On July 27, 2006, jrandom released I2P version 0.6.1.23, including an\n" +"innovative new TCP transport protocol he designed called “NTCPâ€, for\n" +"new-IO-based TCP. It used Java’s new IO library for efficient handling\n" +"of large numbers of TCP connections." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:218 +msgid "" +"In late 2006, jrandom turned his focus to Syndie. He came to see it as\n" +"his top priority, and the “killer application†for I2P. Highly secure\n" +"and almost unusable, it delayed messages for up to two days before\n" +"delivery to resist traffic analysis. Later in 2006, he stopped work on\n" +"the bundled Syndie application and started a new, incompatible,\n" +"standalone messaging application. This application was, confusingly,\n" +"also called “Syndieâ€. The new Syndie was a large and complex\n" +"development, and it was essentially a one-man project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:227 +msgid "" +"From late 2006 into 2007, core I2P development and releases slowed\n" +"dramatically. From almost 30 releases in 2005 and 13 in the first half\n" +"of 2006, there were only 5 in the second half of 2006 and only 4 in all\n" +"of 2007. During this time, zzz and a developer named Complication had\n" +"source code commit privileges and were making changes, but their\n" +"understanding of the code base was limited. zzz worked, for example, on\n" +"improving i2psnark, fixing bugs, and redesigning the strategy for\n" +"anticipatory tunnel building. But there was a lot more that needed to be\n" +"done. Complication and zzz did what they could, and they wrote the code\n" +"for almost all the changes in the four 2007 releases\n" +"(0.6.1.27–0.6.1.30). By this time, jrandom was providing very little\n" +"guidance, code review, or direction for the project." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:240 +msgid "It wasn’t apparent at the time, but the project was in trouble." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:242 +msgid "" +"jrandom had almost stopped working on the core I2P router and\n" +"applications. Even the new Syndie, which he had declared as far more\n" +"important than I2P itself, languished. After regular releases through\n" +"March 2007, his next Syndie release, 1.100a, was August 25, 2007. All\n" +"I2P releases were required to be signed by jrandom’s key, and he built\n" +"and signed his last release, 0.6.1.30, on October 7, 2007." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:249 +msgid "" +"In November 2007, disaster struck. Complication and zzz received a\n" +"cryptic message from jrandom, that he would have to take time off from\n" +"both Syndie and I2P development for a year or more. He expected that he\n" +"would still be available to sign releases, but was willing to pass the\n" +"release signing key to somebody else. Complication and zzz immediately\n" +"replied with a request for the release key and other credentials, such\n" +"as access to the website, mailing list, CVS administration, and others.\n" +"Unfortunately, they never heard from jrandom again." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:258 +msgid "" +"Late 2007 and early 2008, they awaited jrandom’s response, and wondered\n" +"what to do next. However, all of the project infrastructure remained\n" +"active, so it didn’t seem to be an immediate crisis. They knew, however,\n" +"that without the release key or website access, they would have to sign\n" +"with new keys, host the files on a new website, and require everybody to\n" +"manually update since their keys wouldn’t be recognized." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:265 +msgid "" +"The second stage of the disaster happened on January 13, 2008. The\n" +"hosting company for almost all `i2p.net <http://i2p.net>`__ servers\n" +"suffered a power outage, and they did not fully return to service. Only\n" +"jrandom had the credentials required to restore service. In addition,\n" +"the centralized CVS source control appeared to be down, so five years of\n" +"source control history appeared to be lost. Luckily, the CVS server was\n" +"up, only the name server for it was down. The full contents of the CVS\n" +"archive was quickly downloaded." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:274 +msgid "" +"Complication, welterde, and zzz quickly made a number of decisions to\n" +" get the project back up and running. Welterde started a new website at\n" +" `i2p2.de <http://i2p2.de>`__. I2P needed to move to a decentralized\n" +" source code control system. They tested bazaar and that did not work\n" +" well over I2P. Git was just getting started. jrandom had used monotone\n" +" for Syndie and liked its security properties, and it worked well over\n" +" I2P, so it was selected." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:281 +msgid "" +"Several people set up new services. The next release, 0.6.1.31, was\n" +" signed by Complication and required a manual upgrade. It was released\n" +" on February 10, 2008." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:285 +msgid "" +"The project realized that even though it claimed to be totally\n" +"decentralized, it actually depended on a number of centralized\n" +"resources, above all, on jrandom. Work was done throughout 2008 to\n" +"decentralize the project, and distribute roles to a number of people.\n" +"Additionally, it was realized that development had essentially stalled\n" +"in 2007, because jrandom had stopped working on it, but had not\n" +"delegated to other developers. Nobody had an overall understanding of\n" +"the code base." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:294 +msgid "" +"Complication continued to sign the releases through mid-2009, but his\n" +"contributions declined as he focused on activism and other projects.\n" +"Starting with release 0.7.6 on July 31, 2009, zzz would sign the next 49\n" +"releases." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:299 +msgid "" +"In December 2008, zzz attended his first CCC, 25C3 in Berlin, and met\n" +"other I2P project team members for the first time, including hottuna and\n" +"welterde. The experience was overwhelming, and also humbling, as he\n" +"struggled to explain I2P to others or answer even basic questions about\n" +"its design and use of cryptography." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:305 +msgid "" +"By mid-2009, zzz had come to understand the code base much better. Far\n" +"from being complete or perfect, it was filled with problems and\n" +"scalability issues. In 2009 the project experienced more network growth\n" +"due to its anonymizing properties as well as its circumvention\n" +"abilities. Participants appeared who were beginning to adopt the network\n" +"for reasons like censorship and clearnet issues like blocking of popular\n" +"services. For development gains, in-net auto updates became available\n" +"for the software." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:316 +msgid "" +"July 2010 zzz briefly presented I2P at the end of Adrian Hong’s\n" +"presentation at HOPE XXXX. Adrian talked about how tech has helped\n" +"expose human rights violations, and the need for defensive tools for\n" +"activists. He urged that we all be ambassadors for all tech, stay on top\n" +"of new tech, and keep the barrier low and educate people about how to\n" +"use the tool we create." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:323 +msgid "" +"He also talked about how we need many options for people to use, and\n" +"asked how do we make it easier to support human rights, freedom of\n" +"expression?" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:327 +msgid "" +"At the end of the talk, zzz was invited on stage to introduce I2P and\n" +"give an overview of what the project was about. The same weekend, it was\n" +"pointed out that the I2P documentation was not in great shape." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:331 +msgid "" +"In Fall 2010, zzz declared a moratorium on I2P development until the\n" +"website documentation was complete and accurate. It took 3 months to get\n" +"it done." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:335 +msgid "" +"Beginning in 2010, until COVID restrictions were put in place, zzz, ech,\n" +"hottuna, and other I2P contributors have attended CCC ( Chaos\n" +"Communications Congress) every year. Over the years, meeh, Zab, Sadie,\n" +"LazyGravy, KYTV, IDK and others have made the trip to Germany to share\n" +"tables with other projects and celebrate the end of a year of releases.\n" +"The project looks forward to one day being able to meet up again and\n" +"have an in-person yearly roadmap meeting." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:343 +msgid "" +"Anoncoin, a digital cryptocurrency that focuses on privacy and anonymity\n" +"for its users was created in 2013. It was the first coin that provided\n" +"built-in support for I2P, as well as Tor that makes it impossible to\n" +"determine the IP address of the user. The developers, including meeh,\n" +"also ran organizations like Privacy Solutions, and provided infrastructure\n" +"support to the I2P network by running services like outproxies and\n" +"reseed servers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:351 +msgid "" +"I2PBote development started to take off again in 2014 when str4d began\n" +"contributing to the project. Bote is a server-less email client — it\n" +"stores email in a `distributed hash\n" +"table <http://en.wikipedia.org/wiki/Distributed_hash_table>`__. Email is\n" +"“automatically encrypted and digitally signed, which ensures no one but\n" +"the intended recipient can read the email, and third parties cannot\n" +"forge them.†( https://i2pbote.xyz/). The project has existed since\n" +"2009." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:366 +msgid "" +"At Real World Crypto that year, zzz, psi and str4d began to talk about\n" +"and review the plan to update I2P’s cryptography. The same year, the\n" +"project was awarded a $5k donation from Duck Duck Go. Lavabit,\n" +"SecureDrop, RiseUp and Mailpile also received donations for supporting\n" +"better trust and privacy online." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:372 +msgid "" +"By late 2014 most new signing crypto was complete, including ECDSA and\n" +"EdDSA. New destination crypto was available; but new router info crypto\n" +"needed to wait a year for the network to upgrade sufficiently." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:376 +msgid "" +"During the early part of 2015, zzz posted to Twitter that it would be\n" +"great to have a mini conference for I2P. In Spring, it was decided that\n" +"I2PCon would take place that August over the course of a weekend." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:380 +msgid "" +"Hottuna and Sadie organized most of the details, getting graphic assets\n" +"created, posters printed and a banner made for the podium. Nick at\n" +"Hacklab, where the event would take place, helped with making sure the\n" +"space was ready for the event. Sadie reached out to the local infosec\n" +"community and helped secure guest speakers as well. The event happened\n" +"on one of the hottest weekends of the Summer, with attendees arriving\n" +"from America and Europe. The I2P community did an amazing job of\n" +"supporting the event by postering, giving talks, and spreading the word\n" +"in forums and on social media. The talks can be viewed on KYTV’s YouTube\n" +"Channel https://www.youtube.com/channel/UCZfD2Dk6POE-VU8DOqW7VVw" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:395 +msgid "" +"In January 2016 at Real World Crypto Stanford — str4d gave a talk on the\n" +"crypto migration progress and future plans for the project. zzz and\n" +"others would continue weekly meetings to plan the migration over the\n" +"next few years." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:400 +msgid "" +"NTCP2 was implemented in 2018, in release 0.9.36. It was disabled by\n" +"default so that it could be tested. It was enabled in 0.9.37. NTCP1 was\n" +"disabled in 0.9.40." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:404 +msgid "" +"The new I2P transport protocol provides effective resistance against\n" +" DPI censorship. It also results in reduced CPU load because of the\n" +" faster, modern cryptography used. It makes I2P more likely to run on\n" +" low-end devices, such as smartphones and home routers. Both major I2P\n" +" implementations have full support for NTCP2 and it make NTCP2\n" +" available for use starting with version 0.9.36 (Java) and 2.20 (i2pd,\n" +" C++)." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:412 +msgid "" +"The complete implementation details can be read here\n" +"https://geti2p.net/en/blog/post/2018/08/20/NTCP2" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:415 +msgid "" +"0.9.39 included extensive changes for new network database types\n" +"(proposal 123). The i2pcontrol plugin was bundled as a web-app to support\n" +"development of RPC applications." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:419 +msgid "" +"In 2019, the team decided to attend more conferences. That year IDK and\n" +"zzz attended DefCon, and IDK gave a workshop on I2P application\n" +"development. At Monero Village, zzz gave a talk called I2P for\n" +"Cryptocurrency Developers." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:424 +msgid "" +"Late that year, Sadie and IDK attended Our Networks in Toronto, where\n" +"IDK gave a lightning talk about I2P." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:427 +msgid "" +"Sadie attended RightsCon in Tunis and the Internet Freedom Festival in\n" +"Valencia to meet with NGO’s and Human Right Defenders. Thanks to the the\n" +"connections we made, the project received grants for usability and\n" +"accessibility support from Open Tech Fund, and most recently Internews.\n" +"This will ensure more user friendly onboarding, UX, and information\n" +"architecture improvements to support the growing interest in the\n" +"network. It will also support specific tooling to help in-need users\n" +"with specific risk surfaces through user research." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:438 +msgid "" +"That Summer, Hoà ng Nguyên Phong had his research into I2P censorship\n" +"accepted too FOCI at USENIX in Santa Clara. Sadie had supported the\n" +"research and they attended together. I2P Metrics was created during this\n" +"time https://i2p-metrics.np-tokumei.net/, and well as research into more\n" +"resistant reseed servers for the I2P network\n" +"https://homepage.np-tokumei.net/post/notes-i2p-reseed-over-cloudflare/.\n" +"You can read the research report here\n" +"https://homepage.np-tokumei.net/post/notes-otf-wrapup-blogpost/." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:447 +msgid "" +"At CCC that year, the decision was made to migrate from Monotone too\n" +"GitLab. The project was one of the last to use Monotone, and it was time\n" +"to prepare to move on. IDK would spend 2020 ensuring the process was as\n" +"smooth as it could be. The pandemic would result in the team not being\n" +"able to see each other that year to celebrate the ( mostly) smooth move\n" +"to Gitlab. On December 10. 2020, the project switched off the old mtn\n" +"i2p.i2p branch, and moved the development of the core Java I2P libraries\n" +"from Monotone to Git officially." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:456 +msgid "" +"Congratulations and thanks to everyone who helped in the git\n" +" migration, especially zzz, eche|on, nextloop, and our site mirror\n" +" operators! While some of us will miss Monotone, it has become a\n" +" barrier for new and existing participants in I2P development and\n" +" we’re excited to join the world of developers using Git to manage\n" +" their distributed projects." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:465 +msgid "" +"0.9.47 enabled the new end-to-end encryption protocol (proposal 144) by\n" +"default for some services. A Sybil analysis and blocking tool was also\n" +"now enabled by default. 0.9.48 enabled the new end-to-end encryption\n" +"protocol (proposal 144) for most services. Preliminary support was added\n" +"for new tunnel build message encryption (proposal 152). There were\n" +"significant performance improvements throughout the router." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:472 +msgid "" +"0.9.49 was the release that brought faster crypto. The I2P network\n" +"became faster and more secure. Improvements and fixes for the SSU (UDP)\n" +"transport resulted in faster speeds. The release also started the\n" +"migration to new, faster ECIES-X25519 encryption for routers. The\n" +"project had been working on the specifications and protocols for new\n" +"encryption for several years, and was getting close to the end of it.\n" +"The migration would take several releases to complete." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:480 +msgid "" +"To minimize disruption, only new installs and a very small percentage of\n" +"existing installs (randomly selected at restart) would be using the new\n" +"encryption." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:484 +msgid "" +"The project had “rekeyed†the network twice before, when changing the\n" +"default signature type, but this was the first time it had changed the\n" +"default encryption type. 0.9.50 enabled DNS over HTTPS for reseeding to\n" +"protect users from passive DNS snooping. There were numerous fixes and\n" +"improvements for IPv6 addresses, including new UPnP support." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:492 +msgid "1.5.0 — The early anniversary release because it is so good!" +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:495 +msgid "" +"Yes, that’s right, after 9 years of 0.9.x releases, we are going\n" +" straight from 0.9.50 to 1.5.0. This does not signify a major API\n" +" change, or a claim that development is now complete. It is simply a\n" +" recognition of almost 20 years of work to provide anonymity and\n" +" security for our users." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:501 +msgid "" +"This release finishes implementation of smaller tunnel build messages\n" +" to reduce bandwidth. We continue the transition of the network’s\n" +" routers to X25519 encryption. Of course there are also numerous bug\n" +" fixes and performance improvements." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:506 +msgid "" +"As usual, we recommend that you update to this release. The best way\n" +" to maintain security and help the network is to run the latest\n" +" release." +msgstr "" + +#: i2p2www/blog/2021/08/28/History-of-I2P.rst:510 +msgid "Congratulations team. Let’s do another 20." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:2 +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:11 +msgid "Level up your I2P Skills with Encrypted LeaseSets" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:9 +msgid "" +"It has been said that I2P emphasizes Hidden Services, we examine one " +"interpretation of this" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:16 +msgid "" +"It has been said in the past that I2P emphasizes support for Hidden Services,\n" +"which is true in many ways. However, what this means to users, developers, and\n" +"hidden service administrators isn't always the same. Encrypted LeaseSets and\n" +"their use-cases provide a unique, practical window into how I2P makes hidden\n" +"services more versatile, easier to administer, and how I2P extends on the\n" +"Hidden Service concept to provide security benefits for potentially interesting\n" +"use-cases." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:26 +msgid "" +"What is a LeaseSet?\n" +"-------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:31 +msgid "" +"When you create a hidden service, you publish something called a \"LeaseSet\" to\n" +"the I2P NetDB. The \"LeaseSet\" is, in the simplest terms, what other I2P users\n" +"need to discover \"where\" your hidden service is on the I2P Network. It contains\n" +"\"Leases\" which identify tunnels that can be used to reach your hidden service,\n" +"and the public key of your destination, which clients will encrypt messages to.\n" +"This type of hidden service is reachable by anyone who has the address, which\n" +"is probably the most common use case for now." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:41 +msgid "" +"Sometimes, you might not want to allow your hidden services to be accessible by\n" +"anyone, though. Some people use hidden services as a way of accessing an SSH\n" +"server on a home PC, or to stitch together a network of IOT Devices. In these\n" +"cases it's not necessary, and may be counter-productive, to make your hidden\n" +"service accessible to everyone one the I2P Network. This is where \"Encrypted\n" +"LeaseSets\" come into play." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:50 +msgid "" +"Encrypted LeaseSets: VERY Hidden Services\n" +"------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:55 +msgid "" +"Encrypted LeaseSets are LeaseSets which are published to the NetDB in an\n" +"encrypted form, where none of the Leases or public keys are visible unless\n" +"the client has the keys required to decrypt the LeaseSet inside of it. Only\n" +"clients you share keys with(For PSK Encrypted LeaseSets), or who share their\n" +"keys with you(For DH Encrypted LeaseSets), will be able to see the destination\n" +"and no one else." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:64 +msgid "" +"I2P Supports several strategies for Encrypted LeaseSets. The key characteristics\n" +"of each strategy are important to understand when deciding which one to use. If\n" +"an Encrypted LeaseSet uses a \"Pre-Shared Key(PSK)\" strategy, then the server\n" +"will generate a key(or keys) which the server operator then shares with each\n" +"client. Of course, this exchange must happen out-of-band, possibly via an\n" +"exchange on IRC for example. This version of Encrypted LeaseSets is sort of\n" +"like logging into Wi-Fi with a password. Except, what you're logging into is\n" +"a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:75 +msgid "" +"If an Encrypted LeaseSet uses a \"Diffie-Hellman(DH)\n" +"strategy, then they keys are generated on the client instead. When a\n" +"Diffie-Hellman client connects to a destination with an Encrypted LeaseSet, they\n" +"must first share their keys with the server operator. The server operator then\n" +"decides whether to authorize the DH client. This version of Encrypted LeaseSets\n" +"is sort of like SSH with an `authorized_keys` file. Except, what you're logging\n" +"into is a Hidden Service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:85 +msgid "" +"By Encrypting your LeaseSet, you not only make it impossible for unauthorized\n" +"users to connect to your destination, you make it impossible for unauthorized\n" +"visitors to even discover the real destination of the I2P Hidden Service. Some\n" +"readers have probably already considered a use-case for their own Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:93 +msgid "" +"Using Encrypted LeaseSets to Safely Access a Router Console\n" +"-----------------------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:98 +msgid "" +"As a general rule, the more complex information a service has access to about\n" +"your device, the more dangerous it is to expose that service to the Internet or\n" +"indeed, to a Hidden Service network like I2P. If you want to expose such a\n" +"service, you need to protect it with something like a password, or, in the case\n" +"of I2P, a much more thorough and secure option could be an Encrypted LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:106 +msgid "" +"**Before continuing, please read and understand that if you do the following**\n" +"**procedure without an Encrypted LeaseSet, you will be defeating the security of**\n" +"**your I2P router. Do not configure access to your router console over I2P without**\n" +"**an Encrypted LeaseSet. Additionally, do not share your Encrypted LeaseSet PSK's**\n" +"**with any devices you do not control.**" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:114 +msgid "" +"One such service which is useful to share over I2P, but ONLY with an Encrypted\n" +"LeaseSet, is the I2P router console itself. Exposing the I2P router console on\n" +"one machine to I2P with an Encrypted LeaseSet allows another machine with a\n" +"browser to administer the remote I2P instance. I find this useful for remotely\n" +"monitoring my regular I2P Services. It could also be used to monitor a server\n" +"which is used to seed a torrent long-term as a way to access I2PSnark." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:123 +msgid "" +"For as long as it takes to explain them, setting up an Encrypted LeaseSet is\n" +"straightforward to configure via the Hidden Services Manager UI." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:128 +msgid "" +"On the \"Server\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:137 +msgid "" +"Start by opening the Hidden Services Manager at http://127.0.0.1:7657/i2ptunnelmgr\n" +"and scroll to the bottom of the section that says \"I2P Hidden Services.\" Create\n" +"a new hidden service with the host \"127.0.0.1\" and the port \"7657\" with these\n" +"\"Tunnel Cryptography Options\" and save the hidden service." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:148 +msgid "" +"Then, select your new tunnel from the Hidden Services Manager main page. The\n" +"Tunnel Cryptography Options should now include your first Pre-Shared Key. Copy\n" +"this down for the next step, along with the Encrypted Base32 Address of your\n" +"tunnel." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:159 +msgid "" +"On the \"Client\"\n" +"---------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:164 +msgid "" +"Now switch computers to the client which will connect to the hidden service,\n" +"and visit the Keyring Configuration at http://127.0.0.1:7657/configkeyring to\n" +"add the keys from earlier. Start by pasting the Base32 from the Server into\n" +"the field labeled: \"Full destination, name, Base32, or hash.\" Next, paste the\n" +"Pre-Shared Key from the server into the \"Encryption Key\" field. Click save,\n" +"and you're ready to securely visit the Hidden Service using an Encrypted\n" +"LeaseSet." +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:178 +msgid "" +"Now You're Ready to Remotely Administer I2P\n" +"-------------------------------------------" +msgstr "" + +#: i2p2www/blog/2021/09/07/Level-Up-Encrypted-Leasesets.rst:183 +msgid "" +"As you can see, I2P offers unique capabilities to Hidden Service Administrators\n" +"which empower them to securely manage their I2P connections from anywhere in the\n" +"world. Other Encrypted LeaseSets I keep on the same device for the same reason\n" +"point to the SSH server, the Portainer instance I user to manage my service\n" +"containers, and my personal NextCloud instance. With I2P, truly private, always\n" +"reachable Self-Hosting is an achievable goal, in fact I think it's one of the\n" +"things we're uniquely suited to, because of Encrypted LeaseSets. With them, I2P\n" +"could become the key to securing self-hosted home automation or simply become\n" +"the backbone of a new more private peer-to-peer web." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:2 +msgid "Improving I2P Adoption and Onboarding using Jpackage, I2P-Zero" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:9 +msgid "" +"Versatile and emerging ways of installing and embedding I2P in your " +"application" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:11 +msgid "" +"For the majority of I2P's existence, it's been an application that runs with the\n" +"help of a Java Virtual Machine that is already installed on the platform. This\n" +"has always been the normal way to distribute Java applications, but it leads to\n" +"a complicated installation procedure for many people. To make things even more\n" +"complicated, the \"right answer\" to making I2P easy to install on any given\n" +"platform might not be the same as any other platform. For example, I2P is quite\n" +"simple to install with standard tools on Debian and Ubuntu based operating\n" +"systems, because we can simply list the required Java components as \"Required\"\n" +"by our package, however on Windows or OSX, there is no such system allowing us to make\n" +"sure that a compatible Java is installed." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:24 +msgid "" +"The obvious solution would be to manage the Java installation ourselves, but\n" +"this used to a problem in-and-of-itself, outside of the scope of I2P. However,\n" +"in recent Java versions, a new set of options has emerged which has the\n" +"potential to solve this problem for many Java software. This exciting tool is\n" +"called **\"Jpackage.\"**" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:32 +msgid "I2P-Zero and Dependency-Free I2P Installation" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:37 +msgid "" +"The first very successful effort at building a dependency-free I2P Package was\n" +"I2P-Zero, which was created by the Monero project originally for use with the\n" +"Monero cryptocurrency. This project got us very excited because of it's success\n" +"in creating a general-purpose I2P router which could easily packaged with an\n" +"I2P application. Especially on Reddit, many people express their preference for\n" +"the simplicity of setting up an I2P-Zero router." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:46 +msgid "" +"This really proved to us that a dependency-free I2P Package which was easy to\n" +"install was possible using modern Java tools, but I2P-Zero's use case was a\n" +"little bit different than ours. It is best for embedded apps that need an I2P\n" +"router that they can easily control using it's convenient control port on port\n" +"\"8051\". Our next step would be to adapt the technology to the general-purpose\n" +"I2P Application." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:55 +msgid "OSX Application Security Changes affect I2P IzPack Installer" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:60 +msgid "" +"The issue became more pressing in recent versions of Mac OSX, where it is no\n" +"longer straightforward to use the \"Classic\" installer which comes in the .jar\n" +"format. This is because the application is not \"Notarized\" by Apple authorities\n" +"and it is deemed a security risk. **However**, Jpackage can produce a .dmg file,\n" +"which can be notarized by Apple authorities, conveniently solving our problem." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:68 +msgid "" +"The new I2P .dmg installer, created by Zlatinb, makes I2P easier to install on\n" +"OSX than ever, no longer requiring users to install Java themselves and using\n" +"standard OSX installation tools in their prescribed ways. The new .dmg installer\n" +"makes setting up I2P on Mac OSX easier than it's ever been." +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:79 +msgid "The I2P of the future is Easy to Install" +msgstr "" + +#: i2p2www/blog/2021/09/15/i2p-jpackages.rst:84 +msgid "" +"One of the things I hear from users the most is that if I2P wants adoption, it\n" +"needs to be easy to use for people. Many of them want a \"Tor Browser Like\" user\n" +"experience, to quote or paraphrase many familiar Redditors. Installation should\n" +"not require complicated and error-prone \"post-installation\" steps. Many new\n" +"users are not prepared to deal with their browser configuration in a thorough\n" +"and complete way. To address this problem, we created the I2P Profile Bundle\n" +"which configured Firefox so that it would automatically \"Just Work\" for I2P.\n" +"As it's developed, it's added security features and improved integration with\n" +"I2P itself. In it's latest version, it **also** bundles a complete, Jpackage\n" +"powered I2P Router. The I2P Firefox Profile is now a fully-fledged distribution\n" +"of I2P for Windows, with the only remaining dependency being Firefox itself.\n" +"This should provide an unprecedented level of convenience for I2P users on\n" +"Windows." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:2 +msgid "Bitcoin Core adds support for I2P!" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:9 +msgid "A new use case and a signal of growing acceptance" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:11 +msgid "" +"An event months in the making, Bitcoin Core has added official support for I2P!\n" +"Bitcoin-over-I2P nodes can interact fully with the rest of the Bitcoin nodes,\n" +"using the help of nodes that operate within both I2P and the clearnet, making\n" +"them first-class participants in the Bitcoin network. It's exciting to see\n" +"large communities like Bitcoin taking notice of the advantages I2P can bring\n" +"to them providing privacy and reachability to people all over the world." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:20 +msgid "How it Works" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:25 +msgid "" +"I2P support is automatic, via the SAM API. This is also exciting news, because\n" +"it highlights some of the things I2P is singularly good at, like empowering \n" +"application developers to build I2P connections programmatically and\n" +"conveniently. Bitcoin-over-I2P users can use I2P with no manual configuration by\n" +"enabling the SAM API and running Bitcoin with I2P enabled." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:33 +msgid "Configuring your I2P Router" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:38 +msgid "" +"In order to set up an I2P Router to provide anonymous connectivity to bitcoin,\n" +"the SAM API needs to be enabled. In Java I2P, you should go to `http://127.0.0.1:7657/configclients\n" +"<http://127.0.0.1:7657/configclients>`_. and start the SAM Application Bridge\n" +"with the \"Start\" button. You may also want to enable the SAM Application Bridge\n" +"by default by checking the \"Run at Startup\" box and clicking \"Save Client\n" +"Configuration.\"" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:47 +msgid "" +"On i2pd, the SAM API is normally enabled by default, but if it isn't, you should\n" +"set::\n" +"\n" +" sam.enabled=true\n" +"\n" +"in your i2pd.conf file." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:56 +msgid "Configuring your Bitcoin Node for Anonymity and Connectivity" +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:61 +msgid "" +"Getting Bitcoin itself launched in an anonymous mode still requires editing some\n" +"configuration files in the Bitcoin Data Directory, which is %APPDATA%\\Bitcoin on\n" +"Windows, ~/.bitcoin on Linux, and ~/Library/Application Support/Bitcoin/ on Mac\n" +"OSX. It also requires at least version 22.0.0 for I2P support to be present." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:68 +msgid "" +"After following these instructions, you should have a private Bitcoin\n" +"node which uses I2P for I2P connections, and Tor for .onion and clearnet\n" +"connections, so that all your connections are anonymous. For convenience,\n" +"Windows users should open their Bitcoin Data Directory by opening the start menu\n" +"and searching for \"Run.\" Inside the run prompt, type \"%APPDATA%\\Bitcoin\" and\n" +"press enter." +msgstr "" + +#: i2p2www/blog/2021/09/18/i2p-bitcoin.draft.rst:77 +msgid "" +"In that directory create a file called \"i2p.conf.\" On Windows, you should make\n" +"sure that you've add quotes around the file when you save it, in order to\n" +"prevent Windows from adding a default file extension to the file. The file\n" +"should contain the following I2P-Related Bitcoin configuration options::\n" +"\n" +" i2psam=127.0.0.1:7656\n" +" i2pacceptincoming=true\n" +" onlynet=i2p\n" +"\n" +"Next, you should create another file called \"tor.conf.\" The file should contain\n" +"the following Tor related configuration options::\n" +"\n" +" proxy=127.0.0.1:9050\n" +" onion=127.0.0.1:9050\n" +" onlynet=tor\n" +"\n" +"Finally, you'll need to \"include\" these configuration options in your Bitcoin\n" +"configuration file, called \"bitcoin.conf\" in the Data Directory. Add these two\n" +"lines to your bitcoin.conf file::\n" +"\n" +" includeconf=i2p.conf\n" +" includeconf=tor.conf\n" +"\n" +"Now your Bitcoin node is configured to only use anonymous connections. In order\n" +"to enable direct connections to remote nodes, remove the lines beginning in::\n" +"\n" +" onlynet=\n" +"\n" +"You can do this if you do not require your Bitcoin node to be anonymous, and\n" +"it helps anonymous users connect to the rest of the Bitcoin network." +msgstr "" diff --git a/i2p2www/translations/ro/LC_MESSAGES/comparison.po b/i2p2www/translations/ro/LC_MESSAGES/comparison.po index bd2a372a59dc2c524f454183b71acbc055b0a4e9..9c78568004b5526ecd79502541f7ff4c1bd96be7 100644 --- a/i2p2www/translations/ro/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/ro/LC_MESSAGES/comparison.po @@ -1,23 +1,23 @@ -# Romanian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # polearnik <polearnik@mail.ru>, 2019 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2019-09-07 06:39+0000\n" -"Last-Translator: polearnik <polearnik@mail.ru>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: polearnik <polearnik@mail.ru>, 2019\n" "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n" -"Plural-Forms: nplurals=3; " -"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ro\n" +"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -25,85 +25,39 @@ msgstr "I2P in comparatie cu Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet este o reÈ›ea de publicare anonima distribuita pe deplin, egal la " -"egal , oferind metode sigure de a stoca date, precum È™i încearcă să facă " -"fata inundărilor de trafic. ÃŽn timp ce Freenet este conceput ca un " -"depozit de date distribuite, persoane au construit aplicaÈ›ii pentru a " -"face comunicarea anonimă mai generice, cum ar fi site-uri web statice È™i " -"forumuri." +msgstr "Freenet este o reÈ›ea de publicare anonima distribuita pe deplin, egal la egal , oferind metode sigure de a stoca date, precum È™i încearcă să facă fata inundărilor de trafic. ÃŽn timp ce Freenet este conceput ca un depozit de date distribuite, persoane au construit aplicaÈ›ii pentru a face comunicarea anonimă mai generice, cum ar fi site-uri web statice È™i forumuri." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"Comparativ cu I2P, Freenet oferă unele avantaje substanÈ›iale - este un " -"depozit de date distribuite, în timp ce I2P nu este, permite oamenilor " -"pentru a prelua conÈ›inutul publicat de către alte persoane, chiar atunci " -"când editorul nu mai este on-line. ÃŽn plus, ar trebui să fie în măsură de" -" a distribui date populare destul de eficient. I2P în sine nu are È™i nu " -"va oferi această funcÈ›ionalitate. Pe de altă parte, există o suprapunere " -"utilizatorilor care doar să comunice unul cu celălalt anonim prin " -"intermediul site-uri, forumuri, programe de file sharing, etc asemenea, " -"au existat câteva tentative de a elabora un magazin de date distribuite " -"pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a " -"href=\"%(tahoe)s\"> Tahoe-LAFS </ a>), dar nimic nu este inca gata " -"pentru uz general." +msgstr "Comparativ cu I2P, Freenet oferă unele avantaje substanÈ›iale - este un depozit de date distribuite, în timp ce I2P nu este, permite oamenilor pentru a prelua conÈ›inutul publicat de către alte persoane, chiar atunci când editorul nu mai este on-line. ÃŽn plus, ar trebui să fie în măsură de a distribui date populare destul de eficient. I2P în sine nu are È™i nu va oferi această funcÈ›ionalitate. Pe de altă parte, există o suprapunere utilizatorilor care doar să comunice unul cu celălalt anonim prin intermediul site-uri, forumuri, programe de file sharing, etc asemenea, au existat câteva tentative de a elabora un magazin de date distribuite pentru a rula pe partea de sus a I2P, (cel mai recent un port de <a href=\"%(tahoe)s\"> Tahoe-LAFS </ a>), dar nimic nu este inca gata pentru uz general." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Cu toate acestea, chiar È™i ignorând orice probleme implementării, există " -"unele preocupări cu privire algoritmi Freenet scalabilitate È™i de " -"perspectivă anonimata, datorită în mare parte la euristica Freenet " -"condusa de rutare. InteracÈ›iunile de diferite tehnici de siguranță pot " -"descuraja cu succes diferite atacuri, È™i, probabil, unele aspecte ale " -"algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, " -"analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, " -"dar încă mai există speranță. Cel puÈ›in, Freenet nu oferă anonimatul " -"substanÈ›ial față de un atacator care nu are resursele necesare pentru a " -"analiza în continuare." +msgstr "Cu toate acestea, chiar È™i ignorând orice probleme implementării, există unele preocupări cu privire algoritmi Freenet scalabilitate È™i de perspectivă anonimata, datorită în mare parte la euristica Freenet condusa de rutare. InteracÈ›iunile de diferite tehnici de siguranță pot descuraja cu succes diferite atacuri, È™i, probabil, unele aspecte ale algoritmilor de rutare va oferi sperat pentru scalabilitate. Din păcate, analiza nu demult a algoritmilor implicate a dus la rezultate pozitive, dar încă mai există speranță. Cel puÈ›in, Freenet nu oferă anonimatul substanÈ›ial față de un atacator care nu are resursele necesare pentru a analiza în continuare." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -111,48 +65,28 @@ msgstr "I2P in comparatie cu alte proiecte" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"Există o mulÈ›ime de alte aplicaÈ›ii È™i proiecte ce lucrează asupra " -"comunicării anonimă È™i I2P a fost inspirat de o mare parte a eforturilor " -"lor. Aceasta nu este o listă completă a resurselor de anonimat - <a " -"href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie " -"Anonimatului</a> È™i de GNUnet <a href = \"https://www .gnunet.org/link-" -"uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva " -"sisteme se disting prin comparaÈ›ie continua. Următoarele pagini au " -"comparaÈ›ii individuale :" +msgstr "Există o mulÈ›ime de alte aplicaÈ›ii È™i proiecte ce lucrează asupra comunicării anonimă È™i I2P a fost inspirat de o mare parte a eforturilor lor. Aceasta nu este o listă completă a resurselor de anonimat - <a href=\"http://freehaven.net/anonbib/topic.html\">Bibliografie Anonimatului</a> È™i de GNUnet <a href = \"https://www .gnunet.org/link-uri/\"> proiecte legate de </a> servesc acestui scop. Asa spus, câteva sisteme se disting prin comparaÈ›ie continua. Următoarele pagini au comparaÈ›ii individuale :" #: i2p2www/pages/site/comparison/index.html:20 #, python-format msgid "" "The following are discussed on the <a href=\"%(othernetworks)s\">other " "networks page:</a>" -msgstr "" -"Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte " -"retele: </ a>" +msgstr "Următoarele sunt discutate pe pagina<a href=\"%(othernetworks)s\">alte retele: </ a>" #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"ConÈ›inutul acestei pagini este subiectul actualizarii, discuÈ›ii È™i " -"dispute, È™i observaÈ›ii È™i completări sunt binevenite. PuteÈ›i contribui o " -"analiză prin introducerea unui <a href=\"%(trac)s\"> bilet nou pe Trac " -"</a>." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -169,253 +103,116 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Cele mai multe dintre următoarele secÈ›iuni sunt destul de vechi, È™i ar " -"putea să nu fie exacte. Pentru o privire de ansamblu asupra comparaÈ›ii " -"disponibile, a se vedea href=\"%(comparison)s\"> pagina principală " -"comparaÈ›ii reÈ›ea </ a>. PuteÈ›i contribui o analiză prin introducerea unui" -" <a href=\"%(trac)s\"> bilet nou pe Trac </ a>." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." -msgstr "" -"RetroShare este un set de aplicaÈ›ii peer-to-peer care rulează în\n" -"ReÈ›ea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg" -" de astfel de F2F\n" -"reÈ›eaua face conexiuni IP directe numai la colegii autenticaÈ›i " -"(„prieteniâ€) după ce sunt explicite\n" -"schimb de certificate. Poate descoperi colegi neautentificaÈ›i (de " -"exemplu, prietenii prietenilor),\n" -"dar conexiunile la aceÈ™tia sunt transmise peste colegii „prieteni†pentru" -" a oferi confidenÈ›ialitate È™i anonimat." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." +msgstr "RetroShare este un set de aplicaÈ›ii peer-to-peer care rulează în\nReÈ›ea <a href=\"%(f2fwiki)s\">prieten cu prieten (F2F)</a>. Fiecare coleg de astfel de F2F\nreÈ›eaua face conexiuni IP directe numai la colegii autenticaÈ›i („prieteniâ€) după ce sunt explicite\nschimb de certificate. Poate descoperi colegi neautentificaÈ›i (de exemplu, prietenii prietenilor),\ndar conexiunile la aceÈ™tia sunt transmise peste colegii „prieteni†pentru a oferi confidenÈ›ialitate È™i anonimat." #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." -msgstr "" -"RetroShare este conceput pentru a construi o reÈ›ea privată de colegi de " -"încredere, în timp ce I2P este proiectat\n" -"să fie o reÈ›ea publică anonimă la scară largă. Versiunile recente ale " -"RetroShare au opÈ›iuni de rulat\n" -"ca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel" -" sunt toate conexiunile\n" -"anonimizat È™i nu este necesară încredere pentru adăugarea de „prieteni†" -"noi." +msgstr "RetroShare este conceput pentru a construi o reÈ›ea privată de colegi de încredere, în timp ce I2P este proiectat\nsă fie o reÈ›ea publică anonimă la scară largă. Versiunile recente ale RetroShare au opÈ›iuni de rulat\nca un \"darknet\" public prin utilizarea I2P sau Tor ca transport. Astfel sunt toate conexiunile\nanonimizat È™i nu este necesară încredere pentru adăugarea de „prieteni†noi." #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." -msgstr "" -"Morphmix È™i Tarzan sunt ambele complet distribuite , de tip peer-to-peer " -"reÈ›elele de proxy-uri anonime, care permit oamenilor să tunel prin " -"intermediul reÈ›elei de amestec scăzut latență. Morphmix include unele " -"algoritmi foarte interesante de detectare a comploturilor È™i apărare " -"Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a " -"realiza aceasta. Cele două diferenÈ›e principale între aceste sisteme È™i " -"I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul ameninÈ›are I2P " -"</a> È™i proiectarea lor de-proxy (spre deosebire de a oferi atât " -"anonimare expeditorului È™i receptorului). Există un cod sursă disponibil " -"pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în " -"afara mediilor academice." +msgstr "Morphmix È™i Tarzan sunt ambele complet distribuite , de tip peer-to-peer reÈ›elele de proxy-uri anonime, care permit oamenilor să tunel prin intermediul reÈ›elei de amestec scăzut latență. Morphmix include unele algoritmi foarte interesante de detectare a comploturilor È™i apărare Sybil, în timp ce Tarzan face uz de deficitul de adrese IP pentru a realiza aceasta. Cele două diferenÈ›e principale între aceste sisteme È™i I2P sunt legate de <a href=\"%(threatmodel)s\"> modelul ameninÈ›are I2P </a> È™i proiectarea lor de-proxy (spre deosebire de a oferi atât anonimare expeditorului È™i receptorului). Există un cod sursă disponibil pentru ambele sisteme, dar noi nu sunt constienti de utilizarea lor în afara mediilor academice." #: i2p2www/pages/site/comparison/other-networks.html:172 #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." -msgstr "" -"Mixminion È™i Mixmaster sunt reÈ›ele de suport e-mail anonim împotriva unui" -" adversar foarte puternic. AplicaÈ›ii high-latență de mesagerie care " -"rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> " -"Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a " -"satisface modelul ameninÈ›area acestor adversari, în timp ce rulează în " -"paralel de-a lungul partea de nevoile utilizatorilor latență redusă, " -"pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă" -" latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un " -"comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va" -" satisface nevoile utilizatorilor care necesită protecÈ›ie extrem de " -"e-mail." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." +msgstr "Mixminion È™i Mixmaster sunt reÈ›ele de suport e-mail anonim împotriva unui adversar foarte puternic. AplicaÈ›ii high-latență de mesagerie care rulează pe partea de sus a I2P (de exemplu, <a href=\"%(syndie)s\"> Syndie </ a> sau I2PBote) se poate dovedi, probabil, suficient pentru a satisface modelul ameninÈ›area acestor adversari, în timp ce rulează în paralel de-a lungul partea de nevoile utilizatorilor latență redusă, pentru a oferi un set de anonimat semnificativ mai mare. Suport de înaltă latență în router-ul I2P în sine poate sau nu poate fi adăugat într-un comunicat viitor îndepărtat. Este prea devreme pentru a spune dacă I2P va satisface nevoile utilizatorilor care necesită protecÈ›ie extrem de e-mail." #: i2p2www/pages/site/comparison/other-networks.html:184 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." -msgstr "" -"Ca È™i în cazul Tor È™i ceapa de rutare, atât Mixminion È™i Mixmaster ia o " -"abordare bazată pe directorul " +msgstr "Ca È™i în cazul Tor È™i ceapa de rutare, atât Mixminion È™i Mixmaster ia o abordare bazată pe directorul " #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" -msgstr "" -"JAP ( Java Proxy Anonim ) este o reÈ›ea de cascade de amestece pentru " -"anonimizarea cererilor de web , È™i , ca atare, are câteva noduri " -"centralizate ( participanÈ›ii la cascada ), care amesteca cereri de la " -"clienti prin secvenÈ›a de noduri (cascadă ) înainte de proxy de pe web . " -"Domeniul de aplicare , modelul de ameninÈ›are , si siguranÈ›a este " -"substanÈ›ial diferită de I2P , dar pentru cei care nu au nevoie de " -"anonimat semnificativ , dar încă nu sunt mulÈ›umit cu un Anonymizer - cum " -"ar fi serviciu , JAP este în valoare de revizuire . O remarcare de " -"prudenta este faptul că oricine sub jurisdicÈ›ia instanÈ›elor germane ar " -"putea dori să aibă grijă , ca Biroul Federal German de InvestigaÈ›ii " -"Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe " -"reÈ›ea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi " -"ilegal în instanÈ›ele germane , faptul că datele au fost colectate cu " -"succes . InstanÈ›ele schimba mintea lor bazate pe situaÈ›ie , iar acest " -"lucru este o dovadă că în cazul în care un organism guvernamental sau " -"agenÈ›ia de informaÈ›ii a vrut , ar putea aduna date , chiar dacă acesta " -"poate fi găsite inadmisibile în unele instanÈ›e mai târziu )\n" +msgstr "JAP ( Java Proxy Anonim ) este o reÈ›ea de cascade de amestece pentru anonimizarea cererilor de web , È™i , ca atare, are câteva noduri centralizate ( participanÈ›ii la cascada ), care amesteca cereri de la clienti prin secvenÈ›a de noduri (cascadă ) înainte de proxy de pe web . Domeniul de aplicare , modelul de ameninÈ›are , si siguranÈ›a este substanÈ›ial diferită de I2P , dar pentru cei care nu au nevoie de anonimat semnificativ , dar încă nu sunt mulÈ›umit cu un Anonymizer - cum ar fi serviciu , JAP este în valoare de revizuire . O remarcare de prudenta este faptul că oricine sub jurisdicÈ›ia instanÈ›elor germane ar putea dori să aibă grijă , ca Biroul Federal German de InvestigaÈ›ii Penale ( FBCI ) a montat cu succes un <a href=\"%(url)s\"> atac < /a> pe reÈ›ea . Chiar dacă metoda a acestui atac a fost ulterior dovedit a fi ilegal în instanÈ›ele germane , faptul că datele au fost colectate cu succes . InstanÈ›ele schimba mintea lor bazate pe situaÈ›ie , iar acest lucru este o dovadă că în cazul în care un organism guvernamental sau agenÈ›ia de informaÈ›ii a vrut , ar putea aduna date , chiar dacă acesta poate fi găsite inadmisibile în unele instanÈ›e mai târziu )\n" #: i2p2www/pages/site/comparison/other-networks.html:216 #, python-format msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." -msgstr "" -"Ambele din aceste sisteme funcÈ›ionează prin aceeaÈ™i baza <a " -"href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de " -"anonimat bazat pe modelul ameninÈ›area de a oferi negare plauzibilă față " -"de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, " -"fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii " -"utilizatori cu datele de identitate sau dorite, iar apoi folosiÈ›i un " -"algoritm de feedback pentru a optimiza această cale gasita. Aceasta " -"funcÈ›ionează bine pentru aplicaÈ›ii care pur È™i simplu doresc să È™tie ce " -"alÈ›i oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice," -" ce mai faci\" - veÈ›i obÈ›ine de fapt un grup local, de noduri, care pot " -"partaja fiÈ™iere cu È™i menÈ›ine un anumit grad de anonimat (dacă nu aveÈ›i " -"mai mult control asupra cine este în acel grup de colegii)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." +msgstr "Ambele din aceste sisteme funcÈ›ionează prin aceeaÈ™i baza <a href=\"%(antnet)s\"> antnet </a> de rutare, oferind un anumit grad de anonimat bazat pe modelul ameninÈ›area de a oferi negare plauzibilă față de un simplu adversar non-conspiră. Cu rutare antnet, ei în primul rând, fie fac o plimbare aleatoare sau o căutare difuzata a găsit unii utilizatori cu datele de identitate sau dorite, iar apoi folosiÈ›i un algoritm de feedback pentru a optimiza această cale gasita. Aceasta funcÈ›ionează bine pentru aplicaÈ›ii care pur È™i simplu doresc să È™tie ce alÈ›i oameni din jurul lor au de oferit - \"Cum voi face\" vs \"Hei Alice, ce mai faci\" - veÈ›i obÈ›ine de fapt un grup local, de noduri, care pot partaja fiÈ™iere cu È™i menÈ›ine un anumit grad de anonimat (dacă nu aveÈ›i mai mult control asupra cine este în acel grup de colegii)." #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." -msgstr "" -"Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în " -"care cererea vrea să vorbească cu un anumit utilizator se termină prin a " -"face o emisiune de căutare sau de mers aleator (deÈ™i, dacă acestea sunt " -"suficient de norocos pentru a reuÈ™i, de rutare antnet ar trebui să " -"optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce " -"aceste reÈ›ele pot lucra bine la solzi mici, ele nu sunt potrivite pentru " -"retele mari în cazul în care cineva vrea să intre în contact cu un alt " -"inter pares. Asta nu înseamnă că nu există nicio valoare în aceste " -"sisteme, doar că aplicabilitatea lor este limitată la situaÈ›iile în care " -"problemele lor specifice pot fi abordate." +msgstr "Cu toate acestea, algoritmul nu scaleaza de bine la toate - în cazul în care cererea vrea să vorbească cu un anumit utilizator se termină prin a face o emisiune de căutare sau de mers aleator (deÈ™i, dacă acestea sunt suficient de norocos pentru a reuÈ™i, de rutare antnet ar trebui să optimizeze găsirea conexiunii). Acest lucru înseamnă că, în timp ce aceste reÈ›ele pot lucra bine la solzi mici, ele nu sunt potrivite pentru retele mari în cazul în care cineva vrea să intre în contact cu un alt inter pares. Asta nu înseamnă că nu există nicio valoare în aceste sisteme, doar că aplicabilitatea lor este limitată la situaÈ›iile în care problemele lor specifice pot fi abordate." #: i2p2www/pages/site/comparison/other-networks.html:239 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." -msgstr "" -"Aceasta a fost o reÈ›ea închisă-source destinata utilizatorilor iraniene. " -"Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să " -"caute într-un instrument de eludare </ a>. Este suficient să spunem că " -"este o sursa închisă È™i care vizează în mod public o anumită È›ară nu sunt" -" idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această " -"sursă, È™i documentaÈ›ia noastră <a href=\"%(docs)s\">tehnice </a>, are " -"nevoie de mult mai multa revizuire." +msgstr "Aceasta a fost o reÈ›ea închisă-source destinata utilizatorilor iraniene. Tor a făcut o <a href=\"%(torpost)s\"> writeup bun asupra a ceea ce să caute într-un instrument de eludare </ a>. Este suficient să spunem că este o sursa închisă È™i care vizează în mod public o anumită È›ară nu sunt idei bune. I2P este, desigur, sursă deschisă. Cu toate acestea, această sursă, È™i documentaÈ›ia noastră <a href=\"%(docs)s\">tehnice </a>, are nevoie de mult mai multa revizuire." #: i2p2www/pages/site/comparison/other-networks.html:248 msgid "Paid VPN Services" @@ -426,10 +223,8 @@ msgstr "Servicii VPN platite" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"PuteÈ›i contribui o analiză prin introducerea unui <a href=\"%(trac)s\"> " -"bilet nou pe Trac </a>." #: i2p2www/pages/site/comparison/other-networks.html:254 msgid "Others" @@ -457,17 +252,7 @@ msgid "" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n" "database</a> and <a href=\"%(peerselection)s\">peer selection</a>." -msgstr "" -"Tor È™i Onion Routing sunt reÈ›ele anonime proxy, permițând oamenilor să " -"tuneleze prin intermediul reÈ›elei de amestec latență scăzuta. Cele două " -"diferenÈ›e principale între Tor/onion-routing È™i I2P sunt în legătură cu" -" diferenÈ›ele de model-ameninÈ›are È™i de design de-proxy (deÈ™i Tor acceptă " -"servicii ascunse, de asemenea). ÃŽn plus, Tor are abordarea directorului " -"bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" " -"generale a reÈ›elei, precum È™i adunarea È™i raportarea statistici, spre " -"deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date " -"reÈ›ea </ a> È™i <a href=\"%(peerselection)s\">selecÈ›ie egal la egal </ " -"a>." +msgstr "Tor È™i Onion Routing sunt reÈ›ele anonime proxy, permițând oamenilor să tuneleze prin intermediul reÈ›elei de amestec latență scăzuta. Cele două diferenÈ›e principale între Tor/onion-routing È™i I2P sunt în legătură cu diferenÈ›ele de model-ameninÈ›are È™i de design de-proxy (deÈ™i Tor acceptă servicii ascunse, de asemenea). ÃŽn plus, Tor are abordarea directorului bazat - pe oferirea unui punct centralizat de gestionare a \"vederii\" generale a reÈ›elei, precum È™i adunarea È™i raportarea statistici, spre deosebire de I2P distribuita <a href = \"% (netdb) s\" > Baza de date reÈ›ea </ a> È™i <a href=\"%(peerselection)s\">selecÈ›ie egal la egal </ a>." #: i2p2www/pages/site/comparison/tor.html:23 msgid "" @@ -480,14 +265,7 @@ msgid "" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." -msgstr "" -"FuncÈ›ionalitatea outproxy I2P/Tor are câteva puncte slabe importante " -"împotriva unor agresori - odata comunicarea părăseÈ™te mixnet, adversarea " -"pasiva la nivel mondial se poate mai uÈ™or monta analiza traficului. ÃŽn " -"plus, outproxies au acces la textul datelor transferate în ambele " -"direcÈ›ii, È™i outproxies sunt predispuse la abuz, împreună cu toate " -"celelalte probleme de securitate le-am venit să-l cunoastem cu trafic " -"normal din Internet." +msgstr "FuncÈ›ionalitatea outproxy I2P/Tor are câteva puncte slabe importante împotriva unor agresori - odata comunicarea părăseÈ™te mixnet, adversarea pasiva la nivel mondial se poate mai uÈ™or monta analiza traficului. ÃŽn plus, outproxies au acces la textul datelor transferate în ambele direcÈ›ii, È™i outproxies sunt predispuse la abuz, împreună cu toate celelalte probleme de securitate le-am venit să-l cunoastem cu trafic normal din Internet." #: i2p2www/pages/site/comparison/tor.html:35 msgid "" @@ -497,14 +275,7 @@ msgid "" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." -msgstr "" -"Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu " -"privire la aceste situaÈ›ii, deoarece acestea sunt în afara modelului lor " -"de ameninÈ›are. Este, de asemenea, în afara (formal) domeniul de aplicare " -"funcÈ›ională I2P lui (în cazul în care oamenii doresc să construiască " -"funcÈ›ionalitate outproxy pe partea de sus a unui strat de comunicare " -"anonimă, ei pot). De fapt, unii utilizatori de I2P în prezent profita de" -" Tor la outproxy." +msgstr "Cu toate acestea, majoritatea persoanelor nu trebuie să faca griji cu privire la aceste situaÈ›ii, deoarece acestea sunt în afara modelului lor de ameninÈ›are. Este, de asemenea, în afara (formal) domeniul de aplicare funcÈ›ională I2P lui (în cazul în care oamenii doresc să construiască funcÈ›ionalitate outproxy pe partea de sus a unui strat de comunicare anonimă, ei pot). De fapt, unii utilizatori de I2P în prezent profita de Tor la outproxy." #: i2p2www/pages/site/comparison/tor.html:49 msgid "Comparison of Tor and I2P Terminology" @@ -514,9 +285,7 @@ msgstr "Compararea cu Tor È™i I2P terminologie" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"ÃŽn timp ce Tor È™i I2P sunt similare în multe feluri, o mare parte din " -"terminologie este diferita." +msgstr "ÃŽn timp ce Tor È™i I2P sunt similare în multe feluri, o mare parte din terminologie este diferita." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -589,8 +358,8 @@ msgstr "Serviciul ascuns" #: i2p2www/pages/site/comparison/tor.html:63 #: i2p2www/pages/site/comparison/tor.html:68 -msgid "Eepsite or Destination" -msgstr "Eepsite sau Destinatie" +msgid "I2P Site or Destination" +msgstr "" #: i2p2www/pages/site/comparison/tor.html:64 msgid "Hidden Service Descriptor" @@ -660,21 +429,14 @@ msgstr "Beneficiile Tor peste I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"Baza mult mai mare de utilizatori; vizibilitate mult mai multa în " -"comunitățile academice È™i hacker, beneficiaza de studii formale de " -"anonimat, rezistenta, È™i de performanță, vizibila, liderul non-anonim " -"universitate pe baza de" +msgstr "Baza mult mai mare de utilizatori; vizibilitate mult mai multa în comunitățile academice È™i hacker, beneficiaza de studii formale de anonimat, rezistenta, È™i de performanță, vizibila, liderul non-anonim universitate pe baza de" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" -msgstr "" -"S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru " -"adresare" +msgstr "S-au rezolvat deja unele probleme de scalare I2P a fost încă pentru adresare" #: i2p2www/pages/site/comparison/tor.html:85 msgid "Has significant funding" @@ -686,34 +448,24 @@ msgstr "Are mai multe dezvoltatori, inclusiv câteva care sunt finanÈ›ate" #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Mai rezistent la blocarea din cauza stratului transport TLS È™i poduri " -"(I2P are propuneri pentru \"rute restricÈ›ionate complete\", dar acestea " -"încă nu sunt puse în aplicare )" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Mai rezistent la blocarea din cauza stratului transport TLS È™i poduri (I2P are propuneri pentru \"rute restricÈ›ionate complete\", dar acestea încă nu sunt puse în aplicare )" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" -msgstr "" -"Suficient de mare pentru că a trebuit să se adapteze la blocarea È™i DOS " -"încercări" +msgstr "Suficient de mare pentru că a trebuit să se adapteze la blocarea È™i DOS încercări" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Concepute È™i optimizate pentru traficul de ieÈ™ire, cu un număr mare de " -"noduri de ieÈ™ire" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Concepute È™i optimizate pentru traficul de ieÈ™ire, cu un număr mare de noduri de ieÈ™ire" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"DocumentaÈ›ia mai bună, are acte oficiale È™i specificaÈ›iile, site-ul mai " -"bun, mult mai multe traduceri" +msgstr "DocumentaÈ›ia mai bună, are acte oficiale È™i specificaÈ›iile, site-ul mai bun, mult mai multe traduceri" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -727,17 +479,13 @@ msgstr "Nodurile client Tor au foarte putin trafic overhead" msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"Control centralizat reduce complexitatea de la fiecare nod È™i poate " -"răspunde în mod eficient atacuri Sybil" +msgstr "Control centralizat reduce complexitatea de la fiecare nod È™i poate răspunde în mod eficient atacuri Sybil" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"O bază de noduri de mare capacitate oferă transfer mai mare È™i latență " -"mai mică" +msgstr "O bază de noduri de mare capacitate oferă transfer mai mare È™i latență mai mică" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -749,11 +497,9 @@ msgstr "Beneficiile I2P peste Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Concepute È™i optimizate pentru serviciile ascunse, care sunt mult mai " -"rapide decât în Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Concepute È™i optimizate pentru serviciile ascunse, care sunt mult mai rapide decât în Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -763,23 +509,17 @@ msgstr "Complet distribuit È™i de auto organizare" msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Colegii sunt selectate de către profilare continua si clasament de " -"performanță, mai degrabă decât încredere în capacitatea de a pretins" +msgstr "Colegii sunt selectate de către profilare continua si clasament de performanță, mai degrabă decât încredere în capacitatea de a pretins" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" -msgstr "" -"Colegii Floodfill (\"serverele director\") sunt diferiti È™i nu sunt de " -"încredere, mai degrabă decât codate" +msgstr "Colegii Floodfill (\"serverele director\") sunt diferiti È™i nu sunt de încredere, mai degrabă decât codate" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" -msgstr "" -"Suficient de mici pentru că sa nu fie blocati sau administrati demult, " -"sau deloc" +msgstr "Suficient de mici pentru că sa nu fie blocati sau administrati demult, sau deloc" #: i2p2www/pages/site/comparison/tor.html:135 msgid "Peer-to-peer friendly" @@ -793,17 +533,13 @@ msgstr "Comutarea pachetelor în loc de comutarea circuitelor" msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" -msgstr "" -"balansare incarcarii implicita si transparentă a mesajelor pe mai multe " -"colegii, mai des decât o singură cale" +msgstr "balansare incarcarii implicita si transparentă a mesajelor pe mai multe colegii, mai des decât o singură cale" #: i2p2www/pages/site/comparison/tor.html:145 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" -msgstr "" -"rezistenÈ›a vs eÈ™ecurile prin rularea mai multor tuneluri în paralel, plus" -" tuneluri rotative" +msgstr "rezistenÈ›a vs eÈ™ecurile prin rularea mai multor tuneluri în paralel, plus tuneluri rotative" #: i2p2www/pages/site/comparison/tor.html:151 msgid "" @@ -811,21 +547,14 @@ msgid "" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" -msgstr "" -"scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de " -"exemplu are 2 tuneluri de intrare care sunt utilizate de către toti " -"colegi cu care Alice converseaza , mai degrabă decât un circuit pentru " -"fiecare)" +msgstr "scala conexiuni ale fiecărui client la O (1) în loc de O (N) (Alice de exemplu are 2 tuneluri de intrare care sunt utilizate de către toti colegi cu care Alice converseaza , mai degrabă decât un circuit pentru fiecare)" #: i2p2www/pages/site/comparison/tor.html:161 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"Tuneluri unidirecÈ›ionale în loc de circuite bidirecÈ›ionale, dublarea " -"numărului de noduri colegilor trebuie să facă un compromis pentru a " -"obÈ›ine aceleaÈ™i informaÈ›ii." +msgstr "Tuneluri unidirecÈ›ionale în loc de circuite bidirecÈ›ionale, dublarea numărului de noduri colegilor trebuie să facă un compromis pentru a obÈ›ine aceleaÈ™i informaÈ›ii." #: i2p2www/pages/site/comparison/tor.html:166 #, python-format @@ -839,11 +568,7 @@ msgid "" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" -msgstr "" -"ProtecÈ›ia împotriva detectarii de activitate clientului, chiar È™i atunci " -"când un atacator participă la tunel, aÈ™a cum tuneluri sunt folosite " -"pentru mai multe decât pur È™i simplu trecerea intr-un capăt mesaje finali" -" (de exemplu netDb, managementul tunel, tunel" +msgstr "ProtecÈ›ia împotriva detectarii de activitate clientului, chiar È™i atunci când un atacator participă la tunel, aÈ™a cum tuneluri sunt folosite pentru mai multe decât pur È™i simplu trecerea intr-un capăt mesaje finali (de exemplu netDb, managementul tunel, tunel" #: i2p2www/pages/site/comparison/tor.html:180 msgid "" @@ -851,18 +576,13 @@ msgid "" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." -msgstr "" -"Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe " -"care un atacator poate folosi pentru a monta un atac activ , spre " -"deosebire de circuite din Tor, care de obicei au viata lunga." +msgstr "Tunelurile din I2P sunt de scurtă durată, scăderea numărului de probe care un atacator poate folosi pentru a monta un atac activ , spre deosebire de circuite din Tor, care de obicei au viata lunga." #: i2p2www/pages/site/comparison/tor.html:188 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." -msgstr "" -"I2P API-uri sunt proiectate special pentru anonimatul È™i securitate, în " -"timp ce SOCKS este proiectat pentru funcÈ›ionalitate." +msgstr "I2P API-uri sunt proiectate special pentru anonimatul È™i securitate, în timp ce SOCKS este proiectat pentru funcÈ›ionalitate." #: i2p2www/pages/site/comparison/tor.html:193 msgid "Essentially all peers participate in routing for others" @@ -873,10 +593,7 @@ msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." -msgstr "" -"Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce " -"nodurile client nu necesită mai mult de lățime de bandă, ele nu participă" -" pe deplin la mixnet." +msgstr "Overhead de bandă a utilizatorului este scăzut, decit în Tor, în timp ce nodurile client nu necesită mai mult de lățime de bandă, ele nu participă pe deplin la mixnet." #: i2p2www/pages/site/comparison/tor.html:201 msgid "Integrated automatic update mechanism" @@ -902,19 +619,14 @@ msgstr "... È™i posibil sa nu fie puse în aplicare, astfel încât nu conta pe msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" -msgstr "" -"Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai " -"multe mesaje" +msgstr "Apărare vs analiza numărului de mesaje de ambalaj usturoi invelite mai multe mesaje" #: i2p2www/pages/site/comparison/tor.html:216 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" -msgstr "" -"Apărare vs intersecÈ›ie pe termen lung prin adăugarea de întârzieri la " -"diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin " -"alte hamei)" +msgstr "Apărare vs intersecÈ›ie pe termen lung prin adăugarea de întârzieri la diferite hamei (în cazul în care întârzierile nu sunt perceptibile prin alte hamei)" #: i2p2www/pages/site/comparison/tor.html:223 msgid "" @@ -922,8 +634,4 @@ msgid "" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" -msgstr "" -"Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un " -"tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul" -" va injecta mesaje false dacă există mesaje insuficiente, etc)" - +msgstr "Diverse strategii de amestecare la nivel tunel (de exemplu, a crea un tunel care se va ocupa 500 de mesaje / minut, în cazul în care obiectivul va injecta mesaje false dacă există mesaje insuficiente, etc)" diff --git a/i2p2www/translations/ro/LC_MESSAGES/misc.po b/i2p2www/translations/ro/LC_MESSAGES/misc.po index 6f578cfadb4086dbe55162b9c3db256a8f8e8e46..129bad42579674a05145e6d4ffb93a38b8483f26 100644 --- a/i2p2www/translations/ro/LC_MESSAGES/misc.po +++ b/i2p2www/translations/ro/LC_MESSAGES/misc.po @@ -1,24 +1,24 @@ -# Romanian translations for I2P. -# Copyright (C) 2017 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # oper2 <12>, 2014 -# pol polearnik <polearnik@mail.ru>, 2014 +# polearnik <polearnik@mail.ru>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2017-09-19 18:21+0000\n" -"Last-Translator: pol polearnik <polearnik@mail.ru>\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: polearnik <polearnik@mail.ru>, 2014\n" "Language-Team: Romanian (http://www.transifex.com/otf/I2P/language/ro/)\n" -"Plural-Forms: nplurals=3; " -"plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1))\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ro\n" +"Plural-Forms: nplurals=3; plural=(n==1?0:(((n%100>19)||((n%100==0)&&(n!=0)))?2:1));\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -27,78 +27,39 @@ msgstr "I2P la CLT È™i PETCON 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Membrii I2P va avea loc o discuÈ›ie la CLT È™i PETCON 2009.1 Doi membri ai " -"echipei de I2P vor fi la două viitoarea zi Linux È™i securitate convenÈ›ie." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Membrii I2P va avea loc o discuÈ›ie la CLT È™i PETCON 2009.1 Doi membri ai echipei de I2P vor fi la două viitoarea zi Linux È™i securitate convenÈ›ie." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"Pe data de 14 martie 2009 va avea loc o scurtă discuÈ›ie despre " -"introducere generală la I2P la <a href=\"%(chemnitzer)s\"> Chemnitz Linux" -" Eticheta de 2009 </ a> deÈ›inuta de Echelon. Echelon È™i alÈ›i membri ai " -"familiei I2P vor participa la reuniunea Linux două zile (sâmbătă È™i " -"duminică) È™i vor fi recunoscute în calitate de membri de familie I2P. " -"Faceti cunostinta, daÈ›i întrebări, arată-le elemente de recuzită " -"dumneavoastră! DemonstraÈ›i-vă sprijinul!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "Pe data de 14 martie 2009 va avea loc o scurtă discuÈ›ie despre introducere generală la I2P la <a href=\"%(chemnitzer)s\"> Chemnitz Linux Eticheta de 2009 </ a> deÈ›inuta de Echelon. Echelon È™i alÈ›i membri ai familiei I2P vor participa la reuniunea Linux două zile (sâmbătă È™i duminică) È™i vor fi recunoscute în calitate de membri de familie I2P. Faceti cunostinta, daÈ›i întrebări, arată-le elemente de recuzită dumneavoastră! DemonstraÈ›i-vă sprijinul!" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"Doar 10 zile mai târziu va avea loc<a href=\"%(petcon)s\"> convenÈ›ia de " -"confidenÈ›ialitate È™i securitate a datelor </ a> din Dresda . Din nou, " -"Echelon va participa la acest eveniment È™i va avea loc o scurtă discuÈ›ie " -"cu privire la prezentare generală a I2P. La fel va avea loc o alta " -"discutie despre stabilirea profilului de clienti I2P ." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "Doar 10 zile mai târziu va avea loc<a href=\"%(petcon)s\"> convenÈ›ia de confidenÈ›ialitate È™i securitate a datelor </ a> din Dresda . Din nou, Echelon va participa la acest eveniment È™i va avea loc o scurtă discuÈ›ie cu privire la prezentare generală a I2P. La fel va avea loc o alta discutie despre stabilirea profilului de clienti I2P ." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"Cod sursă I2P a fost È›inut într-un depozit CVS. In zilele noastre se " -"păstrează într-un depozit<a href=\"%(monotone)s\"> Monotone </ a> . " -"Pentru cei care nu sunt foarte familiarizati cu CVS, există o <a " -"href=\"http://cvsbook.red-bean.com/cvsbook.html\">carte fantastica</ a> " -"pe această temă (dezvoltatorii trebuie doar să faca cunostinta cu primul " -"capitol - \"O privire de ansamblu de CVS\", aÈ™a cum capitolele următoare " -"intra în unele detalii urâte cu foarte puÈ›ini nevoie pentru a atinge " -"vreodată)." +msgstr "Cod sursă I2P a fost È›inut într-un depozit CVS. In zilele noastre se păstrează într-un depozit<a href=\"%(monotone)s\"> Monotone </ a> . Pentru cei care nu sunt foarte familiarizati cu CVS, există o <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">carte fantastica</ a> pe această temă (dezvoltatorii trebuie doar să faca cunostinta cu primul capitol - \"O privire de ansamblu de CVS\", aÈ™a cum capitolele următoare intra în unele detalii urâte cu foarte puÈ›ini nevoie pentru a atinge vreodată)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Citat plin de umor de la WinCVS: \"ȘtiaÈ›i că ... Niciodata experimentul " -"cu noile comenzile CVS pe repozitoriul dumneavoastră de lucru Crearea " -"unui modul de probă în loc.\"." +msgstr "Citat plin de umor de la WinCVS: \"ȘtiaÈ›i că ... Niciodata experimentul cu noile comenzile CVS pe repozitoriul dumneavoastră de lucru Crearea unui modul de probă în loc.\"." #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -109,13 +70,9 @@ msgstr "migraÈ›ie I2PTunnel" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" -"După actualizarea la noua arhitectură, veÈ›i avea de a face un pic de " -"lucru pentru a obÈ›ine servere vechi I2PTunnel-conduse in funcÈ›ionare.Vom" -" exemplifica printr-un exemplu simplu. Pentru un eepsite cu configuraÈ›ia" -" clientApp veche, ati avut:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:16 msgid "To provide that same functionality on the new web architecture:" @@ -131,14 +88,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "FaceÈ›i clic pe Adauga nou: [tunel Server] \"GO\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Pentru numele: <code> \"eepsite\" </code>" +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" msgstr "" -"Pentru descrierea: <code> \"? Eepsite meu, oare nu este destul de " -"frumos\" </ code>" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -152,10 +107,7 @@ msgstr "Pentru portul È›intă:" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Pentru fiÈ™ierul cheie privat: <code>cale la \"myWebPriv.dat\" </ code> " -"<br /> \n" -"(este recomandat pentru a copia acest fisierul .dat la noua instalare dir)" +msgstr "Pentru fiÈ™ierul cheie privat: <code>cale la \"myWebPriv.dat\" </ code> <br /> \n(este recomandat pentru a copia acest fisierul .dat la noua instalare dir)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -171,24 +123,12 @@ msgstr "Acesta va veni înapoi spunând:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" -msgstr "" -"Asta este! Server nou I2PTunnel creat funcÈ›ionează în acelaÈ™i mod de " -"asemenea, în afară de tine \n" -"Nu este nevoie să \"copiaÈ›i fiÈ™ierul vechi\". ÃŽn spatele scenei, totul " -"este condus \n" -"de <code> i2ptunnel.config </ code> , care s-ar putea modifica extern " -"(dacă ai face, \n" -"apasa \"Reload config\", pe pagina de web I2PTunnel, care va dărâma toate" -" dvs. tuneluri existente È™i reconstrui noi)" +msgstr "Asta este! Server nou I2PTunnel creat funcÈ›ionează în acelaÈ™i mod de asemenea, în afară de tine \nNu este nevoie să \"copiaÈ›i fiÈ™ierul vechi\". ÃŽn spatele scenei, totul este condus \nde <code> i2ptunnel.config </ code> , care s-ar putea modifica extern (dacă ai face, \napasa \"Reload config\", pe pagina de web I2PTunnel, care va dărâma toate dvs. tuneluri existente È™i reconstrui noi)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47 msgid "" @@ -197,21 +137,15 @@ msgid "" "interface. It will say \"Please be patient\" if you try to \n" "beforehand, which means that it is still trying to build the \n" "necessary I2PTunnel sessions it has been configured to create." -msgstr "" -"ReÈ›ineÈ›i că va trebui să aÈ™teptaÈ›i până când router-ul va fi integrat \n" -"în reÈ›ea înainte de a fi capabili de a utiliza / i2ptunnel / web \n" -"interfață. Se va spune \"Vă rugăm să aÈ™teptaÈ›i\", dacă încercaÈ›i \n" -"în prealabil, ceea ce înseamnă că acesta este încă in stare de construire" -" \n" -"sesiuni de I2PTunnel necesare acesta ce a fost configurat pentru a crea." +msgstr "ReÈ›ineÈ›i că va trebui să aÈ™teptaÈ›i până când router-ul va fi integrat \nîn reÈ›ea înainte de a fi capabili de a utiliza / i2ptunnel / web \ninterfață. Se va spune \"Vă rugăm să aÈ™teptaÈ›i\", dacă încercaÈ›i \nîn prealabil, ceea ce înseamnă că acesta este încă in stare de construire \nsesiuni de I2PTunnel necesare acesta ce a fost configurat pentru a crea." #: i2p2www/pages/site/misc/i2ptunnel-services.html:2 msgid "I2PTunnel services" msgstr "servicii I2PTunnel" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." -msgstr "Mai jos este copia rapida de eepsite ghid de implementare Aum lui." +msgid "Below is quick copy of aum's I2P Site deployment guide." +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 msgid "1. - Deploy a local server" @@ -222,70 +156,48 @@ msgid "" "For simplicity's sake, we will walk through the setup of a web server; " "however, this procedure is the same regardless what protocol of servers " "and/or clients you are setting up." -msgstr "" -"Pentru simplitate, vom merge prin configurarea unui server web, cu toate " -"acestea, această procedură este aceeaÈ™i, indiferent ce protocol de " -"servere È™i / sau clienÈ›i pe care îl configuraÈ›i." +msgstr "Pentru simplitate, vom merge prin configurarea unui server web, cu toate acestea, această procedură este aceeaÈ™i, indiferent ce protocol de servere È™i / sau clienÈ›i pe care îl configuraÈ›i." #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." -msgstr "" -"Vom recomanda serverul Httpd Tiny web, thttpd, (versiunea disponibilă " -"pentru windows pe site-ul ), deÈ™i se poate utiliza orice cu care sa te " -"simti confortabil cu." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." +msgstr "Vom recomanda serverul Httpd Tiny web, thttpd, (versiunea disponibilă pentru windows pe site-ul ), deÈ™i se poate utiliza orice cu care sa te simti confortabil cu." #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." -msgstr "" -"O altă opÈ›iune mai robusta ar fi de a folosi EasyPHP, care este, de " -"asemenea, open source. Acesta este dotat cu PHP, phpMyAdmin, MySQL, È™i " -"server web Apache. Pentru începători care nu au experiență configurarea " -"È™i găzduire conÈ›inutului pe servere, consultaÈ›i pagina de hosting pentru " -"ajutor." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." +msgstr "O altă opÈ›iune mai robusta ar fi de a folosi EasyPHP, care este, de asemenea, open source. Acesta este dotat cu PHP, phpMyAdmin, MySQL, È™i server web Apache. Pentru începători care nu au experiență configurarea È™i găzduire conÈ›inutului pe servere, consultaÈ›i pagina de hosting pentru ajutor." #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." -msgstr "" -"Cu serverul web pe care l-aÈ›i ales, configuraÈ›i-l pentru a asculta un " -"port la alegere, È™i a servi documentele sale de la un director la " -"alegerea ta. Pentru acest exemplu, vom presupune 10880 port." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." +msgstr "Cu serverul web pe care l-aÈ›i ales, configuraÈ›i-l pentru a asculta un port la alegere, È™i a servi documentele sale de la un director la alegerea ta. Pentru acest exemplu, vom presupune 10880 port." #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 msgid "" "Make sure your firewall is set up so that you cannot receive incoming " "connections on this port (which would breach your anonymity)." -msgstr "" -"AsiguraÈ›i-vă că firewall-ul este configurat astfel încât să nu poate " -"primi conexiuni de intrare la acest port (care ar încălca anonimatul)." +msgstr "AsiguraÈ›i-vă că firewall-ul este configurat astfel încât să nu poate primi conexiuni de intrare la acest port (care ar încălca anonimatul)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:25 msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." -msgstr "" -"TestaÈ›i serverul de web, arătând browser-ul dvs. normal (cel cu " -"\"legătura directă\") la <a href=\"http://localhost:10880\" " -"target=\"_blank\"> http://localhost:10880 </ a> (schimbati 10880 de " -"numărul de port ce l-aÈ›i ales)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." +msgstr "TestaÈ›i serverul de web, arătând browser-ul dvs. normal (cel cu \"legătura directă\") la <a href=\"http://localhost:10880\" target=\"_blank\"> http://localhost:10880 </ a> (schimbati 10880 de numărul de port ce l-aÈ›i ales)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 msgid "" "Once your webserver is working, and you can access it locally with your " "browser, continue to the next step." -msgstr "" -"Odată ce serverul dvs. lucreaza, È™i îl puteÈ›i accesa la nivel local cu " -"browser-ul dvs., continuaÈ›i cu pasul următor." +msgstr "Odată ce serverul dvs. lucreaza, È™i îl puteÈ›i accesa la nivel local cu browser-ul dvs., continuaÈ›i cu pasul următor." #: i2p2www/pages/site/misc/i2ptunnel-services.html:33 msgid "2 - Generate an I2P Destination Keypair" @@ -293,45 +205,29 @@ msgstr "2 - generează o destinaÈ›ie pereche de chei I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." -msgstr "" -"I2P nu ocupă adrese IP. Pentru a proteja anonimatul, se ocupă adrese " -"unice numite chei de destinaÈ›ie." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." +msgstr "I2P nu ocupă adrese IP. Pentru a proteja anonimatul, se ocupă adrese unice numite chei de destinaÈ›ie." #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" -msgstr "" -"O cheie destinaÈ›ie funcÈ›ionează ca o adresă IP obiÈ™nuită, cu excepÈ›ia " -"faptului că nu pot fi urmărite dupa adresa IP sau locaÈ›ie fizică. Când " -"utilizatorii plaseaza o cerere de a vorbi cu tine, gateway-urile sunt " -"cele care răspund pentru tine. Astfel încât utilizatorul solicitant poate" -" cunoaÈ™te doar adresa IP a gateway-urile. Cu toate acestea, gateway-uri " -"nu È™tiu adresa IP dvs. , deoarece gateway-uri sunt ultimele nodurile de " -"pe tuneluri, È™i creaÈ›i anonim tuneluri de cale de usturoi de rutare. " -"(Deci, gateway-uri sunt ca marionete care nu pot vedea stăpânii lor, È™i " -"toată lumea comunică prin intermediul acestor marionete)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" +msgstr "O cheie destinaÈ›ie funcÈ›ionează ca o adresă IP obiÈ™nuită, cu excepÈ›ia faptului că nu pot fi urmărite dupa adresa IP sau locaÈ›ie fizică. Când utilizatorii plaseaza o cerere de a vorbi cu tine, gateway-urile sunt cele care răspund pentru tine. Astfel încât utilizatorul solicitant poate cunoaÈ™te doar adresa IP a gateway-urile. Cu toate acestea, gateway-uri nu È™tiu adresa IP dvs. , deoarece gateway-uri sunt ultimele nodurile de pe tuneluri, È™i creaÈ›i anonim tuneluri de cale de usturoi de rutare. (Deci, gateway-uri sunt ca marionete care nu pot vedea stăpânii lor, È™i toată lumea comunică prin intermediul acestor marionete)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" -msgstr "" -"Pentru a implementa un server de pe I2P, creaÈ›i o keypair destinaÈ›ie. " -"PuteÈ›i utiliza cheia privată pentru a autentifica server-ul dvs. atunci " -"când se conecteaza la I2P, È™i să vă facă cheia publică (aka cheie " -"destinaÈ›ie), cunoscut în mod public, astfel încât alÈ›ii se poate conecta " -"la server. (indirect, prin intermediul gateway-urile)\\" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" +msgstr "Pentru a implementa un server de pe I2P, creaÈ›i o keypair destinaÈ›ie. PuteÈ›i utiliza cheia privată pentru a autentifica server-ul dvs. atunci când se conecteaza la I2P, È™i să vă facă cheia publică (aka cheie destinaÈ›ie), cunoscut în mod public, astfel încât alÈ›ii se poate conecta la server. (indirect, prin intermediul gateway-urile)\\" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 msgid "Each service you run on I2P requires a different keypair." @@ -342,77 +238,52 @@ msgid "" "To generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code> (all on one line)" -msgstr "" -"Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar " -"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </" -" code> (tot pe o singură linie)" +msgstr "Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code> (tot pe o singură linie)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:50 msgid "" "In windows, to generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code>" -msgstr "" -"Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar " -"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </" -" code>" +msgstr "Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." -msgstr "" -"Nume de fiÈ™iere <code> myWebPrivKey.dat </ code> È™i <code> " -"myWebPubKey.dat </ code> sunt arbitrare - alege ce vrei aici, atâta timp " -"cât aÈ›i înÈ›eles propriile alegeri." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." +msgstr "Nume de fiÈ™iere <code> myWebPrivKey.dat </ code> È™i <code> myWebPubKey.dat </ code> sunt arbitrare - alege ce vrei aici, atâta timp cât aÈ›i înÈ›eles propriile alegeri." #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 msgid "" "We now need to export your public key into base64 format, which you will " "share with others." -msgstr "" -"Avem acum nevoie pentru a exporta cheia dvs. publică în format base64, " -"care vă vor împărtăși cu alÈ›ii." +msgstr "Avem acum nevoie pentru a exporta cheia dvs. publică în format base64, care vă vor împărtăși cu alÈ›ii." #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." -msgstr "" -"Pentru a converti fiÈ™ierul myWebPubKey.dat în base64 partajabile, tastaÈ›i" -" <code> comanda java-cp lib/i2p.jar net.i2p.data.Base64 codifica " -"myWebPubKey.dat> myWebPubKey.txt </ code> (tot pe o linie )." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." +msgstr "Pentru a converti fiÈ™ierul myWebPubKey.dat în base64 partajabile, tastaÈ›i <code> comanda java-cp lib/i2p.jar net.i2p.data.Base64 codifica myWebPubKey.dat> myWebPubKey.txt </ code> (tot pe o linie )." #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." -msgstr "" -"Acest fiÈ™ier pe care tocmai aÈ›i generat, <code> myWebPubKey.txt </ code>," -" conÈ›ine un È™ir de base64 lung (516 de caractere de la ultima " -"numaratoare), pe care o numim o cheie destinaÈ›ie. Tot ce trebuie să È™tiÈ›i" -" despre acest È™ir de acum este că permite clienÈ›ilor de la distanță " -"pentru a indica în mod unic È™i conecta la server-ul dvs., chiar în " -"acelaÈ™i mod ca È™i o adresă IP permite maÈ™ini la distanță să identifice È™i" -" să se conecteze la maÈ™ina dumneavoastră." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." +msgstr "Acest fiÈ™ier pe care tocmai aÈ›i generat, <code> myWebPubKey.txt </ code>, conÈ›ine un È™ir de base64 lung (516 de caractere de la ultima numaratoare), pe care o numim o cheie destinaÈ›ie. Tot ce trebuie să È™tiÈ›i despre acest È™ir de acum este că permite clienÈ›ilor de la distanță pentru a indica în mod unic È™i conecta la server-ul dvs., chiar în acelaÈ™i mod ca È™i o adresă IP permite maÈ™ini la distanță să identifice È™i să se conecteze la maÈ™ina dumneavoastră." #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." -msgstr "" -"Cu toate acestea, spre deosebire de o adresă IP, nu există nici o " -"modalitate de a urmări locaÈ›ia fizică a aparatului dumneavoastră - chiar " -"dacă server-ul dvs. pot fi abordate prin intermediul I2P, adresa IP nu " -"pot fi urmărite sau asociate cu această cheie destinaÈ›ie." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." +msgstr "Cu toate acestea, spre deosebire de o adresă IP, nu există nici o modalitate de a urmări locaÈ›ia fizică a aparatului dumneavoastră - chiar dacă server-ul dvs. pot fi abordate prin intermediul I2P, adresa IP nu pot fi urmărite sau asociate cu această cheie destinaÈ›ie." #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 msgid "3 - Open a 'Tunnel' from I2P To Your Server" @@ -420,52 +291,37 @@ msgstr "3 - Deschide un \"tunel\" de la I2P la server" #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." -msgstr "" -"Pentru clienÈ›ii din alte părÈ›i I2P a putea accesa server-ul dvs., trebuie" -" să executaÈ›i o \"punte\" sau \"tunel\", care are legături de la aceÈ™ti " -"clienÈ›i È™i le transmite la server-ul local." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." +msgstr "Pentru clienÈ›ii din alte părÈ›i I2P a putea accesa server-ul dvs., trebuie să executaÈ›i o \"punte\" sau \"tunel\", care are legături de la aceÈ™ti clienÈ›i È™i le transmite la server-ul local." #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 msgid "" "To activate such a tunnel, type the command <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code> (all one line)." -msgstr "" -"Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar " -"lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </" -" code> (tot pe o singură linie)" +msgstr "Pentru a genera keypair dvs., tastaÈ›i comanda: <code> java-jar lib/i2ptunnel.jar-nogui-e \"genkeys myWebPrivKey.dat myWebPubKey.dat\" </ code> (tot pe o singură linie)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:78 msgid "" "If you used different filenames or port number earlier on, change these " "accordingly" -msgstr "" -"Dacă aÈ›i utilizat diferite nume de fiÈ™iere sau număre de port mai " -"devreme, schimba aceste în consecință" +msgstr "Dacă aÈ›i utilizat diferite nume de fiÈ™iere sau număre de port mai devreme, schimba aceste în consecință" #: i2p2www/pages/site/misc/i2ptunnel-services.html:81 msgid "" "Windows users, remember to replace apostrophes with double quotes. Thus: " "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code>" -msgstr "" -"Utilizatorii de Windows, tineti minte sa înlocuiti apostroful cu " -"ghilimele duble. Astfel: <code> java-jar lib/i2ptunnel.jar-nogui-e " -"\"localhost server de 10880 myWebPrivKey.dat\" </ code>" +msgstr "Utilizatorii de Windows, tineti minte sa înlocuiti apostroful cu ghilimele duble. Astfel: <code> java-jar lib/i2ptunnel.jar-nogui-e \"localhost server de 10880 myWebPrivKey.dat\" </ code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." -msgstr "" -"ÃŽn câteva secunde, \"tunelul\" ar trebui să fie acum activ, È™i clienÈ›i la" -" distanță ar trebui să ajungă la server-ul dvs. în mod anonim. " -"AmintiÈ›i-vă pentru a permite router-ul \"sa se incalzeasca\" înainte de a" -" deschide pentru clienÈ›i ." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." +msgstr "ÃŽn câteva secunde, \"tunelul\" ar trebui să fie acum activ, È™i clienÈ›i la distanță ar trebui să ajungă la server-ul dvs. în mod anonim. AmintiÈ›i-vă pentru a permite router-ul \"sa se incalzeasca\" înainte de a deschide pentru clienÈ›i ." #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 msgid "4 - Update Your hosts.txt File " @@ -477,31 +333,21 @@ msgid "" "hosts.txt file, so I2P can translate the simple URL you place in the " "browser's address bar into the full public key text needed to find your " "server." -msgstr "" -"Pentru a testa un server propriu la nivel local, va trebui să creaÈ›i o " -"intrare în fiÈ™ierul hosts.txt, astfel încât I2P poate traduce URL-ul " -"simplu plasaÈ›i în bara de adresa a browser-ului cheie publică necesara " -"pentru a găsi server." +msgstr "Pentru a testa un server propriu la nivel local, va trebui să creaÈ›i o intrare în fiÈ™ierul hosts.txt, astfel încât I2P poate traduce URL-ul simplu plasaÈ›i în bara de adresa a browser-ului cheie publică necesara pentru a găsi server." #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" -msgstr "" -"Editati hosts.txt dvs., È™i adăugaÈ›i linia myserver.i2p = blahblahblah, " -"unde myserver.i2p este un \"domeniu\" I2P doriÈ›i să se asocieze cu site-" -"ul dvs., È™i blahblahblah este textul cheii publice base64 ce l-aÈ›i creat " -"mai devreme în fiÈ™ier myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" +msgstr "Editati hosts.txt dvs., È™i adăugaÈ›i linia myserver.i2p = blahblahblah, unde myserver.i2p este un \"domeniu\" I2P doriÈ›i să se asocieze cu site-ul dvs., È™i blahblahblah este textul cheii publice base64 ce l-aÈ›i creat mai devreme în fiÈ™ier myWebPubKey.txt" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 msgid "" "With this in place, you and others can reach your server with the simple " "domain name myserver.i2p in the browser's address bar." -msgstr "" -"ÃŽn acest loc, dvs. si altii pot ajunge la server-ul dvs. cu un simplu " -"nume de domeniu myserver.i2p în bara de adrese a browser-ului." +msgstr "ÃŽn acest loc, dvs. si altii pot ajunge la server-ul dvs. cu un simplu nume de domeniu myserver.i2p în bara de adrese a browser-ului." #: i2p2www/pages/site/misc/i2ptunnel-services.html:102 msgid "5 - Surf Your Site Within I2P" @@ -512,11 +358,7 @@ msgid "" "Using your secondary browser - the one you earlier configured to use " "localhost:4444 as a proxy - point this browser to the address <a " "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" -msgstr "" -"Folosind browser-ul secundar - configurat mai devreme pentru a utiliza " -"localhost: 4444 ca un proxy - punct acest browser pentru a adresa <a " -"href=\"http://myserver.i2p\" target=\"_blank\"> http://myserver. I2P </ " -"a>" +msgstr "Folosind browser-ul secundar - configurat mai devreme pentru a utiliza localhost: 4444 ca un proxy - punct acest browser pentru a adresa <a href=\"http://myserver.i2p\" target=\"_blank\"> http://myserver. I2P </ a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:107 msgid "You should see the main page of your webserver come up." @@ -532,62 +374,43 @@ msgstr "Avem acum să se gândească dincolo de doar servere de web." #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." -msgstr "" -"Pe măsură ce creste integritate în I2P È™i a obÈ›ine mai mult de un " -"\"simt\" pentru el, veÈ›i dori să folositi tot felul de servere si " -"clienti." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." +msgstr "Pe măsură ce creste integritate în I2P È™i a obÈ›ine mai mult de un \"simt\" pentru el, veÈ›i dori să folositi tot felul de servere si clienti." #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"FrumuseÈ›ea I2P este că permite clienÈ›ilor de internet standard È™i servere" -" pentru cele mai multe protocoale să fie transparent \"tunel\" prin " -"intermediul reÈ›elei anonim." +msgstr "FrumuseÈ›ea I2P este că permite clienÈ›ilor de internet standard È™i servere pentru cele mai multe protocoale să fie transparent \"tunel\" prin intermediul reÈ›elei anonim." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." -msgstr "" -"PuteÈ›i rula de servere mail / clienti, servere de nume / clienti, servere" -" de noutati / clienti - aproape orice, la toate - poate chiar FTP în " -"modul pasiv." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." +msgstr "PuteÈ›i rula de servere mail / clienti, servere de nume / clienti, servere de noutati / clienti - aproape orice, la toate - poate chiar FTP în modul pasiv." #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." -msgstr "" -"Acum, vom crea un tunel client. Acest lucru este ca tunelul de server pe " -"care l-am creat mai devreme, dar funcÈ›ionează în sens invers. Se ascultă " -"la un port de pe computerul local, clientul dvs. local se conectează la " -"acest port, conexiunea este transmisă prin I2P la serviciul de la " -"celălalt capăt." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." +msgstr "Acum, vom crea un tunel client. Acest lucru este ca tunelul de server pe care l-am creat mai devreme, dar funcÈ›ionează în sens invers. Se ascultă la un port de pe computerul local, clientul dvs. local se conectează la acest port, conexiunea este transmisă prin I2P la serviciul de la celălalt capăt." #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." -msgstr "" -"Pentru a deschide tunelul client pentru server-ul dvs., tastaÈ›i comanda " -"<code> java-jar lib/i2ptunnel.jar-nogui-e \"config localhost 7654\"-e " -"\"client 10888 textofbase64key\" </ code> (tot intr-o singură linie)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." +msgstr "Pentru a deschide tunelul client pentru server-ul dvs., tastaÈ›i comanda <code> java-jar lib/i2ptunnel.jar-nogui-e \"config localhost 7654\"-e \"client 10888 textofbase64key\" </ code> (tot intr-o singură linie)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." -msgstr "" -"Port 10888 este arbitrar - trebuie doar să fie altceva decât portul fizic" -" pe care il asculta server-ul dvs.." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." +msgstr "Port 10888 este arbitrar - trebuie doar să fie altceva decât portul fizic pe care il asculta server-ul dvs.." #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 msgid "" @@ -595,53 +418,34 @@ msgid "" "myWebPubKey.txt, reproduced fully on one line (alternately, instead of " "textofbase64key, you can specify the name from your hosts.txt - e.g. " "myserver.i2p)" -msgstr "" -"textofbase64key este pur È™i simplu conÈ›inutul fiÈ™ier cheie public " -"myWebPubKey.txt, scrisa pe o singură linie (alternativ, în loc de " -"textofbase64key, puteÈ›i specifica numele de hosts.txt dvs. - de exemplu " -"myserver.i2p)" +msgstr "textofbase64key este pur È™i simplu conÈ›inutul fiÈ™ier cheie public myWebPubKey.txt, scrisa pe o singură linie (alternativ, în loc de textofbase64key, puteÈ›i specifica numele de hosts.txt dvs. - de exemplu myserver.i2p)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:138 msgid "" "Within a minute or two of launching this command, the client tunnel from " "your local machine into I2P will be open and ready for use." -msgstr "" -"ÃŽntr-un minut sau două dupa lansarea acestei comenzi, tunelul de client " -"de la computerul local în I2P va fi deschis È™i gata de utilizare." +msgstr "ÃŽntr-un minut sau două dupa lansarea acestei comenzi, tunelul de client de la computerul local în I2P va fi deschis È™i gata de utilizare." #: i2p2www/pages/site/misc/i2ptunnel-services.html:141 msgid "" "Point your regular web browser (ie, not the one you configured to use " "localhost:4444), and point it to <a href=\"http://localhost:10888\" " "target=\"_blank\">http://localhost:10888</a>" -msgstr "" -"Punctul de browser-ul web regulat (de exemplu, nu cel pe care l-ati " -"configurat pentru a utiliza localhost: 4444), È™i punctul în care să <a " -"href=\"http://localhost:10888\" target=\"_blank\"> http://localhost:10888" -" </ a>" +msgstr "Punctul de browser-ul web regulat (de exemplu, nu cel pe care l-ati configurat pentru a utiliza localhost: 4444), È™i punctul în care să <a href=\"http://localhost:10888\" target=\"_blank\"> http://localhost:10888 </ a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:144 msgid "" "Verify that the main page of your server eventually comes up in your " "browser." -msgstr "" -"AsiguraÈ›i-vă că pagina principală a serverului dvs. în cele din urmă vine" -" în browser-ul dumneavoastră." +msgstr "AsiguraÈ›i-vă că pagina principală a serverului dvs. în cele din urmă vine în browser-ul dumneavoastră." #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." -msgstr "" -"PuteÈ›i utiliza aceeaÈ™i procedură pentru folosirea orice programului " -"client local, pentru a accesa un server de la distanță I2P - ajunge doar " -"cheia publică base64 (denumit cheie destinaÈ›ie) din serverul de la " -"distanță, alegeÈ›i un port local pentru a se conecta la serverul de la " -"distanță, deschideÈ›i tunel, È™i doar conecta cu clientul dvs. pentru inima" -" ta de conÈ›inut." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." +msgstr "PuteÈ›i utiliza aceeaÈ™i procedură pentru folosirea orice programului client local, pentru a accesa un server de la distanță I2P - ajunge doar cheia publică base64 (denumit cheie destinaÈ›ie) din serverul de la distanță, alegeÈ›i un port local pentru a se conecta la serverul de la distanță, deschideÈ›i tunel, È™i doar conecta cu clientul dvs. pentru inima ta de conÈ›inut." #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 msgid "7 - Share your server details with others" @@ -651,45 +455,26 @@ msgstr "7 - ÃŽmpărtășiÈ›i detaliile de server cu alÈ›ii" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." -msgstr "" -"Folosind un mediu anonim (de exemplu, unul dintre serverele IRC I2P sau " -"wiki ugha), posta numele dvs. de domeniu (de exemplu, <a " -"href=\"http://www.mynick.i2p\" target=\"_blank\"> www.mynick.i2p</ a>, " -"precum È™i cheia destinaÈ›ie. AlÈ›ii vor putea apoi să ajungă la server-ul " -"dvs. de la distanță, fără ca nici unul dintre va pune în pericol " -"anonimatul." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." +msgstr "Folosind un mediu anonim (de exemplu, unul dintre serverele IRC I2P sau wiki ugha), posta numele dvs. de domeniu (de exemplu, <a href=\"http://www.mynick.i2p\" target=\"_blank\"> www.mynick.i2p</ a>, precum È™i cheia destinaÈ›ie. AlÈ›ii vor putea apoi să ajungă la server-ul dvs. de la distanță, fără ca nici unul dintre va pune în pericol anonimatul." #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." -msgstr "" -"Retineti, poti sa te duci la ceea ce este pe I2P È™i pentru a găsi cele " -"mai recente cheile publice legate de URL-ul lor. Tu ar trebui să postezi," -" de asemenea, cheie publică proprie È™i URL-ul lor. Cu toate acestea, veÈ›i" -" dori să faceÈ›i acest lucru anonim, desigur. Drupal.i2p.net este în " -"prezent, scris, accesibil numai de pe net. Deci, pentru a accesa WWW " -"exterior anonim din interiorul I2P, veÈ›i avea nevoie pentru a porni " -"script-ul numit startSquid. Fă-o la fel cum au făcut alte script-uri. " -"Reconfigurati browser-ul dvs. să proxezi pe localhost: 5555, astfel cum " -"sunt definite în script, iar în cazul în care script-ul a generat cheile," -" puteÈ›i accesa proxy squid. Pune orice URL-ul WWW (cum ar fi Google sau " -"site-ul I2P) în bara de adrese a browser-ului dvs. È™i veti avea navigarea" -" pe World Wide Web anonim. Acum puteÈ›i posta în siguranță cheia dvs. " -"publică, È™i nimeni nu poate detecta adresa IP." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." +msgstr "Retineti, poti sa te duci la ceea ce este pe I2P È™i pentru a găsi cele mai recente cheile publice legate de URL-ul lor. Tu ar trebui să postezi, de asemenea, cheie publică proprie È™i URL-ul lor. Cu toate acestea, veÈ›i dori să faceÈ›i acest lucru anonim, desigur. Drupal.i2p.net este în prezent, scris, accesibil numai de pe net. Deci, pentru a accesa WWW exterior anonim din interiorul I2P, veÈ›i avea nevoie pentru a porni script-ul numit startSquid. Fă-o la fel cum au făcut alte script-uri. Reconfigurati browser-ul dvs. să proxezi pe localhost: 5555, astfel cum sunt definite în script, iar în cazul în care script-ul a generat cheile, puteÈ›i accesa proxy squid. Pune orice URL-ul WWW (cum ar fi Google sau site-ul I2P) în bara de adrese a browser-ului dvs. È™i veti avea navigarea pe World Wide Web anonim. Acum puteÈ›i posta în siguranță cheia dvs. publică, È™i nimeni nu poate detecta adresa IP." #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense" @@ -697,12 +482,9 @@ msgstr "8 - scrie unele script-uri să se ocupe de toate aceste prostii dezonora #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." -msgstr "" -"Aceasta ar conduce majoritatea oamenilor nebun, trecând prin toate aceste" -" etape de fiecare dată când unul stabileÈ™te un server I2P, È™i / sau " -"implementează un client." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." +msgstr "Aceasta ar conduce majoritatea oamenilor nebun, trecând prin toate aceste etape de fiecare dată când unul stabileÈ™te un server I2P, È™i / sau implementează un client." #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 msgid "" @@ -710,47 +492,29 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." -msgstr "" -"Aum site-ul <a href=\"http://www.freenet.org.nz/i2p/\" " -"target=\"_blank\"> http://www.freenet.org.nz/i2p/ </ a> are un script " -"numit setupServer.py care automatizează toate prostiile astea într-o " -"singură linie de comandă simplă. Dar eu respect gusturile oamenilor în " -"interfeÈ›e de utilizator diferite, È™i încercarea de a scrie ceva care " -"satisface nevoile tuturor, de obicei, duce la ceva atât de complex, care " -"se transformă în ceva teribil." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." +msgstr "Aum site-ul <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\"> http://www.freenet.org.nz/i2p/ </ a> are un script numit setupServer.py care automatizează toate prostiile astea într-o singură linie de comandă simplă. Dar eu respect gusturile oamenilor în interfeÈ›e de utilizator diferite, È™i încercarea de a scrie ceva care satisface nevoile tuturor, de obicei, duce la ceva atât de complex, care se transformă în ceva teribil." #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 msgid "" "So please feel free to use and/or customize setupServer.py to taste, or " "write your own in Python or another language." -msgstr "" -"Deci, vă rugăm să nu ezitaÈ›i să folositi È™i/sau personalizati " -"setupServer.py la gust, sau scrieti script propriu în Python sau intr-o " -"altă limbă." +msgstr "Deci, vă rugăm să nu ezitaÈ›i să folositi È™i/sau personalizati setupServer.py la gust, sau scrieti script propriu în Python sau intr-o altă limbă." #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." -msgstr "" -"De asemenea, poate doriÈ›i să scrieti un script care se ocupă de pornire a" -" Router-ului I2P, eepProxy, plus toate tunelurile pe care le folosiÈ›i. " -"Am un astfel de script numit startEverything.sh, care va fi lansat la " -"pornirea sistemului. (AsiguraÈ›i-vă că pentru a căuta site-ul pentru " -"script-uri È™ablon pentru a automatiza comenzile I2P. Dacă aÈ™ crea o " -"pagină pentru unul, voi încerca să retin ca să-l leg aici." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." +msgstr "De asemenea, poate doriÈ›i să scrieti un script care se ocupă de pornire a Router-ului I2P, eepProxy, plus toate tunelurile pe care le folosiÈ›i. Am un astfel de script numit startEverything.sh, care va fi lansat la pornirea sistemului. (AsiguraÈ›i-vă că pentru a căuta site-ul pentru script-uri È™ablon pentru a automatiza comenzile I2P. Dacă aÈ™ crea o pagină pentru unul, voi încerca să retin ca să-l leg aici." #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." -msgstr "" -"ExerciÈ›iu pentru utilizatorii de Windows - transcrieti setupServer.py " -"într-un fiÈ™ier BAT MS-DOS.." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgstr "ExerciÈ›iu pentru utilizatorii de Windows - transcrieti setupServer.py într-un fiÈ™ier BAT MS-DOS.." #: i2p2www/pages/site/misc/invisiblenet.html:2 msgid "Old Documents" @@ -758,19 +522,12 @@ msgstr "Documente vechi" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." -msgstr "" -"Urmind listă de documente iniÈ›iale pe www.invisiblenet.net/i2p/ È™i \n" -"salvate la \n" -"<a href=\"http://www.archive.org/\"> Wayback Masini </a>. \n" -"Ele sunt destul de datat È™i pot sau nu pot fi corecte. \n" -"Cu toate acestea, I2CP È™i I2NP documente, au unele informaÈ›ii utile." +"However, the I2CP and I2NP documents in particular have some good information." +msgstr "Urmind listă de documente iniÈ›iale pe www.invisiblenet.net/i2p/ È™i \nsalvate la \n<a href=\"http://www.archive.org/\"> Wayback Masini </a>. \nEle sunt destul de datat È™i pot sau nu pot fi corecte. \nCu toate acestea, I2CP È™i I2NP documente, au unele informaÈ›ii utile." #: i2p2www/pages/site/misc/jbigi.html:3 msgid "August 2011" @@ -782,15 +539,10 @@ msgstr "Prezentare generală" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." -msgstr "" -"Folosind JNI (Java Native Interface), un pic de cod C (datorită ugha!), " -"Un pic \n" -"lucru manual È™i o bucată de gumă de mestecat si le-am făcut mai multe \n" -"operaÈ›iuni criptografice un pic mai repede." +msgstr "Folosind JNI (Java Native Interface), un pic de cod C (datorită ugha!), Un pic \nlucru manual È™i o bucată de gumă de mestecat si le-am făcut mai multe \noperaÈ›iuni criptografice un pic mai repede." #: i2p2www/pages/site/misc/jbigi.html:13 #, python-format @@ -801,45 +553,21 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." -msgstr "" -"Accelerare vine de la bibliotecă super-rapid \n" -"<a href=\"%(gmplib)s\"> GNU MP Bignum (libgmp) </ a>. \n" -"Noi folosim o singură funcÈ›ie de libgmp - \n" -"<a href=\"%(func)s\"> mpz_powm () </ a> \n" -"ca un înlocuitor pentru \n" -"<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>." -" \n" -"Ca modPow () este o porÈ›iune de calcul semnificativă a multor operaÈ›iuni " -"criptografice, acest lucru este deosebit de benefic." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." +msgstr "Accelerare vine de la bibliotecă super-rapid \n<a href=\"%(gmplib)s\"> GNU MP Bignum (libgmp) </ a>. \nNoi folosim o singură funcÈ›ie de libgmp - \n<a href=\"%(func)s\"> mpz_powm () </ a> \nca un înlocuitor pentru \n<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>. \nCa modPow () este o porÈ›iune de calcul semnificativă a multor operaÈ›iuni criptografice, acest lucru este deosebit de benefic." #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n" "is used." -msgstr "" -"Instalarea standarda I2P include aproximativ 20 de versiuni ale " -"bibliotecii pentru diferite platforme, \n" -"fiecare aproximativ 50KB, în interiorul fiÈ™ierul jbigi.jar. \n" -"IniÈ›ializarea bibliotecii JBigI, inclusiv identificarea CPU, selecÈ›ie, È™i" -" extracÈ›ie \n" -"modulului de încărcare corecta, este manipulat de către \n" -"<a href=\"%(nativebigint)s\">clasă NativeBigInteger </ a>. \n" -"Dacă modul nu este disponibil pentru platforma actuală, este utilizat " -"standardul \n" -"<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a>" -" \n" -"." +msgstr "Instalarea standarda I2P include aproximativ 20 de versiuni ale bibliotecii pentru diferite platforme, \nfiecare aproximativ 50KB, în interiorul fiÈ™ierul jbigi.jar. \nIniÈ›ializarea bibliotecii JBigI, inclusiv identificarea CPU, selecÈ›ie, È™i extracÈ›ie \nmodulului de încărcare corecta, este manipulat de către \n<a href=\"%(nativebigint)s\">clasă NativeBigInteger </ a>. \nDacă modul nu este disponibil pentru platforma actuală, este utilizat standardul \n<a href=\"%(bigint)s\"> Java Math bibliotecii BigInteger modPow () </ a> \n." #: i2p2www/pages/site/misc/jbigi.html:38 msgid "Rebuilding and Testing JBigI" @@ -847,12 +575,9 @@ msgstr "Reconstruirea È™i testare JBigI" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." -msgstr "" -"ÃŽn urma sunt instructiunile pentru a construirea È™i testarea " -"performanÈ›elor bibliotecii jbigi pentru propria platforma." +msgstr "ÃŽn urma sunt instructiunile pentru a construirea È™i testarea performanÈ›elor bibliotecii jbigi pentru propria platforma." #: i2p2www/pages/site/misc/jbigi.html:42 msgid "Requirements" @@ -861,55 +586,28 @@ msgstr "CerinÈ›e" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." -msgstr "" -"Aceasta funcÈ›ionează pe Linux, È™i cu câteva modificări în build.sh, " -"probabil, de asemenea, cu privire la \n" -"alte platforme. A fost, de asemenea, raportat lucru pe platforma FreeBSD." -" Pe Kaffee \n" -"accelerare este foarte mica, deoarece foloseste deja BitInteger nativ pe " -"plan intern. \n" -"Blackdown pare a provoca erori ciudate. Daca aveÈ›i de gând să faci \n" -"compilare, aveÈ›i nevoie de JDK, JRE nu va funcÈ›iona." +msgstr "Aceasta funcÈ›ionează pe Linux, È™i cu câteva modificări în build.sh, probabil, de asemenea, cu privire la \nalte platforme. A fost, de asemenea, raportat lucru pe platforma FreeBSD. Pe Kaffee \naccelerare este foarte mica, deoarece foloseste deja BitInteger nativ pe plan intern. \nBlackdown pare a provoca erori ciudate. Daca aveÈ›i de gând să faci \ncompilare, aveÈ›i nevoie de JDK, JRE nu va funcÈ›iona." #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " -msgstr "" -"Codul necesar este disponibil în baza de date monoton È™i cele mai recente" -" pachete cu sursa." +"The required code is available in monotone database and the latest source " +"tarball. " +msgstr "Codul necesar este disponibil în baza de date monoton È™i cele mai recente pachete cu sursa." #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." -msgstr "" -"Biblioteca GNU MP Bignum (libgmp) trebuie să fie instalata, în cazul în " -"care acesta nu este \n" -"incluse în OS / distribuÈ›ie sau instalat deja, acesta poate fi primit de " -"la \n" -"<a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/#DOWNLOAD </ " -"a>. Chiar dacă \n" -"l-au instalat deja ca binar, ar putea fi încă în valoare de o încercare " -"de a compila \n" -"GMP-te, deoarece atunci se va putea folosi instrucÈ›iunile specifice ale \n" -"procesorul. Cel mai recent GMP poate, de asemenea, \n" -"fi utilizate în locul GMP 5.0.2, dar acesta nu a fost testat de către noi." +msgstr "Biblioteca GNU MP Bignum (libgmp) trebuie să fie instalata, în cazul în care acesta nu este \nincluse în OS / distribuÈ›ie sau instalat deja, acesta poate fi primit de la \n<a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/#DOWNLOAD </ a>. Chiar dacă \nl-au instalat deja ca binar, ar putea fi încă în valoare de o încercare de a compila \nGMP-te, deoarece atunci se va putea folosi instrucÈ›iunile specifice ale \nprocesorul. Cel mai recent GMP poate, de asemenea, \nfi utilizate în locul GMP 5.0.2, dar acesta nu a fost testat de către noi." #: i2p2www/pages/site/misc/jbigi.html:61 msgid "Step-by-step instructions" @@ -917,14 +615,9 @@ msgstr "InstrucÈ›iuni Pas-cu-pas" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" -msgstr "" -"Uită-te la <a href=\"http://localhost:7657/logs.jsp\"> mediu de pornire " -"pe pagina logs.jsp </ a>. \n" -"Nu ar trebui să fie una dintre cele două mesaje de stare pentru JBigI - " -"fie" +msgstr "Uită-te la <a href=\"http://localhost:7657/logs.jsp\"> mediu de pornire pe pagina logs.jsp </ a>. \nNu ar trebui să fie una dintre cele două mesaje de stare pentru JBigI - fie" #: i2p2www/pages/site/misc/jbigi.html:66 msgid "Locally optimized native BigInteger loaded from the library path" @@ -946,64 +639,30 @@ msgid "" "may require you to compile your own library.\n" "If the BigInteger library was loaded, do at least the next step to see\n" "what your performance is." -msgstr "" -"Dacă biblioteca nativa BitInteger nu a fost încărcată, cu siguranta ai " -"nevoie pentru a \n" -"compila propria biblioteca. \n" -"Anumite platforme, cum ar fi OS X, OpenSolaris, È™i sistemele pe 64 de " -"biÈ›i, \n" -"vă pot solicita să compilaÈ›i propria biblioteca. \n" -"Dacă biblioteca BigInteger a fost încărcata, faceti cel puÈ›in următorul " -"pas pentru a vedea \n" -"care performanÈ›a este." +msgstr "Dacă biblioteca nativa BitInteger nu a fost încărcată, cu siguranta ai nevoie pentru a \ncompila propria biblioteca. \nAnumite platforme, cum ar fi OS X, OpenSolaris, È™i sistemele pe 64 de biÈ›i, \nvă pot solicita să compilaÈ›i propria biblioteca. \nDacă biblioteca BigInteger a fost încărcata, faceti cel puÈ›in următorul pas pentru a vedea \ncare performanÈ›a este." #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." -msgstr "" -"Uită-te la <a href=\"http://localhost:7657/stats.jsp\"> " -"http://localhost:7657/stats.jsp </ a> \n" -"pentru a vedea valorile medii de viață pentru <code> " -"crypto.elGamal.decrypt </ code> È™i \n" -"<code> crypto.elGamal.encrypt </ code> . Numerele sunt momente în " -"milisecunde. CopiaÈ›i aceste undeva astfel încât să puteÈ›i compara \n" -" mai târziu. \n" -"Media de reÈ›ea de timpul criptarii este de aproximativ 20ms. \n" -"Dacă timpul dvs. de criptare este mai mic de 50ms pentru un procesor " -"relativ nou , sau mai puÈ›in de 100ms \n" -"pentru un procesor mai vechi, È™i biblioteca BigInteger nativ este " -"incarcata, valorile sunt bune ." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." +msgstr "Uită-te la <a href=\"http://localhost:7657/stats.jsp\"> http://localhost:7657/stats.jsp </ a> \npentru a vedea valorile medii de viață pentru <code> crypto.elGamal.decrypt </ code> È™i \n<code> crypto.elGamal.encrypt </ code> . Numerele sunt momente în milisecunde. CopiaÈ›i aceste undeva astfel încât să puteÈ›i compara \n mai târziu. \nMedia de reÈ›ea de timpul criptarii este de aproximativ 20ms. \nDacă timpul dvs. de criptare este mai mic de 50ms pentru un procesor relativ nou , sau mai puÈ›in de 100ms \npentru un procesor mai vechi, È™i biblioteca BigInteger nativ este incarcata, valorile sunt bune ." #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" -msgstr "" -"ObÈ›ineÈ›i cele mai recente cod-sursă eliberat de I2P de la \n" -"<a href=\"%(downloads)s\"> pagina de descărcare </ a>, sau de a lua sursa" -" de ultimă oră \n" -"din mtn.i2p2.de bazei de data monoton" +msgstr "ObÈ›ineÈ›i cele mai recente cod-sursă eliberat de I2P de la \n<a href=\"%(downloads)s\"> pagina de descărcare </ a>, sau de a lua sursa de ultimă oră \ndin mtn.i2p2.de bazei de data monoton" #: i2p2www/pages/site/misc/jbigi.html:92 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>" -msgstr "" -"ÃŽn interiorul copacului sursă schimbati directorul : <code> core / c / " -"jbigi </ code>" +msgstr "ÃŽn interiorul copacului sursă schimbati directorul : <code> core / c / jbigi </ code>" #: i2p2www/pages/site/misc/jbigi.html:93 msgid "" @@ -1011,65 +670,30 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." -msgstr "" -"CitiÈ›i fiÈ™ierul README. \n" -"Dacă aveÈ›i un / usr / lib / libgmp.so fiÈ™ier, nu trebuie să descărcaÈ›i " -"GMP. \n" -"UtilizaÈ›i argumentul \"dinamic\", a build.sh. \n" -"ÃŽn caz contrar, trebuie să descărcaÈ›i GMP versiunea 5.0.2 de la \n" -"de la <a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/ # " -"DOWNLOAD </ a>, salvându-l ca GMP-5.0.2.tar.bz2. \n" -"Dacă vă decideÈ›i să utilizaÈ›i o versiune mai nouă, schimba VER = linie în" -" <code> core / c / jbigi / build.sh </ code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." +msgstr "CitiÈ›i fiÈ™ierul README. \nDacă aveÈ›i un / usr / lib / libgmp.so fiÈ™ier, nu trebuie să descărcaÈ›i GMP. \nUtilizaÈ›i argumentul \"dinamic\", a build.sh. \nÃŽn caz contrar, trebuie să descărcaÈ›i GMP versiunea 5.0.2 de la \nde la <a href=\"http://gmplib.org/#DOWNLOAD\"> http://gmplib.org/ # DOWNLOAD </ a>, salvându-l ca GMP-5.0.2.tar.bz2. \nDacă vă decideÈ›i să utilizaÈ›i o versiune mai nouă, schimba VER = linie în <code> core / c / jbigi / build.sh </ code>." #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." -msgstr "" -"Aruncati o privire la <code> build.sh </ code>, în cazul în care " -"variabilă de mediu <code> JAVA_HOME </ code> \n" -" este setata È™i utilizaÈ›i Linux, atunci s-ar putea funcÈ›iona. \n" -"Schimba altfel setările. AmintiÈ›i-vă, ca aveÈ›i nevoie de Java SDK " -"instalat." +msgstr "Aruncati o privire la <code> build.sh </ code>, în cazul în care variabilă de mediu <code> JAVA_HOME </ code> \n este setata È™i utilizaÈ›i Linux, atunci s-ar putea funcÈ›iona. \nSchimba altfel setările. AmintiÈ›i-vă, ca aveÈ›i nevoie de Java SDK instalat." #: i2p2www/pages/site/misc/jbigi.html:106 msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." -msgstr "" -"RulaÈ›i <code> build.sh </ code> (dacă aÈ›i descărcat GMP) sau \n" -"<code> build.sh dinamic </ code> (dacă aveÈ›i / usr / lib / libgmp.so). " -"<br/> Poate construirea a aruncat unele erori de lipsă jni.h È™i fiÈ™iere " -"jni_md.h. Copiati aceste fiÈ™iere din directoriul de instalare a java dvs." -" / c / jbigi / jbigi / include / directory, \n" -"sau reparati $JAVA_HOME. <br> \n" -"PuteÈ›i rula <code> build.sh </ code> din <code>core / c / </ code> " -"director care va \n" -"construi toate biblioteci jbigi disponibile într-o jbigi.jar. </ br> \n" -"Un fiÈ™ier numit <code> libjbigi.so </ code> ar trebui să fie creat în " -"director curent. Dacă acest lucru nu se întâmplă È™i / sau veÈ›i obÈ›ine " -"erori, vă rugăm să raportati \n" -"ele." +msgstr "RulaÈ›i <code> build.sh </ code> (dacă aÈ›i descărcat GMP) sau \n<code> build.sh dinamic </ code> (dacă aveÈ›i / usr / lib / libgmp.so). <br/> Poate construirea a aruncat unele erori de lipsă jni.h È™i fiÈ™iere jni_md.h. Copiati aceste fiÈ™iere din directoriul de instalare a java dvs. / c / jbigi / jbigi / include / directory, \nsau reparati $JAVA_HOME. <br> \nPuteÈ›i rula <code> build.sh </ code> din <code>core / c / </ code> director care va \nconstrui toate biblioteci jbigi disponibile într-o jbigi.jar. </ br> \nUn fiÈ™ier numit <code> libjbigi.so </ code> ar trebui să fie creat în director curent. Dacă acest lucru nu se întâmplă È™i / sau veÈ›i obÈ›ine erori, vă rugăm să raportati \nele." #: i2p2www/pages/site/misc/jbigi.html:118 msgid "" @@ -1077,19 +701,13 @@ msgid "" "the speed test.\n" "Read the final lines of the speed test's output for some additional\n" "info, it will be something like this:" -msgstr "" -"UrmaÈ›i instrucÈ›iunile din bază / c / README pentru a instala biblioteca " -"È™i a trece testul de viteză. \n" -"CitiÈ›i liniile finale ale rezultatului testului de viteză pentru unele " -"info suplimentare, acesta va fi ceva de genul:" +msgstr "UrmaÈ›i instrucÈ›iunile din bază / c / README pentru a instala biblioteca È™i a trece testul de viteză. \nCitiÈ›i liniile finale ale rezultatului testului de viteză pentru unele info suplimentare, acesta va fi ceva de genul:" #: i2p2www/pages/site/misc/jbigi.html:128 msgid "" "If the native is indeed 5-7x faster (or more) then it looks all good. If " "not, please report." -msgstr "" -"ÃŽn cazul în care nativul este într-adevăr de 5-7x mai rapid (sau mai " -"mult), atunci se pare totul bine. Dacă nu, vă rugăm să raportaÈ›i." +msgstr "ÃŽn cazul în care nativul este într-adevăr de 5-7x mai rapid (sau mai mult), atunci se pare totul bine. Dacă nu, vă rugăm să raportaÈ›i." #: i2p2www/pages/site/misc/jbigi.html:129 msgid "Copy <code>libjbigi.so</code> to your i2p directory" @@ -1101,19 +719,10 @@ msgstr "ReporniÈ›i programele I2P." #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." -msgstr "" -"Pe <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -" <code>crypto.elGamal.decrypt</code> si " -"<code>crypto.elGamal.encrypt</code>\n" -"ar trebui să fie mult mai repede." +msgstr "Pe <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n <code>crypto.elGamal.decrypt</code> si <code>crypto.elGamal.encrypt</code>\nar trebui să fie mult mai repede." #: i2p2www/pages/site/misc/jrandom-awol.html:2 msgid "Jrandom's Announcement" @@ -1121,45 +730,28 @@ msgstr "Anunt Jrandom-lui" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"Următorul mesaj a fost primit la mijlocul lunii noiembrie 2007. Nu avem " -"nici o informaÈ›ie suplimentara \n" -"cu privire la statutul jrandom-lui." +msgstr "Următorul mesaj a fost primit la mijlocul lunii noiembrie 2007. Nu avem nici o informaÈ›ie suplimentara \ncu privire la statutul jrandom-lui." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" "and related subdomains." -msgstr "" -"Ulterior, într-un incident care nu au legătură, compania de găzduire " -"pentru \n" -"toate serverele *.i2p.net (cu excepÈ›ia forum.i2p.net) a suferit o pană " -"de curent \n" -"pe 13 ianuarie 2008, iar serverele i2p.net nu au revenit pe deplin la " -"serviciu. \n" -"Ca doar jrandom are acreditările necesare pentru a restabili serviciu, \n" -"È™i el nu a putut fi contactat, \n" -"ne-am mutat toate serviciile publice la <a href=\"%(site)s\"> www.i2p2.de" -" </ a> " +msgstr "Ulterior, într-un incident care nu au legătură, compania de găzduire pentru \ntoate serverele *.i2p.net (cu excepÈ›ia forum.i2p.net) a suferit o pană de curent \npe 13 ianuarie 2008, iar serverele i2p.net nu au revenit pe deplin la serviciu. \nCa doar jrandom are acreditările necesare pentru a restabili serviciu, \nÈ™i el nu a putut fi contactat, \nne-am mutat toate serviciile publice la <a href=\"%(site)s\"> www.i2p2.de </ a> " #: i2p2www/pages/site/misc/jrandom-awol.html:19 #, python-format msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"Aproximativ două luni mai târziu, din motive care nu au legatura, \n" -"forum.i2p.net a fost mutat la <a href=\"http://%(forum)s/\">%(forum)s</a>." +msgstr "Aproximativ două luni mai târziu, din motive care nu au legatura, \nforum.i2p.net a fost mutat la <a href=\"http://%(forum)s/\">%(forum)s</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -1169,65 +761,35 @@ msgstr "Instalarea manual Java Wrapper" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." -msgstr "" -"Pachetul de instalare pentru router <a href=\"%(downloads)s\"> I2P </a> " -"vine \n" -"cu un înveliÈ™ Java pentru cele mai comune arhitecturi. Dacă sistemul dvs." -" nu este \n" -"susÈ›inut de instalator nostru sau dacă doriÈ›i să actualizaÈ›i wrapper la " -"o \n" -"versiunea următoarele etape noi descriu instalarea manuală ambalajul" +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." +msgstr "Pachetul de instalare pentru router <a href=\"%(downloads)s\"> I2P </a> vine \ncu un înveliÈ™ Java pentru cele mai comune arhitecturi. Dacă sistemul dvs. nu este \nsusÈ›inut de instalator nostru sau dacă doriÈ›i să actualizaÈ›i wrapper la o \nversiunea următoarele etape noi descriu instalarea manuală ambalajul" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." -msgstr "" -"Verifica <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">" -" pagina de descărcare </ a> \n" -"pentru platforma dumneavoastră. Este listat platforma? Dacă da, sunteÈ›i" -" \n" -"norocos! DescărcaÈ›i cea mai recentă versiune a ediÈ›iei comunitar pentru " -"sistemul de operare È™i \n" -"CPU È™i treceti la <a href=\"#packaged\"> următorul pas </ a>." +msgstr "Verifica <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\"> pagina de descărcare </ a> \npentru platforma dumneavoastră. Este listat platforma? Dacă da, sunteÈ›i \nnorocos! DescărcaÈ›i cea mai recentă versiune a ediÈ›iei comunitar pentru sistemul de operare È™i \nCPU È™i treceti la <a href=\"#packaged\"> următorul pas </ a>." #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." -msgstr "" -"ÃŽn cazul în care platforma nu are un înveliÈ™ deja compilat disponibil, \n" -"poate veti fi capabil să-l compilaÈ›i singur. Dacă sunteÈ›i dispus treceti" -" \n" -"la <a href=\"#compiling\"> compilarea </ a> înveliÈ™ului pentru sistemul " -"dumneavoastră." +msgstr "ÃŽn cazul în care platforma nu are un înveliÈ™ deja compilat disponibil, \npoate veti fi capabil să-l compilaÈ›i singur. Dacă sunteÈ›i dispus treceti \nla <a href=\"#compiling\"> compilarea </ a> înveliÈ™ului pentru sistemul dumneavoastră." #: i2p2www/pages/site/misc/manual-wrapper.html:27 msgid "Using existing binaries" msgstr "Folosind binare existente" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." -msgstr "" -"ÃŽn paÈ™ii de mai jos, $ I2P înseamnă <em> locaÈ›ie I2P a fost instalat la " -"</ em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgstr "ÃŽn paÈ™ii de mai jos, $ I2P înseamnă <em> locaÈ›ie I2P a fost instalat la </ em>." #: i2p2www/pages/site/misc/manual-wrapper.html:36 #: i2p2www/pages/site/misc/manual-wrapper.html:64 @@ -1242,11 +804,9 @@ msgstr "<code> tail-f /tmp/wrapper.log </code> È™i căutaÈ›i orice probleme." #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." -msgstr "" -"Dacă acest lucru nu are efect, va trebui să utilizaÈ›i <code> runplain.sh " -"</ code> pentru a porni I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." +msgstr "Dacă acest lucru nu are efect, va trebui să utilizaÈ›i <code> runplain.sh </ code> pentru a porni I2P." #: i2p2www/pages/site/misc/manual-wrapper.html:43 msgid "Compiling from source" @@ -1254,23 +814,16 @@ msgstr "Compilarea de la sursă" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." -msgstr "" -"AceÈ™ti paÈ™i au lucrat pentru a compila wrapper pentru utilizare pe un " -"sistem mipsel ce se rulează Debian. PaÈ™ii <strong> vor </ strong> trebuie" -" să fie modificate pentru sistemul dumneavoastră." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." +msgstr "AceÈ™ti paÈ™i au lucrat pentru a compila wrapper pentru utilizare pe un sistem mipsel ce se rulează Debian. PaÈ™ii <strong> vor </ strong> trebuie să fie modificate pentru sistemul dumneavoastră." #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." -msgstr "" -"DescărcaÈ›i arhiva sursă pentru versiunea comunitatii de înveliÈ™ de la <a " -"href=\"http://wrapper.tanukisoftware.com/downloads\"> pagina de " -"descarcare a wrapper </ a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." +msgstr "DescărcaÈ›i arhiva sursă pentru versiunea comunitatii de înveliÈ™ de la <a href=\"http://wrapper.tanukisoftware.com/downloads\"> pagina de descarcare a wrapper </ a>." #: i2p2www/pages/site/misc/manual-wrapper.html:49 msgid "Extract the tarball" @@ -1278,19 +831,15 @@ msgstr "Extrage arhiva" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" -msgstr "" -"Setati variabile de mediu <code> ANT_HOME </ code> È™i <code> JAVA_HOME </" -" code>. De exemplu, în Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" +msgstr "Setati variabile de mediu <code> ANT_HOME </ code> È™i <code> JAVA_HOME </ code>. De exemplu, în Debian:" #: i2p2www/pages/site/misc/manual-wrapper.html:54 msgid "" "Since there isn't a Makefile for Mipsel, we'll make a copy of an already " "existing makefile:" -msgstr "" -"Daca nu există un Makefile pentru Mipsel, vom face o copie a unui " -"Makefile deja existent:" +msgstr "Daca nu există un Makefile pentru Mipsel, vom face o copie a unui Makefile deja existent:" #: i2p2www/pages/site/misc/manual-wrapper.html:56 msgid "Now we can attempt to compile the wrapper:" @@ -1298,9 +847,7 @@ msgstr "Acum putem încerca pentru a compila înveliÈ™:" #: i2p2www/pages/site/misc/manual-wrapper.html:57 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM" -msgstr "" -"folositi <code> ./build64.sh </ code>, dacă aveÈ›i un procesor pe 64 de " -"biÈ›i È™i JVM" +msgstr "folositi <code> ./build64.sh </ code>, dacă aveÈ›i un procesor pe 64 de biÈ›i È™i JVM" #: i2p2www/pages/site/misc/manual-wrapper.html:58 msgid "Copy the wrapper into its proper place:" @@ -1310,9 +857,7 @@ msgstr "CopiaÈ›i ambalajul în locul său:" msgid "" "Here's an outline and rationale for a minimal WWW proxy app for use over " "I2P." -msgstr "" -"Iată o schiță È™i justificarea pentru o WWW proxy app minime pentru " -"utilizarea cu I2P." +msgstr "Iată o schiță È™i justificarea pentru o WWW proxy app minime pentru utilizarea cu I2P." #: i2p2www/pages/site/misc/minwww.html:8 msgid "" @@ -1322,295 +867,116 @@ msgid "" "in the router (but later versions of the SocketLibrary will be able to\n" "use selective ACK and large window sizes, allowing more ACKs to be\n" "skipped)" -msgstr "" -"Functionarea HTTP peste I2P folosind I2PTunnel. ÃŽn cazul în care " -"SocketLibrary de bază \n" -"este afară, singura diferență semnificativă va fi \"wrapRequest\" È™i \n" -"'unwrapRequest \"va fi funcÈ›ional plasate în socketLibrary, nu \n" -"în router (dar mai târziu versiuni ale SocketLibrary va putea \n" -"utilizează ACK selective È™i ferestre de mari dimensiuni, care să permită " -"mai multe ACK-uri pentru a fi \n" -"ignorate)" +msgstr "Functionarea HTTP peste I2P folosind I2PTunnel. ÃŽn cazul în care SocketLibrary de bază \neste afară, singura diferență semnificativă va fi \"wrapRequest\" È™i \n'unwrapRequest \"va fi funcÈ›ional plasate în socketLibrary, nu \nîn router (dar mai târziu versiuni ale SocketLibrary va putea \nutilizează ACK selective È™i ferestre de mari dimensiuni, care să permită mai multe ACK-uri pentru a fi \nignorate)" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" -msgstr "" -"O formă optimizată, proiectat să se ocupe doar 128KB de [1] fiÈ™iere È™i " -"pagini, poate \n" -"funcÈ›ionează mult mai rapid:" +msgstr "O formă optimizată, proiectat să se ocupe doar 128KB de [1] fiÈ™iere È™i pagini, poate \nfuncÈ›ionează mult mai rapid:" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." -msgstr "" -"DiferenÈ›a de încărcare a reÈ›elei È™i de latență este semnificativ - acesta" -" este \n" -"în esență, o versiune UDP de HTTP. Pe web normal, nu putem într-adevăr " -"că, \n" -"deoarece cele mai multe cereri HTTP È™i răspunsuri sunt ordine de mărime " -"mai mari decât UDP \n" -"pachete sprijine funcÈ›ional, dar în I2P, mesajele pot fi mari. economiile" -" \n" -"pentru sarcina de reÈ›ea vine de la faptul că nu avem nevoie pentru a " -"trimite orice ACK \n" -"mesaje - mai degrabă decât folie / cererea desface mai devreme (ce " -"include un \n" -"DataMessage cu o DeliveryStatusMessage de a asigura livrarea garantat), \n" -"MinWWW ocupă proxy cu retransmite (dacă este necesar - în I2PTunnel de " -"astăzi, nu există \n" -"retransmite)." +msgstr "DiferenÈ›a de încărcare a reÈ›elei È™i de latență este semnificativ - acesta este \nîn esență, o versiune UDP de HTTP. Pe web normal, nu putem într-adevăr că, \ndeoarece cele mai multe cereri HTTP È™i răspunsuri sunt ordine de mărime mai mari decât UDP \npachete sprijine funcÈ›ional, dar în I2P, mesajele pot fi mari. economiile \npentru sarcina de reÈ›ea vine de la faptul că nu avem nevoie pentru a trimite orice ACK \nmesaje - mai degrabă decât folie / cererea desface mai devreme (ce include un \nDataMessage cu o DeliveryStatusMessage de a asigura livrarea garantat), \nMinWWW ocupă proxy cu retransmite (dacă este necesar - în I2PTunnel de astăzi, nu există \nretransmite)." #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." -msgstr "" -"Datele pe care proxy MinWWW È™i serverul trebuie să-È™i încheie este banal " -"- în cazul în care \n" -"proxy vrea să trimită \"GET /\", ea, adauga inaintea cu destinaÈ›ie I2P " -"trimiterea \n" -"cererea, urmate de o solicitare ID 4 octeÈ›i. Serverul MinWWW primeÈ™te " -"cele \n" -"cereri, contacte httpd adecvat, trimite cererea, aÈ™teaptă \n" -"răspuns, È™i trimite un răspuns la proxy MinWWW conÈ›ine răspunsul,\n" -"prefix cererea ID-ul original. Că răspunsul este preluat È™i a trecut " -"înapoi \n" -"la browser È™i conexiunea este închisă." +msgstr "Datele pe care proxy MinWWW È™i serverul trebuie să-È™i încheie este banal - în cazul în care \nproxy vrea să trimită \"GET /\", ea, adauga inaintea cu destinaÈ›ie I2P trimiterea \ncererea, urmate de o solicitare ID 4 octeÈ›i. Serverul MinWWW primeÈ™te cele \ncereri, contacte httpd adecvat, trimite cererea, aÈ™teaptă \nrăspuns, È™i trimite un răspuns la proxy MinWWW conÈ›ine răspunsul,\nprefix cererea ID-ul original. Că răspunsul este preluat È™i a trecut înapoi \nla browser È™i conexiunea este închisă." #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." -msgstr "" -"ÃŽn plus, proxy-ul MinWWW poate alege serverul MinWWW pentru folosirea din" -" \n" -"lista, trece printr-un round robin sau alt algoritm, astfel încât există" -" \n" -"mai multe outproxies fuzionate transparent. Lățimea de bandă necesară " -"pentru rularea \n" -"unului dintre aceste outproxies este, de asemenea, redusa foarte mult, " -"deoarece acesta se va ocupa doar 128KB \n" -"fiÈ™iere (aka nimeni nu e de gând să descărce filme porno, warez, etc)." +msgstr "ÃŽn plus, proxy-ul MinWWW poate alege serverul MinWWW pentru folosirea din \nlista, trece printr-un round robin sau alt algoritm, astfel încât există \nmai multe outproxies fuzionate transparent. Lățimea de bandă necesară pentru rularea \nunului dintre aceste outproxies este, de asemenea, redusa foarte mult, deoarece acesta se va ocupa doar 128KB \nfiÈ™iere (aka nimeni nu e de gând să descărce filme porno, warez, etc)." #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." -msgstr "" -"FuncÈ›ionalitatea /este/ limitata, dar 128KB de date este mult pentru o " -"singura cerere sau răspuns HTTP. Diagramele de mai sus sunt, de asemenea," -" nerealiste în sectorul hameiului lor - \n" -"ROUTERA într-adevăr nu va vorbi direct la ROUTERB. ROUTERA va trimite " -"fiecare \n" -"din mesaje prin două routere de ieÈ™ire suplimentare, apoi înaintat \n" -"două routere de intrare suplimentare ROUTERB, astfel încât decalajul nu " -"este semnificativ - \n" -"în timp ce cele de mai sus salvează numai 11 paÈ™i, 8 dintre aceste măsuri" -" trebuie să traverseze \n" -"întreaga cale tunel (4 + hamei la distanță de fiecare dată când tuneluri " -"sunt 2 hamei de la distanță \n" -"în fiecare întindere), lăsând MinWWW cu doar doua traversari complete " -"(una pentru \n" -"cerere, unul pentru răspunsul), în loc de 10." +msgstr "FuncÈ›ionalitatea /este/ limitata, dar 128KB de date este mult pentru o singura cerere sau răspuns HTTP. Diagramele de mai sus sunt, de asemenea, nerealiste în sectorul hameiului lor - \nROUTERA într-adevăr nu va vorbi direct la ROUTERB. ROUTERA va trimite fiecare \ndin mesaje prin două routere de ieÈ™ire suplimentare, apoi înaintat \ndouă routere de intrare suplimentare ROUTERB, astfel încât decalajul nu este semnificativ - \nîn timp ce cele de mai sus salvează numai 11 paÈ™i, 8 dintre aceste măsuri trebuie să traverseze \nîntreaga cale tunel (4 + hamei la distanță de fiecare dată când tuneluri sunt 2 hamei de la distanță \nîn fiecare întindere), lăsând MinWWW cu doar doua traversari complete (una pentru \ncerere, unul pentru răspunsul), în loc de 10." #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" -msgstr "" -"Punerea în aplicare a proxy MinWWW È™i serverului ar trebui să fie destul " -"de usoara - citit o HTTP \n" -"cerere complet din partea clientului (poate începe numai cu HTTP GET, " -"lăsând \n" -"POST HTTP pentru mai târziu), înfășuraÈ›i mesajul, È™i aÈ™teptaÈ›i răspunsul." -" serverul \n" -"la rândul său, pur È™i simplu are nevoie pentru a analiza cererea fie a " -"deschide un socket sau URL-ul, \n" -"trimiteti cererea, aÈ™teptaÈ›i răspunsul, È™i trimite-l înapoi prin " -"intermediul reÈ›elei. \n" -"Dacă cineva a fost să pună în aplicare acest lucru, ar fi bine :)" +msgstr "Punerea în aplicare a proxy MinWWW È™i serverului ar trebui să fie destul de usoara - citit o HTTP \ncerere complet din partea clientului (poate începe numai cu HTTP GET, lăsând \nPOST HTTP pentru mai târziu), înfășuraÈ›i mesajul, È™i aÈ™teptaÈ›i răspunsul. serverul \nla rândul său, pur È™i simplu are nevoie pentru a analiza cererea fie a deschide un socket sau URL-ul, \ntrimiteti cererea, aÈ™teptaÈ›i răspunsul, È™i trimite-l înapoi prin intermediul reÈ›elei. \nDacă cineva a fost să pună în aplicare acest lucru, ar fi bine :)" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" -msgstr "" -"[1] De ce fiÈ™iere 128KB? ÃŽn prezent, I2CP funcÈ›ional permite mesaje " -"dimensiune arbitrara \n" -", dar care va fi merge departe, deoarece aceasta implică memorie " -"excesiva \n" -" pe routere intermediare, sau detalii suplimentare de punere în aplicare " -". I2PTunnel este în prezent limitat la 128KB È™i nu a fost o povară,aÈ™a " -"că, probabil, ar putea fi crescută la 256KB când spec. I2CP va fi " -"actualizata)" +msgstr "[1] De ce fiÈ™iere 128KB? ÃŽn prezent, I2CP funcÈ›ional permite mesaje dimensiune arbitrara \n, dar care va fi merge departe, deoarece aceasta implică memorie excesiva \n pe routere intermediare, sau detalii suplimentare de punere în aplicare . I2PTunnel este în prezent limitat la 128KB È™i nu a fost o povară,aÈ™a că, probabil, ar putea fi crescută la 256KB când spec. I2CP va fi actualizata)" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." -msgstr "" -"Au fost discuÈ›ii cu privire la o cerere de blogging-ul distribuit de " -"câteva \n" -"luni, numit acum \"MyI2P\". ÃŽn timp ce discuÈ›iile originale s-au pierdut," -" a fost \n" -"posibilitatea de a prelua un <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\"> cache Google </ " -"a> \n" -". Acesta nu este destul, dar include o vedere de ansamblu de bază È™i " -"unele discuÈ›ii \n" -"care a urmat." +msgstr "Au fost discuÈ›ii cu privire la o cerere de blogging-ul distribuit de câteva \nluni, numit acum \"MyI2P\". ÃŽn timp ce discuÈ›iile originale s-au pierdut, a fost \nposibilitatea de a prelua un <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\"> cache Google </ a> \n. Acesta nu este destul, dar include o vedere de ansamblu de bază È™i unele discuÈ›ii \ncare a urmat." #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." -msgstr "" -"Aplicatie în sine nu este încă pusă în aplicare , iar ideile din spatele " -"acestuia au\n" -" fost destul de ambitiosi , dar ele sunt încă valabile si in \n" -"<a href=\"%(roadmap)s\">planul curent < / a > este de a avea " -"funcÈ›ionalitatea MyI2P de bază disponibila\n" -"de-a lungul release-ului I2P 1.0 . Care va include o agendă de adrese " -"distribuita\n" -"pentru a permite denumiri sigure , distribuite , È™i umane ce pot fi " -"citite prin sacrificarea\n" -"nevoie de unicitate la nivel mondial - în principiu, fiecare are propria " -"lor agendă locală\n" -"È™i pot \" abona \" la agende altor persoane , permițându- MyI2P periodic\n" -"prelua nume nou pentru maparea de destinaÈ›ie ( lăsând conflicte până la " -"utilizatorul le\n" -"rezolva ) . ÃŽn plus față de agenda , va exista un blogging- distribuit\n" -"sistem folosind un subset redus È™i asigurat de\n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\"> BBCode < / a " -"> , în esență,\n" -"oferă un <a href=\"http://www.livejournal.com/\"> LiveJournal < / a > " -"anonim cu\n" -"o \" lista de prieteni \" È™i de control al accesului transparent ( " -"autentificat de I2P\n" -"<a href=\"%(datagrams)s\"> datagrame</ a> cu reguli definite bazat pe " -"agenda de adrese) ." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." +msgstr "Aplicatie în sine nu este încă pusă în aplicare , iar ideile din spatele acestuia au\n fost destul de ambitiosi , dar ele sunt încă valabile si in \n<a href=\"%(roadmap)s\">planul curent < / a > este de a avea funcÈ›ionalitatea MyI2P de bază disponibila\nde-a lungul release-ului I2P 1.0 . Care va include o agendă de adrese distribuita\npentru a permite denumiri sigure , distribuite , È™i umane ce pot fi citite prin sacrificarea\nnevoie de unicitate la nivel mondial - în principiu, fiecare are propria lor agendă locală\nÈ™i pot \" abona \" la agende altor persoane , permițându- MyI2P periodic\nprelua nume nou pentru maparea de destinaÈ›ie ( lăsând conflicte până la utilizatorul le\nrezolva ) . ÃŽn plus față de agenda , va exista un blogging- distribuit\nsistem folosind un subset redus È™i asigurat de\n<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\"> BBCode < / a > , în esență,\noferă un <a href=\"http://www.livejournal.com/\"> LiveJournal < / a > anonim cu\no \" lista de prieteni \" È™i de control al accesului transparent ( autentificat de I2P\n<a href=\"%(datagrams)s\"> datagrame</ a> cu reguli definite bazat pe agenda de adrese) ." #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." -msgstr "" -"FuncÈ›ionalitate suplimentară, cum ar fi integrarea cu un magazin de " -"suport DHT sau \n" -" transferuri de fiÈ™iere pentru ataÈ™amente pot fi adăugate mai târziu. " -"E-mail poate sau \n" -"nu ajunge în prima trecere, fie, deÈ™i punerea sa în aplicare este, în " -"esență doar \n" -"o intrare de blog cu acces privat, asa ca, probabil unele designer de UI " -"pot veni cu \n" -"ceva. Exportarea datelor la RSS sau accesul prin ATOM va fi o opÈ›iune \n" -"adaugata in viitor, de asemenea." +msgstr "FuncÈ›ionalitate suplimentară, cum ar fi integrarea cu un magazin de suport DHT sau \n transferuri de fiÈ™iere pentru ataÈ™amente pot fi adăugate mai târziu. E-mail poate sau \nnu ajunge în prima trecere, fie, deÈ™i punerea sa în aplicare este, în esență doar \no intrare de blog cu acces privat, asa ca, probabil unele designer de UI pot veni cu \nceva. Exportarea datelor la RSS sau accesul prin ATOM va fi o opÈ›iune \nadaugata in viitor, de asemenea." #: i2p2www/pages/site/misc/ratestats.html:2 #: i2p2www/pages/site/misc/ratestats.html:5 @@ -1623,11 +989,9 @@ msgstr "I2P permite colectarea de o gamă largă de rate." #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" -msgstr "" -"Lista a fost colectate folosind următoarea comandă în directorul de sus " -"in ramură i2p.i2p :" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" +msgstr "Lista a fost colectate folosind următoarea comandă în directorul de sus in ramură i2p.i2p :" #: i2p2www/pages/site/misc/ratestats.html:10 msgid "All options aren't needed, but it works." @@ -1641,35 +1005,17 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"Codului sursă I2P este păstrată în mai multe depozite monotone " -"distribuite. \n" -"Vezi site-ul\n" -"<a href=\"http://www.monotone.ca/\"> Monotone </ a> pentru informaÈ›ii \n" -"de monoton. \n" -"vedea \n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\"> acest post pe forum " -"I2P monoton </ a> \n" -"pentru mai multe informaÈ›ii cu privire la modul de a începe È™i a verifica" -" afară de sursa anonim. \n" -"Există, de asemenea, un ghid rapid de pornire pe \n" -"<a href=\"%(newdevs)s\"> pagină nouă pentru dezvoltatori </ a>." +msgstr "Codului sursă I2P este păstrată în mai multe depozite monotone distribuite. \nVezi site-ul\n<a href=\"http://www.monotone.ca/\"> Monotone </ a> pentru informaÈ›ii \nde monoton. \nvedea \n<a href=\"http://%(forum)s/viewtopic.php?t=2524\"> acest post pe forum I2P monoton </ a> \npentru mai multe informaÈ›ii cu privire la modul de a începe È™i a verifica afară de sursa anonim. \nExistă, de asemenea, un ghid rapid de pornire pe \n<a href=\"%(newdevs)s\"> pagină nouă pentru dezvoltatori </ a>." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." -msgstr "" -"Dacă doriÈ›i să obÈ›ineÈ›i sursa non-anonim, trage de la server public " -"mtn.welterde.de . \n" -"Denumirea ramurei sursei de cod I2P este \"i2p.i2p\"." +msgstr "Dacă doriÈ›i să obÈ›ineÈ›i sursa non-anonim, trage de la server public mtn.welterde.de . \nDenumirea ramurei sursei de cod I2P este \"i2p.i2p\"." #: i2p2www/pages/site/misc/transition-guide.html:21 msgid "Guide" @@ -1679,9 +1025,7 @@ msgstr "Ghidaj" msgid "" "\n" "The following is a detailed guide by Complication." -msgstr "" -"\n" -"Ceea ce urmează este un ghid detaliat de complicaÈ›ie." +msgstr "\nCeea ce urmează este un ghid detaliat de complicaÈ›ie." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2 msgid "How to Upgrade from 0.6.1.30 and Earlier" @@ -1698,44 +1042,24 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." -msgstr "" -"De la dezvoltator I2P \n" -"<a href=\"%(jrandom)s\"> a plecat AWOL </ a>, \n" -"nu avem cheia de semnare pentru actualizare sau acces la \n" -"www.i2p [. net] sau dev.i2p [. net]. \n" -"ComplicaÈ›ie È™i zzz au generat noi chei de semnare, È™i ei È™i Amiga " -"furnizeaza \n" -"actualizarea hosting-ului de fiÈ™iere. Aceste modificări trebuie să fie " -"configurate în router-ul pentru efect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." +msgstr "De la dezvoltator I2P \n<a href=\"%(jrandom)s\"> a plecat AWOL </ a>, \nnu avem cheia de semnare pentru actualizare sau acces la \nwww.i2p [. net] sau dev.i2p [. net]. \nComplicaÈ›ie È™i zzz au generat noi chei de semnare, È™i ei È™i Amiga furnizeaza \nactualizarea hosting-ului de fiÈ™iere. Aceste modificări trebuie să fie configurate în router-ul pentru efect." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." -msgstr "" -"Face următoarele modificări de configurare È™i router-ul se va instala " -"automat \n" -"la cea mai recentă versiune." +msgstr "Face următoarele modificări de configurare È™i router-ul se va instala automat \nla cea mai recentă versiune." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." -msgstr "" -"Vă recomandăm proces automatizat care va verifica cheia fiÈ™ierului " -"semnat de actualizare. \n" -"Dacă nu faceti aceste modificări, \n" -"puteÈ›i descărca manual fiÈ™ierul i2pupdate.zip de la \n" -"<a href=\"%(downloads)s\"> pagina de descărcare </ a>." +msgstr "Vă recomandăm proces automatizat care va verifica cheia fiÈ™ierului semnat de actualizare. \nDacă nu faceti aceste modificări, \nputeÈ›i descărca manual fiÈ™ierul i2pupdate.zip de la \n<a href=\"%(downloads)s\"> pagina de descărcare </ a>." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34 #, python-format @@ -1744,11 +1068,9 @@ msgstr "SchimbaÈ›i URL-ul de È™tiri la:%(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " -msgstr "" -"SelectaÈ›i unul din următoarele URL-uri de actualizare noi la întâmplare" -" È™i introduceÈ›i-l în caseta de actualizare URL:" +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " +msgstr "SelectaÈ›i unul din următoarele URL-uri de actualizare noi la întâmplare È™i introduceÈ›i-l în caseta de actualizare URL:" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 msgid "Check the box \"Update through the eepProxy?\"" @@ -1769,27 +1091,14 @@ msgstr "FaceÈ›i clic pe \"Apply\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." -msgstr "" -"Acum sunteÈ›i gata pentru a primi în mod automat fiÈ™ierul de actualizare " -"de eliberare, \n" -"fie prin stabilirea politicii dvs. de actualizare pentru a \"descărca È™i " -"instala\" sau făcând clic pe link-ul\n" -"\"update disponibil\", atunci când apare." +msgstr "Acum sunteÈ›i gata pentru a primi în mod automat fiÈ™ierul de actualizare de eliberare, \nfie prin stabilirea politicii dvs. de actualizare pentru a \"descărca È™i instala\" sau făcând clic pe link-ul\n\"update disponibil\", atunci când apare." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65 #, python-format msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." -msgstr "" -"Dacă doriÈ›i pentru a verifica cheile de actualizare de încredere, ele " -"sunt, de asemenea, scris È™i semnat\n" -"<a href=\"%(url)s\"> aici </ a>. \n" -"Vă mulÈ›umim pentru sprijinul dumneavoastră în timpul acestei tranziÈ›ii. " -"Pentru ajutor, vă rugăm să ne contactaÈ›i la # I2P." - +"Thank you for your support during this transition. For help please contact us on #i2p." +msgstr "Dacă doriÈ›i pentru a verifica cheile de actualizare de încredere, ele sunt, de asemenea, scris È™i semnat\n<a href=\"%(url)s\"> aici </ a>. \nVă mulÈ›umim pentru sprijinul dumneavoastră în timpul acestei tranziÈ›ii. Pentru ajutor, vă rugăm să ne contactaÈ›i la # I2P." diff --git a/i2p2www/translations/ru/LC_MESSAGES/comparison.po b/i2p2www/translations/ru/LC_MESSAGES/comparison.po index ffa45285abace7101f805244a637054f1ef3341a..ff6b4c376507f0a6ea7e115ccca662d582dc5b5e 100644 --- a/i2p2www/translations/ru/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/ru/LC_MESSAGES/comparison.po @@ -1,7 +1,7 @@ -# Russian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Aleksey Orekhov <opexob@yandex.ru>, 2013 # Aleksey Vyskubov <viskubov@gmail.com>, 2016 @@ -12,20 +12,18 @@ # R4SAS, 2019 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: zzzi2p\n" -"Language-Team: Russian (Russia) " -"(http://www.transifex.com/otf/I2P/language/ru_RU/)\n" -"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && " -"n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) " -"|| (n%100>=11 && n%100<=14)? 2 : 3)\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Irina Fedulova <istartlin@gmail.com>, 2020\n" +"Language-Team: Russian (Russia) (http://www.transifex.com/otf/I2P/language/ru_RU/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ru_RU\n" +"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) || (n%100>=11 && n%100<=14)? 2 : 3);\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -33,88 +31,39 @@ msgstr "I2P в Ñравнении Ñ Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." -msgstr "" -"Freenet - Ñто полноÑтью раÑпределеннаÑ, точка-точка, Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð°Ñ Ñеть Ð´Ð»Ñ " -"публикации, предоÑтавлÑÑŽÑ‰Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°Ñный ÑпоÑоб хранить данные, также " -"некоторые подходы, позволÑющие обрабатывать нагрузки\n" -"в пиках. Ð¥Ð¾Ñ‚Ñ Freenet разработан как раÑпределенное хранилище, " -"пользователи Ñделали\n" -"Ð¿Ñ€Ð¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð²ÐµÑ€Ñ… него, которые позволÑÑŽÑ‚ другие формы взаимодейÑтвиÑ, " -"такие как Ñтатичные\n" -"веб-Ñайты и доÑки Ñообщений." +msgstr "Freenet - Ñто полноÑтью раÑпределеннаÑ, точка-точка, Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð°Ñ Ñеть Ð´Ð»Ñ Ð¿ÑƒÐ±Ð»Ð¸ÐºÐ°Ñ†Ð¸Ð¸, предоÑтавлÑÑŽÑ‰Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°Ñный ÑпоÑоб хранить данные, также некоторые подходы, позволÑющие обрабатывать нагрузки\nв пиках. Ð¥Ð¾Ñ‚Ñ Freenet разработан как раÑпределенное хранилище, пользователи Ñделали\nÐ¿Ñ€Ð¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð²ÐµÑ€Ñ… него, которые позволÑÑŽÑ‚ другие формы взаимодейÑтвиÑ, такие как Ñтатичные\nвеб-Ñайты и доÑки Ñообщений." #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"По Ñравнению Ñ I2P, Freenet имеет некоторые преимущеÑтва - Ñто " -"раÑпределенное хранилище\n" -"данных, чем I2P не ÑвлÑетÑÑ, позволÑющее людÑм обмениватьÑÑ Ð´Ð°Ð½Ð½Ñ‹Ð¼Ð¸, даже" -" еÑли оригинальный\n" -"автор более недоÑтупен. Также Ñеть позволÑет Ñффективно раÑпределÑÑ‚ÑŒ " -"данные. I2P Ñам по Ñебе не имеет и не будет иметь такой функции. С другой" -" Ñтороны, здеÑÑŒ еÑÑ‚ÑŒ недоÑтаток Ð´Ð»Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÐµÐ¹, которые проÑто хотÑÑ‚ " -"анонимно общатьÑÑ Ñ‡ÐµÑ€ÐµÐ· веб-Ñайты, доÑки объÑвлений, программы " -"файлообмена и Ñ‚.д\n" -"Ð’ I2P еÑÑ‚ÑŒ варианты реализации таких функций Ñ Ð¿Ð¾Ð¼Ð¾Ñ‰ÑŒÑŽ Ñпециальных " -"приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего Ð´Ð»Ñ " -"обычного иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ðµ готово." +msgstr "По Ñравнению Ñ I2P, Freenet имеет некоторые преимущеÑтва - Ñто раÑпределенное хранилище\nданных, чем I2P не ÑвлÑетÑÑ, позволÑющее людÑм обмениватьÑÑ Ð´Ð°Ð½Ð½Ñ‹Ð¼Ð¸, даже еÑли оригинальный\nавтор более недоÑтупен. Также Ñеть позволÑет Ñффективно раÑпределÑÑ‚ÑŒ данные. I2P Ñам по Ñебе не имеет и не будет иметь такой функции. С другой Ñтороны, здеÑÑŒ еÑÑ‚ÑŒ недоÑтаток Ð´Ð»Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÐµÐ¹, которые проÑто хотÑÑ‚ анонимно общатьÑÑ Ñ‡ÐµÑ€ÐµÐ· веб-Ñайты, доÑки объÑвлений, программы файлообмена и Ñ‚.д\nÐ’ I2P еÑÑ‚ÑŒ варианты реализации таких функций Ñ Ð¿Ð¾Ð¼Ð¾Ñ‰ÑŒÑŽ Ñпециальных приложений (a href=\"%(tahoe)s\">Tahoe-LAFS</a>), но еще ничего Ð´Ð»Ñ Ð¾Ð±Ñ‹Ñ‡Ð½Ð¾Ð³Ð¾ иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ðµ готово." #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"largely to Freenet's heuristic driven routing. The interactions of various techniques \n" +"certainly may successfully deter various attacks, and perhaps some aspects of the \n" +"routing algorithms will provide the hoped for scalability. Unfortunately, not much\n" +"analysis of the algorithms involved has resulted in positive results, but there is still\n" +"hope. At the very least, Freenet does provide substantial anonymity against an attacker\n" "who does not have the resources necessary to analyze it further." -msgstr "" -"Тем не менее, даже не Ð¾Ð±Ñ€Ð°Ñ‰Ð°Ñ Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ðµ на проблемы реализации, еÑÑ‚ÑŒ " -"определенные ÑоображениÑ\n" -"об алгоритмах Freenet Ñ Ñ‚Ð¾Ñ‡ÐºÐ¸ Ð·Ñ€ÐµÐ½Ð¸Ñ Ð¼Ð°ÑÑˆÑ‚Ð°Ð±Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ анонимноÑти, в " -"облаÑти ÑвриÑтичеÑкой маршрутизации внутри Freenet. ВзаимодейÑтвие разных" -" техник определенно может защитить от Ñ€Ñда атак, \n" -"и, возможно, некоторые аÑпекты алгоритмов маршрутизации дают надежды на " -"маÑштабирование. К Ñожалению, немногие из попыток анализа алгоритмов дали" -" позитивные результаты, но надежда еÑÑ‚ÑŒ.\n" -"Ð’ конце концов, Freenet предоÑтавлÑет значительный уровень анонимноÑти " -"против атакующего, который не обладает доÑтаточными Ð´Ð»Ñ Ð´Ð°Ð»ÑŒÐ½ÐµÐ¹ÑˆÐµÐ³Ð¾ " -"анализа реÑурÑами." +msgstr "Тем не менее, даже не Ð¾Ð±Ñ€Ð°Ñ‰Ð°Ñ Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ðµ на проблемы реализации, еÑÑ‚ÑŒ определенные ÑоображениÑ\nоб алгоритмах Freenet Ñ Ñ‚Ð¾Ñ‡ÐºÐ¸ Ð·Ñ€ÐµÐ½Ð¸Ñ Ð¼Ð°ÑÑˆÑ‚Ð°Ð±Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ анонимноÑти, в облаÑти ÑвриÑтичеÑкой маршрутизации внутри Freenet. ВзаимодейÑтвие разных техник определенно может защитить от Ñ€Ñда атак, \nи, возможно, некоторые аÑпекты алгоритмов маршрутизации дают надежды на маÑштабирование. К Ñожалению, немногие из попыток анализа алгоритмов дали позитивные результаты, но надежда еÑÑ‚ÑŒ.\nÐ’ конце концов, Freenet предоÑтавлÑет значительный уровень анонимноÑти против атакующего, который не обладает доÑтаточными Ð´Ð»Ñ Ð´Ð°Ð»ÑŒÐ½ÐµÐ¹ÑˆÐµÐ³Ð¾ анализа реÑурÑами." #: i2p2www/pages/site/comparison/index.html:2 msgid "Comparing I2P to other projects" @@ -122,26 +71,14 @@ msgstr "Сравнение I2P Ñ Ð´Ñ€ÑƒÐ³Ð¸Ð¼Ð¸ проектами" #: i2p2www/pages/site/comparison/index.html:4 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" -msgstr "" -"СущеÑтвует много других хороших приложений и проектов в облаÑти анонимных" -" коммуникаций, и I2P определенно обогащаетÑÑ Ð¸Ñ… опытом. Ðто неполный\n" -" ÑпиÑок подобных реÑурÑов - у freehaven'а в \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"и в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\n" -"Ñти ÑпиÑки полнее. Ð’Ñего неÑколько ÑиÑтем имеет ÑмыÑл Ñравнивать далее. \n" -"Ðиже перечиÑлены Ñтраницы, поÑвÑщенные ÑравнениÑм Ñ Ñтими ÑиÑтемами:" +msgstr "СущеÑтвует много других хороших приложений и проектов в облаÑти анонимных коммуникаций, и I2P определенно обогащаетÑÑ Ð¸Ñ… опытом. Ðто неполный\n ÑпиÑок подобных реÑурÑов - у freehaven'а в \n<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\nи в GNUnet <a href=\"https://www.gnunet.org/links/\">проектах</a>\nÑти ÑпиÑки полнее. Ð’Ñего неÑколько ÑиÑтем имеет ÑмыÑл Ñравнивать далее. \nÐиже перечиÑлены Ñтраницы, поÑвÑщенные ÑравнениÑм Ñ Ñтими ÑиÑтемами:" #: i2p2www/pages/site/comparison/index.html:20 #, python-format @@ -153,15 +90,9 @@ msgstr "ОбÑуждаетÑÑ Ð½Ð° <a href=\"%(othernetworks)s\">Ñтраниц #: i2p2www/pages/site/comparison/index.html:33 #, python-format msgid "" -"The content of this page is subject to update, discussion and dispute, " -"and we welcome comments and additions.\n" -"You may contribute an analysis by entering a <a href=\"%(trac)s\">new " -"ticket on Trac</a>." +"The content of this page is subject to update, discussion and dispute, and we welcome comments and additions.\n" +"You may contribute an analysis by entering a <a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Содержимое Ñтой Ñтраницы подлежит обновлению, обÑуждению и оÑпариванию, и" -" мы будем рады любым замечаниÑм и дополнениÑм.\n" -"Ð’Ñ‹ можете поÑодейÑтвовать анализу, добавив <a href=\"%(trac)s\">новый " -"тикет в Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:2 msgid "I2P Compared to Other Anonymous Networks" @@ -178,251 +109,116 @@ msgid "" "For an overview of available comparisons, see the\n" "<a href=\"%(comparison)s\">main network comparisons page</a>.\n" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Ð‘Ð¾Ð»ÑŒÑˆÐ°Ñ Ñ‡Ð°ÑÑ‚ÑŒ Ñледующих разделов Ñильно уÑтарела и не может быть точной.\n" -"Ð”Ð»Ñ Ð¾Ð·Ð½Ð°ÐºÐ¾Ð¼Ð»ÐµÐ½Ð¸Ñ Ñ Ð´Ð¾Ñтупными ÑравнениÑми обратитеÑÑŒ к\n" -"<a href=\"%(comparison)s\">оÑновной Ñтранице ÑÑ€Ð°Ð²Ð½ÐµÐ½Ð¸Ñ Ñетей</a>.\n" -"Ð’Ñ‹ можете поÑодейÑтвовать анализу, добавив\n" -"<a href=\"%(trac)s\">новый тикет в Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:29 #, python-format msgid "" "RetroShare is a set of peer-to-peer applications running in a\n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of " -"such F2F \n" -"network makes direct IP connections only to authenticated peers " -"(\"friends\") after explicit \n" -"certificates exchange. It can discover unauthenticated peers (e.g. " -"friends of friends), \n" -"but connections to them are relayed over \"friend\" peers for providing " -"privacy and anonymity." -msgstr "" -"RetroShare - Ñто набор peer-to-peer приложений, работающих в \n" -"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> Ñети. Каждый пир такой" -" F2F \n" -"Ñети уÑтанавливает прÑмые IP-ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ Ñ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐµÐ½Ð½Ñ‹Ð¼Ð¸ пирами " -"(\"друзьÑми\") поÑле Ñвного \n" -"обмена Ñертификатами. Он может обнаружить непроверенные пиры (например, " -"Ð´Ñ€ÑƒÐ·ÑŒÑ Ð´Ñ€ÑƒÐ·ÐµÐ¹), \n" -"но ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ Ð½Ð¸Ð¼Ð¸ производÑÑ‚ÑÑ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ через пиры \"друзей\" Ð´Ð»Ñ " -"обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð´ÐµÐ½Ñ†Ð¸Ð°Ð»ÑŒÐ½Ð¾Ñти и анонимноÑти." +"<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> network. Each peer of such F2F \n" +"network makes direct IP connections only to authenticated peers (\"friends\") after explicit \n" +"certificates exchange. It can discover unauthenticated peers (e.g. friends of friends), \n" +"but connections to them are relayed over \"friend\" peers for providing privacy and anonymity." +msgstr "RetroShare - Ñто набор peer-to-peer приложений, работающих в \n<a href=\"%(f2fwiki)s\">Friend-to-friend (F2F)</a> Ñети. Каждый пир такой F2F \nÑети уÑтанавливает прÑмые IP-ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ Ñ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐµÐ½Ð½Ñ‹Ð¼Ð¸ пирами (\"друзьÑми\") поÑле Ñвного \nобмена Ñертификатами. Он может обнаружить непроверенные пиры (например, Ð´Ñ€ÑƒÐ·ÑŒÑ Ð´Ñ€ÑƒÐ·ÐµÐ¹), \nно ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ Ð½Ð¸Ð¼Ð¸ производÑÑ‚ÑÑ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ через пиры \"друзей\" Ð´Ð»Ñ Ð¾Ð±ÐµÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð´ÐµÐ½Ñ†Ð¸Ð°Ð»ÑŒÐ½Ð¾Ñти и анонимноÑти." #: i2p2www/pages/site/comparison/other-networks.html:37 msgid "" -"RetroShare is designed to build a private network of trusted peers, while" -" I2P is designed \n" -"to be a large-scaled public anonymous network. Recent versions of " -"RetroShare have options to run \n" -"as a public \"darknet\" by using I2P or Tor as a transport. That way all " -"connections are \n" +"RetroShare is designed to build a private network of trusted peers, while I2P is designed \n" +"to be a large-scaled public anonymous network. Recent versions of RetroShare have options to run \n" +"as a public \"darknet\" by using I2P or Tor as a transport. That way all connections are \n" "anonymized and no trust is required for adding new \"friends\"." -msgstr "" -"RetroShare предназначен Ð´Ð»Ñ Ð¿Ð¾ÑÑ‚Ñ€Ð¾ÐµÐ½Ð¸Ñ Ñ‡Ð°Ñтноой Ñети доверенных пиров, в " -"то Ð²Ñ€ÐµÐ¼Ñ ÐºÐ°Ðº I2P предназначен быть крупной публичной анонимной Ñетью. " -"ПоÑледние верÑии RetroShare имеют варианты запуÑка в качеÑтве публичного " -"\"даркнета\", иÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ I2P или Tor в качеÑтве транÑпорта. Таким " -"образом, вÑе ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ \n" -"анонимны и не требуют Ð´Ð¾Ð²ÐµÑ€Ð¸Ñ Ð´Ð»Ñ Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð½Ð¾Ð²Ñ‹Ñ… \"друзей\"." +msgstr "RetroShare предназначен Ð´Ð»Ñ Ð¿Ð¾ÑÑ‚Ñ€Ð¾ÐµÐ½Ð¸Ñ Ñ‡Ð°Ñтноой Ñети доверенных пиров, в то Ð²Ñ€ÐµÐ¼Ñ ÐºÐ°Ðº I2P предназначен быть крупной публичной анонимной Ñетью. ПоÑледние верÑии RetroShare имеют варианты запуÑка в качеÑтве публичного \"даркнета\", иÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ I2P или Tor в качеÑтве транÑпорта. Таким образом, вÑе ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ \nанонимны и не требуют Ð´Ð¾Ð²ÐµÑ€Ð¸Ñ Ð´Ð»Ñ Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð½Ð¾Ð²Ñ‹Ñ… \"друзей\"." #: i2p2www/pages/site/comparison/other-networks.html:48 #, python-format msgid "" -"Morphmix and Tarzan are both fully distributed, peer to peer networks of" -" \n" -"anonymizing proxies, allowing people to tunnel out through the low " -"latency \n" -"mix network. Morphmix includes some very interesting collusion detection" -" \n" -"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of " -"IP\n" +"Morphmix and Tarzan are both fully distributed, peer to peer networks of \n" +"anonymizing proxies, allowing people to tunnel out through the low latency \n" +"mix network. Morphmix includes some very interesting collusion detection \n" +"algorithms and Sybil defenses, while Tarzan makes use of the scarcity of IP\n" "addresses to accomplish the same. The two primary differences between \n" -"these systems and I2P are related to I2P's <a " -"href=\"%(threatmodel)s\">threat model</a> \n" -"and their out-proxy design (as opposed to providing both sender and " -"receiver \n" -"anonymity). There is source code available to both systems, but we are " -"not aware \n" +"these systems and I2P are related to I2P's <a href=\"%(threatmodel)s\">threat model</a> \n" +"and their out-proxy design (as opposed to providing both sender and receiver \n" +"anonymity). There is source code available to both systems, but we are not aware \n" "of their use outside of academic environments." -msgstr "" -"Morphmix и Tarzan - Ñто полноÑтью раÑпределенные точка-точка Ñети " -"анонимных прокÑи-Ñерверов, позволÑющие людÑм организовывать ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ " -"через Ñмешанную Ñеть Ñ Ð½Ð¸Ð·ÐºÐ¸Ð¼Ð¸ задержками.\n" -"Morphmix включает интереÑные алгоритмы обхода коллизий и защиты от атаки " -"Sybil, а Tarzan иÑпользует Ð´Ð»Ñ Ñтого недоÑтаток IP-адреÑов. Два оÑновных " -"Ð¾Ñ‚Ð»Ð¸Ñ‡Ð¸Ñ Ñ‚Ð°ÐºÐ¸Ñ… ÑиÑтем от I2P ÑвÑзаны Ñ <a href=\"%(threatmodel)s\">моделью" -" угроз</a> I2P \n" -"и их дизайнов выходÑщих узлов (в отличие от обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾Ñти и " -"отправителÑ, и получателÑ). Ð”Ð»Ñ Ð¾Ð±Ð¾Ð¸Ñ… ÑиÑтем доÑтупны иÑходные коды, но " -"нам не извеÑтно об их иÑпользовании за пределами научной деÑтельноÑти." +msgstr "Morphmix и Tarzan - Ñто полноÑтью раÑпределенные точка-точка Ñети анонимных прокÑи-Ñерверов, позволÑющие людÑм организовывать ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ‡ÐµÑ€ÐµÐ· Ñмешанную Ñеть Ñ Ð½Ð¸Ð·ÐºÐ¸Ð¼Ð¸ задержками.\nMorphmix включает интереÑные алгоритмы обхода коллизий и защиты от атаки Sybil, а Tarzan иÑпользует Ð´Ð»Ñ Ñтого недоÑтаток IP-адреÑов. Два оÑновных Ð¾Ñ‚Ð»Ð¸Ñ‡Ð¸Ñ Ñ‚Ð°ÐºÐ¸Ñ… ÑиÑтем от I2P ÑвÑзаны Ñ <a href=\"%(threatmodel)s\">моделью угроз</a> I2P \nи их дизайнов выходÑщих узлов (в отличие от обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ð¾Ñти и отправителÑ, и получателÑ). Ð”Ð»Ñ Ð¾Ð±Ð¾Ð¸Ñ… ÑиÑтем доÑтупны иÑходные коды, но нам не извеÑтно об их иÑпользовании за пределами научной деÑтельноÑти." #: i2p2www/pages/site/comparison/other-networks.html:172 #, python-format msgid "" "\n" -"Mixminion and Mixmaster are networks to support anonymous email against a" -" very\n" +"Mixminion and Mixmaster are networks to support anonymous email against a very\n" "powerful adversary.\n" "High-latency messaging applications running on top of I2P\n" "(for example <a href=\"%(syndie)s\">Syndie</a> or I2PBote)\n" "may perhaps prove adequate to meet the threat\n" -"model of those adversaries, while running in parallel along side the " -"needs of low latency users, to provide\n" +"model of those adversaries, while running in parallel along side the needs of low latency users, to provide\n" "a significantly larger anonymity set.\n" -"High-latency support within the I2P router itself may or may not be added" -" in a distant future release.\n" -"It is too early to say if I2P will meet the needs of users requiring " -"extreme protection for email." -msgstr "" -"\n" -"Mixminion и Mixmaster ÑвлÑÑŽÑ‚ÑÑ ÑетÑми, поддерживающими анонимноÑÑ‚ÑŒ " -"Ñлектронной корреÑпонденции Ñ Ð¾Ñ‡ÐµÐ½ÑŒ Ñильной защитой.\n" -"Программы обмена ÑообщениÑми Ñ Ð²Ñ‹Ñокой ÑкрытноÑтью, работающие поверх I2P" -"\n" -"(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\n" -"возможно, Ñмогут показать доÑтаточную ÑопротивлÑемоÑÑ‚ÑŒ ÑущеÑтвующей " -"модели угроз, в то же Ð²Ñ€ÐµÐ¼Ñ ÑƒÐ´Ð¾Ð²Ð»ÐµÑ‚Ð²Ð¾Ñ€ÑÑ Ð¿Ð¾Ñ‚Ñ€ÐµÐ±Ð½Ð¾Ñти пользователей по " -"обмену ÑообщениÑми меньшей ÑкрытноÑти,\n" -"обеÑÐ¿ÐµÑ‡Ð¸Ð²Ð°Ñ Ð³Ð¾Ñ€Ð°Ð·Ð´Ð¾ лучшую анонимноÑÑ‚ÑŒ.\n" -"Поддержка выÑокой ÑкрытноÑти в Ñамом I2P маршрутизаторе, возможно, будет " -"реализована, а, возможно, и нет, в отдалённом будущем.\n" -"Ещё Ñлишком рано говорить, удовлетворÑет ли I2P потребноÑÑ‚Ñм " -"пользователей в ÑкÑтремально защищённом обмене ÑообщениÑми." +"High-latency support within the I2P router itself may or may not be added in a distant future release.\n" +"It is too early to say if I2P will meet the needs of users requiring extreme protection for email." +msgstr "\nMixminion и Mixmaster ÑвлÑÑŽÑ‚ÑÑ ÑетÑми, поддерживающими анонимноÑÑ‚ÑŒ Ñлектронной корреÑпонденции Ñ Ð¾Ñ‡ÐµÐ½ÑŒ Ñильной защитой.\nПрограммы обмена ÑообщениÑми Ñ Ð²Ñ‹Ñокой ÑкрытноÑтью, работающие поверх I2P\n(например <a href=\"%(syndie)s\">Syndie</a> или I2PBote),\nвозможно, Ñмогут показать доÑтаточную ÑопротивлÑемоÑÑ‚ÑŒ ÑущеÑтвующей модели угроз, в то же Ð²Ñ€ÐµÐ¼Ñ ÑƒÐ´Ð¾Ð²Ð»ÐµÑ‚Ð²Ð¾Ñ€ÑÑ Ð¿Ð¾Ñ‚Ñ€ÐµÐ±Ð½Ð¾Ñти пользователей по обмену ÑообщениÑми меньшей ÑкрытноÑти,\nобеÑÐ¿ÐµÑ‡Ð¸Ð²Ð°Ñ Ð³Ð¾Ñ€Ð°Ð·Ð´Ð¾ лучшую анонимноÑÑ‚ÑŒ.\nПоддержка выÑокой ÑкрытноÑти в Ñамом I2P маршрутизаторе, возможно, будет реализована, а, возможно, и нет, в отдалённом будущем.\nЕщё Ñлишком рано говорить, удовлетворÑет ли I2P потребноÑÑ‚Ñм пользователей в ÑкÑтремально защищённом обмене ÑообщениÑми." #: i2p2www/pages/site/comparison/other-networks.html:184 msgid "" "As with Tor and Onion Routing, \n" "both Mixminion and Mixmaster take the directory based approach as well." -msgstr "" -"Как и в Ñлучае Ñ Tor и Onion Routing, Mixminion и Mixmaster применÑÑŽÑ‚ " -"подход на оÑнове Ñправочных директорий." +msgstr "Как и в Ñлучае Ñ Tor и Onion Routing, Mixminion и Mixmaster применÑÑŽÑ‚ подход на оÑнове Ñправочных директорий." #: i2p2www/pages/site/comparison/other-networks.html:194 #, python-format msgid "" -"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing " -"web requests,\n" -"and as such it has a few centralized nodes (participants in the cascade) " -"that blend\n" -"and mix requests from clients through the sequence of nodes (the cascade)" -" before \n" -"proxying out onto the web. The scope, threat model, and security is " -"substantially \n" -"different from I2P, but for those who don't require significant anonymity" -" but still\n" -"are not satisfied with an Anonymizer-like service, JAP is worth " -"reviewing. One\n" -"caution to note is that anyone under the jurisdiction of the German " -"courts may want\n" -"to take care, as the German Federal Bureau of Criminal Investigation " -"(FBCI) has \n" +"JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests,\n" +"and as such it has a few centralized nodes (participants in the cascade) that blend\n" +"and mix requests from clients through the sequence of nodes (the cascade) before \n" +"proxying out onto the web. The scope, threat model, and security is substantially \n" +"different from I2P, but for those who don't require significant anonymity but still\n" +"are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One\n" +"caution to note is that anyone under the jurisdiction of the German courts may want\n" +"to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has \n" "successfully mounted an \n" "<a href=\"%(url)s\">attack</a> \n" -"on the network. Even though the method of this attack was later found to" -" be illegal \n" -"in the German courts, the fact that the data was successfully collected " -"is the \n" -"concern. Courts change their minds based upon circumstance, and this is " -"evidence that \n" -"if a government body or intelligence agency wanted to, they could gather " -"the data, even \n" +"on the network. Even though the method of this attack was later found to be illegal \n" +"in the German courts, the fact that the data was successfully collected is the \n" +"concern. Courts change their minds based upon circumstance, and this is evidence that \n" +"if a government body or intelligence agency wanted to, they could gather the data, even \n" "if it may be found inadmissible in some courts later)" -msgstr "" -"JAP (Java Anonymous Proxy) - Ñто Ñеть Ñмешанных каÑкадов Ð´Ð»Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð¸Ð·Ð°Ñ†Ð¸Ð¸" -" веб-запроÑов, и Ð´Ð»Ñ Ñтого применÑетÑÑ Ð½ÐµÑколько централизованных узлов " -"(учаÑтников каÑкада), которые Ñмешивают и обрабатывают запроÑÑ‹ " -"пользователей через набор узлов (каÑкад) перед доÑтавкой их в Ñеть.\n" -"Задача, модель угроз и безопаÑноÑти ÑущеÑтвенно отличаютÑÑ Ð¾Ñ‚ принÑÑ‚Ñ‹Ñ… в " -"I2P, но те, кто не нуждаетÑÑ Ð² значительном уровне анонимноÑти, но не " -"удовлетворен уровнем анонимноÑти ÑущеÑтвующих анонимайзеров, могут " -"раÑÑмотреть Ñтот вариант. Те, кто в зоне ответÑтвенноÑти немецкого " -"законодательÑтва, должны учитывать опаÑноÑÑ‚ÑŒ того, что German Federal " -"Bureau of Criminal Investigation (FBCI) уÑпешно провело <a " -"href=\"%(url)s\">атаку</a> на Ñту Ñеть.\n" -"Ð¥Ð¾Ñ‚Ñ Ð¼ÐµÑ‚Ð¾Ð´Ñ‹ атаки позже были признаны незаконными в немецком Ñуде, факт " -"уÑпешного Ñбора данных Ñтоит учитывать. Суды могут поменÑÑ‚ÑŒ Ñвои Ñ€ÐµÑˆÐµÐ½Ð¸Ñ " -"по обÑтоÑтельÑтвам и техничеÑкую возможноÑÑ‚ÑŒ Ñбора информации " -"правительÑтвом или агентÑтвами Ð½ÐµÐ»ÑŒÐ·Ñ ÑбраÑывать Ñо Ñчетов)." +msgstr "JAP (Java Anonymous Proxy) - Ñто Ñеть Ñмешанных каÑкадов Ð´Ð»Ñ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð¸Ð·Ð°Ñ†Ð¸Ð¸ веб-запроÑов, и Ð´Ð»Ñ Ñтого применÑетÑÑ Ð½ÐµÑколько централизованных узлов (учаÑтников каÑкада), которые Ñмешивают и обрабатывают запроÑÑ‹ пользователей через набор узлов (каÑкад) перед доÑтавкой их в Ñеть.\nЗадача, модель угроз и безопаÑноÑти ÑущеÑтвенно отличаютÑÑ Ð¾Ñ‚ принÑÑ‚Ñ‹Ñ… в I2P, но те, кто не нуждаетÑÑ Ð² значительном уровне анонимноÑти, но не удовлетворен уровнем анонимноÑти ÑущеÑтвующих анонимайзеров, могут раÑÑмотреть Ñтот вариант. Те, кто в зоне ответÑтвенноÑти немецкого законодательÑтва, должны учитывать опаÑноÑÑ‚ÑŒ того, что German Federal Bureau of Criminal Investigation (FBCI) уÑпешно провело <a href=\"%(url)s\">атаку</a> на Ñту Ñеть.\nÐ¥Ð¾Ñ‚Ñ Ð¼ÐµÑ‚Ð¾Ð´Ñ‹ атаки позже были признаны незаконными в немецком Ñуде, факт уÑпешного Ñбора данных Ñтоит учитывать. Суды могут поменÑÑ‚ÑŒ Ñвои Ñ€ÐµÑˆÐµÐ½Ð¸Ñ Ð¿Ð¾ обÑтоÑтельÑтвам и техничеÑкую возможноÑÑ‚ÑŒ Ñбора информации правительÑтвом или агентÑтвами Ð½ÐµÐ»ÑŒÐ·Ñ ÑбраÑывать Ñо Ñчетов)." #: i2p2www/pages/site/comparison/other-networks.html:216 #, python-format msgid "" "Both of these systems work through the same basic \n" "<a href=\"%(antnet)s\">antnet</a> routing, providing some degree of\n" -"anonymity based on the threat model of providing plausible deniability " -"against a simple \n" -"non-colluding adversary. With the antnet routing, they first either do a" -" random walk or a \n" -"broadcast search to find some peer with the data or identity desired, and" -" then use a feedback\n" -"algorithm to optimize that found path. This works well for applications " -"that merely want to know \n" -"what other people around them have to offer - \"How are y'all doing\" vs." -" \"Hey Alice, how are you\" - \n" -"you basically get a local cluster of nodes that can share files with and " -"maintain some degree of \n" -"anonymity (though you don't have much control over who is in that group " -"of peers)." -msgstr "" -"Обе Ñти ÑиÑтемы работают на одном базовом механизме <a " -"href=\"%(antnet)s\">маршрутизации</a>, добиваÑÑÑŒ некоторой анонимноÑти, " -"предоÑтавлÑÑ Ð¿ÑƒÑ‚ÑŒ отказа при неÑложном, неорганизованном противнике. " -"ИÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ antnet маршрутизацию, они Ñначала делают Ñлучайный проход или " -"широковещательный Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð½Ð° поиÑк пира Ñ Ð½ÑƒÐ¶Ð½Ñ‹Ð¼Ð¸ данными или адреÑами, а " -"затем иÑпользуют обратную ÑвÑзь Ð´Ð»Ñ Ð¾Ð¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð°Ñ†Ð¸Ð¸ найденного пути. Ðто " -"нормально работает Ð´Ð»Ñ Ð¿Ñ€Ð¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ð¹, которые Ñобирают информацию о том, что" -" другие пиры вокруг могут предложить - \"как у Ð²Ð°Ñ Ð²Ñех дела?\" против " -"\"ÐлиÑа, привет, Ñ‚Ñ‹ как?\". Ðа выходе вы получаете локальный набор узлов," -" Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼Ð¸ можно обмениватьÑÑ Ñ„Ð°Ð¹Ð»Ð°Ð¼Ð¸ и поддерживать определенный " -"уровень анонимноÑти (Ñ…Ð¾Ñ‚Ñ Ð²Ñ‹ не имеете оÑобого ÐºÐ¾Ð½Ñ‚Ñ€Ð¾Ð»Ñ Ð½Ð°Ð´ тем, кто " -"будет в Ñтой группе пиров)." +"anonymity based on the threat model of providing plausible deniability against a simple \n" +"non-colluding adversary. With the antnet routing, they first either do a random walk or a \n" +"broadcast search to find some peer with the data or identity desired, and then use a feedback\n" +"algorithm to optimize that found path. This works well for applications that merely want to know \n" +"what other people around them have to offer - \"How are y'all doing\" vs. \"Hey Alice, how are you\" - \n" +"you basically get a local cluster of nodes that can share files with and maintain some degree of \n" +"anonymity (though you don't have much control over who is in that group of peers)." +msgstr "Обе Ñти ÑиÑтемы работают на одном базовом механизме <a href=\"%(antnet)s\">маршрутизации</a>, добиваÑÑÑŒ некоторой анонимноÑти, предоÑтавлÑÑ Ð¿ÑƒÑ‚ÑŒ отказа при неÑложном, неорганизованном противнике. ИÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ antnet маршрутизацию, они Ñначала делают Ñлучайный проход или широковещательный Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð½Ð° поиÑк пира Ñ Ð½ÑƒÐ¶Ð½Ñ‹Ð¼Ð¸ данными или адреÑами, а затем иÑпользуют обратную ÑвÑзь Ð´Ð»Ñ Ð¾Ð¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð°Ñ†Ð¸Ð¸ найденного пути. Ðто нормально работает Ð´Ð»Ñ Ð¿Ñ€Ð¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ð¹, которые Ñобирают информацию о том, что другие пиры вокруг могут предложить - \"как у Ð²Ð°Ñ Ð²Ñех дела?\" против \"ÐлиÑа, привет, Ñ‚Ñ‹ как?\". Ðа выходе вы получаете локальный набор узлов, Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼Ð¸ можно обмениватьÑÑ Ñ„Ð°Ð¹Ð»Ð°Ð¼Ð¸ и поддерживать определенный уровень анонимноÑти (Ñ…Ð¾Ñ‚Ñ Ð²Ñ‹ не имеете оÑобого ÐºÐ¾Ð½Ñ‚Ñ€Ð¾Ð»Ñ Ð½Ð°Ð´ тем, кто будет в Ñтой группе пиров)." #: i2p2www/pages/site/comparison/other-networks.html:228 msgid "" -"However, the algorithm does not scale well at all - if the application " -"wants to speak with a \n" -"particular peer it ends up doing a broadcast search or random walk " -"(though if they are lucky enough\n" -"for that to succeed, the antnet routing should optimize that found " -"connection). This means that \n" -"while these networks can work great at small scales, they are not " -"suitable for large networks where\n" -"someone wants to get in touch with another specific peer. That does not " -"mean that there is no \n" -"value in these systems, just that their applicability is limited to " -"situations where their \n" +"However, the algorithm does not scale well at all - if the application wants to speak with a \n" +"particular peer it ends up doing a broadcast search or random walk (though if they are lucky enough\n" +"for that to succeed, the antnet routing should optimize that found connection). This means that \n" +"while these networks can work great at small scales, they are not suitable for large networks where\n" +"someone wants to get in touch with another specific peer. That does not mean that there is no \n" +"value in these systems, just that their applicability is limited to situations where their \n" "particular issues can be addressed." -msgstr "" -"Тем не менее, Ñтот алгоритм не очень хорошо маÑштабируетÑÑ - еÑли " -"приложение хочет говорить Ñ ÐºÐ¾Ð½ÐºÑ€ÐµÑ‚Ð½Ñ‹Ð¼ пиром, оно делает " -"широковещательный Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð¸Ð»Ð¸ Ñлучайный поиÑк (хотÑ, еÑли поиÑк удалÑÑ, " -"antnet позволит оптимизировать ÑвÑзь). Ðто означает, что Ñ…Ð¾Ñ‚Ñ Ñти Ñети " -"работают на малом чиÑле узлов, Ð´Ð»Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¾Ð³Ð¾ чиÑла узлов они не очень " -"применимы при попытке ÑвÑзатьÑÑ Ñ ÐºÐ¾Ð½ÐºÑ€ÐµÑ‚Ð½Ñ‹Ð¼ пиром. Ðто не означает, что " -"Ñти ÑиÑтемы беÑполезны, проÑто их применимоÑÑ‚ÑŒ ограничена ÑценариÑми, где" -" Ñти недоÑтатки можно обработать другими ÑредÑтвами." +msgstr "Тем не менее, Ñтот алгоритм не очень хорошо маÑштабируетÑÑ - еÑли приложение хочет говорить Ñ ÐºÐ¾Ð½ÐºÑ€ÐµÑ‚Ð½Ñ‹Ð¼ пиром, оно делает широковещательный Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð¸Ð»Ð¸ Ñлучайный поиÑк (хотÑ, еÑли поиÑк удалÑÑ, antnet позволит оптимизировать ÑвÑзь). Ðто означает, что Ñ…Ð¾Ñ‚Ñ Ñти Ñети работают на малом чиÑле узлов, Ð´Ð»Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¾Ð³Ð¾ чиÑла узлов они не очень применимы при попытке ÑвÑзатьÑÑ Ñ ÐºÐ¾Ð½ÐºÑ€ÐµÑ‚Ð½Ñ‹Ð¼ пиром. Ðто не означает, что Ñти ÑиÑтемы беÑполезны, проÑто их применимоÑÑ‚ÑŒ ограничена ÑценариÑми, где Ñти недоÑтатки можно обработать другими ÑредÑтвами." #: i2p2www/pages/site/comparison/other-networks.html:239 #, python-format msgid "" "This was a closed-source network targeted at Iranian users.\n" -"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a " -"circumvention tool</a>.\n" -"Suffice it to say that being closed source and publicly targeting a " -"specific country are not good ideas.\n" +"Tor did a <a href=\"%(torpost)s\">good writeup on what to look for in a circumvention tool</a>.\n" +"Suffice it to say that being closed source and publicly targeting a specific country are not good ideas.\n" "I2P is, of course, open source. However, that source, and our\n" "<a href=\"%(docs)s\">technical documentation</a>, need much more review." -msgstr "" -"Ðто был проект Ñ Ð·Ð°ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ иÑходным кодом, нацеленный на иранÑких " -"пользователей.\n" -"Tor Ñтал <a href=\"%(torpost)s\">хорошим примером того, что нужно " -"инÑтрументу обхода цензуры</a>.\n" -"Однако, нужно Ñказать, что закрытый иÑходный код и нацеленноÑÑ‚ÑŒ на " -"аудиторию конкретной Ñтраны - Ñто не лучшие идеи.\n" -"I2P - Ñто, конечно же, проект Ñ Ð¾Ñ‚ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ иÑходным кодом. Тем не менее, " -"Ñти иÑходные коды, а также <a href=\"%(docs)s\">техничеÑÐºÐ°Ñ " -"документациÑ</a> требуют гораздо большего вниманиÑ." +msgstr "Ðто был проект Ñ Ð·Ð°ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ иÑходным кодом, нацеленный на иранÑких пользователей.\nTor Ñтал <a href=\"%(torpost)s\">хорошим примером того, что нужно инÑтрументу обхода цензуры</a>.\nОднако, нужно Ñказать, что закрытый иÑходный код и нацеленноÑÑ‚ÑŒ на аудиторию конкретной Ñтраны - Ñто не лучшие идеи.\nI2P - Ñто, конечно же, проект Ñ Ð¾Ñ‚ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ иÑходным кодом. Тем не менее, Ñти иÑходные коды, а также <a href=\"%(docs)s\">техничеÑÐºÐ°Ñ Ð´Ð¾ÐºÑƒÐ¼ÐµÐ½Ñ‚Ð°Ñ†Ð¸Ñ</a> требуют гораздо большего вниманиÑ." #: i2p2www/pages/site/comparison/other-networks.html:248 msgid "Paid VPN Services" @@ -433,10 +229,8 @@ msgstr "Платные VPN-ÑервиÑÑ‹" #, python-format msgid "" "You may contribute an analysis by entering a\n" -"<a href=\"%(trac)s\">new ticket on Trac</a>." +"<a href=\"%(trac)s\">new issue on Github</a>." msgstr "" -"Ð’Ñ‹ можете поÑодейÑтвовать анализу, добавив\n" -"<a href=\"%(trac)s\">новый тикет в Trac</a>." #: i2p2www/pages/site/comparison/other-networks.html:254 msgid "Others" @@ -464,17 +258,7 @@ msgid "" "network, as well as gather and report statistics, as \n" "opposed to I2P's distributed <a href=\"%(netdb)s\">network \n" "database</a> and <a href=\"%(peerselection)s\">peer selection</a>." -msgstr "" -"Tor и Onion Routing - Ñто анонимные Ñети прокÑи-Ñерверов, позволÑющие " -"пользователÑм\n" -"туннелировать данные через их Ñеть Ñ Ð½Ð¸Ð·ÐºÐ¸Ð¼Ð¸ задержками. Два оÑновных " -"Ð¾Ñ‚Ð»Ð¸Ñ‡Ð¸Ñ Tor и I2P \n" -"оÑнованы на разнице в моделÑÑ… угроз и дизайне выходных прокÑи-узлов (хотÑ" -" Tor и поддерживает Ñкрытые ÑервиÑÑ‹, как и I2P). Кроме того, Tor " -"реализует централизованную точку Ð´Ð»Ñ ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²Ð¸Ð´Ð¸Ð¼Ð¾Ñтью Ñети, а также " -"Ð´Ð»Ñ Ñбора ÑтатиÑтики, в отличие от раÑпределенной модели Ñети I2P, <a " -"href=\"%(netdb)s\">базы Ñети</a> и <a href=\"%(peerselection)s\">выбора " -"пира</a>." +msgstr "Tor и Onion Routing - Ñто анонимные Ñети прокÑи-Ñерверов, позволÑющие пользователÑм\nтуннелировать данные через их Ñеть Ñ Ð½Ð¸Ð·ÐºÐ¸Ð¼Ð¸ задержками. Два оÑновных Ð¾Ñ‚Ð»Ð¸Ñ‡Ð¸Ñ Tor и I2P \nоÑнованы на разнице в моделÑÑ… угроз и дизайне выходных прокÑи-узлов (Ñ…Ð¾Ñ‚Ñ Tor и поддерживает Ñкрытые ÑервиÑÑ‹, как и I2P). Кроме того, Tor реализует централизованную точку Ð´Ð»Ñ ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð²Ð¸Ð´Ð¸Ð¼Ð¾Ñтью Ñети, а также Ð´Ð»Ñ Ñбора ÑтатиÑтики, в отличие от раÑпределенной модели Ñети I2P, <a href=\"%(netdb)s\">базы Ñети</a> и <a href=\"%(peerselection)s\">выбора пира</a>." #: i2p2www/pages/site/comparison/tor.html:23 msgid "" @@ -487,14 +271,7 @@ msgid "" "outproxies are prone to abuse, along with all of the \n" "other security issues we've come to know and love with \n" "normal Internet traffic." -msgstr "" -"Ð¤ÑƒÐ½ÐºÑ†Ð¸Ñ Ð²Ñ‹Ñ…Ð¾Ð´Ð½Ñ‹Ñ… узлов в I2P/Tor обладает неÑколькими Ñвными проблемами " -"- \n" -"как только данные покидают Ñеть, глобальные наблюдатели легко " -"обеÑпечивают мониторинг Ñтого трафика. Вдобавок, выходные узлы имеют " -"доÑтуп к незашифрованным данным в обе Ñтороны, а также легко выÑвлÑÑŽÑ‚ÑÑ Ð¸" -" подвержены разного рода атакам реального мира. И Ñто вÑе в добавление к " -"обычным проблемам безопаÑноÑти, которые мы знаем." +msgstr "Ð¤ÑƒÐ½ÐºÑ†Ð¸Ñ Ð²Ñ‹Ñ…Ð¾Ð´Ð½Ñ‹Ñ… узлов в I2P/Tor обладает неÑколькими Ñвными проблемами - \nкак только данные покидают Ñеть, глобальные наблюдатели легко обеÑпечивают мониторинг Ñтого трафика. Вдобавок, выходные узлы имеют доÑтуп к незашифрованным данным в обе Ñтороны, а также легко выÑвлÑÑŽÑ‚ÑÑ Ð¸ подвержены разного рода атакам реального мира. И Ñто вÑе в добавление к обычным проблемам безопаÑноÑти, которые мы знаем." #: i2p2www/pages/site/comparison/tor.html:35 msgid "" @@ -504,11 +281,7 @@ msgid "" "to build outproxy functionality on top of an anonymous\n" "communication layer, they can). In fact, some I2P users\n" "currently take advantage of Tor to outproxy." -msgstr "" -"Тем не менее, многим людÑм не Ñтоит беÑпокоитьÑÑ Ð½Ð° Ñтот Ñчет, Ñ‚.к. они " -"за пределами угроз модели. Они также вне (формальной) границы I2P (еÑли " -"людÑм нужно Ñделать выходной узел, они могут его Ñделать). Ðа Ñамом деле," -" Ñ€Ñд пользователей I2P в качеÑтве выходного узла иÑпользуют Tor." +msgstr "Тем не менее, многим людÑм не Ñтоит беÑпокоитьÑÑ Ð½Ð° Ñтот Ñчет, Ñ‚.к. они за пределами угроз модели. Они также вне (формальной) границы I2P (еÑли людÑм нужно Ñделать выходной узел, они могут его Ñделать). Ðа Ñамом деле, Ñ€Ñд пользователей I2P в качеÑтве выходного узла иÑпользуют Tor." #: i2p2www/pages/site/comparison/tor.html:49 msgid "Comparison of Tor and I2P Terminology" @@ -518,9 +291,7 @@ msgstr "Сравнение терминологии Tor и I2P" msgid "" "While Tor and I2P are similar in many ways, much of the terminology is " "different." -msgstr "" -"Ð¥Ð¾Ñ‚Ñ Tor и I2P во многом похожи, у них значительно отличаетÑÑ " -"терминологиÑ." +msgstr "Ð¥Ð¾Ñ‚Ñ Tor и I2P во многом похожи, у них значительно отличаетÑÑ Ñ‚ÐµÑ€Ð¼Ð¸Ð½Ð¾Ð»Ð¾Ð³Ð¸Ñ." #: i2p2www/pages/site/comparison/tor.html:55 msgid "Cell" @@ -664,21 +435,14 @@ msgstr "ПреимущеÑтва Tor перед I2P" #: i2p2www/pages/site/comparison/tor.html:78 msgid "" -"Much bigger user base; much more visibility in the academic and hacker " -"communities; benefits from\n" +"Much bigger user base; much more visibility in the academic and hacker communities; benefits from\n" "formal studies of anonymity, resistance, and performance;\n" "has a non-anonymous, visible, university-based leader" -msgstr "" -"Значительно Ð±Ð¾Ð»ÑŒÑˆÐ°Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÑŒÑÐºÐ°Ñ Ð±Ð°Ð·Ð°; Большее внимание Ñо Ñтороны " -"науки и хакерÑкого ÑообщеÑтва; выгоды от формальных иÑÑледований " -"анонимноÑти, ÑÐ¾Ð¿Ñ€Ð¾Ñ‚Ð¸Ð²Ð»ÐµÐ½Ð¸Ñ Ð¸ производительноÑти;\n" -"извеÑтен неанонимный, видимый, ÑвÑзанный Ñ ÑƒÐ½Ð¸Ð²ÐµÑ€Ñитетом лидер" +msgstr "Значительно Ð±Ð¾Ð»ÑŒÑˆÐ°Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÑŒÑÐºÐ°Ñ Ð±Ð°Ð·Ð°; Большее внимание Ñо Ñтороны науки и хакерÑкого ÑообщеÑтва; выгоды от формальных иÑÑледований анонимноÑти, ÑÐ¾Ð¿Ñ€Ð¾Ñ‚Ð¸Ð²Ð»ÐµÐ½Ð¸Ñ Ð¸ производительноÑти;\nизвеÑтен неанонимный, видимый, ÑвÑзанный Ñ ÑƒÐ½Ð¸Ð²ÐµÑ€Ñитетом лидер" #: i2p2www/pages/site/comparison/tor.html:84 msgid "Has already solved some scaling issues I2P has yet to address" -msgstr "" -"Уже разрешили Ñ€Ñд проблем маÑштабированиÑ, к которым I2P еще проÑто не " -"подошел" +msgstr "Уже разрешили Ñ€Ñд проблем маÑштабированиÑ, к которым I2P еще проÑто не подошел" #: i2p2www/pages/site/comparison/tor.html:85 msgid "Has significant funding" @@ -690,32 +454,24 @@ msgstr "Больше разработчиков, Ð²ÐºÐ»ÑŽÑ‡Ð°Ñ Ñ€Ñд опла #: i2p2www/pages/site/comparison/tor.html:88 msgid "" -"More resistant to state-level blocking due to TLS transport layer and " -"bridges\n" -"(I2P has proposals for \"full restricted routes\" but these are not yet " -"implemented)" -msgstr "" -"Более уÑтойчивый к блокировкам на уровне гоÑударÑтв, Ð±Ð»Ð°Ð³Ð¾Ð´Ð°Ñ€Ñ Ñ‚Ñ€Ð°Ð½Ñпорту" -" поверх TLS и моÑтам (I2P имеет Ð¿Ñ€ÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ \"полноÑтью закрытым " -"путÑм\", но они еще не реализованы)" +"More resistant to state-level blocking due to TLS transport layer and bridges\n" +"(I2P has proposals for \"full restricted routes\" but these are not yet implemented)" +msgstr "Более уÑтойчивый к блокировкам на уровне гоÑударÑтв, Ð±Ð»Ð°Ð³Ð¾Ð´Ð°Ñ€Ñ Ñ‚Ñ€Ð°Ð½Ñпорту поверх TLS и моÑтам (I2P имеет Ð¿Ñ€ÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ \"полноÑтью закрытым путÑм\", но они еще не реализованы)" #: i2p2www/pages/site/comparison/tor.html:93 msgid "Big enough that it has had to adapt to blocking and DOS attempts" msgstr "ДоÑтаточно Ð±Ð¾Ð»ÑŒÑˆÐ°Ñ Ñеть, чтобы адаптироватьÑÑ Ðº блокировке и попыткам DOS" #: i2p2www/pages/site/comparison/tor.html:94 -msgid "Designed and optimized for exit traffic, with a large number of exit nodes" -msgstr "" -"Разработан и оптимизирован Ð´Ð»Ñ Ð²Ñ‹Ñ…Ð¾Ð´Ð° трафика Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¸Ð¼ чиÑлом выходных " -"узлов" +msgid "" +"Designed and optimized for exit traffic, with a large number of exit nodes" +msgstr "Разработан и оптимизирован Ð´Ð»Ñ Ð²Ñ‹Ñ…Ð¾Ð´Ð° трафика Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¸Ð¼ чиÑлом выходных узлов" #: i2p2www/pages/site/comparison/tor.html:96 msgid "" "Better documentation, has formal papers and specifications,\n" "better website, many more translations" -msgstr "" -"Лучше документациÑ, еÑÑ‚ÑŒ иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ Ñпецификации,\n" -"лучше веб-Ñайт, гораздо больше переведенных данных" +msgstr "Лучше документациÑ, еÑÑ‚ÑŒ иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸ Ñпецификации,\nлучше веб-Ñайт, гораздо больше переведенных данных" #: i2p2www/pages/site/comparison/tor.html:101 msgid "More efficient with memory usage" @@ -729,17 +485,13 @@ msgstr "Клиенты Tor работают Ñ Ð¾Ñ‡ÐµÐ½ÑŒ небольшими msgid "" "Centralized control reduces the complexity at each\n" "node and can efficiently address Sybil attacks" -msgstr "" -"Централизованный контроль уменьшает ÑложноÑÑ‚ÑŒ каждого узла и может " -"Ñффективно работать Ñ Ð°Ñ‚Ð°ÐºÐ°Ð¼Ð¸ Sybil" +msgstr "Централизованный контроль уменьшает ÑложноÑÑ‚ÑŒ каждого узла и может Ñффективно работать Ñ Ð°Ñ‚Ð°ÐºÐ°Ð¼Ð¸ Sybil" #: i2p2www/pages/site/comparison/tor.html:110 msgid "" "A core of high capacity nodes provides higher\n" "throughput and lower latency" -msgstr "" -"Ðабор выÑокопроизводительных узлов обеÑпечивает выÑокую " -"производительноÑÑ‚ÑŒ и меньшие задержки" +msgstr "Ðабор выÑокопроизводительных узлов обеÑпечивает выÑокую производительноÑÑ‚ÑŒ и меньшие задержки" #: i2p2www/pages/site/comparison/tor.html:115 msgid "C, not Java (ewww)" @@ -751,11 +503,9 @@ msgstr "ПреимущеÑтва I2P перед Tor" #: i2p2www/pages/site/comparison/tor.html:120 msgid "" -"Designed and optimized for hidden services, which are much faster than in" -" Tor" -msgstr "" -"Разработан и оптимизирован Ð´Ð»Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ñ‹ Ñкрытых ÑервиÑов, что гораздо " -"быÑтрее, чем в Tor" +"Designed and optimized for hidden services, which are much faster than in " +"Tor" +msgstr "Разработан и оптимизирован Ð´Ð»Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ñ‹ Ñкрытых ÑервиÑов, что гораздо быÑтрее, чем в Tor" #: i2p2www/pages/site/comparison/tor.html:121 msgid "Fully distributed and self organizing" @@ -765,18 +515,13 @@ msgstr "ПолноÑтью раÑÐ¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ Ð¸ Ñамооргани msgid "" "Peers are selected by continuously profiling and ranking performance,\n" "rather than trusting claimed capacity" -msgstr "" -"Пиры выбираютÑÑ Ð½Ð° оÑнове поÑтоÑнного профайлинга и замеров по " -"производительноÑти,\n" -"нежели по объÑвленной пиром пропуÑкной ÑпоÑобноÑти" +msgstr "Пиры выбираютÑÑ Ð½Ð° оÑнове поÑтоÑнного профайлинга и замеров по производительноÑти,\nнежели по объÑвленной пиром пропуÑкной ÑпоÑобноÑти" #: i2p2www/pages/site/comparison/tor.html:129 msgid "" "Floodfill peers (\"directory servers\") are varying and untrusted,\n" "rather than hardcoded" -msgstr "" -"Пиры Floodfill (\"Ñправочные Ñервера\") поÑтоÑнно менÑÑŽÑ‚ÑÑ Ð¸ не обладают " -"доверием, в отличие от Ñвно прошитых в Tor" +msgstr "Пиры Floodfill (\"Ñправочные Ñервера\") поÑтоÑнно менÑÑŽÑ‚ÑÑ Ð¸ не обладают доверием, в отличие от Ñвно прошитых в Tor" #: i2p2www/pages/site/comparison/tor.html:134 msgid "Small enough that it hasn't been blocked or DOSed much, or at all" @@ -794,17 +539,13 @@ msgstr "Коммутирует пакеты вмеÑто Ñоединений" msgid "" "implicit transparent load balancing of messages \n" "across multiple peers, rather than a single path" -msgstr "" -"Ð¯Ð²Ð½Ð°Ñ Ð¿Ñ€Ð¾Ð·Ñ€Ð°Ñ‡Ð½Ð°Ñ Ð±Ð°Ð»Ð°Ð½Ñировка Ñообщений по многим пирам, в отличие от " -"иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ пути" +msgstr "Ð¯Ð²Ð½Ð°Ñ Ð¿Ñ€Ð¾Ð·Ñ€Ð°Ñ‡Ð½Ð°Ñ Ð±Ð°Ð»Ð°Ð½Ñировка Ñообщений по многим пирам, в отличие от иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ пути" #: i2p2www/pages/site/comparison/tor.html:145 msgid "" "resilience vs. failures by running multiple \n" "tunnels in parallel, plus rotating tunnels" -msgstr "" -"ÐадежноÑÑ‚ÑŒ и отказоуÑтойчивоÑÑ‚ÑŒ за Ñчет Ð¿Ð¾Ð´Ð´ÐµÑ€Ð¶Ð°Ð½Ð¸Ñ Ð½ÐµÑкольких " -"параллельных туннелей и обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ñ€Ð¾Ñ‚Ð°Ñ†Ð¸Ð¸ туннелей" +msgstr "ÐадежноÑÑ‚ÑŒ и отказоуÑтойчивоÑÑ‚ÑŒ за Ñчет Ð¿Ð¾Ð´Ð´ÐµÑ€Ð¶Ð°Ð½Ð¸Ñ Ð½ÐµÑкольких параллельных туннелей и обеÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ñ€Ð¾Ñ‚Ð°Ñ†Ð¸Ð¸ туннелей" #: i2p2www/pages/site/comparison/tor.html:151 msgid "" @@ -812,20 +553,14 @@ msgid "" "of O(N) (Alice has e.g. 2 inbound tunnels that are \n" "used by all of the peers Alice is talking with, \n" "rather than a circuit for each)" -msgstr "" -"ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»Ñ Ð¼Ð°ÑштабируютÑÑ ÐºÐ°Ðº O(1) вмеÑто O(N) " -"(например, ÐлиÑа держит 2 входÑщих туннелÑ, которые может иÑпользовать " -"любой пир, Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼ ÐлиÑа общаетÑÑ, а не держим по цепочке на каждый " -"пир)" +msgstr "ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»Ñ Ð¼Ð°ÑштабируютÑÑ ÐºÐ°Ðº O(1) вмеÑто O(N) (например, ÐлиÑа держит 2 входÑщих туннелÑ, которые может иÑпользовать любой пир, Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼ ÐлиÑа общаетÑÑ, а не держим по цепочке на каждый пир)" #: i2p2www/pages/site/comparison/tor.html:161 msgid "" "Unidirectional tunnels instead of bidirectional\n" "circuits, doubling the number of nodes a peer has to\n" "compromise to get the same information." -msgstr "" -"ОдноÑторонние туннели вмеÑто двуÑторонних цепочек, ÑƒÐ´Ð²Ð°Ð¸Ð²Ð°Ñ Ñ‡Ð¸Ñло узлов, " -"которые пир должен Ñкомпрометировать, чтобы получить ту же информацию" +msgstr "ОдноÑторонние туннели вмеÑто двуÑторонних цепочек, ÑƒÐ´Ð²Ð°Ð¸Ð²Ð°Ñ Ñ‡Ð¸Ñло узлов, которые пир должен Ñкомпрометировать, чтобы получить ту же информацию" #: i2p2www/pages/site/comparison/tor.html:166 #, python-format @@ -839,11 +574,7 @@ msgid "" "tunnels are used for more than simply passing end \n" "to end messages (e.g. netDb, tunnel management, \n" "tunnel testing)" -msgstr "" -"Защита против Ð´ÐµÑ‚ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ñкой активноÑти, даже еÑли\n" -"атакующий учаÑтвует в туннеле, так как туннели иÑпользуютÑÑ Ð½Ðµ только длÑ" -" передачи Ñообщений, но и Ð´Ð»Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ñ‹ NetDb, ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñми, " -"проверки работоÑпоÑобноÑти туннелей)" +msgstr "Защита против Ð´ÐµÑ‚ÐµÐºÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ñкой активноÑти, даже еÑли\nатакующий учаÑтвует в туннеле, так как туннели иÑпользуютÑÑ Ð½Ðµ только Ð´Ð»Ñ Ð¿ÐµÑ€ÐµÐ´Ð°Ñ‡Ð¸ Ñообщений, но и Ð´Ð»Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ñ‹ NetDb, ÑƒÐ¿Ñ€Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñми, проверки работоÑпоÑобноÑти туннелей)" #: i2p2www/pages/site/comparison/tor.html:180 msgid "" @@ -851,34 +582,24 @@ msgid "" "of samples that an attacker can use to mount an \n" "active attack with, unlike circuits in Tor, which are\n" "typically long lived." -msgstr "" -"Ð’ I2P реализованы короткоживущие туннели, что уменьшает количеÑтво " -"ÑпоÑобов, которые атакующий может иÑпользовать Ð´Ð»Ñ Ð°Ñ‚Ð°ÐºÐ¸, в отличие от " -"цепочек в Tor'е, которые как правило живут долго. " +msgstr "Ð’ I2P реализованы короткоживущие туннели, что уменьшает количеÑтво ÑпоÑобов, которые атакующий может иÑпользовать Ð´Ð»Ñ Ð°Ñ‚Ð°ÐºÐ¸, в отличие от цепочек в Tor'е, которые как правило живут долго. " #: i2p2www/pages/site/comparison/tor.html:188 msgid "" "I2P APIs are designed specifically for anonymity and\n" "security, while SOCKS is designed for functionality." -msgstr "" -"API I2P Ñпроектированы под анонимноÑÑ‚ÑŒ и безопаÑноÑÑ‚ÑŒ, тогда как SOCKS " -"Ñделан Ð´Ð»Ñ Ñ„ÑƒÐ½ÐºÑ†Ð¸Ð¾Ð½Ð°Ð»ÑŒÐ½Ð¾Ñти" +msgstr "API I2P Ñпроектированы под анонимноÑÑ‚ÑŒ и безопаÑноÑÑ‚ÑŒ, тогда как SOCKS Ñделан Ð´Ð»Ñ Ñ„ÑƒÐ½ÐºÑ†Ð¸Ð¾Ð½Ð°Ð»ÑŒÐ½Ð¾Ñти" #: i2p2www/pages/site/comparison/tor.html:193 msgid "Essentially all peers participate in routing for others" -msgstr "" -"За редким иÑключением, вÑе пиры учаÑтвуют в маршрутизации трафика Ð´Ð»Ñ " -"других" +msgstr "За редким иÑключением, вÑе пиры учаÑтвуют в маршрутизации трафика Ð´Ð»Ñ Ð´Ñ€ÑƒÐ³Ð¸Ñ…" #: i2p2www/pages/site/comparison/tor.html:195 msgid "" "The bandwidth overhead of being a full peer is low, \n" "while in Tor, while client nodes don't require much\n" "bandwidth, they don't fully participate in the mixnet." -msgstr "" -"Затраты на работу в полном режиме довольно низки, тогда как в Tor, еÑли " -"клиент Ñам по Ñебе не требует много полоÑÑ‹, но они еще и не полноÑтью " -"иÑпользуют Ñеть." +msgstr "Затраты на работу в полном режиме довольно низки, тогда как в Tor, еÑли клиент Ñам по Ñебе не требует много полоÑÑ‹, но они еще и не полноÑтью иÑпользуют Ñеть." #: i2p2www/pages/site/comparison/tor.html:201 msgid "Integrated automatic update mechanism" @@ -904,19 +625,14 @@ msgstr "... и, возможно, никогда не реализуемые, Ñ‚ msgid "" "Defense vs. message count analysis by garlic wrapping \n" "multiple messages" -msgstr "" -"Защита от количеÑтвенного анализа Ñообщений за Ñчет\n" -"Ð·Ð°Ð²Ð¾Ñ€Ð°Ñ‡Ð¸Ð²Ð°Ð½Ð¸Ñ Ð½ÐµÑкольких Ñообщений в одно" +msgstr "Защита от количеÑтвенного анализа Ñообщений за Ñчет\nÐ·Ð°Ð²Ð¾Ñ€Ð°Ñ‡Ð¸Ð²Ð°Ð½Ð¸Ñ Ð½ÐµÑкольких Ñообщений в одно" #: i2p2www/pages/site/comparison/tor.html:216 msgid "" "Defense vs. long term intersection by adding delays \n" "at various hops (where the delays are not discernible\n" "by other hops)" -msgstr "" -"Защита от ÑтатиÑтичеÑкого анализа за Ñчет Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð´ÐµÑ€Ð¶ÐµÐº на разных " -"хопах\n" -"(где задержки не завиÑÑÑ‚ от других хоÑтов)" +msgstr "Защита от ÑтатиÑтичеÑкого анализа за Ñчет Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð´ÐµÑ€Ð¶ÐµÐº на разных хопах\n(где задержки не завиÑÑÑ‚ от других хоÑтов)" #: i2p2www/pages/site/comparison/tor.html:223 msgid "" @@ -924,9 +640,4 @@ msgid "" "create a tunnel that will handle 500 messages / minute,\n" "where the endpoint will inject dummy messages if there\n" "are insufficient messages, etc)" -msgstr "" -"Разные Ñтратегии имитовÑтавки на уровне туннелей (например,\n" -"Ñоздание туннелÑ, который будет обрабатывать 500 Ñообщений в минуту, \n" -"где Ñндпойнт поÑылает Ñлучайные данные, еÑли полезный трафик не " -"передаетÑÑ Ð¸ Ñ‚.д.)" - +msgstr "Разные Ñтратегии имитовÑтавки на уровне туннелей (например,\nÑоздание туннелÑ, который будет обрабатывать 500 Ñообщений в минуту, \nгде Ñндпойнт поÑылает Ñлучайные данные, еÑли полезный трафик не передаетÑÑ Ð¸ Ñ‚.д.)" diff --git a/i2p2www/translations/ru/LC_MESSAGES/docs.po b/i2p2www/translations/ru/LC_MESSAGES/docs.po index be2467b48191f4ef06d6ed3dec41b70e0f448600..22e8165640f321299251085937cfbb903c34c6c8 100644 --- a/i2p2www/translations/ru/LC_MESSAGES/docs.po +++ b/i2p2www/translations/ru/LC_MESSAGES/docs.po @@ -4566,7 +4566,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:72 msgid "for" -msgstr "" +msgstr "длÑ" #: i2p2www/pages/site/docs/applications/git.html:74 msgid "in order to obscure your local time zone." diff --git a/i2p2www/translations/ru/LC_MESSAGES/misc.po b/i2p2www/translations/ru/LC_MESSAGES/misc.po index b1fc48127c08cd08590aa45725495365bf11175c..a48e11bbda58b58800d52146c0ab1caf0fc9ed08 100644 --- a/i2p2www/translations/ru/LC_MESSAGES/misc.po +++ b/i2p2www/translations/ru/LC_MESSAGES/misc.po @@ -1,13 +1,14 @@ -# Russian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Ackermann Yuriy <ackermann.yuriy@gmail.com>, 2015 # Aisha Medova <nyangasm@outlook.com>, 2017 # Aleksey Orekhov <opexob@yandex.ru>, 2013 # Alexander Georgievskiy <galeksandrp@gmail.com>, 2016 # Petr Polyakov, 2014 +# Alexander Georgievskiy <galeksandrp@gmail.com>, 2016 # Irina Fedulova <istartlin@gmail.com>, 2020 # joshua ridney, 2015 # jujjer <jujjer@gmail.com>, 2013 @@ -16,20 +17,18 @@ # yume, 2014-2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:55+0000\n" -"Last-Translator: zzzi2p\n" -"Language-Team: Russian (Russia) " -"(http://www.transifex.com/otf/I2P/language/ru_RU/)\n" -"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && " -"n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) " -"|| (n%100>=11 && n%100<=14)? 2 : 3)\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Irina Fedulova <istartlin@gmail.com>, 2020\n" +"Language-Team: Russian (Russia) (http://www.transifex.com/otf/I2P/language/ru_RU/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: ru_RU\n" +"Plural-Forms: nplurals=4; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<=4 && (n%100<12 || n%100>14) ? 1 : n%10==0 || (n%10>=5 && n%10<=9) || (n%100>=11 && n%100<=14)? 2 : 3);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -38,76 +37,39 @@ msgstr "I2P на CLT и PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"ПредÑтавители ÑообщеÑтва I2P выÑтупÑÑ‚ Ñ Ð´Ð¾ÐºÐ»Ð°Ð´Ð¾Ð¼ на CLT и PetCon 2009.1 \n" -"Два члена команды I2P примут учаÑтие в предÑтоÑщих конференциÑÑ… Linux day" -" и security convention." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "ПредÑтавители ÑообщеÑтва I2P выÑтупÑÑ‚ Ñ Ð´Ð¾ÐºÐ»Ð°Ð´Ð¾Ð¼ на CLT и PetCon 2009.1 \nДва члена команды I2P примут учаÑтие в предÑтоÑщих конференциÑÑ… Linux day и security convention." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" -msgstr "" -"14 марта 2009 года ÑоÑтоитÑÑ Ð²Ñтреча, на которой будет предÑтавлена Ñеть " -"I2P, на <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, " -"Ð¿Ñ€Ð¾Ð²Ð¾Ð´Ð¸Ð¼Ð°Ñ echelon.\n" -"Echelon и некоторые члены ÑообщеÑтва I2P будут приÑутÑтвовать на вÑтрече " -"два полных Ð´Ð½Ñ (Ñуббота и воÑкреÑенье). Ð’ÑтретьтеÑÑŒ Ñ Ð½Ð¸Ð¼Ð¸, задайте " -"вопроÑÑ‹, поделитеÑÑŒ Ñвоими предложениÑми! Поддержите I2P!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" +msgstr "14 марта 2009 года ÑоÑтоитÑÑ Ð²Ñтреча, на которой будет предÑтавлена Ñеть I2P, на <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a>, Ð¿Ñ€Ð¾Ð²Ð¾Ð´Ð¸Ð¼Ð°Ñ echelon.\nEchelon и некоторые члены ÑообщеÑтва I2P будут приÑутÑтвовать на вÑтрече два полных Ð´Ð½Ñ (Ñуббота и воÑкреÑенье). Ð’ÑтретьтеÑÑŒ Ñ Ð½Ð¸Ð¼Ð¸, задайте вопроÑÑ‹, поделитеÑÑŒ Ñвоими предложениÑми! Поддержите I2P!" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." -msgstr "" -"10 днÑми позже в Дрездене пройдет Ñъезд <a href=\"%(petcon)s\">Privacy " -"and Data Security</a>.\n" -"Echelon поÑетит Ñто Ñобытие и раÑÑкажет о базовых принципах I2P. Также " -"будет другой доклад о возможноÑÑ‚ÑÑ… Ð¿Ñ€Ð¾Ñ„Ð¸Ð»Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ð°Ð¼Ð¸ I2P." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." +msgstr "10 днÑми позже в Дрездене пройдет Ñъезд <a href=\"%(petcon)s\">Privacy and Data Security</a>.\nEchelon поÑетит Ñто Ñобытие и раÑÑкажет о базовых принципах I2P. Также будет другой доклад о возможноÑÑ‚ÑÑ… Ð¿Ñ€Ð¾Ñ„Ð¸Ð»Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ð°Ð¼Ð¸ I2P." #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." -msgstr "" -"Ранее иÑходный код I2P хранилÑÑ Ð² CVS репозитории. Теперь он хранитÑÑ Ð² " -"репозитории <a href=\"%(monotone)s\">Monotone</a>.\n" -"Ð”Ð»Ñ Ñ‚ÐµÑ…, кто не очень знаком Ñ CVS, еÑÑ‚ÑŒ <a href=\"http://cvsbook.red-" -"bean.com/cvsbook.html\">потрÑÑÐ°ÑŽÑ‰Ð°Ñ ÐºÐ½Ð¸Ð³Ð°</a> по теме (разработчикам " -"потребуетÑÑ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ Ð¿ÐµÑ€Ð²Ð°Ñ Ð³Ð»Ð°Ð²Ð° — \"Обзор CVS\", тогда как поÑледующие " -"главы каÑаютÑÑ Ð½ÐµÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ñ… неприÑтных деталей, Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼Ð¸ врÑд ли доведетÑÑ" -" ÑталкиватьÑÑ)." +msgstr "Ранее иÑходный код I2P хранилÑÑ Ð² CVS репозитории. Теперь он хранитÑÑ Ð² репозитории <a href=\"%(monotone)s\">Monotone</a>.\nÐ”Ð»Ñ Ñ‚ÐµÑ…, кто не очень знаком Ñ CVS, еÑÑ‚ÑŒ <a href=\"http://cvsbook.red-bean.com/cvsbook.html\">потрÑÑÐ°ÑŽÑ‰Ð°Ñ ÐºÐ½Ð¸Ð³Ð°</a> по теме (разработчикам потребуетÑÑ Ñ‚Ð¾Ð»ÑŒÐºÐ¾ Ð¿ÐµÑ€Ð²Ð°Ñ Ð³Ð»Ð°Ð²Ð° — \"Обзор CVS\", тогда как поÑледующие главы каÑаютÑÑ Ð½ÐµÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ñ… неприÑтных деталей, Ñ ÐºÐ¾Ñ‚Ð¾Ñ€Ñ‹Ð¼Ð¸ врÑд ли доведетÑÑ ÑталкиватьÑÑ)." #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" -msgstr "" -"Ð—Ð°Ð±Ð°Ð²Ð½Ð°Ñ Ñ†Ð¸Ñ‚Ð°Ñ‚Ð° из WiCVS: \"Знаете ли... Ðикогда не ÑкÑпериментируйте Ñ " -"новыми командами CVS в дейÑтвующем репозитории. Создайте теÑтовый модуль " -"вмеÑто него.\"" +msgstr "Ð—Ð°Ð±Ð°Ð²Ð½Ð°Ñ Ñ†Ð¸Ñ‚Ð°Ñ‚Ð° из WiCVS: \"Знаете ли... Ðикогда не ÑкÑпериментируйте Ñ Ð½Ð¾Ð²Ñ‹Ð¼Ð¸ командами CVS в дейÑтвующем репозитории. Создайте теÑтовый модуль вмеÑто него.\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:2 #: i2p2www/pages/site/misc/i2ptunnel-migration.html:4 @@ -155,10 +117,7 @@ msgstr "Ð’ качеÑтве порта назначениÑ:" msgid "" "For the private key file: <code>path to \"myWebPriv.dat\"</code><br /> \n" "(it is recommended to copy that .dat to your new install dir)" -msgstr "" -"Ð’ качеÑтве пути к файлу Ñ Ð·Ð°ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ ключом: <code>путь к " -"\"myWebPriv.dat\"</code><br />\n" -"(рекомендуетÑÑ Ñкопировать Ñтот .dat-файл в директорию Ñ Ð½Ð¾Ð²Ð¾Ð¹ уÑтановкой)" +msgstr "Ð’ качеÑтве пути к файлу Ñ Ð·Ð°ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ ключом: <code>путь к \"myWebPriv.dat\"</code><br />\n(рекомендуетÑÑ Ñкопировать Ñтот .dat-файл в директорию Ñ Ð½Ð¾Ð²Ð¾Ð¹ уÑтановкой)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:29 msgid "Check the \"Start automatically?\" checkbox" @@ -174,22 +133,12 @@ msgstr "Будет выведено Ñообщение:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" -msgstr "" -"Ðто вÑÑ‘! Создание нового I2PTunnel Ñервера работает точно таким же " -"образом, только вам, конечно, не потребуетÑÑ \"копировать Ñтарый файл\". " -"Ðа Ñамом деле вÑÑ‘ Ñто управлÑетÑÑ Ñ„Ð°Ð¹Ð»Ð¾Ð¼ <code>i2ptunnel.config</code>, " -"который вы можете изменить отдельно (еÑли вы Ñто Ñделаете, нажмите " -"\"Перезагрузить конфигурацию\" на Ñтранице I2PTunnel, при Ñтом вÑе " -"ÑущеÑтвующие туннели будут разорваны и поÑтроены новые)" +msgstr "Ðто вÑÑ‘! Создание нового I2PTunnel Ñервера работает точно таким же образом, только вам, конечно, не потребуетÑÑ \"копировать Ñтарый файл\". Ðа Ñамом деле вÑÑ‘ Ñто управлÑетÑÑ Ñ„Ð°Ð¹Ð»Ð¾Ð¼ <code>i2ptunnel.config</code>, который вы можете изменить отдельно (еÑли вы Ñто Ñделаете, нажмите \"Перезагрузить конфигурацию\" на Ñтранице I2PTunnel, при Ñтом вÑе ÑущеÑтвующие туннели будут разорваны и поÑтроены новые)" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:47 msgid "" @@ -198,12 +147,7 @@ msgid "" "interface. It will say \"Please be patient\" if you try to \n" "beforehand, which means that it is still trying to build the \n" "necessary I2PTunnel sessions it has been configured to create." -msgstr "" -"Учтите, что перед иÑпользованием интерфейÑа /i2ptunnel/ потребуетÑÑ " -"подождать, пока маршрутизатор интегрируетÑÑ Ð² Ñеть. До Ñтого времени " -"будет поÑвлÑÑ‚ÑŒÑÑ Ñообщение Ñ Ð¿Ñ€Ð¾Ñьбой подождать, что означает, что " -"маршрутизатор находитÑÑ Ð² процеÑÑе поÑÑ‚Ñ€Ð¾ÐµÐ½Ð¸Ñ Ð½ÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ñ‹Ñ… ÑеÑÑий " -"I2PTunnel в ÑоответÑтвии Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸ÐµÐ¹." +msgstr "Учтите, что перед иÑпользованием интерфейÑа /i2ptunnel/ потребуетÑÑ Ð¿Ð¾Ð´Ð¾Ð¶Ð´Ð°Ñ‚ÑŒ, пока маршрутизатор интегрируетÑÑ Ð² Ñеть. До Ñтого времени будет поÑвлÑÑ‚ÑŒÑÑ Ñообщение Ñ Ð¿Ñ€Ð¾Ñьбой подождать, что означает, что маршрутизатор находитÑÑ Ð² процеÑÑе поÑÑ‚Ñ€Ð¾ÐµÐ½Ð¸Ñ Ð½ÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ñ‹Ñ… ÑеÑÑий I2PTunnel в ÑоответÑтвии Ñ ÐºÐ¾Ð½Ñ„Ð¸Ð³ÑƒÑ€Ð°Ñ†Ð¸ÐµÐ¹." #: i2p2www/pages/site/misc/i2ptunnel-services.html:2 msgid "I2PTunnel services" @@ -222,69 +166,48 @@ msgid "" "For simplicity's sake, we will walk through the setup of a web server; " "however, this procedure is the same regardless what protocol of servers " "and/or clients you are setting up." -msgstr "" -"Ð”Ð»Ñ Ð¿Ñ€Ð¾Ñтоты мы раÑÑмотрим процедуру наÑтройки Ð´Ð»Ñ Ð²ÐµÐ±-Ñервера; тем не " -"менее, Ñта процедура одинакова вне завиÑимоÑти от того, Ñерверы и/или " -"клиенты Ð´Ð»Ñ ÐºÐ°ÐºÐ¸Ñ… протоколов вы уÑтанавливаете." +msgstr "Ð”Ð»Ñ Ð¿Ñ€Ð¾Ñтоты мы раÑÑмотрим процедуру наÑтройки Ð´Ð»Ñ Ð²ÐµÐ±-Ñервера; тем не менее, Ñта процедура одинакова вне завиÑимоÑти от того, Ñерверы и/или клиенты Ð´Ð»Ñ ÐºÐ°ÐºÐ¸Ñ… протоколов вы уÑтанавливаете." #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." -msgstr "" -"Я рекомендую иÑпользовать веб-Ñервер Tiny Httpd, thttpd, (на Ñайте " -"доÑтупна windows-верÑиÑ), но вы можете иÑпользовать то, что удобно вам." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." +msgstr "Я рекомендую иÑпользовать веб-Ñервер Tiny Httpd, thttpd, (на Ñайте доÑтупна windows-верÑиÑ), но вы можете иÑпользовать то, что удобно вам." #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." -msgstr "" -"Другим более Ñтойким вариантом ÑвлÑетÑÑ Ð¸Ñпользование EasyPHP, также Ñ " -"открытым иÑходным кодом. EasyPHP поÑтавлÑетÑÑ Ð²Ð¼ÐµÑте Ñ PHP, PHPmyadmin, " -"mySQL, и веб-Ñервером Apache. Ð”Ð»Ñ Ð½Ð¾Ð²Ð¸Ñ‡ÐºÐ¾Ð², еÑли нет опыта по наÑтройке и" -" размещению контента на Ñерверах, рекомендуем проÑмотреть Ñтраницу о " -"хоÑтинге Ð´Ð»Ñ Ñправки." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." +msgstr "Другим более Ñтойким вариантом ÑвлÑетÑÑ Ð¸Ñпользование EasyPHP, также Ñ Ð¾Ñ‚ÐºÑ€Ñ‹Ñ‚Ñ‹Ð¼ иÑходным кодом. EasyPHP поÑтавлÑетÑÑ Ð²Ð¼ÐµÑте Ñ PHP, PHPmyadmin, mySQL, и веб-Ñервером Apache. Ð”Ð»Ñ Ð½Ð¾Ð²Ð¸Ñ‡ÐºÐ¾Ð², еÑли нет опыта по наÑтройке и размещению контента на Ñерверах, рекомендуем проÑмотреть Ñтраницу о хоÑтинге Ð´Ð»Ñ Ñправки." #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." -msgstr "" -"ÐаÑтройте выбранный вами веб-Ñервер на нужный порт и корневую директорию " -"Ñ Ð²ÐµÐ±-документами. Ð’ Ñтом примере будет иÑпользоватьÑÑ Ð¿Ð¾Ñ€Ñ‚ 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." +msgstr "ÐаÑтройте выбранный вами веб-Ñервер на нужный порт и корневую директорию Ñ Ð²ÐµÐ±-документами. Ð’ Ñтом примере будет иÑпользоватьÑÑ Ð¿Ð¾Ñ€Ñ‚ 10880." #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 msgid "" "Make sure your firewall is set up so that you cannot receive incoming " "connections on this port (which would breach your anonymity)." -msgstr "" -"УбедитеÑÑŒ, что ваш межÑетевой Ñкран запрещает входÑщие ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ð½Ð° Ñтом" -" порту (что нарушило бы вашу анонимноÑÑ‚ÑŒ)." +msgstr "УбедитеÑÑŒ, что ваш межÑетевой Ñкран запрещает входÑщие ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ð½Ð° Ñтом порту (что нарушило бы вашу анонимноÑÑ‚ÑŒ)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:25 msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." -msgstr "" -"Попробуйте открыть при помощи вашего обычного браузера (того, у которого " -"\"прÑмое Ñоединение\") Ñтраницу по адреÑу <a " -"href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> Ð´Ð»Ñ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐºÐ¸ работы " -"веб-Ñервера (при необходимоÑти замените 10880 на выбранный вами порт)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." +msgstr "Попробуйте открыть при помощи вашего обычного браузера (того, у которого \"прÑмое Ñоединение\") Ñтраницу по адреÑу <a href=\"http://localhost:10880\" target=\"_blank\">http://localhost:10880</a> Ð´Ð»Ñ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐºÐ¸ работы веб-Ñервера (при необходимоÑти замените 10880 на выбранный вами порт)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 msgid "" "Once your webserver is working, and you can access it locally with your " "browser, continue to the next step." -msgstr "" -"Когда убедитеÑÑŒ, что ваш веб-Ñервер работает корректно и вы можете зайти " -"на него локально из браузера - переходите к Ñледующему шагу." +msgstr "Когда убедитеÑÑŒ, что ваш веб-Ñервер работает корректно и вы можете зайти на него локально из браузера - переходите к Ñледующему шагу." #: i2p2www/pages/site/misc/i2ptunnel-services.html:33 msgid "2 - Generate an I2P Destination Keypair" @@ -292,45 +215,29 @@ msgstr "2 - Ð“ÐµÐ½ÐµÑ€Ð°Ñ†Ð¸Ñ I2P пары ключей назначениÑ" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." -msgstr "" -"ВнутреннÑÑ Ñеть I2P не иÑпользует IP-адреÑа. Ð”Ð»Ñ Ð·Ð°Ñ‰Ð¸Ñ‚Ñ‹ вашей анонимноÑти" -" она иÑпользует уникальные адреÑа, называемые ключами назначениÑ." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." +msgstr "ВнутреннÑÑ Ñеть I2P не иÑпользует IP-адреÑа. Ð”Ð»Ñ Ð·Ð°Ñ‰Ð¸Ñ‚Ñ‹ вашей анонимноÑти она иÑпользует уникальные адреÑа, называемые ключами назначениÑ." #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" -msgstr "" -"Ключ адреÑа Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ð°ÐµÑ‚ почти как обычные IP-адреÑа, иÑÐºÐ»ÑŽÑ‡Ð°Ñ " -"возможноÑÑ‚ÑŒ отÑледить его до вашего реального IP-адреÑа или " -"дейÑтвительного меÑтонахождениÑ. Когда пользователи отправлÑÑŽÑ‚ Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð½Ð° " -"ÑвÑзь Ñ Ð²Ð°Ð¼Ð¸, то шлюзы отвечают за ваÑ. Таким образом, пользователь, " -"который отправил запроÑ, может узнать только IP-адреÑа шлюзов. Однако, " -"шлюзы не знают ваш IP-адреÑ, так как шлюзы ÑвлÑÑŽÑ‚ÑÑ Ð¿Ð¾Ñледними узлами " -"туннелей, и вы анонимно Ñоздаете туннели Ñ Ð¿Ð¾Ð¼Ð¾Ñ‰ÑŒÑŽ чеÑночной " -"маршрутизации. (Шлюзы как марионетки, которые не могут видеть кукловода, " -"при Ñтом вÑе иÑпользуют их Ð´Ð»Ñ Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" +msgstr "Ключ адреÑа Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ð°ÐµÑ‚ почти как обычные IP-адреÑа, иÑÐºÐ»ÑŽÑ‡Ð°Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑ‚ÑŒ отÑледить его до вашего реального IP-адреÑа или дейÑтвительного меÑтонахождениÑ. Когда пользователи отправлÑÑŽÑ‚ Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð½Ð° ÑвÑзь Ñ Ð²Ð°Ð¼Ð¸, то шлюзы отвечают за ваÑ. Таким образом, пользователь, который отправил запроÑ, может узнать только IP-адреÑа шлюзов. Однако, шлюзы не знают ваш IP-адреÑ, так как шлюзы ÑвлÑÑŽÑ‚ÑÑ Ð¿Ð¾Ñледними узлами туннелей, и вы анонимно Ñоздаете туннели Ñ Ð¿Ð¾Ð¼Ð¾Ñ‰ÑŒÑŽ чеÑночной маршрутизации. (Шлюзы как марионетки, которые не могут видеть кукловода, при Ñтом вÑе иÑпользуют их Ð´Ð»Ñ Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" -msgstr "" -"Ð”Ð»Ñ Ñ€Ð°Ð·Ð²ÐµÑ€Ñ‚Ñ‹Ð²Ð°Ð½Ð¸Ñ Ñервера в I2P вы Ñоздаете пару ключей назначениÑ. " -"Закрытый ключ иÑпользуетÑÑ Ð´Ð»Ñ Ð°ÑƒÑ‚ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸Ð¸ вашего Ñервера при его " -"подключении к I2P. Открытый ключ (ключ назначениÑ) публикуетÑÑ, чтобы " -"клиенты могли ÑоединÑÑ‚ÑŒÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером (не напрÑмую, через ваши " -"шлюзы)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" +msgstr "Ð”Ð»Ñ Ñ€Ð°Ð·Ð²ÐµÑ€Ñ‚Ñ‹Ð²Ð°Ð½Ð¸Ñ Ñервера в I2P вы Ñоздаете пару ключей назначениÑ. Закрытый ключ иÑпользуетÑÑ Ð´Ð»Ñ Ð°ÑƒÑ‚ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸Ð¸ вашего Ñервера при его подключении к I2P. Открытый ключ (ключ назначениÑ) публикуетÑÑ, чтобы клиенты могли ÑоединÑÑ‚ÑŒÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером (не напрÑмую, через ваши шлюзы)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 msgid "Each service you run on I2P requires a different keypair." @@ -341,77 +248,52 @@ msgid "" "To generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code> (all on one line)" -msgstr "" -"Выполните Ñледующую команду Ð´Ð»Ñ Ð³ÐµÐ½ÐµÑ€Ð°Ñ†Ð¸Ð¸ пары ключей: <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " -"myWebPubKey.dat\"</code> (в одну Ñтроку)" +msgstr "Выполните Ñледующую команду Ð´Ð»Ñ Ð³ÐµÐ½ÐµÑ€Ð°Ñ†Ð¸Ð¸ пары ключей: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code> (в одну Ñтроку)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:50 msgid "" "In windows, to generate your keypair, type the command: <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat " "myWebPubKey.dat\"</code>" -msgstr "" -"Выполните Ñледующую команду Ð´Ð»Ñ Ð³ÐµÐ½ÐµÑ€Ð°Ñ†Ð¸Ð¸ пары ключей, еÑли вы " -"иÑпользуете Windows: <code>java -jar lib/i2ptunnel.jar -nogui -e " -"\"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>" +msgstr "Выполните Ñледующую команду Ð´Ð»Ñ Ð³ÐµÐ½ÐµÑ€Ð°Ñ†Ð¸Ð¸ пары ключей, еÑли вы иÑпользуете Windows: <code>java -jar lib/i2ptunnel.jar -nogui -e \"genkeys myWebPrivKey.dat myWebPubKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." -msgstr "" -"Имена файлов <code>myWebPrivKey.dat</code> и <code>myWebPubKey.dat</code>" -" не обÑзательно должны быть именно такими - задайте Ñвои, еÑли хотите, но" -" не забывайте о Ñвоём выборе." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." +msgstr "Имена файлов <code>myWebPrivKey.dat</code> и <code>myWebPubKey.dat</code> не обÑзательно должны быть именно такими - задайте Ñвои, еÑли хотите, но не забывайте о Ñвоём выборе." #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 msgid "" "We now need to export your public key into base64 format, which you will " "share with others." -msgstr "" -"Теперь нам нужно ÑкÑпортировать публичный ключ, закодированный в base64, " -"Ð´Ð»Ñ Ð¿Ð¾Ñледующей его публикации." +msgstr "Теперь нам нужно ÑкÑпортировать публичный ключ, закодированный в base64, Ð´Ð»Ñ Ð¿Ð¾Ñледующей его публикации." #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." -msgstr "" -"Чтобы закодировать ваш myWebPubKey.dat в base64 Ð´Ð»Ñ Ð¿ÑƒÐ±Ð»Ð¸ÐºÐ°Ñ†Ð¸Ð¸ и обмена, " -"выполните такую команду <code>java -cp lib/i2p.jar net.i2p.data.Base64 " -"encode myWebPubKey.dat > myWebPubKey.txt</code> (в одну Ñтрочку)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." +msgstr "Чтобы закодировать ваш myWebPubKey.dat в base64 Ð´Ð»Ñ Ð¿ÑƒÐ±Ð»Ð¸ÐºÐ°Ñ†Ð¸Ð¸ и обмена, выполните такую команду <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > myWebPubKey.txt</code> (в одну Ñтрочку)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." -msgstr "" -"Файл <code>myWebPubKey.txt</code>, который вы только что Ñгенерировали, " -"Ñодержит длинную base64-Ñтроку (516 Ñимволов по нашим подÑчётам), котораÑ" -" называетÑÑ ÐºÐ»ÑŽÑ‡Ð¾Ð¼ назначениÑ. Ðа текущий момент вÑÑ‘, что вам нужно знать" -" об Ñтой Ñтроке - Ñто то, что она позволÑет удалённым клиентам однозначно" -" определить и ÑоединитьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером точно так же, как IP-Ð°Ð´Ñ€ÐµÑ " -"позволÑет удалённым уÑтройÑтвам определÑÑ‚ÑŒ ваш компьютер и ÑоединÑÑ‚ÑŒÑÑ Ñ " -"ним." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." +msgstr "Файл <code>myWebPubKey.txt</code>, который вы только что Ñгенерировали, Ñодержит длинную base64-Ñтроку (516 Ñимволов по нашим подÑчётам), ÐºÐ¾Ñ‚Ð¾Ñ€Ð°Ñ Ð½Ð°Ð·Ñ‹Ð²Ð°ÐµÑ‚ÑÑ ÐºÐ»ÑŽÑ‡Ð¾Ð¼ назначениÑ. Ðа текущий момент вÑÑ‘, что вам нужно знать об Ñтой Ñтроке - Ñто то, что она позволÑет удалённым клиентам однозначно определить и ÑоединитьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером точно так же, как IP-Ð°Ð´Ñ€ÐµÑ Ð¿Ð¾Ð·Ð²Ð¾Ð»Ñет удалённым уÑтройÑтвам определÑÑ‚ÑŒ ваш компьютер и ÑоединÑÑ‚ÑŒÑÑ Ñ Ð½Ð¸Ð¼." #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." -msgstr "" -"Ðо в отличие от IP-адреÑа при иÑпользовании ключа Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ " -"определить физичеÑкое меÑтонахождение вашего уÑтройÑтва; IP-Ð°Ð´Ñ€ÐµÑ Ð²Ð°ÑˆÐµÐ³Ð¾ " -"Ñервера не может быть отÑлежен или ÑвÑзан Ñ Ñтим ключом Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð´Ð°Ð¶Ðµ " -"неÑÐ¼Ð¾Ñ‚Ñ€Ñ Ð½Ð° то, что ваш Ñервер доÑтупен в I2P." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." +msgstr "Ðо в отличие от IP-адреÑа при иÑпользовании ключа Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ определить физичеÑкое меÑтонахождение вашего уÑтройÑтва; IP-Ð°Ð´Ñ€ÐµÑ Ð²Ð°ÑˆÐµÐ³Ð¾ Ñервера не может быть отÑлежен или ÑвÑзан Ñ Ñтим ключом Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð´Ð°Ð¶Ðµ неÑÐ¼Ð¾Ñ‚Ñ€Ñ Ð½Ð° то, что ваш Ñервер доÑтупен в I2P." #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 msgid "3 - Open a 'Tunnel' from I2P To Your Server" @@ -419,52 +301,37 @@ msgstr "3 - Создайте \"Туннель\" из I2P к вашему Ñер #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." -msgstr "" -"Ð”Ð»Ñ Ñ‚Ð¾Ð³Ð¾, чтобы клиенты из I2P Ñмогли получить доÑтуп к вашему Ñерверу, " -"вы должны открыть \"моÑÑ‚\" или \"туннель\", который направлÑет ÑоединениÑ" -" от Ñтих клиентов на ваш локальный Ñервер." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." +msgstr "Ð”Ð»Ñ Ñ‚Ð¾Ð³Ð¾, чтобы клиенты из I2P Ñмогли получить доÑтуп к вашему Ñерверу, вы должны открыть \"моÑÑ‚\" или \"туннель\", который направлÑет ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ð¾Ñ‚ Ñтих клиентов на ваш локальный Ñервер." #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 msgid "" "To activate such a tunnel, type the command <code>java -jar " "lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code> (all one line)." -msgstr "" -"Ð”Ð»Ñ Ð°ÐºÑ‚Ð¸Ð²Ð°Ñ†Ð¸Ð¸ Ñтого Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñ Ð²Ñ‹Ð¿Ð¾Ð»Ð½Ð¸Ñ‚Ðµ команду <code>java -jar " -"lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " -"myWebPrivKey.dat\"</code> (в одну Ñтрочку)." +msgstr "Ð”Ð»Ñ Ð°ÐºÑ‚Ð¸Ð²Ð°Ñ†Ð¸Ð¸ Ñтого Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñ Ð²Ñ‹Ð¿Ð¾Ð»Ð½Ð¸Ñ‚Ðµ команду <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code> (в одну Ñтрочку)." #: i2p2www/pages/site/misc/i2ptunnel-services.html:78 msgid "" "If you used different filenames or port number earlier on, change these " "accordingly" -msgstr "" -"ЕÑли вы иÑпользовали другие имена Ð´Ð»Ñ Ñ„Ð°Ð¹Ð»Ð¾Ð² или номер порта - измените " -"их и здеÑÑŒ" +msgstr "ЕÑли вы иÑпользовали другие имена Ð´Ð»Ñ Ñ„Ð°Ð¹Ð»Ð¾Ð² или номер порта - измените их и здеÑÑŒ" #: i2p2www/pages/site/misc/i2ptunnel-services.html:81 msgid "" "Windows users, remember to replace apostrophes with double quotes. Thus: " "<code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 " "myWebPrivKey.dat\"</code>" -msgstr "" -"Пользователи Windows - не забудьте заменить апоÑтрофы на двойные кавычки." -" Т.е.: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost " -"10880 myWebPrivKey.dat\"</code>" +msgstr "Пользователи Windows - не забудьте заменить апоÑтрофы на двойные кавычки. Т.е.: <code>java -jar lib/i2ptunnel.jar -nogui -e \"server localhost 10880 myWebPrivKey.dat\"</code>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." -msgstr "" -"Ð’ течение неÑкольких Ñекунд \"туннель\" должен активироватьÑÑ, и " -"удалённые клиенты Ñмогут ÑоединÑÑ‚ÑŒÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером анонимно. Ðе " -"забудьте дать маршрутизатору Ð²Ñ€ÐµÐ¼Ñ \"разогретьÑÑ\" перед тем, как " -"приглашать поÑетителей." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." +msgstr "Ð’ течение неÑкольких Ñекунд \"туннель\" должен активироватьÑÑ, и удалённые клиенты Ñмогут ÑоединÑÑ‚ÑŒÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером анонимно. Ðе забудьте дать маршрутизатору Ð²Ñ€ÐµÐ¼Ñ \"разогретьÑÑ\" перед тем, как приглашать поÑетителей." #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 msgid "4 - Update Your hosts.txt File " @@ -476,30 +343,21 @@ msgid "" "hosts.txt file, so I2P can translate the simple URL you place in the " "browser's address bar into the full public key text needed to find your " "server." -msgstr "" -"Ð”Ð»Ñ Ñ‚ÐµÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð²Ð°ÑˆÐµÐ³Ð¾ Ñервера локально потребуетÑÑ Ñоздать запиÑÑŒ в " -"hosts.txt, чтобы Ñеть I2P могла преобразовать вводимый в браузере URL в " -"полный открытый ключ, необходимый Ð´Ð»Ñ Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ñервера." +msgstr "Ð”Ð»Ñ Ñ‚ÐµÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð²Ð°ÑˆÐµÐ³Ð¾ Ñервера локально потребуетÑÑ Ñоздать запиÑÑŒ в hosts.txt, чтобы Ñеть I2P могла преобразовать вводимый в браузере URL в полный открытый ключ, необходимый Ð´Ð»Ñ Ð¾Ð±Ð½Ð°Ñ€ÑƒÐ¶ÐµÐ½Ð¸Ñ Ñервера." #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" -msgstr "" -"Отредактируйте hosts.i2p: добавьте Ñтроку myserver.i2p=blahblahblah, \n" -"где myserver.i2p — 'домен' в I2P, на котором вы хотите размеÑтить Ñайт, \n" -"а blahblahblah — открытый ключ в виде base64, который вы Ñоздали ранее в " -"файле myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" +msgstr "Отредактируйте hosts.i2p: добавьте Ñтроку myserver.i2p=blahblahblah, \nгде myserver.i2p — 'домен' в I2P, на котором вы хотите размеÑтить Ñайт, \nа blahblahblah — открытый ключ в виде base64, который вы Ñоздали ранее в файле myWebPubKey.txt" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 msgid "" "With this in place, you and others can reach your server with the simple " "domain name myserver.i2p in the browser's address bar." -msgstr "" -"ЕÑли вÑÑ‘ указано верно, вы и другие пользователи Ñмогут ÑвÑзатьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼" -" Ñервером, Ð²Ð²ÐµÐ´Ñ Ð´Ð¾Ð¼ÐµÐ½Ð½Ð¾Ðµ Ð¸Ð¼Ñ myserver.i2p в адреÑную Ñтроку браузера." +msgstr "ЕÑли вÑÑ‘ указано верно, вы и другие пользователи Ñмогут ÑвÑзатьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером, Ð²Ð²ÐµÐ´Ñ Ð´Ð¾Ð¼ÐµÐ½Ð½Ð¾Ðµ Ð¸Ð¼Ñ myserver.i2p в адреÑную Ñтроку браузера." #: i2p2www/pages/site/misc/i2ptunnel-services.html:102 msgid "5 - Surf Your Site Within I2P" @@ -510,10 +368,7 @@ msgid "" "Using your secondary browser - the one you earlier configured to use " "localhost:4444 as a proxy - point this browser to the address <a " "href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" -msgstr "" -"Укажите вашему второму браузеру - тому, который вы наÑтроили на " -"иÑпользование localhost:4444 в качеÑтве прокÑи-Ñервера - поÑетить Ð°Ð´Ñ€ÐµÑ " -"<a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" +msgstr "Укажите вашему второму браузеру - тому, который вы наÑтроили на иÑпользование localhost:4444 в качеÑтве прокÑи-Ñервера - поÑетить Ð°Ð´Ñ€ÐµÑ <a href=\"http://myserver.i2p\" target=\"_blank\">http://myserver.i2p</a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:107 msgid "You should see the main page of your webserver come up." @@ -529,61 +384,43 @@ msgstr "Теперь пора задуматьÑÑ Ð¾ чём-то большем #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." -msgstr "" -"Когда вы ближе познакомитеÑÑŒ Ñ I2P, вы захотите пользоватьÑÑ Ð²ÑÑкого рода" -" Ñерверами и клиентами." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." +msgstr "Когда вы ближе познакомитеÑÑŒ Ñ I2P, вы захотите пользоватьÑÑ Ð²ÑÑкого рода Ñерверами и клиентами." #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." -msgstr "" -"ПрелеÑÑ‚ÑŒ I2P заключаетÑÑ Ð² том, что она позволÑет вполне обычным клиентам" -" и Ñерверам большинÑтва протоколов работать без оÑобой перенаÑтройки " -"путём их 'туннелированиÑ' через анонимную Ñеть." +msgstr "ПрелеÑÑ‚ÑŒ I2P заключаетÑÑ Ð² том, что она позволÑет вполне обычным клиентам и Ñерверам большинÑтва протоколов работать без оÑобой перенаÑтройки путём их 'туннелированиÑ' через анонимную Ñеть." #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." -msgstr "" -"Ð’Ñ‹ можете иÑпользовать почтовые Ñерверы/клиенты, Ñерверы/клиенты " -"Ñ€Ð°Ð·Ñ€ÐµÑˆÐµÐ½Ð¸Ñ Ð¸Ð¼Ñ‘Ð½, новоÑтные Ñерверы/клиенты - практичеÑки вÑÑ‘ - возможно, " -"даже FTP в паÑÑивном режиме." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." +msgstr "Ð’Ñ‹ можете иÑпользовать почтовые Ñерверы/клиенты, Ñерверы/клиенты Ñ€Ð°Ð·Ñ€ÐµÑˆÐµÐ½Ð¸Ñ Ð¸Ð¼Ñ‘Ð½, новоÑтные Ñерверы/клиенты - практичеÑки вÑÑ‘ - возможно, даже FTP в паÑÑивном режиме." #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." -msgstr "" -"Теперь Ñоздадим клиентÑкий туннель. Он похож на Ñерверный, Ñозданный нами" -" ранее, но работает в обратном направлении. Он ждёт Ñоединений на " -"определённом порту на вашем компьютере; ваш локальный клиент ÑоединÑетÑÑ " -"Ñ Ñтим портом; Ñоединение перенаправлÑетÑÑ Ñ‡ÐµÑ€ÐµÐ· I2P к ÑервиÑу на другом " -"конце туннелÑ." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." +msgstr "Теперь Ñоздадим клиентÑкий туннель. Он похож на Ñерверный, Ñозданный нами ранее, но работает в обратном направлении. Он ждёт Ñоединений на определённом порту на вашем компьютере; ваш локальный клиент ÑоединÑетÑÑ Ñ Ñтим портом; Ñоединение перенаправлÑетÑÑ Ñ‡ÐµÑ€ÐµÐ· I2P к ÑервиÑу на другом конце туннелÑ." #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." -msgstr "" -"Ð”Ð»Ñ Ð¾Ñ‚ÐºÑ€Ñ‹Ñ‚Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ñкого Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñ Ð´Ð»Ñ Ñервера наберите команду code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (вÑÑ‘ одной Ñтрокой)" +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." +msgstr "Ð”Ð»Ñ Ð¾Ñ‚ÐºÑ€Ñ‹Ñ‚Ð¸Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ñкого Ñ‚ÑƒÐ½Ð½ÐµÐ»Ñ Ð´Ð»Ñ Ñервера наберите команду code>java -jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 textofbase64key\"</code> (вÑÑ‘ одной Ñтрокой)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." -msgstr "" -"Порт 10888 выбран произвольно - он проÑто должен отличатьÑÑ Ð¾Ñ‚ порта, на " -"котором ожидает Ñоединений ваш Ñервер." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." +msgstr "Порт 10888 выбран произвольно - он проÑто должен отличатьÑÑ Ð¾Ñ‚ порта, на котором ожидает Ñоединений ваш Ñервер." #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 msgid "" @@ -591,51 +428,34 @@ msgid "" "myWebPubKey.txt, reproduced fully on one line (alternately, instead of " "textofbase64key, you can specify the name from your hosts.txt - e.g. " "myserver.i2p)" -msgstr "" -"textofbase64key — Ñто Ñодержимое текÑтового файла myWebPubKey.txt, " -"воÑпроизведенное полноÑтью в одну линию (как вариант, вмеÑто " -"textofbase64key можно выбрать Ð¸Ð¼Ñ Ð¸Ð· hosts.txt, например, myserver.i2p)" +msgstr "textofbase64key — Ñто Ñодержимое текÑтового файла myWebPubKey.txt, воÑпроизведенное полноÑтью в одну линию (как вариант, вмеÑто textofbase64key можно выбрать Ð¸Ð¼Ñ Ð¸Ð· hosts.txt, например, myserver.i2p)" #: i2p2www/pages/site/misc/i2ptunnel-services.html:138 msgid "" "Within a minute or two of launching this command, the client tunnel from " "your local machine into I2P will be open and ready for use." -msgstr "" -"КлиентÑкий туннель Ñ Ð²Ð°ÑˆÐµÐ³Ð¾ компьютера в I2P откроетÑÑ Ð¸ будет готов к " -"иÑпользованию через пару минут поÑле Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ñтой команды." +msgstr "КлиентÑкий туннель Ñ Ð²Ð°ÑˆÐµÐ³Ð¾ компьютера в I2P откроетÑÑ Ð¸ будет готов к иÑпользованию через пару минут поÑле Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ñтой команды." #: i2p2www/pages/site/misc/i2ptunnel-services.html:141 msgid "" "Point your regular web browser (ie, not the one you configured to use " "localhost:4444), and point it to <a href=\"http://localhost:10888\" " "target=\"_blank\">http://localhost:10888</a>" -msgstr "" -"Зайдите браузером (не тем, который наÑтроен иÑпользовать localhost:4444) " -"на <a href=\"http://localhost:10888\" " -"target=\"_blank\">http://localhost:10888</a>" +msgstr "Зайдите браузером (не тем, который наÑтроен иÑпользовать localhost:4444) на <a href=\"http://localhost:10888\" target=\"_blank\">http://localhost:10888</a>" #: i2p2www/pages/site/misc/i2ptunnel-services.html:144 msgid "" "Verify that the main page of your server eventually comes up in your " "browser." -msgstr "" -"УдоÑтоверьтеÑÑŒ, что Ð³Ð»Ð°Ð²Ð½Ð°Ñ Ñтраница вашего Ñервера отображаетÑÑ Ð² " -"браузере." +msgstr "УдоÑтоверьтеÑÑŒ, что Ð³Ð»Ð°Ð²Ð½Ð°Ñ Ñтраница вашего Ñервера отображаетÑÑ Ð² браузере." #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." -msgstr "" -"ИÑпользование локальных клиентÑких программ Ð´Ð»Ñ Ð´Ð¾Ñтупа к удаленному " -"Ñерверу I2P ничем не отличаетÑÑ Ð¾Ñ‚ обычной процедуры: получаете открытый " -"ключ удаленного Ñервера в виде base64 (ключ адреÑа назначениÑ), выбираете" -" локальный порт Ð´Ð»Ñ ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ ÑƒÐ´Ð°Ð»ÐµÐ½Ð½Ñ‹Ð¼ Ñервером, открываете туннель, " -"проÑто подÑоединÑетеÑÑŒ клиентÑкой программой и получаете доÑтуп к вашему " -"любимому контенту." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." +msgstr "ИÑпользование локальных клиентÑких программ Ð´Ð»Ñ Ð´Ð¾Ñтупа к удаленному Ñерверу I2P ничем не отличаетÑÑ Ð¾Ñ‚ обычной процедуры: получаете открытый ключ удаленного Ñервера в виде base64 (ключ адреÑа назначениÑ), выбираете локальный порт Ð´Ð»Ñ ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ ÑƒÐ´Ð°Ð»ÐµÐ½Ð½Ñ‹Ð¼ Ñервером, открываете туннель, проÑто подÑоединÑетеÑÑŒ клиентÑкой программой и получаете доÑтуп к вашему любимому контенту." #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 msgid "7 - Share your server details with others" @@ -645,44 +465,26 @@ msgstr "7 - ПоделитеÑÑŒ адреÑом вашего Ñервера" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." -msgstr "" -"ИÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ñ‹Ðµ ÑредÑтва (например, один из I2P IRC-Ñерверов или " -"ugha's wiki), Ñообщите доменное Ð¸Ð¼Ñ (например, <a " -"href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> " -"вмеÑте Ñ ÐºÐ»ÑŽÑ‡Ð¾Ð¼ адреÑа назначениÑ. ПоÑле Ñтого другие пользователи Ñмогут" -" ÑоединитьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером без риÑка Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ и их анонимноÑти." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." +msgstr "ИÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ñ‹Ðµ ÑредÑтва (например, один из I2P IRC-Ñерверов или ugha's wiki), Ñообщите доменное Ð¸Ð¼Ñ (например, <a href=\"http://www.mynick.i2p\" target=\"_blank\">www.mynick.i2p</a> вмеÑте Ñ ÐºÐ»ÑŽÑ‡Ð¾Ð¼ адреÑа назначениÑ. ПоÑле Ñтого другие пользователи Ñмогут ÑоединитьÑÑ Ñ Ð²Ð°ÑˆÐ¸Ð¼ Ñервером без риÑка Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ и их анонимноÑти." #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." -msgstr "" -"Помните, что вы можете зайти на What's on I2P и найти Ñамые поÑледние " -"публичные ключи, привÑзанные к URL. Ð’Ñ‹ также должны размеÑтить там Ñвои " -"публичный ключи и URL. РазумеетÑÑ, вы захотите Ñделать Ñто анонимно. " -"Drupal.i2p.net в наÑтоÑщее времÑ, по ÑоÑтоÑнию на момент напиÑÐ°Ð½Ð¸Ñ Ñтого " -"текÑта, доÑтупен только из Ñети. Таким образом, Ð´Ð»Ñ Ñ‚Ð¾Ð³Ð¾ чтобы получить " -"доÑтуп к внешней Ñети WWW анонимно из внутренней I2P, вам придетÑÑ " -"запуÑтить ваш Ñкрипт под названием startSquid. Сделайте Ñто таким же " -"образом, как вы делали другие Ñкрипты. ПеренаÑтройте Ñвой браузер на " -"прокÑи localhost:5555, как определено в Ñкрипте, и когда Ñкрипт " -"Ñгенерирует Ñвои ключи, вы Ñможете получить доÑтуп к прокÑи-приманке. " -"Ð’Ñтавьте любой URL (например, Google или Ñтот i2p-Ñайт) в адреÑную Ñтроку" -" браузера и вы будете Ñерфить в интернете анонимно. Ð¡ÐµÐ¹Ñ‡Ð°Ñ Ð²Ñ‹ можете " -"безопаÑно указывать ваш публичный ключ, и никто не узнает ваш IP-адреÑ." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." +msgstr "Помните, что вы можете зайти на What's on I2P и найти Ñамые поÑледние публичные ключи, привÑзанные к URL. Ð’Ñ‹ также должны размеÑтить там Ñвои публичный ключи и URL. РазумеетÑÑ, вы захотите Ñделать Ñто анонимно. Drupal.i2p.net в наÑтоÑщее времÑ, по ÑоÑтоÑнию на момент напиÑÐ°Ð½Ð¸Ñ Ñтого текÑта, доÑтупен только из Ñети. Таким образом, Ð´Ð»Ñ Ñ‚Ð¾Ð³Ð¾ чтобы получить доÑтуп к внешней Ñети WWW анонимно из внутренней I2P, вам придетÑÑ Ð·Ð°Ð¿ÑƒÑтить ваш Ñкрипт под названием startSquid. Сделайте Ñто таким же образом, как вы делали другие Ñкрипты. ПеренаÑтройте Ñвой браузер на прокÑи localhost:5555, как определено в Ñкрипте, и когда Ñкрипт Ñгенерирует Ñвои ключи, вы Ñможете получить доÑтуп к прокÑи-приманке. Ð’Ñтавьте любой URL (например, Google или Ñтот i2p-Ñайт) в адреÑную Ñтроку браузера и вы будете Ñерфить в интернете анонимно. Ð¡ÐµÐ¹Ñ‡Ð°Ñ Ð²Ñ‹ можете безопаÑно указывать ваш публичный ключ, и никто не узнает ваш IP-адреÑ." #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 msgid "8 - Write Some Scripts To Handle All This Menial Nonsense" @@ -690,11 +492,9 @@ msgstr "8 - ÐапиÑать Ñкрипты, чтобы ÑправитьÑÑ Ñ #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." -msgstr "" -"ЕÑли проходить через Ñти шаги каждый раз, когда вы наÑтраиваете I2P " -"Ñервер или развертываете клиент, то можно Ñойти Ñ ÑƒÐ¼Ð°." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." +msgstr "ЕÑли проходить через Ñти шаги каждый раз, когда вы наÑтраиваете I2P Ñервер или развертываете клиент, то можно Ñойти Ñ ÑƒÐ¼Ð°." #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 msgid "" @@ -702,45 +502,29 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." -msgstr "" -"Сайт Aum <a href=\"http://www.freenet.org.nz/i2p/\" " -"target=\"_blank\">http://www.freenet.org.nz/i2p/</a> Ñодержит Ñкрипт " -"setupServer.py, который автоматизирует вÑе Ñти шаги в одной командной " -"Ñтроке. Ðо Ñ ÑƒÐ²Ð°Ð¶Ð°ÑŽ, что предÑÑ‚Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð»ÑŽÐ´ÐµÐ¹ об интерфейÑах отличаютÑÑ, и" -" попытка напиÑать что-то удовлетворÑющее вÑем требованиÑм обычно приводит" -" к громоздким и непонÑтным вещам, которые отпугивают новичков." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." +msgstr "Сайт Aum <a href=\"http://www.freenet.org.nz/i2p/\" target=\"_blank\">http://www.freenet.org.nz/i2p/</a> Ñодержит Ñкрипт setupServer.py, который автоматизирует вÑе Ñти шаги в одной командной Ñтроке. Ðо Ñ ÑƒÐ²Ð°Ð¶Ð°ÑŽ, что предÑÑ‚Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð»ÑŽÐ´ÐµÐ¹ об интерфейÑах отличаютÑÑ, и попытка напиÑать что-то удовлетворÑющее вÑем требованиÑм обычно приводит к громоздким и непонÑтным вещам, которые отпугивают новичков." #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 msgid "" "So please feel free to use and/or customize setupServer.py to taste, or " "write your own in Python or another language." -msgstr "" -"ПожалуйÑта, Ñвободно пользуйтеÑÑŒ и подÑтраивайте на Ñвой Ð²ÐºÑƒÑ " -"setupServer.py или напишите Ñвой ÑобÑтвенный на Python или другом Ñзыке." +msgstr "ПожалуйÑта, Ñвободно пользуйтеÑÑŒ и подÑтраивайте на Ñвой Ð²ÐºÑƒÑ setupServer.py или напишите Ñвой ÑобÑтвенный на Python или другом Ñзыке." #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." -msgstr "" -"Также вы можете захотеть напиÑать Ñкрипт, который управлÑет загрузкой " -"маршрутизатора I2P, eepProxy, а также иÑпользуемыми вами туннелÑми. У " -"Ð¼ÐµÐ½Ñ ÐµÑÑ‚ÑŒ такой Ñкрипт, называетÑÑ startEverything.sh, загружаетÑÑ Ð¿Ñ€Ð¸ " -"входе в ÑиÑтему. (Ðе забудьте найти на Ñайте шаблоны Ñкриптов Ð´Ð»Ñ " -"автоматизации команд I2P. ЕÑли Ñ Ñоздам Ð´Ð»Ñ Ð½Ð¸Ñ… Ñтраницы, то поÑтараюÑÑŒ " -"указать здеÑÑŒ ÑÑылки." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." +msgstr "Также вы можете захотеть напиÑать Ñкрипт, который управлÑет загрузкой маршрутизатора I2P, eepProxy, а также иÑпользуемыми вами туннелÑми. У Ð¼ÐµÐ½Ñ ÐµÑÑ‚ÑŒ такой Ñкрипт, называетÑÑ startEverything.sh, загружаетÑÑ Ð¿Ñ€Ð¸ входе в ÑиÑтему. (Ðе забудьте найти на Ñайте шаблоны Ñкриптов Ð´Ð»Ñ Ð°Ð²Ñ‚Ð¾Ð¼Ð°Ñ‚Ð¸Ð·Ð°Ñ†Ð¸Ð¸ команд I2P. ЕÑли Ñ Ñоздам Ð´Ð»Ñ Ð½Ð¸Ñ… Ñтраницы, то поÑтараюÑÑŒ указать здеÑÑŒ ÑÑылки." #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." -msgstr "" -"Упражнение Ð´Ð»Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÐµÐ¹ Windows: перенеÑти setupServer.py в файл MS-" -"DOS .BAT" +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgstr "Упражнение Ð´Ð»Ñ Ð¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ñ‚ÐµÐ»ÐµÐ¹ Windows: перенеÑти setupServer.py в файл MS-DOS .BAT" #: i2p2www/pages/site/misc/invisiblenet.html:2 msgid "Old Documents" @@ -748,19 +532,12 @@ msgstr "Старые документы" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." -msgstr "" -"Ðиже Ñледует ÑпиÑок документов, изначально раÑположенных по адреÑу " -"www.invisiblenet.net/i2p/ и Ñохраненных в <a " -"href=\"http://www.archive.org/\">Wayback Machine</a>.\n" -"Они довольно Ñтарые и могут быть или не быть точными.\n" -"Однако, Ð´Ð¾ÐºÑƒÐ¼ÐµÐ½Ñ‚Ð°Ñ†Ð¸Ñ Ð¾ I2CP и I2NP Ñодержит много полезной информации." +"However, the I2CP and I2NP documents in particular have some good information." +msgstr "Ðиже Ñледует ÑпиÑок документов, изначально раÑположенных по адреÑу www.invisiblenet.net/i2p/ и Ñохраненных в <a href=\"http://www.archive.org/\">Wayback Machine</a>.\nОни довольно Ñтарые и могут быть или не быть точными.\nОднако, Ð´Ð¾ÐºÑƒÐ¼ÐµÐ½Ñ‚Ð°Ñ†Ð¸Ñ Ð¾ I2CP и I2NP Ñодержит много полезной информации." #: i2p2www/pages/site/misc/jbigi.html:3 msgid "August 2011" @@ -772,15 +549,10 @@ msgstr "Обзор" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." -msgstr "" -"При помощи JNI (Java Native Interface), небольшого кода на C (ÑпаÑибо, " -"ugha!), небольшого\n" -"количеÑтва ручной работы и куÑочка жвачки мы заÑтавили некоторые\n" -"криптографичеÑкие операции работать немного быÑтрее." +msgstr "При помощи JNI (Java Native Interface), небольшого кода на C (ÑпаÑибо, ugha!), небольшого\nколичеÑтва ручной работы и куÑочка жвачки мы заÑтавили некоторые\nкриптографичеÑкие операции работать немного быÑтрее." #: i2p2www/pages/site/misc/jbigi.html:13 #, python-format @@ -791,41 +563,21 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." -msgstr "" -"УÑÐºÐ¾Ñ€ÐµÐ½Ð¸Ñ ÑƒÐ´Ð°Ð»Ð¾ÑÑŒ доÑтичь за Ñчёт иÑпользованиÑ\n" -"<a href=\"%(gmplib)s\">библиотеки GNU MP Bignum (libgmp)</a>.\n" -"Мы иÑпользуем одну функцию из libgmp -\n" -"<a href=\"%(func)s\">mpz_powm()</a>\n" -"как замену длÑ\n" -"<a href=\"%(bigint)s\">функции modPow() из библиотеки Java Math " -"BigInteger</a>.\n" -"Ртак как Ð·Ð½Ð°Ñ‡Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð°Ñ Ñ‡Ð°ÑÑ‚ÑŒ вычиÑлений иÑпользует modPow() - Ñто " -"позволило неплохо уÑкоритьÑÑ." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." +msgstr "УÑÐºÐ¾Ñ€ÐµÐ½Ð¸Ñ ÑƒÐ´Ð°Ð»Ð¾ÑÑŒ доÑтичь за Ñчёт иÑпользованиÑ\n<a href=\"%(gmplib)s\">библиотеки GNU MP Bignum (libgmp)</a>.\nМы иÑпользуем одну функцию из libgmp -\n<a href=\"%(func)s\">mpz_powm()</a>\nкак замену длÑ\n<a href=\"%(bigint)s\">функции modPow() из библиотеки Java Math BigInteger</a>.\nРтак как Ð·Ð½Ð°Ñ‡Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð°Ñ Ñ‡Ð°ÑÑ‚ÑŒ вычиÑлений иÑпользует modPow() - Ñто позволило неплохо уÑкоритьÑÑ." #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>\n" "is used." -msgstr "" -"Ð¡Ñ‚Ð°Ð½Ð´Ð°Ñ€Ñ‚Ð½Ð°Ñ Ð¿Ð¾Ñтавка I2P Ñодержит около 20 верÑий библиотеки Ð´Ð»Ñ Ñ€Ð°Ð·Ð½Ñ‹Ñ… " -"платформ, ÐºÐ°Ð¶Ð´Ð°Ñ Ð¾ÐºÐ¾Ð»Ð¾ 50КБ, в файле jbigi.jar.\n" -"Ð˜Ð½Ð¸Ñ†Ð¸Ð°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ¸ JBigI, Ð²ÐºÐ»ÑŽÑ‡Ð°Ñ Ð¸Ð´ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸ÑŽ CPU, выбор и " -"извлечение подходÑщего загрузочного модулÑ, управлÑетÑÑ <a " -"href=\"%(nativebigint)s\">клаÑÑом NativeBigInteger</a>.\n" -"ЕÑли модуль недоÑтупен Ð´Ð»Ñ Ñ‚ÐµÐºÑƒÑ‰ÐµÐ¹ платформы, то иÑпользуетÑÑ ÑтандартнаÑ" -" Ñ„ÑƒÐ½ÐºÑ†Ð¸Ñ <a href=\"%(bigint)s\">BigInteger modPow() из библиотеки Java " -"Math</a>." +msgstr "Ð¡Ñ‚Ð°Ð½Ð´Ð°Ñ€Ñ‚Ð½Ð°Ñ Ð¿Ð¾Ñтавка I2P Ñодержит около 20 верÑий библиотеки Ð´Ð»Ñ Ñ€Ð°Ð·Ð½Ñ‹Ñ… платформ, ÐºÐ°Ð¶Ð´Ð°Ñ Ð¾ÐºÐ¾Ð»Ð¾ 50КБ, в файле jbigi.jar.\nÐ˜Ð½Ð¸Ñ†Ð¸Ð°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ¸ JBigI, Ð²ÐºÐ»ÑŽÑ‡Ð°Ñ Ð¸Ð´ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸ÑŽ CPU, выбор и извлечение подходÑщего загрузочного модулÑ, управлÑетÑÑ <a href=\"%(nativebigint)s\">клаÑÑом NativeBigInteger</a>.\nЕÑли модуль недоÑтупен Ð´Ð»Ñ Ñ‚ÐµÐºÑƒÑ‰ÐµÐ¹ платформы, то иÑпользуетÑÑ ÑÑ‚Ð°Ð½Ð´Ð°Ñ€Ñ‚Ð½Ð°Ñ Ñ„ÑƒÐ½ÐºÑ†Ð¸Ñ <a href=\"%(bigint)s\">BigInteger modPow() из библиотеки Java Math</a>." #: i2p2www/pages/site/misc/jbigi.html:38 msgid "Rebuilding and Testing JBigI" @@ -833,12 +585,9 @@ msgstr "ПереÑборка и ТеÑтирование JBigI" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." -msgstr "" -"Ðиже приведены инÑтрукции Ð´Ð»Ñ Ñборки новой библиотеки jbigi Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ " -"платформы и теÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐµÑ‘ производительноÑти " +msgstr "Ðиже приведены инÑтрукции Ð´Ð»Ñ Ñборки новой библиотеки jbigi Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ платформы и теÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ ÐµÑ‘ производительноÑти " #: i2p2www/pages/site/misc/jbigi.html:42 msgid "Requirements" @@ -847,50 +596,28 @@ msgstr "ТребованиÑ" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." -msgstr "" -"Ðто работает на Linux, а Ñ Ð½ÐµÐ±Ð¾Ð»ÑŒÑˆÐ¸Ð¼Ð¸ изменениÑми в build.sh, вероÑтно, и" -" на других платформах. СообщаетÑÑ, что работает в том чиÑле и на FreeBSD." -" Ðа Kaffee уÑкорение незначительно, так как там уже иÑпользуетÑÑ Ð½Ð°Ñ‚Ð¸Ð²Ð½Ñ‹Ð¹" -" BigInteger.\n" -"Blackdown похоже вызывает Ñтранные ошибки. Так как вам потребуетÑÑ " -"компилировать, необходимо иметь JDK; Ñ JRE не выйдет." +msgstr "Ðто работает на Linux, а Ñ Ð½ÐµÐ±Ð¾Ð»ÑŒÑˆÐ¸Ð¼Ð¸ изменениÑми в build.sh, вероÑтно, и на других платформах. СообщаетÑÑ, что работает в том чиÑле и на FreeBSD. Ðа Kaffee уÑкорение незначительно, так как там уже иÑпользуетÑÑ Ð½Ð°Ñ‚Ð¸Ð²Ð½Ñ‹Ð¹ BigInteger.\nBlackdown похоже вызывает Ñтранные ошибки. Так как вам потребуетÑÑ ÐºÐ¾Ð¼Ð¿Ð¸Ð»Ð¸Ñ€Ð¾Ð²Ð°Ñ‚ÑŒ, необходимо иметь JDK; Ñ JRE не выйдет." #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " -msgstr "" -"Ðеобходимый код доÑтупен в бд monotone и поÑледнем архиве Ñ Ð¸Ñходным " -"кодом." +"The required code is available in monotone database and the latest source " +"tarball. " +msgstr "Ðеобходимый код доÑтупен в бд monotone и поÑледнем архиве Ñ Ð¸Ñходным кодом." #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." -msgstr "" -"ТребуетÑÑ ÑƒÑтановка библиотеки GNU MP Bignum (libgmp), еÑли она не " -"включена в вашу ОС/диÑтрибутив или не уÑтановлена ранее, то её можно " -"загрузить Ñ <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Даже еÑли вы уÑтановили её ранее, может быть Ñтоит Ñкомпилировать GMP " -"ÑамоÑтоÑтельно, чтобы можно было иÑпользовать Ñпецифичные инÑтрукции " -"вашего процеÑÑора. Также можно иÑпользовать поÑледнюю верÑию GMP вмеÑто " -"верÑии GMP 5.0.2, но мы ещё не проводили теÑтирование." +msgstr "ТребуетÑÑ ÑƒÑтановка библиотеки GNU MP Bignum (libgmp), еÑли она не включена в вашу ОС/диÑтрибутив или не уÑтановлена ранее, то её можно загрузить Ñ <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Даже еÑли вы уÑтановили её ранее, может быть Ñтоит Ñкомпилировать GMP ÑамоÑтоÑтельно, чтобы можно было иÑпользовать Ñпецифичные инÑтрукции вашего процеÑÑора. Также можно иÑпользовать поÑледнюю верÑию GMP вмеÑто верÑии GMP 5.0.2, но мы ещё не проводили теÑтирование." #: i2p2www/pages/site/misc/jbigi.html:61 msgid "Step-by-step instructions" @@ -898,19 +625,13 @@ msgstr "Пошаговые инÑтрукции" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" -msgstr "" -"ПоÑмотрите на <a href=\"http://localhost:7657/logs.jsp\">вашу Ñреду " -"Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð½Ð° Ñтранице logs.jsp</a>. Там должно быть одно из двух " -"Ñообщений о ÑтатуÑе JBigI, любое." +msgstr "ПоÑмотрите на <a href=\"http://localhost:7657/logs.jsp\">вашу Ñреду Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð½Ð° Ñтранице logs.jsp</a>. Там должно быть одно из двух Ñообщений о ÑтатуÑе JBigI, любое." #: i2p2www/pages/site/misc/jbigi.html:66 msgid "Locally optimized native BigInteger loaded from the library path" -msgstr "" -"Локально Ð¾Ð¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger загружена по " -"указанному пути" +msgstr "Локально Ð¾Ð¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger загружена по указанному пути" #: i2p2www/pages/site/misc/jbigi.html:68 msgid "or" @@ -928,53 +649,26 @@ msgid "" "may require you to compile your own library.\n" "If the BigInteger library was loaded, do at least the next step to see\n" "what your performance is." -msgstr "" -"ЕÑли Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger ÐЕ была загружена, то вам определенно" -" нужно Ñкомпилировать Ñвою. \n" -"Ðекоторые платформы, такие как OS X, OpenSolaris и 64-битные ÑиÑтемы, " -"могут потребовать компилÑцию Ñвоей ÑобÑтвенной библиотеки. \n" -"ЕÑли библиотека BigInteger была загружена, проделайте Ñ…Ð¾Ñ‚Ñ Ð±Ñ‹ Ñледующий " -"шаг, чтобы определить производительноÑÑ‚ÑŒ." +msgstr "ЕÑли Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger ÐЕ была загружена, то вам определенно нужно Ñкомпилировать Ñвою. \nÐекоторые платформы, такие как OS X, OpenSolaris и 64-битные ÑиÑтемы, могут потребовать компилÑцию Ñвоей ÑобÑтвенной библиотеки. \nЕÑли библиотека BigInteger была загружена, проделайте Ñ…Ð¾Ñ‚Ñ Ð±Ñ‹ Ñледующий шаг, чтобы определить производительноÑÑ‚ÑŒ." #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." -msgstr "" -"Зайдите на <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>," -" чтобы увидеть Ñреднее Ð²Ñ€ÐµÐ¼Ñ ÑущеÑÑ‚Ð²Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ð¹ Ð´Ð»Ñ " -"<code>crypto.elGamal.decrypt</code> и " -"<code>crypto.elGamal.encrypt</code>. Ð—Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ ÑƒÐºÐ°Ð·Ð°Ð½Ñ‹ в миллиÑекундах. " -"Скопируйте Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ ÐºÑƒÐ´Ð°-нибудь так, чтобы вы могли Ñравнить Ñ Ð½Ð¸Ð¼Ð¸ " -"позже. \n" -"Среднее Ð²Ñ€ÐµÐ¼Ñ Ð´Ð»Ñ ÑˆÐ¸Ñ„Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² Ñети — около 20мÑ.\n" -"ЕÑли Ð²Ñ€ÐµÐ¼Ñ ÑˆÐ¸Ñ„Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÐ½ÐµÐµ 50Ð¼Ñ Ð´Ð»Ñ Ð´Ð¾Ñтаточно нового процеÑÑора или " -"менее 100Ð¼Ñ Ð´Ð»Ñ Ñтарого, Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger загружена, то у " -"ваÑ, вероÑтно, вÑÑ‘ в порÑдке." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." +msgstr "Зайдите на <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>, чтобы увидеть Ñреднее Ð²Ñ€ÐµÐ¼Ñ ÑущеÑÑ‚Ð²Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ð¹ Ð´Ð»Ñ <code>crypto.elGamal.decrypt</code> и <code>crypto.elGamal.encrypt</code>. Ð—Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ ÑƒÐºÐ°Ð·Ð°Ð½Ñ‹ в миллиÑекундах. Скопируйте Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ ÐºÑƒÐ´Ð°-нибудь так, чтобы вы могли Ñравнить Ñ Ð½Ð¸Ð¼Ð¸ позже. \nСреднее Ð²Ñ€ÐµÐ¼Ñ Ð´Ð»Ñ ÑˆÐ¸Ñ„Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² Ñети — около 20мÑ.\nЕÑли Ð²Ñ€ÐµÐ¼Ñ ÑˆÐ¸Ñ„Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÐ½ÐµÐµ 50Ð¼Ñ Ð´Ð»Ñ Ð´Ð¾Ñтаточно нового процеÑÑора или менее 100Ð¼Ñ Ð´Ð»Ñ Ñтарого, Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° BigInteger загружена, то у ваÑ, вероÑтно, вÑÑ‘ в порÑдке." #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" -msgstr "" -"Скачайте поÑледний выпущенный иÑходный код I2P на <a " -"href=\"%(downloads)s\">Ñтранице загрузок</a> или из бд monotone " -"mtn.i2p2.de" +msgstr "Скачайте поÑледний выпущенный иÑходный код I2P на <a href=\"%(downloads)s\">Ñтранице загрузок</a> или из бд monotone mtn.i2p2.de" #: i2p2www/pages/site/misc/jbigi.html:92 msgid "Inside the source tree change directory to: <code>core/c/jbigi</code>" @@ -986,62 +680,30 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." -msgstr "" -"Прочитайте файл README.\n" -"ЕÑли у Ð²Ð°Ñ ÐµÑÑ‚ÑŒ файл /usr/lib/libgmp.so, то Ñкачивать GMP не требуетÑÑ.\n" -"ИÑпользуйте параметр 'dynamic' Ð´Ð»Ñ build.sh.\n" -"Ð’ противном Ñлучае вам необходимо Ñкачать GMP верÑии 5.0.2 Ñ <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"Ñохранив как gmp-5.0.2.tar.bz2.\n" -"ЕÑли вы решите иÑпользовать более новую верÑию, то измените параметр VER=" -" в файле <code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." +msgstr "Прочитайте файл README.\nЕÑли у Ð²Ð°Ñ ÐµÑÑ‚ÑŒ файл /usr/lib/libgmp.so, то Ñкачивать GMP не требуетÑÑ.\nИÑпользуйте параметр 'dynamic' Ð´Ð»Ñ build.sh.\nÐ’ противном Ñлучае вам необходимо Ñкачать GMP верÑии 5.0.2 Ñ <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, Ñохранив как gmp-5.0.2.tar.bz2.\nЕÑли вы решите иÑпользовать более новую верÑию, то измените параметр VER= в файле <code>core/c/jbigi/build.sh</code>." #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." -msgstr "" -"ПроÑмотрите <code>build.sh</code>, еÑли Ð¿ÐµÑ€ÐµÐ¼ÐµÐ½Ð½Ð°Ñ Ð¾ÐºÑ€ÑƒÐ¶ÐµÐ½Ð¸Ñ " -"<code>JAVA_HOME</code> уÑтановлена и вы иÑпользуете Linux, то вÑÑ‘ Ñто " -"может уÑпешно работать.\n" -"Иначе измените наÑтройки. Ðе забудьте, что требуетÑÑ Ð½Ð°Ð»Ð¸Ñ‡Ð¸Ðµ " -"уÑтановленного Java SDK." +msgstr "ПроÑмотрите <code>build.sh</code>, еÑли Ð¿ÐµÑ€ÐµÐ¼ÐµÐ½Ð½Ð°Ñ Ð¾ÐºÑ€ÑƒÐ¶ÐµÐ½Ð¸Ñ <code>JAVA_HOME</code> уÑтановлена и вы иÑпользуете Linux, то вÑÑ‘ Ñто может уÑпешно работать.\nИначе измените наÑтройки. Ðе забудьте, что требуетÑÑ Ð½Ð°Ð»Ð¸Ñ‡Ð¸Ðµ уÑтановленного Java SDK." #: i2p2www/pages/site/misc/jbigi.html:106 msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." -msgstr "" -"Выполните <code>build.sh</code> (еÑли вы Ñкачивали GMP) или\n" -"<code>build.sh dynamic</code> (еÑли у Ð²Ð°Ñ ÐµÑÑ‚ÑŒ /usr/lib/libgmp.so).<br/>\n" -"Возможно, Ñкрипт выдаÑÑ‚ ошибки об отÑутÑтвии файлов jni.h и jni_md.h.\n" -"Или Ñкопируйте Ñти файлы из уÑтановки java в директорию " -"core/c/jbigi/jbigi/include/, или иÑправьте $JAVA_HOME.<br>\n" -"Ð’Ñ‹ можете запуÑтить <code>build.sh</code> из директории " -"<code>core/c/</code>, в результате будет выполнена Ñборка вÑех доÑтупных " -"библиотек jbigi в jbigi.jar.</br>\n" -"Ð’ текущей директории должен быть Ñоздан файл <code>libjbigi.so</code>. " -"ЕÑли Ñтого не произойдет и/или будут ÑÐ¾Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ Ð¾Ð± ошибках, пожалуйÑта, " -"раÑÑкажите нам об Ñтом." +msgstr "Выполните <code>build.sh</code> (еÑли вы Ñкачивали GMP) или\n<code>build.sh dynamic</code> (еÑли у Ð²Ð°Ñ ÐµÑÑ‚ÑŒ /usr/lib/libgmp.so).<br/>\nВозможно, Ñкрипт выдаÑÑ‚ ошибки об отÑутÑтвии файлов jni.h и jni_md.h.\nИли Ñкопируйте Ñти файлы из уÑтановки java в директорию core/c/jbigi/jbigi/include/, или иÑправьте $JAVA_HOME.<br>\nÐ’Ñ‹ можете запуÑтить <code>build.sh</code> из директории <code>core/c/</code>, в результате будет выполнена Ñборка вÑех доÑтупных библиотек jbigi в jbigi.jar.</br>\nÐ’ текущей директории должен быть Ñоздан файл <code>libjbigi.so</code>. ЕÑли Ñтого не произойдет и/или будут ÑÐ¾Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ Ð¾Ð± ошибках, пожалуйÑта, раÑÑкажите нам об Ñтом." #: i2p2www/pages/site/misc/jbigi.html:118 msgid "" @@ -1049,19 +711,13 @@ msgid "" "the speed test.\n" "Read the final lines of the speed test's output for some additional\n" "info, it will be something like this:" -msgstr "" -"Ð”Ð»Ñ ÑƒÑтановки библиотеки и запуÑка теÑта ÑкороÑти Ñледуйте инÑтрукциÑм в " -"core/c/README.\n" -"Прочитайте поÑледние Ñтроки результата теÑта Ð´Ð»Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð¾Ð¹ " -"информации, они будут похожи на:" +msgstr "Ð”Ð»Ñ ÑƒÑтановки библиотеки и запуÑка теÑта ÑкороÑти Ñледуйте инÑтрукциÑм в core/c/README.\nПрочитайте поÑледние Ñтроки результата теÑта Ð´Ð»Ñ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð¾Ð¹ информации, они будут похожи на:" #: i2p2www/pages/site/misc/jbigi.html:128 msgid "" "If the native is indeed 5-7x faster (or more) then it looks all good. If " "not, please report." -msgstr "" -"ЕÑли Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° дейÑтвительно в 5-7 раз быÑтрее (или более), то " -"вÑÑ‘ хорошо. Иначе Ñообщите нам." +msgstr "ЕÑли Ð½Ð°Ñ‚Ð¸Ð²Ð½Ð°Ñ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñ‚ÐµÐºÐ° дейÑтвительно в 5-7 раз быÑтрее (или более), то вÑÑ‘ хорошо. Иначе Ñообщите нам." #: i2p2www/pages/site/misc/jbigi.html:129 msgid "Copy <code>libjbigi.so</code> to your i2p directory" @@ -1073,17 +729,10 @@ msgstr "ПерезапуÑтите Ð¿Ñ€Ð¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ I2P." #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." -msgstr "" -"Ðа Ñтранице <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -" <code>crypto.elGamal.decrypt</code> и " -"<code>crypto.elGamal.encrypt</code> должны быть гораздо быÑтрее." +msgstr "Ðа Ñтранице <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a> <code>crypto.elGamal.decrypt</code> и <code>crypto.elGamal.encrypt</code> должны быть гораздо быÑтрее." #: i2p2www/pages/site/misc/jrandom-awol.html:2 msgid "Jrandom's Announcement" @@ -1091,42 +740,28 @@ msgstr "ОбъÑвление Jrandom'а" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." -msgstr "" -"ПредÑтавленное ниже Ñообщение было получено в Ñередине ноÑÐ±Ñ€Ñ 2007. Мы не" -" раÑполагаем никакой дополнительной информацией\n" -"о jrandom'е." +msgstr "ПредÑтавленное ниже Ñообщение было получено в Ñередине ноÑÐ±Ñ€Ñ 2007. Мы не раÑполагаем никакой дополнительной информацией\nо jrandom'е." #: i2p2www/pages/site/misc/jrandom-awol.html:9 #, python-format msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" "and related subdomains." -msgstr "" -"Позже, в не ÑвÑзанном Ñ Ñтим проиÑшеÑтвии, хоÑÑ‚Ð¸Ð½Ð³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²Ñех " -"Ñерверов *.i2p.net (кроме forum.i2p.net) поÑтрадала от Ð¾Ñ‚ÐºÐ»ÑŽÑ‡ÐµÐ½Ð¸Ñ Ð¿Ð¸Ñ‚Ð°Ð½Ð¸Ñ" -" 13 ÑÐ½Ð²Ð°Ñ€Ñ 2008 года, и i2p.net Ñервера воÑÑтановили функционирование не " -"в полной мере. \n" -"Так как только jrandom имел необходимый Ð´Ð»Ñ Ð²Ð¾ÑÑÑ‚Ð°Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ ÑервиÑов " -"доÑтуп, а Ñ Ð½Ð¸Ð¼ невозможно ÑвÑзатьÑÑ, мы перенеÑли вÑе публичные ÑервиÑÑ‹ " -"на <a href=\"%(site)s\">www.i2p2.de</a> и ÑвÑзанные Ñ Ð½Ð¸Ð¼ поддомены." +msgstr "Позже, в не ÑвÑзанном Ñ Ñтим проиÑшеÑтвии, хоÑÑ‚Ð¸Ð½Ð³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²Ñех Ñерверов *.i2p.net (кроме forum.i2p.net) поÑтрадала от Ð¾Ñ‚ÐºÐ»ÑŽÑ‡ÐµÐ½Ð¸Ñ Ð¿Ð¸Ñ‚Ð°Ð½Ð¸Ñ 13 ÑÐ½Ð²Ð°Ñ€Ñ 2008 года, и i2p.net Ñервера воÑÑтановили функционирование не в полной мере. \nТак как только jrandom имел необходимый Ð´Ð»Ñ Ð²Ð¾ÑÑÑ‚Ð°Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ ÑервиÑов доÑтуп, а Ñ Ð½Ð¸Ð¼ невозможно ÑвÑзатьÑÑ, мы перенеÑли вÑе публичные ÑервиÑÑ‹ на <a href=\"%(site)s\">www.i2p2.de</a> и ÑвÑзанные Ñ Ð½Ð¸Ð¼ поддомены." #: i2p2www/pages/site/misc/jrandom-awol.html:19 #, python-format msgid "" "Approximately two months later, for unrelated reasons,\n" "forum.i2p.net was moved to <a href=\"http://%(forum)s/\">%(forum)s</a>." -msgstr "" -"СпуÑÑ‚Ñ Ð¿Ñ€Ð¸Ð¼ÐµÑ€Ð½Ð¾ два меÑÑца по неÑвÑзанным причинам forum.i2p.net переехал" -" на <a href=\"http://%(forum)s/\">%(forum)s</a>." +msgstr "СпуÑÑ‚Ñ Ð¿Ñ€Ð¸Ð¼ÐµÑ€Ð½Ð¾ два меÑÑца по неÑвÑзанным причинам forum.i2p.net переехал на <a href=\"http://%(forum)s/\">%(forum)s</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:2 #: i2p2www/pages/site/misc/manual-wrapper.html:4 @@ -1136,60 +771,35 @@ msgstr "УÑтановка Java Wrapper вручную" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." -msgstr "" -"Пакет уÑтановки Ð´Ð»Ñ <a href=\"%(downloads)s\">маршрутизатора I2P</a> " -"поÑтавлÑетÑÑ Ð²Ð¼ÐµÑте Ñ Java Wrapper Ð´Ð»Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¸Ð½Ñтва раÑпроÑтраненных " -"архитектур. ЕÑли ваша ÑиÑтема не поддерживаетÑÑ Ð½Ð°ÑˆÐ¸Ð¼ инÑталлÑтором " -"— или вы хотите обновить Wrapper до более новой верÑии — " -"Ñледующие шаги опиÑывают процеÑÑ ÑƒÑтановки Java Wrapper вручную." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." +msgstr "Пакет уÑтановки Ð´Ð»Ñ <a href=\"%(downloads)s\">маршрутизатора I2P</a> поÑтавлÑетÑÑ Ð²Ð¼ÐµÑте Ñ Java Wrapper Ð´Ð»Ñ Ð±Ð¾Ð»ÑŒÑˆÐ¸Ð½Ñтва раÑпроÑтраненных архитектур. ЕÑли ваша ÑиÑтема не поддерживаетÑÑ Ð½Ð°ÑˆÐ¸Ð¼ инÑталлÑтором — или вы хотите обновить Wrapper до более новой верÑии — Ñледующие шаги опиÑывают процеÑÑ ÑƒÑтановки Java Wrapper вручную." #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." -msgstr "" -"Проверьте <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">Ñтраницу" -" загрузки</a> Tanuki Software. Ваша платформа еÑÑ‚ÑŒ в ÑпиÑке? ЕÑли Ñто " -"так, то вам повезло! Скачайте поÑледнюю верÑию Community Edition Ð´Ð»Ñ " -"вашей ОС и процеÑÑора и переходите к <a href=\"#packaged\">Ñледующему " -"шагу</a>." +msgstr "Проверьте <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">Ñтраницу загрузки</a> Tanuki Software. Ваша платформа еÑÑ‚ÑŒ в ÑпиÑке? ЕÑли Ñто так, то вам повезло! Скачайте поÑледнюю верÑию Community Edition Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ ОС и процеÑÑора и переходите к <a href=\"#packaged\">Ñледующему шагу</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." -msgstr "" -"ЕÑли Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ платформы отÑутÑтвует Ñкомпилированный Wrapper, то вы " -"можете Ñкомпилировать его ÑамоÑтоÑтельно. ЕÑли вы хотите попытатьÑÑ " -"Ñделать Ñто, то переходите к шагу <a href=\"#compiling\">компилÑции</a> " -"Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ ÑиÑтемы." +msgstr "ЕÑли Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ платформы отÑутÑтвует Ñкомпилированный Wrapper, то вы можете Ñкомпилировать его ÑамоÑтоÑтельно. ЕÑли вы хотите попытатьÑÑ Ñделать Ñто, то переходите к шагу <a href=\"#compiling\">компилÑции</a> Ð´Ð»Ñ Ð²Ð°ÑˆÐµÐ¹ ÑиÑтемы." #: i2p2www/pages/site/misc/manual-wrapper.html:27 msgid "Using existing binaries" msgstr "ИÑпользование готовых иÑполнÑемых файлов" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." -msgstr "" -"Ð’ изложенных ниже шагах $I2P обозначает <em>путь, куда уÑтановили " -"I2P</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgstr "Ð’ изложенных ниже шагах $I2P обозначает <em>путь, куда уÑтановили I2P</em>." #: i2p2www/pages/site/misc/manual-wrapper.html:36 #: i2p2www/pages/site/misc/manual-wrapper.html:64 @@ -1204,11 +814,9 @@ msgstr "<code>tail -f /tmp/wrapper.log</code> и поÑмотрите, нет л #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." -msgstr "" -"ЕÑли Ñто не Ñработало - иÑпользуйте <code>runplain.sh</code> Ð´Ð»Ñ Ð·Ð°Ð¿ÑƒÑка " +"If this did not work you'll need to use <code>runplain.sh</code> to start " "I2P." +msgstr "ЕÑли Ñто не Ñработало - иÑпользуйте <code>runplain.sh</code> Ð´Ð»Ñ Ð·Ð°Ð¿ÑƒÑка I2P." #: i2p2www/pages/site/misc/manual-wrapper.html:43 msgid "Compiling from source" @@ -1216,22 +824,16 @@ msgstr "КомпилÑÑ†Ð¸Ñ Ð¸Ð· иÑходников" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." -msgstr "" -"ИнÑÑ‚Ñ€ÑƒÐºÑ†Ð¸Ñ ÑƒÑпешно протеÑтирована на MIPS(EL) Debian. ИнÑÑ‚Ñ€ÑƒÐºÑ†Ð¸Ñ " -"<strong>дожна</strong> быть подÑтроена под вашу ÑиÑтему." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." +msgstr "ИнÑÑ‚Ñ€ÑƒÐºÑ†Ð¸Ñ ÑƒÑпешно протеÑтирована на MIPS(EL) Debian. ИнÑÑ‚Ñ€ÑƒÐºÑ†Ð¸Ñ <strong>дожна</strong> быть подÑтроена под вашу ÑиÑтему." #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." -msgstr "" -"Загрузите архив Ñ Ð¸Ñходным кодом Wrapper Ñо <a " -"href=\"http://wrapper.tanukisoftware.com/downloads\">Ñтраницы " -"загрузок</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." +msgstr "Загрузите архив Ñ Ð¸Ñходным кодом Wrapper Ñо <a href=\"http://wrapper.tanukisoftware.com/downloads\">Ñтраницы загрузок</a>." #: i2p2www/pages/site/misc/manual-wrapper.html:49 msgid "Extract the tarball" @@ -1239,19 +841,15 @@ msgstr "РаÑпакуйте tar-архив" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" -msgstr "" -"УÑтановите переменные Ð¾ÐºÑ€ÑƒÐ¶ÐµÐ½Ð¸Ñ <code>ANT_HOME</code> и " -"<code>JAVA_HOME</code>. Ðапример, в Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" +msgstr "УÑтановите переменные Ð¾ÐºÑ€ÑƒÐ¶ÐµÐ½Ð¸Ñ <code>ANT_HOME</code> и <code>JAVA_HOME</code>. Ðапример, в Debian:" #: i2p2www/pages/site/misc/manual-wrapper.html:54 msgid "" "Since there isn't a Makefile for Mipsel, we'll make a copy of an already " "existing makefile:" -msgstr "" -"Так как Makefile Ð´Ð»Ñ Mipsel отÑутÑтвует, то мы Ñделаем копию уже " -"ÑущеÑтвующего файла:" +msgstr "Так как Makefile Ð´Ð»Ñ Mipsel отÑутÑтвует, то мы Ñделаем копию уже ÑущеÑтвующего файла:" #: i2p2www/pages/site/misc/manual-wrapper.html:56 msgid "Now we can attempt to compile the wrapper:" @@ -1259,9 +857,7 @@ msgstr "Теперь мы можем попытатьÑÑ Ñкомпилиров #: i2p2www/pages/site/misc/manual-wrapper.html:57 msgid "use <code>./build64.sh</code> if you have a 64bit CPU and JVM" -msgstr "" -"иÑпользуйте <code>./build64.sh</code>, еÑли у Ð²Ð°Ñ 64-битный процеÑÑор и " -"JVM." +msgstr "иÑпользуйте <code>./build64.sh</code>, еÑли у Ð²Ð°Ñ 64-битный процеÑÑор и JVM." #: i2p2www/pages/site/misc/manual-wrapper.html:58 msgid "Copy the wrapper into its proper place:" @@ -1281,273 +877,116 @@ msgid "" "in the router (but later versions of the SocketLibrary will be able to\n" "use selective ACK and large window sizes, allowing more ACKs to be\n" "skipped)" -msgstr "" -"Работа HTTP в I2P Ñ Ð¸Ñпользованием I2PTunnel. Когда база библиотеки " -"SocketLibrary\n" -"будет отделена, единÑтвенным ÑущеÑтвенным отличием будет то, что " -"'wrapRequest' и\n" -"'unwrapRequest' будут функционально раÑполагатьÑÑ Ð² socketLibrary, а не\n" -"в маршрутизаторе (но более поздние верÑии SocketLibrary могут\n" -"иÑпользовать выборочные ACK и большие размеры окон, что позволит " -"пропуÑкать\n" -"больше ACK)" +msgstr "Работа HTTP в I2P Ñ Ð¸Ñпользованием I2PTunnel. Когда база библиотеки SocketLibrary\nбудет отделена, единÑтвенным ÑущеÑтвенным отличием будет то, что 'wrapRequest' и\n'unwrapRequest' будут функционально раÑполагатьÑÑ Ð² socketLibrary, а не\nв маршрутизаторе (но более поздние верÑии SocketLibrary могут\nиÑпользовать выборочные ACK и большие размеры окон, что позволит пропуÑкать\nбольше ACK)" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" -msgstr "" -"ÐžÐ¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ñ„Ð¾Ñ€Ð¼Ð°, разработаннаÑ, чтобы обработать только 128 КБ [1]" -" файлы и Ñтраницы, может\n" -"работать значительно быÑтрее:" +msgstr "ÐžÐ¿Ñ‚Ð¸Ð¼Ð¸Ð·Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð°Ñ Ñ„Ð¾Ñ€Ð¼Ð°, разработаннаÑ, чтобы обработать только 128 КБ [1] файлы и Ñтраницы, может\nработать значительно быÑтрее:" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." -msgstr "" -"Разница между загрузкой Ñети и задержками значительна - Ñто,\n" -"по Ñути, UDP верÑÐ¸Ñ HTTP. Ð’ обычной Ñети мы не можем Ñтого Ñделать,\n" -"так как большинÑтво HTTP запроÑов и ответов в разы больше, чем UDP\n" -"пакеты функционально поддерживают, но в I2P ÑÐ¾Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑƒÑ‚ быть больше. " -"ÐÐºÐ¾Ð½Ð¾Ð¼Ð¸Ñ Ð½Ð°\n" -"Ñетевой нагрузке проиÑходит из-за отÑутÑÑ‚Ð²Ð¸Ñ Ð½ÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ð¾Ñти отправлÑÑ‚ÑŒ ACK" -"\n" -"Ñообщений - вмеÑто раннего wrap/unwrap запроÑа (который ÑвÑзывает\n" -"DataMessage Ñ DeliveryStatusMessage Ð´Ð»Ñ Ð¾Ð±ÐµÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð³Ð°Ñ€Ð°Ð½Ñ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð¾Ð¹ " -"доÑтавки),\n" -"MinWWW прокÑи производит повторную отправку (еÑли необходимо - на данный " -"момент в I2PTunnels нет\n" -"повторных отправок)." +msgstr "Разница между загрузкой Ñети и задержками значительна - Ñто,\nпо Ñути, UDP верÑÐ¸Ñ HTTP. Ð’ обычной Ñети мы не можем Ñтого Ñделать,\nтак как большинÑтво HTTP запроÑов и ответов в разы больше, чем UDP\nпакеты функционально поддерживают, но в I2P ÑÐ¾Ð¾Ð±Ñ‰ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑƒÑ‚ быть больше. ÐÐºÐ¾Ð½Ð¾Ð¼Ð¸Ñ Ð½Ð°\nÑетевой нагрузке проиÑходит из-за отÑутÑÑ‚Ð²Ð¸Ñ Ð½ÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ð¾Ñти отправлÑÑ‚ÑŒ ACK\nÑообщений - вмеÑто раннего wrap/unwrap запроÑа (который ÑвÑзывает\nDataMessage Ñ DeliveryStatusMessage Ð´Ð»Ñ Ð¾Ð±ÐµÑÐ¿ÐµÑ‡ÐµÐ½Ð¸Ñ Ð³Ð°Ñ€Ð°Ð½Ñ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð½Ð¾Ð¹ доÑтавки),\nMinWWW прокÑи производит повторную отправку (еÑли необходимо - на данный момент в I2PTunnels нет\nповторных отправок)." #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." -msgstr "" -"Данные, которые прокÑи-Ñервер MinWWW и Ñервер должны обернуть, тривиальны" -" - когда\n" -"прокÑи-Ñервер хочет отправить \"GET /\" запроÑ, он добавлÑет к нему I2P " -"Ð°Ð´Ñ€ÐµÑ Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð¾Ñ‚Ð¿Ñ€Ð°Ð²Ð»Ñющего\n" -"запроÑ, за которым Ñледует 4-байтовый идентификатор запроÑа. Сервер " -"MinWWW получает Ñти\n" -"запроÑÑ‹, обращаетÑÑ Ðº ÑоответÑтвующему HTTPD, отправлÑет запроÑ, ожидает\n" -"ответ, и отправлÑет ответ прокÑи-Ñерверу MinWWW, Ñодержащему запроÑ,\n" -"Ñ Ð¿Ñ€ÐµÑ„Ð¸ÐºÑом иÑходного идентификатора запроÑа. Ðтот ответ беретÑÑ Ð¸ " -"передаетÑÑ\n" -"браузеру, поÑле чего Ñоединение закрываетÑÑ." +msgstr "Данные, которые прокÑи-Ñервер MinWWW и Ñервер должны обернуть, тривиальны - когда\nпрокÑи-Ñервер хочет отправить \"GET /\" запроÑ, он добавлÑет к нему I2P Ð°Ð´Ñ€ÐµÑ Ð½Ð°Ð·Ð½Ð°Ñ‡ÐµÐ½Ð¸Ñ Ð¾Ñ‚Ð¿Ñ€Ð°Ð²Ð»Ñющего\nзапроÑ, за которым Ñледует 4-байтовый идентификатор запроÑа. Сервер MinWWW получает Ñти\nзапроÑÑ‹, обращаетÑÑ Ðº ÑоответÑтвующему HTTPD, отправлÑет запроÑ, ожидает\nответ, и отправлÑет ответ прокÑи-Ñерверу MinWWW, Ñодержащему запроÑ,\nÑ Ð¿Ñ€ÐµÑ„Ð¸ÐºÑом иÑходного идентификатора запроÑа. Ðтот ответ беретÑÑ Ð¸ передаетÑÑ\nбраузеру, поÑле чего Ñоединение закрываетÑÑ." #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." -msgstr "" -"Ð’ дополнение, прокÑи MinWWW может выбирать иÑпользуемый Ñервер MinWWW из " -"ÑпиÑка, по алгоритму round-robin или другому, чтобы прозрачно Ñовмещать " -"неÑколько выходных прокÑи. ÐÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ð°Ñ Ð¿Ñ€Ð¾Ð¿ÑƒÑÐºÐ½Ð°Ñ ÑпоÑобноÑÑ‚ÑŒ Ð´Ð»Ñ " -"запуÑка одного выходного прокÑи уменьшаетÑÑ, так как он должен " -"обрабатывать только 128KB\n" -"файлы (то еÑÑ‚ÑŒ никто не будет загружать порно, варез и Ñ‚.д.)" +msgstr "Ð’ дополнение, прокÑи MinWWW может выбирать иÑпользуемый Ñервер MinWWW из ÑпиÑка, по алгоритму round-robin или другому, чтобы прозрачно Ñовмещать неÑколько выходных прокÑи. ÐÐµÐ¾Ð±Ñ…Ð¾Ð´Ð¸Ð¼Ð°Ñ Ð¿Ñ€Ð¾Ð¿ÑƒÑÐºÐ½Ð°Ñ ÑпоÑобноÑÑ‚ÑŒ Ð´Ð»Ñ Ð·Ð°Ð¿ÑƒÑка одного выходного прокÑи уменьшаетÑÑ, так как он должен обрабатывать только 128KB\nфайлы (то еÑÑ‚ÑŒ никто не будет загружать порно, варез и Ñ‚.д.)" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." -msgstr "" -"ФункциональноÑÑ‚ÑŒ /is/ ограничена, но 128KB данных Ñ Ð·Ð°Ð¿Ð°Ñом хватит Ð´Ð»Ñ " -"одного запроÑа или ответа\n" -"HTTP. Диаграммы выше нереалиÑтичны в отображении хопов -\n" -"ROUTERA никогда напрÑмую не ÑвÑжетÑÑ Ñ ROUTERB. ROUTERA пошлет каждое\n" -"из Ñообщений через два дополнительных выходных роутера, затем их перешлют" -" на\n" -"два дополнительных входных роутера на ROUTERB, так что задержка здеÑÑŒ " -"ÑущеÑтвенна -\n" -"Ñ…Ð¾Ñ‚Ñ ÑƒÐºÐ°Ð·Ð°Ð½Ð½Ð¾Ðµ выше ÑÑкономит только 11 шагов, 8 из них нужны Ð´Ð»Ñ Ð¾Ð±Ñ…Ð¾Ð´Ð°\n" -"вÑего туннельного пути (каждый раз 4+ удаленных хопа при туннелÑÑ… " -"протÑженноÑтью 2 удаленных хопа), оÑтавлÑÑ MinWWW только два обхода (один" -" Ð´Ð»Ñ Ð·Ð°Ð¿Ñ€Ð¾Ñа, один Ð´Ð»Ñ Ð¾Ñ‚Ð²ÐµÑ‚Ð°), вмеÑто 10." +msgstr "ФункциональноÑÑ‚ÑŒ /is/ ограничена, но 128KB данных Ñ Ð·Ð°Ð¿Ð°Ñом хватит Ð´Ð»Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ запроÑа или ответа\nHTTP. Диаграммы выше нереалиÑтичны в отображении хопов -\nROUTERA никогда напрÑмую не ÑвÑжетÑÑ Ñ ROUTERB. ROUTERA пошлет каждое\nиз Ñообщений через два дополнительных выходных роутера, затем их перешлют на\nдва дополнительных входных роутера на ROUTERB, так что задержка здеÑÑŒ ÑущеÑтвенна -\nÑ…Ð¾Ñ‚Ñ ÑƒÐºÐ°Ð·Ð°Ð½Ð½Ð¾Ðµ выше ÑÑкономит только 11 шагов, 8 из них нужны Ð´Ð»Ñ Ð¾Ð±Ñ…Ð¾Ð´Ð°\nвÑего туннельного пути (каждый раз 4+ удаленных хопа при туннелÑÑ… протÑженноÑтью 2 удаленных хопа), оÑтавлÑÑ MinWWW только два обхода (один Ð´Ð»Ñ Ð·Ð°Ð¿Ñ€Ð¾Ñа, один Ð´Ð»Ñ Ð¾Ñ‚Ð²ÐµÑ‚Ð°), вмеÑто 10." #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" -msgstr "" -"Ð ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¿Ñ€Ð¾ÐºÑи MinWWW и Ñервера должна быть довольно проÑта - читать " -"HTTP Ð·Ð°Ð¿Ñ€Ð¾Ñ Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ð° полноÑтью (возможно, начать Ñ HTTP GET, оÑтавив " -"HTTP POST на потом), прокÑировать Ñообщение и ждать ответа. Далее Ñервер" -" проÑто должен раÑпознать Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð¸ открыть Ñокет или URL, поÑлать запроÑ," -" ждать ответа, и отправить его обратно по Ñети.\n" -"Будет отлично, еÑли кто-то реализует Ñто :)" +msgstr "Ð ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¿Ñ€Ð¾ÐºÑи MinWWW и Ñервера должна быть довольно проÑта - читать HTTP Ð·Ð°Ð¿Ñ€Ð¾Ñ Ñ ÐºÐ»Ð¸ÐµÐ½Ñ‚Ð° полноÑтью (возможно, начать Ñ HTTP GET, оÑтавив HTTP POST на потом), прокÑировать Ñообщение и ждать ответа. Далее Ñервер проÑто должен раÑпознать Ð·Ð°Ð¿Ñ€Ð¾Ñ Ð¸ открыть Ñокет или URL, поÑлать запроÑ, ждать ответа, и отправить его обратно по Ñети.\nБудет отлично, еÑли кто-то реализует Ñто :)" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" -msgstr "" -"[1] Почему файлы 128KB? Ð¡ÐµÐ¹Ñ‡Ð°Ñ I2CP допуÑкает работу Ñ Ð¿Ñ€Ð¾Ð¸Ð·Ð²Ð¾Ð»ÑŒÐ½Ñ‹Ð¼ " -"размером ÑообщениÑ, но Ñто будет отменено, так как привлекает или " -"избыточное иÑпользование памÑти на промежуточных маршрутизаторах или " -"дополнительные уÑÐ¸Ð»Ð¸Ñ Ð¿Ð¾ реализации. I2PTunnel ÑÐµÐ¹Ñ‡Ð°Ñ Ð¾Ð³Ñ€Ð°Ð½Ð¸Ñ‡ÐµÐ½ до 128KB" -" без перегрузки,\n" -"так что, возможно, он будет увеличен до 256KB когда Ñпецификации I2CP " -"обновÑÑ‚)" +msgstr "[1] Почему файлы 128KB? Ð¡ÐµÐ¹Ñ‡Ð°Ñ I2CP допуÑкает работу Ñ Ð¿Ñ€Ð¾Ð¸Ð·Ð²Ð¾Ð»ÑŒÐ½Ñ‹Ð¼ размером ÑообщениÑ, но Ñто будет отменено, так как привлекает или избыточное иÑпользование памÑти на промежуточных маршрутизаторах или дополнительные уÑÐ¸Ð»Ð¸Ñ Ð¿Ð¾ реализации. I2PTunnel ÑÐµÐ¹Ñ‡Ð°Ñ Ð¾Ð³Ñ€Ð°Ð½Ð¸Ñ‡ÐµÐ½ до 128KB без перегрузки,\nтак что, возможно, он будет увеличен до 256KB когда Ñпецификации I2CP обновÑÑ‚)" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." -msgstr "" -"ÐеÑколько меÑÑцев длилаÑÑŒ диÑкуÑÑÐ¸Ñ Ð¾ раÑпределенном приложении Ð´Ð»Ñ " -"блогов,\n" -"теперь оно называетÑÑ \"MyI2P\". Ð¥Ð¾Ñ‚Ñ Ð¾Ñ€Ð¸Ð³Ð¸Ð½Ð°Ð»ÑŒÐ½Ð¾Ðµ обÑуждение утерÑно, " -"мы можем \n" -"воÑÑтановить его <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">Ñохраненную " -"верÑию из Google</a>.\n" -" Ðе бог веÑÑ‚ÑŒ что, но Ñ…Ð¾Ñ‚Ñ Ð±Ñ‹ оÑÐ½Ð¾Ð²Ð½Ð°Ñ Ð¸Ð´ÐµÑ\n" -"и завÑзавшееÑÑ Ð¾Ð±Ñуждение." +msgstr "ÐеÑколько меÑÑцев длилаÑÑŒ диÑкуÑÑÐ¸Ñ Ð¾ раÑпределенном приложении Ð´Ð»Ñ Ð±Ð»Ð¾Ð³Ð¾Ð²,\nтеперь оно называетÑÑ \"MyI2P\". Ð¥Ð¾Ñ‚Ñ Ð¾Ñ€Ð¸Ð³Ð¸Ð½Ð°Ð»ÑŒÐ½Ð¾Ðµ обÑуждение утерÑно, мы можем \nвоÑÑтановить его <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">Ñохраненную верÑию из Google</a>.\n Ðе бог веÑÑ‚ÑŒ что, но Ñ…Ð¾Ñ‚Ñ Ð±Ñ‹ оÑÐ½Ð¾Ð²Ð½Ð°Ñ Ð¸Ð´ÐµÑ\nи завÑзавшееÑÑ Ð¾Ð±Ñуждение." #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." -msgstr "" -"Само приложение не реализовано, и Ñо временем идеи, ÑтоÑщие за ним Ñтали" -" \n" -"менее амбициозными, но они до Ñих пор ÑущеÑтвуют и текущий \n" -"<a href=\"%(roadmap)s\">план</a> ÑоÑтоит в том, чтобы Ñделать доÑтупной " -"оÑновную функциональноÑÑ‚ÑŒ MyI2P к выпуÑку I2P 1.0., который будет " -"включать в ÑÐµÐ±Ñ Ñ€Ð°Ñпределенную адреÑную книгу, \n" -"что нужно Ð´Ð»Ñ Ð·Ð°Ñ‰Ð¸Ñ‰ÐµÐ½Ð½Ð¾Ð¹, раÑпределенной, удобной Ð´Ð»Ñ Ð»ÑŽÐ´ÐµÐ¹ адреÑации, " -"пожертвовав необходимоÑтью иметь глобальные уникальные адреÑа - ведь " -"обычно у вÑех еÑÑ‚ÑŒ ÑÐ²Ð¾Ñ Ð»Ð¾ÐºÐ°Ð»ÑŒÐ½Ð°Ñ Ð°Ð´Ñ€ÐµÑÐ½Ð°Ñ ÐºÐ½Ð¸Ð³Ð° и возможноÑÑ‚ÑŒ " -"подпиÑатьÑÑ Ð½Ð° адреÑные книги других людей, позволив MyI2P периодичеÑки " -"получать новые ÑвÑзки адреÑов и назначений (оÑтавлÑÑ Ñ€Ð°Ð·Ñ€ÐµÑˆÐµÐ½Ð¸Ðµ " -"конфликтов за пользователем). Ð’ дополнение к адреÑной книге будет " -"раÑÐ¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ Ð±Ð»Ð¾Ð³Ð¾Ð²Ð°Ñ ÑиÑтема, иÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑŽÑ‰Ð°Ñ ÑƒÑ€ÐµÐ·Ð°Ð½Ð½ÑƒÑŽ защищенную верÑию" -"\n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> длÑ" -" предоÑÑ‚Ð°Ð²Ð»ÐµÐ½Ð¸Ñ <a href=\"http://www.livejournal.com/\">LiveJournal</a> " -"Ñо 'ÑпиÑком друзей' и прозрачным контролем доÑтупа (Ñ Ð°ÑƒÑ‚ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸ÐµÐ¹ Ñ " -"помощью \n" -"<a href=\"%(datagrams)s\">датаграмм</a> I2P и правилами, определÑемыми на" -" оÑнове адреÑной книги)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." +msgstr "Само приложение не реализовано, и Ñо временем идеи, ÑтоÑщие за ним Ñтали \nменее амбициозными, но они до Ñих пор ÑущеÑтвуют и текущий \n<a href=\"%(roadmap)s\">план</a> ÑоÑтоит в том, чтобы Ñделать доÑтупной оÑновную функциональноÑÑ‚ÑŒ MyI2P к выпуÑку I2P 1.0., который будет включать в ÑÐµÐ±Ñ Ñ€Ð°Ñпределенную адреÑную книгу, \nчто нужно Ð´Ð»Ñ Ð·Ð°Ñ‰Ð¸Ñ‰ÐµÐ½Ð½Ð¾Ð¹, раÑпределенной, удобной Ð´Ð»Ñ Ð»ÑŽÐ´ÐµÐ¹ адреÑации, пожертвовав необходимоÑтью иметь глобальные уникальные адреÑа - ведь обычно у вÑех еÑÑ‚ÑŒ ÑÐ²Ð¾Ñ Ð»Ð¾ÐºÐ°Ð»ÑŒÐ½Ð°Ñ Ð°Ð´Ñ€ÐµÑÐ½Ð°Ñ ÐºÐ½Ð¸Ð³Ð° и возможноÑÑ‚ÑŒ подпиÑатьÑÑ Ð½Ð° адреÑные книги других людей, позволив MyI2P периодичеÑки получать новые ÑвÑзки адреÑов и назначений (оÑтавлÑÑ Ñ€Ð°Ð·Ñ€ÐµÑˆÐµÐ½Ð¸Ðµ конфликтов за пользователем). Ð’ дополнение к адреÑной книге будет раÑÐ¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ Ð±Ð»Ð¾Ð³Ð¾Ð²Ð°Ñ ÑиÑтема, иÑÐ¿Ð¾Ð»ÑŒÐ·ÑƒÑŽÑ‰Ð°Ñ ÑƒÑ€ÐµÐ·Ð°Ð½Ð½ÑƒÑŽ защищенную верÑию\n<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> Ð´Ð»Ñ Ð¿Ñ€ÐµÐ´Ð¾ÑÑ‚Ð°Ð²Ð»ÐµÐ½Ð¸Ñ <a href=\"http://www.livejournal.com/\">LiveJournal</a> Ñо 'ÑпиÑком друзей' и прозрачным контролем доÑтупа (Ñ Ð°ÑƒÑ‚ÐµÐ½Ñ‚Ð¸Ñ„Ð¸ÐºÐ°Ñ†Ð¸ÐµÐ¹ Ñ Ð¿Ð¾Ð¼Ð¾Ñ‰ÑŒÑŽ \n<a href=\"%(datagrams)s\">датаграмм</a> I2P и правилами, определÑемыми на оÑнове адреÑной книги)." #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." -msgstr "" -"Ð”Ð¾Ð¿Ð¾Ð»Ð½Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð°Ñ Ñ„ÑƒÐ½ÐºÑ†Ð¸Ð¾Ð½Ð°Ð»ÑŒÐ½Ð¾ÑÑ‚ÑŒ, Ñ‚Ð°ÐºÐ°Ñ ÐºÐ°Ðº Ð¸Ð½Ñ‚ÐµÐ³Ñ€Ð°Ñ†Ð¸Ñ Ñ Ñ€ÐµÐ·ÐµÑ€Ð²Ð½Ñ‹Ð¼ " -"хранилищем DHT или раÑÐ¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ Ð¿ÐµÑ€ÐµÐ´Ð°Ñ‡Ð° файлов Ð´Ð»Ñ 'вложений' могут " -"быть добавлены позже. ÐÐ»ÐµÐºÑ‚Ñ€Ð¾Ð½Ð½Ð°Ñ Ð¿Ð¾Ñ‡Ñ‚Ð° будет или не будет добавлена в " -"первую очередь, Ñ…Ð¾Ñ‚Ñ ÐµÐµ Ñ€ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¿Ð¾ ÑущеÑтву - Ñто проÑто запиÑÑŒ в " -"блоге Ñ Ð¿Ñ€Ð¸Ð²Ð°Ñ‚Ð½Ñ‹Ð¼ доÑтупом, возможно, некоторые дизайнеры " -"пользовательÑкого интерфейÑа Ñмогут что нибудь придумать. ÐкÑпорт данных " -"в RSS или доÑтуп через ATOM также будет добавлен позже." +msgstr "Ð”Ð¾Ð¿Ð¾Ð»Ð½Ð¸Ñ‚ÐµÐ»ÑŒÐ½Ð°Ñ Ñ„ÑƒÐ½ÐºÑ†Ð¸Ð¾Ð½Ð°Ð»ÑŒÐ½Ð¾ÑÑ‚ÑŒ, Ñ‚Ð°ÐºÐ°Ñ ÐºÐ°Ðº Ð¸Ð½Ñ‚ÐµÐ³Ñ€Ð°Ñ†Ð¸Ñ Ñ Ñ€ÐµÐ·ÐµÑ€Ð²Ð½Ñ‹Ð¼ хранилищем DHT или раÑÐ¿Ñ€ÐµÐ´ÐµÐ»ÐµÐ½Ð½Ð°Ñ Ð¿ÐµÑ€ÐµÐ´Ð°Ñ‡Ð° файлов Ð´Ð»Ñ 'вложений' могут быть добавлены позже. ÐÐ»ÐµÐºÑ‚Ñ€Ð¾Ð½Ð½Ð°Ñ Ð¿Ð¾Ñ‡Ñ‚Ð° будет или не будет добавлена в первую очередь, Ñ…Ð¾Ñ‚Ñ ÐµÐµ Ñ€ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð¿Ð¾ ÑущеÑтву - Ñто проÑто запиÑÑŒ в блоге Ñ Ð¿Ñ€Ð¸Ð²Ð°Ñ‚Ð½Ñ‹Ð¼ доÑтупом, возможно, некоторые дизайнеры пользовательÑкого интерфейÑа Ñмогут что нибудь придумать. ÐкÑпорт данных в RSS или доÑтуп через ATOM также будет добавлен позже." #: i2p2www/pages/site/misc/ratestats.html:2 #: i2p2www/pages/site/misc/ratestats.html:5 @@ -1560,11 +999,9 @@ msgstr "I2P предуÑматривает Ñбор в широком диапа #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" -msgstr "" -"Ð˜Ð½Ñ„Ð¾Ñ€Ð¼Ð°Ñ†Ð¸Ñ Ð² ÑпиÑке была Ñобрана Ñ Ð¸Ñпользованием Ñледующей команды в " -"верхнем каталоге ветки i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" +msgstr "Ð˜Ð½Ñ„Ð¾Ñ€Ð¼Ð°Ñ†Ð¸Ñ Ð² ÑпиÑке была Ñобрана Ñ Ð¸Ñпользованием Ñледующей команды в верхнем каталоге ветки i2p.i2p:" #: i2p2www/pages/site/misc/ratestats.html:10 msgid "All options aren't needed, but it works." @@ -1578,32 +1015,17 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." -msgstr "" -"ИÑходный код I2P хранитÑÑ Ð² неÑкольких раÑпределенных репозиториÑÑ… " -"Monotone. \n" -"Дополнительную информацию о ÑиÑтеме вы найдёте на <a " -"href=\"http://www.monotone.ca/\">Ñайте Monotone</a>. \n" -"Ð”Ð»Ñ Ð½Ð°Ñ‡Ð°Ð»Ð° работы и анонимного Ð¿Ð¾Ð»ÑƒÑ‡ÐµÐ½Ð¸Ñ Ð¸Ñходного кода Ñмотрите <a " -"href=\"http://%(forum)s/viewtopic.php?t=2524\">Ñообщение на форуме по " -"поводу i2p и monotone</a>.\n" -"Также Ñмотрите краткое руководÑтво на <a href=\"%(newdevs)s\">новой " -"Ñтранице Ð´Ð»Ñ Ñ€Ð°Ð·Ñ€Ð°Ð±Ð¾Ñ‚Ñ‡Ð¸ÐºÐ¾Ð²</a>." +msgstr "ИÑходный код I2P хранитÑÑ Ð² неÑкольких раÑпределенных репозиториÑÑ… Monotone. \nДополнительную информацию о ÑиÑтеме вы найдёте на <a href=\"http://www.monotone.ca/\">Ñайте Monotone</a>. \nÐ”Ð»Ñ Ð½Ð°Ñ‡Ð°Ð»Ð° работы и анонимного Ð¿Ð¾Ð»ÑƒÑ‡ÐµÐ½Ð¸Ñ Ð¸Ñходного кода Ñмотрите <a href=\"http://%(forum)s/viewtopic.php?t=2524\">Ñообщение на форуме по поводу i2p и monotone</a>.\nТакже Ñмотрите краткое руководÑтво на <a href=\"%(newdevs)s\">новой Ñтранице Ð´Ð»Ñ Ñ€Ð°Ð·Ñ€Ð°Ð±Ð¾Ñ‚Ñ‡Ð¸ÐºÐ¾Ð²</a>." #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." -msgstr "" -"ЕÑли вы хотите получить иÑходный код неанонимно, загрузите его Ñ " -"публичного Ñервера mtn.welterde.de.\n" -"ИÑходный код I2P находитÑÑ Ð² ветке i2p.i2p." +msgstr "ЕÑли вы хотите получить иÑходный код неанонимно, загрузите его Ñ Ð¿ÑƒÐ±Ð»Ð¸Ñ‡Ð½Ð¾Ð³Ð¾ Ñервера mtn.welterde.de.\nИÑходный код I2P находитÑÑ Ð² ветке i2p.i2p." #: i2p2www/pages/site/misc/transition-guide.html:21 msgid "Guide" @@ -1613,9 +1035,7 @@ msgstr "РуководÑтво" msgid "" "\n" "The following is a detailed guide by Complication." -msgstr "" -"\n" -"Ðто - детальное руководÑтво от Complication." +msgstr "\nÐто - детальное руководÑтво от Complication." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:2 msgid "How to Upgrade from 0.6.1.30 and Earlier" @@ -1632,40 +1052,24 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." -msgstr "" -"Так как ведущий разработчик i2p <a href=\"%(jrandom)s\">отÑутÑтвует</a>, " -"у Ð½Ð°Ñ Ð½ÐµÑ‚ доÑтупа к его ключам Ð´Ð»Ñ Ð¿Ð¾Ð´Ð¿Ð¸Ñи обновлений или доÑтупа к " -"www.i2p[.net] или dev.i2p[.net].\n" -"Complication и zzz Ñгенерировали новые ключи Ð´Ð»Ñ Ð¿Ð¾Ð´Ð¿Ð¸Ñи, и они и Amiga " -"предоÑтавлÑÑŽÑ‚ хоÑтинг Ð´Ð»Ñ Ñ„Ð°Ð¹Ð»Ð¾Ð² обновлениÑ. Чтобы вÑтупить в Ñилу, Ñти " -"Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ‹ быть внеÑены в наÑтройки маршрутизатора." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." +msgstr "Так как ведущий разработчик i2p <a href=\"%(jrandom)s\">отÑутÑтвует</a>, у Ð½Ð°Ñ Ð½ÐµÑ‚ доÑтупа к его ключам Ð´Ð»Ñ Ð¿Ð¾Ð´Ð¿Ð¸Ñи обновлений или доÑтупа к www.i2p[.net] или dev.i2p[.net].\nComplication и zzz Ñгенерировали новые ключи Ð´Ð»Ñ Ð¿Ð¾Ð´Ð¿Ð¸Ñи, и они и Amiga предоÑтавлÑÑŽÑ‚ хоÑтинг Ð´Ð»Ñ Ñ„Ð°Ð¹Ð»Ð¾Ð² обновлениÑ. Чтобы вÑтупить в Ñилу, Ñти Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð´Ð¾Ð»Ð¶Ð½Ñ‹ быть внеÑены в наÑтройки маршрутизатора." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." -msgstr "" -"Сделайте Ñледующие Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°Ñтроек, и ваш маршрутизатор будет " -"автоматичеÑки уÑтанавливать поÑледнюю верÑию." +msgstr "Сделайте Ñледующие Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°Ñтроек, и ваш маршрутизатор будет автоматичеÑки уÑтанавливать поÑледнюю верÑию." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." -msgstr "" -"Мы рекомендуем автоматизированный процеÑÑ, так как в Ñтом Ñлучае " -"выполнÑетÑÑ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐºÐ° ключа подпиÑанного файла обновлениÑ.\n" -"ЕÑли вы не внеÑёте Ñти Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² наÑтройки, то вы можете Ñкачать файл " -"i2pupdate.zip вручную Ñо <a href=\"%(downloads)s\">Ñтраницы загрузок</a>." +msgstr "Мы рекомендуем автоматизированный процеÑÑ, так как в Ñтом Ñлучае выполнÑетÑÑ Ð¿Ñ€Ð¾Ð²ÐµÑ€ÐºÐ° ключа подпиÑанного файла обновлениÑ.\nЕÑли вы не внеÑёте Ñти Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² наÑтройки, то вы можете Ñкачать файл i2pupdate.zip вручную Ñо <a href=\"%(downloads)s\">Ñтраницы загрузок</a>." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:34 #, python-format @@ -1674,11 +1078,9 @@ msgstr "Смените новоÑтной URL на: %(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " -msgstr "" -"Выберите ОДИРÑлучайный URL обновлений из предоÑтавленных и введите его в" -" текÑтовое поле Ð´Ð»Ñ URL обновлений:" +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " +msgstr "Выберите ОДИРÑлучайный URL обновлений из предоÑтавленных и введите его в текÑтовое поле Ð´Ð»Ñ URL обновлений:" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 msgid "Check the box \"Update through the eepProxy?\"" @@ -1699,24 +1101,14 @@ msgstr "Ðажмите \"Применить\"" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." -msgstr "" -"Теперь вы можете автоматичеÑки получать обновлениÑ, либо уÑтановив " -"политику обновлений в режим \"Ñкачать и уÑтановить\" или вручную, Ð¿Ñ€Ð¾Ð¹Ð´Ñ " -"по ÑÑылке \"ДоÑтупно обновление\", когда она поÑвлÑетÑÑ." +msgstr "Теперь вы можете автоматичеÑки получать обновлениÑ, либо уÑтановив политику обновлений в режим \"Ñкачать и уÑтановить\" или вручную, Ð¿Ñ€Ð¾Ð¹Ð´Ñ Ð¿Ð¾ ÑÑылке \"ДоÑтупно обновление\", когда она поÑвлÑетÑÑ." #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:65 #, python-format msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." -msgstr "" -"ЕÑли вы хотите проверить доверенные ключи обновлениÑ, то они доÑтупны <a " -"href=\"%(url)s\">здеÑÑŒ</a>.\n" -"СпаÑибо за вашу поддержку во Ð²Ñ€ÐµÐ¼Ñ Ñтого переходного периода. За помощью," -" пожалуйÑта, обращайтеÑÑŒ к нам на #i2p." - +"Thank you for your support during this transition. For help please contact us on #i2p." +msgstr "ЕÑли вы хотите проверить доверенные ключи обновлениÑ, то они доÑтупны <a href=\"%(url)s\">здеÑÑŒ</a>.\nСпаÑибо за вашу поддержку во Ð²Ñ€ÐµÐ¼Ñ Ñтого переходного периода. За помощью, пожалуйÑта, обращайтеÑÑŒ к нам на #i2p." diff --git a/i2p2www/translations/sq/LC_MESSAGES/about.po b/i2p2www/translations/sq/LC_MESSAGES/about.po index 340cae5ea3c7c0c084a869f63515ea1ff01d4ba9..ed2c94d22951781a270cc682de3a9b7225fffa28 100644 --- a/i2p2www/translations/sq/LC_MESSAGES/about.po +++ b/i2p2www/translations/sq/LC_MESSAGES/about.po @@ -1,22 +1,24 @@ -# Albanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Besnik Bleta <besnik@programeshqip.org>, 2018 +# Besnik Bleta <besnik@programeshqip.org>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:26+0000\n" -"PO-Revision-Date: 2021-10-12 09:24+0000\n" -"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n" "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: sq\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/about/alternative-clients.html:2 #: i2p2www/pages/site/about/alternative-clients.html:4 @@ -26,8 +28,7 @@ msgstr "Klientë I2P alternativë" #: i2p2www/pages/site/about/alternative-clients.html:5 msgid "" "The main I2P client implementation uses Java. If for some \n" -"reason you can't use Java on your device, there are alternative " -"implementations\n" +"reason you can't use Java on your device, there are alternative implementations\n" "developed by community members." msgstr "" @@ -50,8 +51,7 @@ msgstr "" #, python-format msgid "" "<a href=\"%(go_i2p)s\">Go-I2P</a> is I2P client developed using the\n" -"<a href=\"%(golang)s\">Go</a> programming language. The project is in " -"early development." +"<a href=\"%(golang)s\">Go</a> programming language. The project is in early development." msgstr "" #: i2p2www/pages/site/about/browser-config.html:2 @@ -71,18 +71,15 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:9 msgid "" "I2P: Invisible Internet Project: a project meant to\n" -" provide an anonymity layer, so user can communicate anonymously " -"using a\n" +" provide an anonymity layer, so user can communicate anonymously using a\n" " range of applications." msgstr "" #: i2p2www/pages/site/about/glossary.html:12 msgid "" "Router: The core I2P software, which routes encrypted\n" -" packets on the I2P network. All routers by default participate in" -" the\n" -" network, which both helps the network and provides cover traffic " -"for any\n" +" packets on the I2P network. All routers by default participate in the\n" +" network, which both helps the network and provides cover traffic for any\n" " clients or servers connecting to the I2P network through the\n" " router." msgstr "" @@ -90,26 +87,22 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:17 msgid "" "RouterIdentity: A collection of information required to\n" -" communicate directly with a router, such as its IP address and " -"listening\n" +" communicate directly with a router, such as its IP address and listening\n" " port, public signing and encryption keys etc." msgstr "" #: i2p2www/pages/site/about/glossary.html:20 msgid "" "Tunnel: An anonymous communication pathway between a\n" -" client or server and the I2P network. Tunnels are unidirectional," -" so any\n" -" one client or server must have at least two Tunnels - one for " -"inbound\n" +" client or server and the I2P network. Tunnels are unidirectional, so any\n" +" one client or server must have at least two Tunnels - one for inbound\n" " traffic and one for outbound traffic." msgstr "" #: i2p2www/pages/site/about/glossary.html:24 msgid "" "Destination: The cryptographic identity of a tunnel.\n" -" These are the identities of clients and servers within the I2P " -"network,\n" +" These are the identities of clients and servers within the I2P network,\n" " and are analogous to the IP:port of a computer on the normal\n" " internet." msgstr "" @@ -117,39 +110,32 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:28 msgid "" "LeaseSet: A collection of information required to\n" -" communicate with a client or server at a particular Destination, " -"such as\n" +" communicate with a client or server at a particular Destination, such as\n" " the gateways of the inbound Tunnels for that\n" " Destination." msgstr "" #: i2p2www/pages/site/about/glossary.html:34 msgid "" -"This table lists definition of different networks and their components. " -"These\n" +"This table lists definition of different networks and their components. These\n" "terms and the definitions provided are taken from\n" -"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization" -" Off The\n" +"<a href=\"https://decentpatterns.xyz/report/#key-terms\">Decentralization Off The\n" "Shelf: 7 Maxims by Simply Secure</a>(used with permission)." msgstr "" #: i2p2www/pages/site/about/glossary.html:40 msgid "" "Decentralization: Network architecture that avoids\n" -" reliance on a single party. Encompasses peer-to-peer, blockchain," -"\n" -" federated, and distributed technologies that involve many " -"individual\n" +" reliance on a single party. Encompasses peer-to-peer, blockchain,\n" +" federated, and distributed technologies that involve many individual\n" " users." msgstr "" #: i2p2www/pages/site/about/glossary.html:44 msgid "" "Peer-to-Peer (p2p): Peers make a portion of their \n" -" resources, such as processing power, disk storage or network " -"bandwidth,\n" -" directly available to other network participants, without the " -"need for\n" +" resources, such as processing power, disk storage or network bandwidth,\n" +" directly available to other network participants, without the need for\n" " central coordination by servers or stable hosts. Popularized by\n" " BitTorrent, Napster, and Bitcoin." msgstr "" @@ -157,32 +143,25 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:49 msgid "" "Federated: Federation allows separate deployments of a\n" -" service to communicate with each other through a common protocol," -" for\n" -" instance a mail server run by Google federates with a mail server" -" run by\n" -" Microsoft when you send an email from @gmail.com to @hotmail.com." -"\n" +" service to communicate with each other through a common protocol, for\n" +" instance a mail server run by Google federates with a mail server run by\n" +" Microsoft when you send an email from @gmail.com to @hotmail.com.\n" " Each deployment may host multiple users." msgstr "" #: i2p2www/pages/site/about/glossary.html:54 msgid "" "Blockchain: A distributed ledger that can record\n" -" transactions between multiple parties efficiently and in a " -"verifiable\n" +" transactions between multiple parties efficiently and in a verifiable\n" " and permanent way." msgstr "" #: i2p2www/pages/site/about/glossary.html:57 msgid "" "Distributed systems: Academic topic within the\n" -" discipline of Computer Science which is concerned with the design" -" of\n" -" computer systems that consist of many individual computers " -"connected\n" -" over a network. Peer-to-peer networks and blockchains are " -"examples of\n" +" discipline of Computer Science which is concerned with the design of\n" +" computer systems that consist of many individual computers connected\n" +" over a network. Peer-to-peer networks and blockchains are examples of\n" " distributed systems architectures." msgstr "" @@ -196,8 +175,7 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:65 msgid "" "DHT: Distributed hash table, used in some projects to\n" -" connect peers to each other by storing information in the form of" -"\n" +" connect peers to each other by storing information in the form of\n" " key-value pairs in a distributed manner." msgstr "" @@ -217,16 +195,14 @@ msgstr "" #: i2p2www/pages/site/about/glossary.html:73 msgid "" "Hash: A number, usually displayed as a string of letters\n" -" and numbers. It can serve as a ‘fingerprint’ uniquely identifying" -"\n" +" and numbers. It can serve as a ‘fingerprint’ uniquely identifying\n" " data." msgstr "" #: i2p2www/pages/site/about/glossary.html:76 msgid "" "UX: User experience, the overall experience of a person\n" -" using a product or a service, especially in terms of how easy it " -"is to\n" +" using a product or a service, especially in terms of how easy it is to\n" " use." msgstr "" @@ -236,14 +212,10 @@ msgstr "Vendi i Nderit" #: i2p2www/pages/site/about/hall-of-fame.html:7 msgid "" -"I2P is a project made completely by spare time enthusiasts. But a big " -"project like\n" -"I2P is not made from software alone, several servers, domain " -"registrations, and coffees need to\n" -"be paid to get a great result. People all over the world donated to I2P " -"reach the state it is in\n" -"currently. Here we do track those who gave us a name to be published in a" -" I2P hall of fame." +"I2P is a project made completely by spare time enthusiasts. But a big project like\n" +"I2P is not made from software alone, several servers, domain registrations, and coffees need to\n" +"be paid to get a great result. People all over the world donated to I2P reach the state it is in\n" +"currently. Here we do track those who gave us a name to be published in a I2P hall of fame." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:12 @@ -253,15 +225,14 @@ msgstr "Një falënderim të madh për personat vijues që kanë dhuruar për I2 #: i2p2www/pages/site/about/hall-of-fame.html:13 #, python-format msgid "" -"If you have made a donation, please send an email to <a " -"href=\"mailto:%(echelon)s\">echelon</a>\n" +"If you have made a donation, please send an email to <a href=\"mailto:%(echelon)s\">echelon</a>\n" "with your name or nick (and optionally homepage) so we can list you here." msgstr "" #: i2p2www/pages/site/about/hall-of-fame.html:18 msgid "" -"The unsorted list of I2P donors in 15 years of I2P history, starting " -"March 2004 til March 2019." +"The unsorted list of I2P donors in 15 years of I2P history, starting March " +"2004 til March 2019." msgstr "" #: i2p2www/pages/site/about/intro.html:2 @@ -275,12 +246,8 @@ msgstr "Projekti i Internetit të Padukshëm" #: i2p2www/pages/site/about/intro.html:6 msgid "" -"The Invisible Internet Project (I2P) is a fully encrypted private network" -" layer that has been developed with privacy and security by design in " -"order to provide protection for your activity,\n" -"location and your identity. The software ships with a router that " -"connects you to the network and applications for sharing, communicating " -"and building." +"The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity,\n" +"location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building." msgstr "" #: i2p2www/pages/site/about/intro.html:9 @@ -290,13 +257,13 @@ msgstr "I2P-ja Kujdeset Për Privatësinë" #: i2p2www/pages/site/about/intro.html:11 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/about/intro.html:14 @@ -305,15 +272,15 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:16 msgid "" -"The Invisible Internet Project provides software to download that " -"connects you to the network. In addition to the network privacy benefits," -" I2P provides an application layer that allows people to use and create " -"familiar apps for daily use. I2P provides its own unique DNS so that you " -"can self host or mirror content on the network. You can create and own " -"your own platform that you can add to the I2P directory or only invite " -"your friends. The I2P network functions the same way the Internet does. " -"When you download the I2P software, it includes everything you need to " -"connect, share, and create privately." +"The Invisible Internet Project provides software to download that connects " +"you to the network. In addition to the network privacy benefits, I2P " +"provides an application layer that allows people to use and create familiar " +"apps for daily use. I2P provides its own unique DNS so that you can self " +"host or mirror content on the network. You can create and own your own " +"platform that you can add to the I2P directory or only invite your friends. " +"The I2P network functions the same way the Internet does. When you download " +"the I2P software, it includes everything you need to connect, share, and " +"create privately." msgstr "" #: i2p2www/pages/site/about/intro.html:18 @@ -322,28 +289,27 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:20 msgid "" -"I2P uses cryptography to achieve a variety of properties for the tunnels " -"it builds and the communications it transports. I2P tunnels use " -"transports, NTCP2 and SSU, to hide the nature of the traffic being " -"transported over it. Connections are encrypted from router-to-router, and" -" from client-to-client(end-to-end). Forward-secrecy is provided for all " -"connections. Because I2P is cryptographically addressed, I2P addresses " -"are self-authenticating and only belong to the user who generated them." +"I2P uses cryptography to achieve a variety of properties for the tunnels it " +"builds and the communications it transports. I2P tunnels use transports, " +"NTCP2 and SSU, to hide the nature of the traffic being transported over it. " +"Connections are encrypted from router-to-router, and from client-to-" +"client(end-to-end). Forward-secrecy is provided for all connections. Because" +" I2P is cryptographically addressed, I2P addresses are self-authenticating " +"and only belong to the user who generated them." msgstr "" #: i2p2www/pages/site/about/intro.html:23 msgid "" -"I2P is a secure and traffic protecting Internet-like layer. The network " -"is made up of peers (\"routers\") and unidirectional inbound and outbound" -" virtual tunnels. Routers communicate with each other using protocols " -"built on existing transport mechanisms (TCP, UDP, etc), passing messages." -" Client applications have their own cryptographic identifier " -"(\"Destination\") which enables it to send and receive messages. These " -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels that will be used for sending and receiving " -"messages through the network. I2P has its own internal network database " -"(using a modification of the Kademlia DHT) for distributing routing and " -"contact information securely." +"I2P is a secure and traffic protecting Internet-like layer. The network is " +"made up of peers (\"routers\") and unidirectional inbound and outbound " +"virtual tunnels. Routers communicate with each other using protocols built " +"on existing transport mechanisms (TCP, UDP, etc), passing messages. Client " +"applications have their own cryptographic identifier (\"Destination\") which" +" enables it to send and receive messages. These clients can connect to any " +"router and authorize the temporary allocation (\"lease\") of some tunnels " +"that will be used for sending and receiving messages through the network. " +"I2P has its own internal network database (using a modification of the " +"Kademlia DHT) for distributing routing and contact information securely." msgstr "" #: i2p2www/pages/site/about/intro.html:26 @@ -352,36 +318,35 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:28 msgid "" -"The I2P network is almost completely decentralized, with exception to " -"what are called \"Reseed Servers,\" which is how you first join the " -"network. This is to deal with the DHT ( Distributed Hash Table ) " -"bootstrap problem. Basically, there's not a good and reliable way to get " -"out of running at least one permanent bootstrap node that non-network " -"users can find to get started. Once you're connected to the network, you " -"only discover peers by building \"exploratory\" tunnels, but to make your" -" initial connection, you need to get a peer set from somewhere. The " -"reseed servers, which you can see listed on " -"http://127.0.0.1:7657/configreseed in the Java I2P router, provide you " -"with those peers. You then connect to them with the I2P router until you " -"find one who you can reach and build exploratory tunnels through. Reseed " -"servers can tell that you bootstrapped from them, but nothing else about " -"your traffic on the I2P network." +"The I2P network is almost completely decentralized, with exception to what " +"are called \"Reseed Servers,\" which is how you first join the network. This" +" is to deal with the DHT ( Distributed Hash Table ) bootstrap problem. " +"Basically, there's not a good and reliable way to get out of running at " +"least one permanent bootstrap node that non-network users can find to get " +"started. Once you're connected to the network, you only discover peers by " +"building \"exploratory\" tunnels, but to make your initial connection, you " +"need to get a peer set from somewhere. The reseed servers, which you can see" +" listed on http://127.0.0.1:7657/configreseed in the Java I2P router, " +"provide you with those peers. You then connect to them with the I2P router " +"until you find one who you can reach and build exploratory tunnels through. " +"Reseed servers can tell that you bootstrapped from them, but nothing else " +"about your traffic on the I2P network." msgstr "" #: i2p2www/pages/site/about/intro.html:30 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/about/intro.html:32 msgid "" -"Yes, this is how a fully distributed peer-to-peer network works. Every " -"node participates in routing packets for others, so your IP address must " -"be known to establish connections. While the fact that your computer runs" -" I2P is public, nobody can see your activities in it. You can't say if a " -"user behind this IP address is sharing files, hosting a website, doing " -"research or just running a node to contribute bandwidth to the project." +"Yes, this is how a fully distributed peer-to-peer network works. Every node " +"participates in routing packets for others, so your IP address must be known" +" to establish connections. While the fact that your computer runs I2P is " +"public, nobody can see your activities in it. You can't say if a user behind" +" this IP address is sharing files, hosting a website, doing research or just" +" running a node to contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/about/intro.html:34 @@ -390,13 +355,13 @@ msgstr "" #: i2p2www/pages/site/about/intro.html:36 msgid "" -"The I2P network does not officially \"Exit\" traffic. It has outproxies " -"to the Internet run by volunteers, which are centralized services. I2P is" -" primarily a hidden service network and outproxying is not an official " -"function, nor is it advised. The privacy benefits you get from " -"participating in the the I2P network come from remaining in the network " -"and not accessing the internet. I2P recommends that you use Tor Browser " -"or a trusted VPN when you want to browse the Internet privately." +"The I2P network does not officially \"Exit\" traffic. It has outproxies to " +"the Internet run by volunteers, which are centralized services. I2P is " +"primarily a hidden service network and outproxying is not an official " +"function, nor is it advised. The privacy benefits you get from participating" +" in the the I2P network come from remaining in the network and not accessing" +" the internet. I2P recommends that you use Tor Browser or a trusted VPN when" +" you want to browse the Internet privately." msgstr "" #: i2p2www/pages/site/about/intro.html:38 @@ -405,15 +370,11 @@ msgstr "Krahasime" #: i2p2www/pages/site/about/intro.html:40 msgid "" -"There are a great many other applications and projects working on " -"anonymous \n" -"communication and I2P has been inspired by much of their efforts. This " -"is not \n" +"There are a great many other applications and projects working on anonymous \n" +"communication and I2P has been inspired by much of their efforts. This is not \n" "a comprehensive list of anonymity resources - both freehaven's \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity " -"Bibliography</a>\n" -"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related " -"projects</a>\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Anonymity Bibliography</a>\n" +"and GNUnet's <a href=\"https://www.gnunet.org/links/\">related projects</a>\n" "serve that purpose well. That said, a few systems stand out for further\n" "comparison. The following have individual comparison pages:" msgstr "" @@ -432,9 +393,8 @@ msgstr "Paraqitje lidhur me I2P-n" #: i2p2www/pages/site/about/media.html:5 #, python-format msgid "" -"Following are links to presentations, videos, and tutorials about I2P. " -"Links to research papers on I2P are available <a " -"href=\"%(papers)s\">here</a>." +"Following are links to presentations, videos, and tutorials about I2P. Links" +" to research papers on I2P are available <a href=\"%(papers)s\">here</a>." msgstr "" #: i2p2www/pages/site/about/media.html:8 @@ -459,11 +419,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(transcript)s\">transcript</a>\n" "Lance James (0x90), February 2002." -msgstr "" -"Paraqitje e IIP në CodeCon\n" -"<a href=\"%(mp3)s\">Audio MP3</a>\n" -"<a href=\"%(transcript)s\">transkriptim</a>\n" -"Lance James (0x90), shkurt 2002." +msgstr "Paraqitje e IIP në CodeCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(transcript)s\">transkriptim</a>\nLance James (0x90), shkurt 2002." #: i2p2www/pages/site/about/media.html:27 #, python-format @@ -472,11 +428,7 @@ msgid "" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(slides)s\">slides</a>\n" "Lance James (0x90), September 2002." -msgstr "" -"Paraqitje e IIP në ToorCon\n" -"<a href=\"%(mp3)s\">Audio MP3</a>\n" -"<a href=\"%(slides)s\">diapozitiva</a>\n" -"Lance James (0x90), shtator 2002." +msgstr "Paraqitje e IIP në ToorCon\n<a href=\"%(mp3)s\">Audio MP3</a>\n<a href=\"%(slides)s\">diapozitiva</a>\nLance James (0x90), shtator 2002." #: i2p2www/pages/site/about/media.html:35 #, python-format @@ -486,12 +438,7 @@ msgid "" "An introduction into anonymous communication with I2P.\n" "<a href=\"%(pdf)s\">To Be or I2P (PDF presentation)</a>,\n" "Jens Kubieziel, 24C3 Berlin, December 28, 2007." -msgstr "" -"<a href=\"%(video)s\">To Be or I2P</a>\n" -"(Video Youtube)\n" -"Një hyrje në komunikimin anonim me I2P.\n" -"<a href=\"%(pdf)s\">To Be or I2P (Paraqitje PDF)</a>,\n" -"Jens Kubieziel, 24C3 Berlin, 28 dhjetor, 2007." +msgstr "<a href=\"%(video)s\">To Be or I2P</a>\n(Video Youtube)\nNjë hyrje në komunikimin anonim me I2P.\n<a href=\"%(pdf)s\">To Be or I2P (Paraqitje PDF)</a>,\nJens Kubieziel, 24C3 Berlin, 28 dhjetor, 2007." #: i2p2www/pages/site/about/media.html:44 #, python-format @@ -499,17 +446,12 @@ msgid "" "<a href=\"%(video)s\">Video of I2P talk at Chemnitz Linux Tag</a>,\n" "Lars Schimmer,\n" "March 14-15, 2009" -msgstr "" -"<a href=\"%(video)s\">Video e bisedës mbi I2P-në në Chemnitz Linux " -"Tag</a>,\n" -"Lars Schimmer,\n" -"14-15 mars, 2009" +msgstr "<a href=\"%(video)s\">Video e bisedës mbi I2P-në në Chemnitz Linux Tag</a>,\nLars Schimmer,\n14-15 mars, 2009" #: i2p2www/pages/site/about/media.html:50 #, python-format msgid "" -"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of" -" Adrian Hong's talk\n" +"HOPE New York July 17, 2010 - Brief overview of I2P by zzz, at the end of Adrian Hong's talk\n" "\"Hackers for Human Rights\".\n" "<a href=\"%(mp3)s\">MP3 audio</a>\n" "<a href=\"%(vid)s\">Youtube Video</a> (I2P part at 44 minutes)" @@ -520,9 +462,7 @@ msgstr "" msgid "" "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" "Adrian Crenshaw. Schmoocon Firetalk, January 2011" -msgstr "" -"<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\n" -"Adrian Crenshaw. Schmoocon Firetalk, janar 2011" +msgstr "<a href=\"%(link)s\">Into the I2P Darknet: Welcome to Cipherspace</a>\nAdrian Crenshaw. Schmoocon Firetalk, janar 2011" #: i2p2www/pages/site/about/media.html:62 #, python-format @@ -530,113 +470,72 @@ msgid "" "<a href=\"%(link)s\">Using techhnology to advance liberty</a>\n" "(Youtube Video)\n" "Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27," -" 2011.\n" +"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, March 27, 2011.\n" "I2P covered from 10:00 to 20:00 in the video." -msgstr "" -"<a href=\"%(link)s\">Përdorim i teknologjisë për shpënien më tej të " -"lirisë</a>\n" -"(Video Youtube)\n" -"Eric Johnson.\n" -"<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 mars, " -"2011.\n" -"Në video I2P diskutohet nga minuta 10:00 deri në atë 20:00." +msgstr "<a href=\"%(link)s\">Përdorim i teknologjisë për shpënien më tej të lirisë</a>\n(Video Youtube)\nEric Johnson.\n<a href=\"http://agora.io/etienne\">Agora I/O Unconference</a>, 27 mars, 2011.\nNë video I2P diskutohet nga minuta 10:00 deri në atë 20:00." #: i2p2www/pages/site/about/media.html:70 #, python-format msgid "" "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" "(Youtube Video)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July " -"11-15, 2011." -msgstr "" -"<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n" -"(Video Youtube)\n" -"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 " -"korrik, 2011." +"Adrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, July 11-15, 2011." +msgstr "<a href=\"%(link)s\">Common Darknet Weaknesses</a>\n(Video Youtube)\nAdrian Crenshaw, <a href=\"http://aide.marshall.edu/\">AIDE</a>, 11-15 korrik, 2011." #: i2p2www/pages/site/about/media.html:76 #, python-format msgid "" "<a href=\"%(link)s\">I2P / Tor Workshop Notes</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 6, 2011." -msgstr "" -"<a href=\"%(link)s\">Shënime nga Praktika mbi I2P / Tor</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 6 gusht, 2011." +msgstr "<a href=\"%(link)s\">Shënime nga Praktika mbi I2P / Tor</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 6 gusht, 2011." #: i2p2www/pages/site/about/media.html:81 #, python-format msgid "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" +"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\n" "DEF CON Live version (Youtube Video)</a>,\n" "<a href=\"%(studio)s\">\"Studio\" version (Youtube Video)</a>,\n" "<a href=\"%(slides)s\">Slides (ppt)</a>\n" "Adrian Crenshaw. DEF CON 19, Las Vegas, August 7, 2011." -msgstr "" -"<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack " -"Strategies -\n" -"Versioni Live nga DEF CON (Video Youtube)</a>,\n" -"<a href=\"%(studio)s\">Versioni \"studio\" (Video Youtube)</a>,\n" -"<a href=\"%(slides)s\">Diapozitiva (ppt)</a>\n" -"Adrian Crenshaw. DEF CON 19, Las Vegas, 7 gusht, 2011." +msgstr "<a href=\"%(live)s\">Cipherspaces/Darknets: An Overview Of Attack Strategies -\nVersioni Live nga DEF CON (Video Youtube)</a>,\n<a href=\"%(studio)s\">Versioni \"studio\" (Video Youtube)</a>,\n<a href=\"%(slides)s\">Diapozitiva (ppt)</a>\nAdrian Crenshaw. DEF CON 19, Las Vegas, 7 gusht, 2011." #: i2p2www/pages/site/about/media.html:91 msgid "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), November 4, 2011." -msgstr "" -"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 " -"0x06 (Thessaloniki Tech Talk Sessions), 4 nëntor, 2011." +"<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 " +"(Thessaloniki Tech Talk Sessions), November 4, 2011." +msgstr "<a href=\"http://0x375.org/\">Modern cipherspace ecosystems</a>, 0x375 0x06 (Thessaloniki Tech Talk Sessions), 4 nëntor, 2011." #: i2p2www/pages/site/about/media.html:95 #, python-format msgid "" "<a href=\"%(link)s\">I2P - The Anonymous Network</a>\n" "(Youtube Video)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, " -"January 25, 2012." -msgstr "" -"<a href=\"%(link)s\">I2P - Rrjeti Anonim</a>\n" -"(Video Youtube)\n" -"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 " -"janr, 2012." +"Blair Dick, University of Abertay, Dundee Ethical Hacking Society, January 25, 2012." +msgstr "<a href=\"%(link)s\">I2P - Rrjeti Anonim</a>\n(Video Youtube)\nBlair Dick, University of Abertay, Dundee Ethical Hacking Society, 25 janr, 2012." #: i2p2www/pages/site/about/media.html:101 #, python-format msgid "" "<a href=\"%(link)s\">I2PCon 2015</a>\n" "Toronto, August 15-16, 2015" -msgstr "" -"<a href=\"%(link)s\">I2PCon 2015</a>\n" -"Toronto, 15-16 gusht, 2015" +msgstr "<a href=\"%(link)s\">I2PCon 2015</a>\nToronto, 15-16 gusht, 2015" #: i2p2www/pages/site/about/media.html:106 #, python-format msgid "" "<a href=\"%(link)s\">I2P - Still alive! (pdf)</a>\n" "<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, " -"2015" -msgstr "" -"<a href=\"%(link)s\">I2P - ende gjallë! (pdf)</a>\n" -"<a href=\"%(link2)s\">(video)</a>\n" -"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 dhjetor, 2015" +"echelon, 32C3 (You Broke the Internet Assembly), Hamburg, December 28, 2015" +msgstr "<a href=\"%(link)s\">I2P - ende gjallë! (pdf)</a>\n<a href=\"%(link2)s\">(video)</a>\nechelon, 32C3 (You Broke the Internet Assembly), Hamburg, 28 dhjetor, 2015" #: i2p2www/pages/site/about/media.html:113 #, python-format msgid "" -"Replacing Weary Crypto: Upgrading the I2P network with stronger " -"primitives\n" +"Replacing Weary Crypto: Upgrading the I2P network with stronger primitives\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" "str4d, Real World Crypto, Stanford, January 8, 2016" -msgstr "" -"Zëvendësim i Fshehtëzimit të Lodhur: Përmirësim i rrjetit I2P me " -"primitivë më të fuqishëm\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, Real World Crypto, Stanford, 8 janar, 2016" +msgstr "Zëvendësim i Fshehtëzimit të Lodhur: Përmirësim i rrjetit I2P me primitivë më të fuqishëm\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, Real World Crypto, Stanford, 8 janar, 2016" #: i2p2www/pages/site/about/media.html:121 #, python-format @@ -644,14 +543,8 @@ msgid "" "Onions and Garlic: the protocols of I2P\n" "<a href=\"%(link)s\">(pdf)</a>\n" "<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, February 17, 2016" -msgstr "" -"Qepër dhe Hudhra: protokollet e I2P-së\n" -"<a href=\"%(link)s\">(pdf)</a>\n" -"<a href=\"%(link2)s\">(odp)</a>\n" -"str4d, COMPSCI 460: Computer Networking, University of Wisconsin " -"Whitewater, 17 shkurt, 2016" +"str4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, February 17, 2016" +msgstr "Qepër dhe Hudhra: protokollet e I2P-së\n<a href=\"%(link)s\">(pdf)</a>\n<a href=\"%(link2)s\">(odp)</a>\nstr4d, COMPSCI 460: Computer Networking, University of Wisconsin Whitewater, 17 shkurt, 2016" #: i2p2www/pages/site/about/media.html:129 #, python-format @@ -660,12 +553,7 @@ msgid "" "<a href=\"%(link)s\">(mp4)</a>\n" "<a href=\"%(link2)s\">(webm)</a>\n" "Andrew Savchenko (bircoph), FOSDEM, Brussel, February 4, 2018" -msgstr "" -"Projekti i Internetit të Padukshëm - Një përmbledhje dhe një udhërrëfyes " -"për teknologjinë\n" -"<a href=\"%(link)s\">(mp4)</a>\n" -"<a href=\"%(link2)s\">(webm)</a>\n" -"Andrew Savchenko (bircoph), FOSDEM, Bruksel, 4 shkurt, 2018" +msgstr "Projekti i Internetit të Padukshëm - Një përmbledhje dhe një udhërrëfyes për teknologjinë\n<a href=\"%(link)s\">(mp4)</a>\n<a href=\"%(link2)s\">(webm)</a>\nAndrew Savchenko (bircoph), FOSDEM, Bruksel, 4 shkurt, 2018" #: i2p2www/pages/site/about/media.html:137 #, python-format @@ -710,39 +598,26 @@ msgstr "" msgid "" "<a href=\"%(link)s\">I2P Tutorial Mac OS X</a>\n" "(Youtube Video)\n" -"A tutorial on how to run i2p on Mac OS X and how to connect to " -"irc.telecomix.i2p.\n" +"A tutorial on how to run i2p on Mac OS X and how to connect to irc.telecomix.i2p.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" msgstr "" #: i2p2www/pages/site/about/media.html:176 #, python-format msgid "" -"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>" -"\n" +"<a href=\"%(link)s\">Felix Atari explains the basic principles of I2P</a>\n" "(Youtube Video)\n" "Agent Felix Atari of the Telecomix Crypto Munitions Bureau.\n" "By <a href=\"http://telecomix.org/\">Telecomix</a>" -msgstr "" -"<a href=\"%(link)s\">Felix Atari shpjegon parimet bazë të I2P-së</a>\n" -"(Video Youtube)\n" -"Agjenti Felix Atari i Telecomix Crypto Munitions Bureau.\n" -"Nga <a href=\"http://telecomix.org/\">Telecomix</a>" +msgstr "<a href=\"%(link)s\">Felix Atari shpjegon parimet bazë të I2P-së</a>\n(Video Youtube)\nAgjenti Felix Atari i Telecomix Crypto Munitions Bureau.\nNga <a href=\"http://telecomix.org/\">Telecomix</a>" #: i2p2www/pages/site/about/media.html:183 #, python-format msgid "" -"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet " -"(Windows Install)</a>\n" +"<a href=\"%(link)s\">How to get onto I2P, the anonymous P2P Darknet (Windows Install)</a>\n" "(Youtube Video)\n" -"This tutorial shows how to install and configure software needed to " -"access I2P." -msgstr "" -"<a href=\"%(link)s\">Si të hyhet në I2P, Darknet-i P2P anonim (Instalim " -"Windows)</a>\n" -"(Video Youtube)\n" -"Kjo përkujdesore tregon se si të instalohet dhe formësohet software-i i " -"nevojshëm për të përdorur I2P-në." +"This tutorial shows how to install and configure software needed to access I2P." +msgstr "<a href=\"%(link)s\">Si të hyhet në I2P, Darknet-i P2P anonim (Instalim Windows)</a>\n(Video Youtube)\nKjo përkujdesore tregon se si të instalohet dhe formësohet software-i i nevojshëm për të përdorur I2P-në." #: i2p2www/pages/site/about/media.html:189 #, python-format @@ -750,10 +625,7 @@ msgid "" "<a href=\"%(link)s\">How to connect to I2P</a>\n" "(Youtube Video)\n" "How to install I2P on Ubuntu." -msgstr "" -"<a href=\"%(link)s\">Si të lidheni në I2P</a>\n" -"(Video Youtube)\n" -"Si të instalohet I2P-ja në Ubuntu." +msgstr "<a href=\"%(link)s\">Si të lidheni në I2P</a>\n(Video Youtube)\nSi të instalohet I2P-ja në Ubuntu." #: i2p2www/pages/site/about/media.html:195 #, python-format @@ -762,11 +634,7 @@ msgid "" "(Video)\n" "Adrian Crenshaw.\n" "January 2011" -msgstr "" -"<a href=\"%(link)s\">Instalimi i software-it darknet I2P në Linux</a>\n" -"(Video)\n" -"Adrian Crenshaw.\n" -"janar 2011" +msgstr "<a href=\"%(link)s\">Instalimi i software-it darknet I2P në Linux</a>\n(Video)\nAdrian Crenshaw.\njanar 2011" #: i2p2www/pages/site/about/media.html:202 #, python-format @@ -774,11 +642,7 @@ msgid "" "<a href=\"%(link)s\">Short garlic routing animation</a>\n" "(Youtube Video)\n" "Adrian Crenshaw.\n" -msgstr "" -"<a href=\"%(link)s\">Animacion i shkurtër mbi rrugëzim " -"<em>garlic</em></a>\n" -"(Video Youtube)\n" -"Adrian Crenshaw.\n" +msgstr "<a href=\"%(link)s\">Animacion i shkurtër mbi rrugëzim <em>garlic</em></a>\n(Video Youtube)\nAdrian Crenshaw.\n" #: i2p2www/pages/site/about/media.html:210 msgid "Articles and Interviews" @@ -791,11 +655,7 @@ msgid "" "<a href=\"%(link1)s\">Part 1</a>\n" "<a href=\"%(link2)s\">Part 2</a>\n" "July 26, 2002." -msgstr "" -"Lance James (0x90) intervistuar nga DistributedCity\n" -"<a href=\"%(link1)s\">Pjesa 1</a>\n" -"<a href=\"%(link2)s\">Pjesa 2</a>\n" -"26 korrik, 2002." +msgstr "Lance James (0x90) intervistuar nga DistributedCity\n<a href=\"%(link1)s\">Pjesa 1</a>\n<a href=\"%(link2)s\">Pjesa 2</a>\n26 korrik, 2002." #: i2p2www/pages/site/about/media.html:221 #, python-format @@ -804,35 +664,22 @@ msgid "" "(original in Spanish)\n" "<a href=\"%(link)s\">English translation</a>\n" "October 31, 2002." -msgstr "" -"Lance James (0x90) intervistuar nga El PaÃs\n" -"(origjinali në spanjisht)\n" -"<a href=\"%(link)s\">përkthimi në anglisht</a>\n" -"31 tetor, 2002." +msgstr "Lance James (0x90) intervistuar nga El PaÃs\n(origjinali në spanjisht)\n<a href=\"%(link)s\">përkthimi në anglisht</a>\n31 tetor, 2002." #: i2p2www/pages/site/about/media.html:228 #, python-format msgid "" -"<a href=\"%(link)s\">2003 Business Week article referencing " -"invisiblenet</a>\n" +"<a href=\"%(link)s\">2003 Business Week article referencing invisiblenet</a>\n" "September 14, 2003." -msgstr "" -"<a href=\"%(link)s\">Artikull i 2003-shit në “Business Week†ku përmendet" -" invisiblenet</a>\n" -"14 shtator, 2003." +msgstr "<a href=\"%(link)s\">Artikull i 2003-shit në “Business Week†ku përmendet invisiblenet</a>\n14 shtator, 2003." #: i2p2www/pages/site/about/media.html:233 #, python-format msgid "" -"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the " -"Internet</a>\n" +"<a href=\"%(link)s\">Netzwelt.de article about being anonymous in the Internet</a>\n" "(German)\n" "November 2007." -msgstr "" -"<a href=\"%(link)s\">Artikull i Netzwelt.de rreth se si të jeni anonim në" -" Internet</a>\n" -"(gjermanisht)\n" -"nëntor 2007." +msgstr "<a href=\"%(link)s\">Artikull i Netzwelt.de rreth se si të jeni anonim në Internet</a>\n(gjermanisht)\nnëntor 2007." #: i2p2www/pages/site/about/media.html:239 #, python-format @@ -840,27 +687,15 @@ msgid "" "<a href=\"%(link)s\">zzz interviewed by gulli.com</a>\n" "March 2009\n" "<a href=\"%(german)s\">German translation</a>" -msgstr "" -"<a href=\"%(link)s\">zzz intervistuar nga gulli.com</a>\n" -"mars 2009\n" -"<a href=\"%(german)s\">Përkthimi në gjermanisht</a>" +msgstr "<a href=\"%(link)s\">zzz intervistuar nga gulli.com</a>\nmars 2009\n<a href=\"%(german)s\">Përkthimi në gjermanisht</a>" #: i2p2www/pages/site/about/media.html:246 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz interviewed on the InfoSec Daily Podcast Ep. 454 (mp3)</a>\n" "August 18, 2011\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz intervistuar në InfoSec Daily Podcast Ep. 454 " -"(mp3)</a>\n" -"18 gusht, 2011\n" -"(lidhje e vdekur, mbjellë brenda I2P te <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz intervistuar në InfoSec Daily Podcast Ep. 454 (mp3)</a>\n18 gusht, 2011\n(lidhje e vdekur, mbjellë brenda I2P te <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=14336\">postman's tracker</a>)" #: i2p2www/pages/site/about/media.html:252 #, python-format @@ -868,49 +703,34 @@ msgid "" "<a href=\"%(link)s\">I2P - Anonymity for the Masses</a>,\n" "Jonathan Cox,\n" "November 11, 2011." -msgstr "" -"<a href=\"%(link)s\">I2P - Anonimitet për Masat</a>,\n" -"Jonathan Cox,\n" -"11 nëntor, 2011." +msgstr "<a href=\"%(link)s\">I2P - Anonimitet për Masat</a>,\nJonathan Cox,\n11 nëntor, 2011." #: i2p2www/pages/site/about/media.html:258 #, python-format msgid "" -"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" +"<a href=\"%(mp3)s\">zzz and Lance James interviewed on the InfoSec Daily Podcast Ep. 596 (mp3)</a>\n" "February 16, 2012\n" -"(link dead, seeded inside I2P at <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" -msgstr "" -"<a href=\"%(mp3)s\">zzz dhe Lance James intervistuar në InfoSec Daily " -"Podcast Ep. 596 (mp3)</a>\n" -"16 shkurt, 2012\n" -"(lidhje e vdekur, mbjellë brenda I2P te <a " -"href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's" -" tracker</a>)" +"(link dead, seeded inside I2P at <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" +msgstr "<a href=\"%(mp3)s\">zzz dhe Lance James intervistuar në InfoSec Daily Podcast Ep. 596 (mp3)</a>\n16 shkurt, 2012\n(lidhje e vdekur, mbjellë brenda I2P te <a href=\"http://tracker2.postman.i2p/index.php?view=TorrentDetail&id=15905\">postman's tracker</a>)" #: i2p2www/pages/site/about/media.html:264 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-010 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-010 (mp3)</a>\n" "Part 1, February 28, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:269 #, python-format msgid "" -"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down " -"Security Podcast Ep. 2015-011 (mp3)</a>\n" +"<a href=\"%(mp3)s\">Jeff and Str4d interviewed on the Brakeing Down Security Podcast Ep. 2015-011 (mp3)</a>\n" "Part 2, March 6, 2015" msgstr "" #: i2p2www/pages/site/about/media.html:274 #, python-format msgid "" -"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. " -"Success, Failures, Grief and Buddhism.</a>\n" +"<a href=\"%(link)s\">Fireside With Lei - Episode 18: Lance James. Success, Failures, Grief and Buddhism.</a>\n" "<a href=\"%(archive)s\">(archive.org)</a>\n" "<a href=\"%(mp3)s\">(mp3)</a>\n" "Robert Lei, December 31, 2018" @@ -919,16 +739,14 @@ msgstr "" #: i2p2www/pages/site/about/media.html:283 #, python-format msgid "" -"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on " -"Medium.com</a>\n" +"<a href=\"%(mhatta)s\">Articles by I2P contributor Masayuki Hatta on Medium.com</a>\n" "2019\n" msgstr "" #: i2p2www/pages/site/about/media.html:288 #, python-format msgid "" -"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy " -"Auto-Configuration</a>\n" +"<a href=\"%(ctrl)s\">Enabling both .onion and .i2p routing with Proxy Auto-Configuration</a>\n" "Daniel Aleksandersen, February 7 2019" msgstr "" @@ -945,8 +763,7 @@ msgstr "" #: i2p2www/pages/site/about/media.html:303 #, python-format msgid "" -"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P " -"implementations, libraries, resources, projects, and shiny things</a>\n" +"<a href=\"%(meeh)s\">A curated list by I2P contributor meeh of I2P implementations, libraries, resources, projects, and shiny things</a>\n" "2019" msgstr "" @@ -956,29 +773,20 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:4 msgid "" -"This implementation of I2P (the Java implementation distributed on this " -"site)\n" -"includes a \"Strict Countries List\" which we use to decide how routers " -"should behave \n" -"within regions where applications like I2P may be limited by law. For " -"example, while\n" -"no countries that we know of prohibit using I2P, some have broad " -"prohibitions on\n" -"participating in routing for others. Routers that appear to be in the " -"\"Strict\"\n" +"This implementation of I2P (the Java implementation distributed on this site)\n" +"includes a \"Strict Countries List\" which we use to decide how routers should behave \n" +"within regions where applications like I2P may be limited by law. For example, while\n" +"no countries that we know of prohibit using I2P, some have broad prohibitions on\n" +"participating in routing for others. Routers that appear to be in the \"Strict\"\n" "countries will automatically be placed into \"Hidden\" mode." msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:11 msgid "" -"The Project relies on the research provided by civil and digital rights " -"organizations in order\n" -"to make decisions that offer protections for its users. In this case the " -"ongoing research\n" -"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has " -"been referenced. General\n" -"guidance is to include countries with a Civil Liberties (CL) score of 16 " -"or less or an Internet\n" +"The Project relies on the research provided by civil and digital rights organizations in order\n" +"to make decisions that offer protections for its users. In this case the ongoing research\n" +"provided by <a href=\"https://freedomhouse.org/\">Freedom House</a> has been referenced. General\n" +"guidance is to include countries with a Civil Liberties (CL) score of 16 or less or an Internet\n" "Freedom score of 39 or less (not free)." msgstr "" @@ -988,16 +796,11 @@ msgstr "" #: i2p2www/pages/site/about/restrictive-countries.html:19 msgid "" -"When a router is placed into hidden mode, three key things change about " -"it's behavior.\n" -"It will no longer publish a routerInfo to the NetDB, it will no longer " -"accept\n" -"participating tunnels, and it will reject direct connections to routers " -"in the same\n" -"country that it is in. These defenses make the routers more difficult to " -"enumerate\n" -"reliably, and prevent them from running afoul of restrictions on routing " -"traffic for\n" +"When a router is placed into hidden mode, three key things change about it's behavior.\n" +"It will no longer publish a routerInfo to the NetDB, it will no longer accept\n" +"participating tunnels, and it will reject direct connections to routers in the same\n" +"country that it is in. These defenses make the routers more difficult to enumerate\n" +"reliably, and prevent them from running afoul of restrictions on routing traffic for\n" "others." msgstr "" @@ -1019,18 +822,15 @@ msgstr "" msgid "" "When you install the I2P software made available at geti2p.net, you are \n" "actually installing an I2P router and an accompanying bundle of basic \n" -"applications. The I2P Java distribution is the first I2P software gateway" -" and \n" +"applications. The I2P Java distribution is the first I2P software gateway and \n" "has been actively developed since 2003." msgstr "" #: i2p2www/pages/site/about/software.html:10 msgid "" "The applications are made available through a webUI, which listens at \n" -"127.0.0.1:7657, and the main page of which is called the “Router " -"Console,†\n" -"where you monitor the health of your connection to the network and access" -" \n" +"127.0.0.1:7657, and the main page of which is called the “Router Console,†\n" +"where you monitor the health of your connection to the network and access \n" "applications to use on the network." msgstr "" @@ -1041,84 +841,61 @@ msgstr "" #: i2p2www/pages/site/about/software.html:15 msgid "" "<strong>The Set Up Wizard</strong>: When you download the \n" -"I2P software, a set up wizard will guide you through a few configuration " -"steps \n" -"while your router is making its first connections to the network. This " -"happens \n" -"the same way that your home router connects you to the Internet. During " -"the set \n" -"up process, you will be given the option to test your bandwidth and set " -"your \n" +"I2P software, a set up wizard will guide you through a few configuration steps \n" +"while your router is making its first connections to the network. This happens \n" +"the same way that your home router connects you to the Internet. During the set \n" +"up process, you will be given the option to test your bandwidth and set your \n" "bandwidth limits in order to ensure a good connection as a network peer." msgstr "" #: i2p2www/pages/site/about/software.html:21 msgid "" "<strong>The I2P Router Console</strong>: Here is where you can see your \n" -"network connections and information about your router. You will be able " -"to see how many peers you \n" -"have, and other information that will help if you need to troubleshoot. " -"You can \n" -"stop and start the router as well. You will see the applications that the" -" \n" -"software includes, as well as links to some community forums and sites on" -" the \n" -"I2P network. You will receive news when there is a a new software " -"release, and \n" -"will be able to download the latest version here as well. Additionally, " -"you can \n" -"find shortcuts to other available applications. The console is " -"customizable and \n" +"network connections and information about your router. You will be able to see how many peers you \n" +"have, and other information that will help if you need to troubleshoot. You can \n" +"stop and start the router as well. You will see the applications that the \n" +"software includes, as well as links to some community forums and sites on the \n" +"I2P network. You will receive news when there is a a new software release, and \n" +"will be able to download the latest version here as well. Additionally, you can \n" +"find shortcuts to other available applications. The console is customizable and \n" "includes a default light theme with a dark theme option." msgstr "" #: i2p2www/pages/site/about/software.html:30 msgid "" -"<strong>SusiMail</strong>: SusiMail is a secure email client. It is " -"primarily \n" -"intended for use with Postman’s email servers inside of the I2P network ." -" It \n" -"is designed to avoid leaking information about email use to other " -"networks. \n" -"SusiMail is bridged so it can send and receive email from the internet as" -" well. \n" -"Occasionally you may see some services like Gmail classifying it as spam," -" which \n" +"<strong>SusiMail</strong>: SusiMail is a secure email client. It is primarily \n" +"intended for use with Postman’s email servers inside of the I2P network . It \n" +"is designed to avoid leaking information about email use to other networks. \n" +"SusiMail is bridged so it can send and receive email from the internet as well. \n" +"Occasionally you may see some services like Gmail classifying it as spam, which \n" "you can correct in your Internet email service providers settings." msgstr "" #: i2p2www/pages/site/about/software.html:36 #, python-format msgid "" -"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P" -" network only BitTorrent client. It never makes a connection to a peer " -"over any other network." +"<strong><a href=\"%(bittorrent)s\">I2PSnark</a></strong>: Snark is an I2P " +"network only BitTorrent client. It never makes a connection to a peer over " +"any other network." msgstr "" #: i2p2www/pages/site/about/software.html:37 #, python-format msgid "" -"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This " -"is a locally-defined list of \n" -"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P " -"addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) " -"It integrates with other applications to \n" +"<strong><a href=\"%(addressbook)s\">The Address Book</a></strong>: This is a locally-defined list of \n" +"human-readable addresses ( ie: i2p-projekt.i2p) and corresponding I2P addresses.(udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p) It integrates with other applications to \n" "allow you to use those human-readable addresses in place of those I2P \n" -"addresses. It is more similar to a hosts file or a contact list than a " -"network \n" -"database or a DNS service. There is no recognized global namespace, you " -"decide \n" +"addresses. It is more similar to a hosts file or a contact list than a network \n" +"database or a DNS service. There is no recognized global namespace, you decide \n" "what any given .i2p domain maps to in the end." msgstr "" #: i2p2www/pages/site/about/software.html:46 #, python-format msgid "" -"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services " -"Manager</a></strong> This is a general-purpose \n" +"<strong><a href=\"%(i2ptunnel)s\">I2P Hidden Services Manager</a></strong> This is a general-purpose \n" "adapter for forwarding services ( ie SSH ) into I2P and proxying client \n" -"requests to and from I2P. It provides a variety of “Tunnel Types†which " -"are \n" +"requests to and from I2P. It provides a variety of “Tunnel Types†which are \n" "able to do advance filtering of traffic before it reaches I2P." msgstr "" @@ -1129,8 +906,7 @@ msgstr "" #: i2p2www/pages/site/about/software.html:51 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web " -"browser with advanced privacy and \n" +"<strong><a href=\"%(browser)s\">Mozilla Firefox</a></strong>: A web browser with advanced privacy and \n" "security features, this is the best browser to configure to browse I2P \n" "sites." msgstr "" @@ -1138,27 +914,23 @@ msgstr "" #: i2p2www/pages/site/about/software.html:54 #, python-format msgid "" -"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser " -"developed by Google that is the \n" -"Open-Source base of Google Chrome, this is sometimes used as an " -"alternative to \n" +"<strong><a href=\"%(browser)s\">Chromium</a></strong>: A web browser developed by Google that is the \n" +"Open-Source base of Google Chrome, this is sometimes used as an alternative to \n" "Firefox." msgstr "" #: i2p2www/pages/site/about/software.html:57 msgid "" -"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-" -"Rich bittorrent client including I2P \n" -"support and the unique ability to “Bridge†regular torrents in-to I2P so" -" \n" +"<strong><a href=\"https://biglybt.com\">BiglyBT</a></strong>: A Feature-Rich bittorrent client including I2P \n" +"support and the unique ability to “Bridge†regular torrents in-to I2P so \n" "people can download them anonymously." msgstr "" #: i2p2www/pages/site/about/software.html:60 #, python-format msgid "" -"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is " -"a popular program used by systems administrators to <a " +"<strong><a href=\"https://openssh.com\">OpenSSH</a></strong>: OpenSSH is a " +"popular program used by systems administrators to <a " "href=\"%(ssh)s\">remotely administer a server</a>, or to provide “Shell†" "accounts for users on the server." msgstr "" @@ -1166,26 +938,17 @@ msgstr "" #: i2p2www/pages/site/about/software.html:61 #, python-format msgid "" -"<strong><a href=\"%(git)s\">Git</a>/<a " -"href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control " -"tool which is \n" -"distributed, and often recommends a fork-first workflow. Hosting source " -"code on \n" -"I2P is an important activity, so Gitlab-specific instructions are " -"available for \n" +"<strong><a href=\"%(git)s\">Git</a>/<a href=\"%(gitlab)s\">Gitlab</a></strong>: Git is a source-code control tool which is \n" +"distributed, and often recommends a fork-first workflow. Hosting source code on \n" +"I2P is an important activity, so Gitlab-specific instructions are available for \n" "all to use." msgstr "" #: i2p2www/pages/site/about/software.html:65 msgid "" -"<strong><a href=\"https://debian.org\">Debian</a> and <a " -"href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible" -" to obtain \n" -"packages for Debian and Ubuntu GNU/Linux over I2P using <a " -"href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> " -"and \n" -"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-" -"i2phttp</a>. In the future, a bittorrent-based transport may also be \n" +"<strong><a href=\"https://debian.org\">Debian</a> and <a href=\"https://ubuntu.com\">Ubuntu</a> GNU/Linux</strong>: It is possible to obtain \n" +"packages for Debian and Ubuntu GNU/Linux over I2P using <a href=\"https://i2pgit.org/idk/apt-transport-i2p\">apt-transport-i2p</a> and \n" +"<a href=\"https://i2pgit.org/idk/apt-transport-i2phttp\">apt-transport-i2phttp</a>. In the future, a bittorrent-based transport may also be \n" "developed." msgstr "" @@ -1196,10 +959,8 @@ msgstr "" #: i2p2www/pages/site/about/software.html:70 #, python-format msgid "" -"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API " -"is a language-independent \n" -"API for writing applications that are I2P-native by communicating with " -"the \n" +"<strong><a href=\"%(sam)s\">The SAM API Bridge</a></strong>: The SAM API is a language-independent \n" +"API for writing applications that are I2P-native by communicating with the \n" "local I2P router. It can provide Streaming-like capabilities, Anonymous \n" "Datagrams, or Repliable Datagrams." msgstr "" @@ -1207,18 +968,15 @@ msgstr "" #: i2p2www/pages/site/about/software.html:74 #, python-format msgid "" -"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a " -"deprecated technology, BOB \n" +"<strong><a href=\"%(bob)s\">The BOB API Bridge</a></strong>: This is a deprecated technology, BOB \n" "users should migrate to SAM if it is possible for them to do so." msgstr "" #: i2p2www/pages/site/about/software.html:76 #, python-format msgid "" -"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an " -"application, this is how Java \n" -"applications communicate with the I2P router to set up tunnels, generate " -"and \n" +"<strong><a href=\"%(i2cp)s\">The I2CP API</a></strong>: Not strictly an application, this is how Java \n" +"applications communicate with the I2P router to set up tunnels, generate and \n" "manage keys, and communicate with other peers on the network." msgstr "" @@ -1229,10 +987,8 @@ msgstr "Anëtarë të Projektit I2P" #: i2p2www/pages/site/about/team.html:5 #, python-format msgid "" -"We are a small group of people spread around several continents, working " -"to\n" -"advance different aspects of the project and discussing the design of the" -"\n" +"We are a small group of people spread around several continents, working to\n" +"advance different aspects of the project and discussing the design of the\n" "network.\n" "<a href=\"%(volunteer)s\">Get involved!</a>" msgstr "" @@ -1404,7 +1160,8 @@ msgid "Product Development" msgstr "Zhvillim Produkti" #: i2p2www/pages/site/about/team.html:117 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/about/team.html:120 @@ -1644,7 +1401,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "zhvillim i jbigi-it, migrim wiki, pastrim dokumentimi" #: i2p2www/pages/site/about/team.html:319 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/about/team.html:323 @@ -1694,32 +1452,25 @@ msgstr "… dhe plot të tjera" #: i2p2www/pages/site/about/i2pcon/2015.html:6 msgid "" -"I2PCon 2015 was the first event of its kind. It had two short-term goals." -"\n" -"First, to provide the general public with an event where knowledge about " -"privacy could be obtained.\n" -"Second, to further the I2P project and its community with technical " -"discussions\n" +"I2PCon 2015 was the first event of its kind. It had two short-term goals.\n" +"First, to provide the general public with an event where knowledge about privacy could be obtained.\n" +"Second, to further the I2P project and its community with technical discussions\n" "about cryptography, anonymity and I2P-centric topics." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:15 msgid "" "A a larger and more long-term goal of this event was to build a\n" -"commnutiy of privacy-conscious individuals. By connecting people who " -"recognize\n" -"the importance of privacy, we wanted to provide a forum where this " -"community can grow." +"commnutiy of privacy-conscious individuals. By connecting people who recognize\n" +"the importance of privacy, we wanted to provide a forum where this community can grow." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:23 msgid "" "The idea for this event was first spawned by our wonderful friends at\n" "<a href=\"https://torontocrypto.org/\">Toronto Crypto</a>.\n" -"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>." -"\n" -"The marketing was spearheaded by <a " -"href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" +"The venue was provided by <a href=\"https://hacklab.to/\">Hacklab.to</a>.\n" +"The marketing was spearheaded by <a href=\"https://twitter.com/YrB1rd\">@YrB1rd</a> and Siew.\n" "Without them this event would not have been possible." msgstr "" @@ -1737,8 +1488,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:44 msgid "" -"Note that in-I2P torrents may also be available on the non-private " -"internet due to bridging by Vuze clients." +"Note that in-I2P torrents may also be available on the non-private internet " +"due to bridging by Vuze clients." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:50 @@ -1777,10 +1528,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:85 msgid "" -"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, " -"malware, network security, and DNS.\n" -"His interest in I2P is centered on preserving user privacy, autonomous " -"filtering, and anti-abuse." +"David Dagon is a postdoc researcher at Georgia Tech focused on botnets, malware, network security, and DNS.\n" +"His interest in I2P is centered on preserving user privacy, autonomous filtering, and anti-abuse." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:89 @@ -1794,15 +1543,11 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:98 msgid "" -"Lance James is the founder of the Invisibile IRC Project, the predecessor" -" to I2P, back in 2002.\n" +"Lance James is the founder of the Invisibile IRC Project, the predecessor to I2P, back in 2002.\n" "He founded his own cyber threat intelligence company in 2003.\n" -"He's been focused on network security, malware research, and information " -"security ever since.\n" -"During 2011-2013, he was Director of Threat Intelligence for The " -"Vigilant, which was acquired by Deloitte in 2013.\n" -"He recently left Deloitte to do consulting through his company The James " -"Group." +"He's been focused on network security, malware research, and information security ever since.\n" +"During 2011-2013, he was Director of Threat Intelligence for The Vigilant, which was acquired by Deloitte in 2013.\n" +"He recently left Deloitte to do consulting through his company The James Group." msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:109 @@ -1811,11 +1556,8 @@ msgstr "" #: i2p2www/pages/site/about/i2pcon/2015.html:115 msgid "" -"Nicholas Johnston is a Professor of Information Security in Sheridan " -"College's School of Applied Computing in the InfoSec Bachelor's degree " -"program.\n" -"His previous professional career was in digital forensics and " -"investigations.\n" +"Nicholas Johnston is a Professor of Information Security in Sheridan College's School of Applied Computing in the InfoSec Bachelor's degree program.\n" +"His previous professional career was in digital forensics and investigations.\n" "He is also a contractor specializing in incident response.\n" "His research areas include secure software development and data analytics." msgstr "" @@ -1870,8 +1612,7 @@ msgstr "Dita 2" #: i2p2www/pages/site/about/i2pcon/index.html:4 msgid "" -"The first conference dedicated to I2P was held in Toronto on August " -"15-16, 2015.\n" +"The first conference dedicated to I2P was held in Toronto on August 15-16, 2015.\n" "See the link below for more information and links to slides and videos." msgstr "" @@ -1889,15 +1630,11 @@ msgstr "Gusht 2010" #: i2p2www/pages/site/about/performance/future.html:7 msgid "" -"There are a few major techniques that can be done to improve the " -"perceived\n" -"performance of I2P - some of the following are CPU related, others " -"bandwidth\n" +"There are a few major techniques that can be done to improve the perceived\n" +"performance of I2P - some of the following are CPU related, others bandwidth\n" "related, and others still are protocol related. However, all of those\n" -"dimensions affect the latency, throughput, and perceived performance of " -"the\n" -"network, as they reduce contention for scarce resources. This list is of" -" course\n" +"dimensions affect the latency, throughput, and perceived performance of the\n" +"network, as they reduce contention for scarce resources. This list is of course\n" "not comprehensive, but it does cover the major ones that are seen." msgstr "" @@ -1916,14 +1653,10 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:21 #, python-format msgid "" -"Probably one of the most important parts of getting faster performance " -"will\n" -"be improving how routers choose the peers that they build their tunnels " -"through\n" -"- making sure they don't use peers with slow links or ones with fast " -"links that\n" -"are overloaded, etc. In addition, we've got to make sure we don't expose" -"\n" +"Probably one of the most important parts of getting faster performance will\n" +"be improving how routers choose the peers that they build their tunnels through\n" +"- making sure they don't use peers with slow links or ones with fast links that\n" +"are overloaded, etc. In addition, we've got to make sure we don't expose\n" "ourselves to a <a href=\"%(sybilpdf)s\">Sybil</a> attack\n" "from a powerful adversary with lots of fast machines." msgstr "" @@ -1934,20 +1667,13 @@ msgstr "Përimtime baze të dhënash rrjeti" #: i2p2www/pages/site/about/performance/future.html:31 msgid "" -"We're going to want to be more efficient with the network database's " -"healing\n" -"and maintenance algorithms - rather than constantly explore the keyspace " -"for new\n" -"peers - causing a significant number of network messages and router load " -"- we\n" -"can slow down or even stop exploring until we detect that there's " -"something new\n" -"worth finding (e.g. decay the exploration rate based upon the last time " -"someone\n" -"gave us a reference to someone we had never heard of). We can also do " -"some\n" -"tuning on what we actually send - how many peers we bounce back (or even " -"if we\n" +"We're going to want to be more efficient with the network database's healing\n" +"and maintenance algorithms - rather than constantly explore the keyspace for new\n" +"peers - causing a significant number of network messages and router load - we\n" +"can slow down or even stop exploring until we detect that there's something new\n" +"worth finding (e.g. decay the exploration rate based upon the last time someone\n" +"gave us a reference to someone we had never heard of). We can also do some\n" +"tuning on what we actually send - how many peers we bounce back (or even if we\n" "bounce back a reply), as well as how many concurrent searches we perform." msgstr "" @@ -1958,24 +1684,15 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:43 #, python-format msgid "" -"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> " -"algorithm\n" -"works is by managing a set of random one-time-use 32 byte arrays, and " -"expiring\n" -"them if they aren't used quickly enough. If we expire them too soon, " -"we're\n" -"forced to fall back on a full (expensive) ElGamal encryption, but if we " -"don't\n" -"expire them quickly enough, we've got to reduce their quantity so that we" -" don't\n" -"run out of memory (and if the recipient somehow gets corrupted and loses " -"some\n" -"tags, even more encryption failures may occur prior to detection). With " -"some\n" -"more active detection and feedback driven algorithms, we can safely and " -"more\n" -"efficiently tune the lifetime of the tags, replacing the ElGamal " -"encryption with\n" +"The way the <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> algorithm\n" +"works is by managing a set of random one-time-use 32 byte arrays, and expiring\n" +"them if they aren't used quickly enough. If we expire them too soon, we're\n" +"forced to fall back on a full (expensive) ElGamal encryption, but if we don't\n" +"expire them quickly enough, we've got to reduce their quantity so that we don't\n" +"run out of memory (and if the recipient somehow gets corrupted and loses some\n" +"tags, even more encryption failures may occur prior to detection). With some\n" +"more active detection and feedback driven algorithms, we can safely and more\n" +"efficiently tune the lifetime of the tags, replacing the ElGamal encryption with\n" "a trivial AES operation." msgstr "" @@ -1995,33 +1712,24 @@ msgstr "" msgid "" "Right now, our <a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> \n" "algorithm works by tagging each encrypted message with a unique random \n" -"32 byte nonce (a \"session tag\"), identifying that message as being " -"encrypted \n" -"with the associated AES session's key. This prevents peers from " -"distinguishing \n" -"messages that are part of the same session, since each message has a " -"completely \n" +"32 byte nonce (a \"session tag\"), identifying that message as being encrypted \n" +"with the associated AES session's key. This prevents peers from distinguishing \n" +"messages that are part of the same session, since each message has a completely \n" "new random tag. To accomplish this, every few messages bundle a whole \n" -"new set of session tags within the encrypted message itself, " -"transparently \n" -"delivering a way to identify future messages. We then have to keep track" -" \n" +"new set of session tags within the encrypted message itself, transparently \n" +"delivering a way to identify future messages. We then have to keep track \n" "of what messages are successfully delivered so that we know what tags \n" "we may use." msgstr "" #: i2p2www/pages/site/about/performance/future.html:74 msgid "" -"This works fine and is fairly robust, however it is inefficient in terms" -" \n" +"This works fine and is fairly robust, however it is inefficient in terms \n" "of bandwidth usage, as it requires the delivery of these tags ahead of \n" "time (and not all tags may be necessary, or some may be wasted, due to \n" -"their expiration). On average though, predelivering the session tag costs" -" \n" -"32 bytes per message (the size of a tag). As Taral suggested though, that" -" \n" -"size can be avoided by replacing the delivery of the tags with a " -"synchronized \n" +"their expiration). On average though, predelivering the session tag costs \n" +"32 bytes per message (the size of a tag). As Taral suggested though, that \n" +"size can be avoided by replacing the delivery of the tags with a synchronized \n" "PRNG - when a new session is established (through an ElGamal encrypted \n" "block), both sides seed a PRNG for use and generate the session tags on \n" "demand (with the recipient precalculating the next few possible values \n" @@ -2034,32 +1742,24 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:88 msgid "" -"The current default tunnel duration of 10 minutes is fairly arbitrary, " -"though\n" -"it \"feels okay\". Once we've got tunnel healing code and more effective" -" failure\n" -"detection, we'll be able to more safely vary those durations, reducing " -"the\n" +"The current default tunnel duration of 10 minutes is fairly arbitrary, though\n" +"it \"feels okay\". Once we've got tunnel healing code and more effective failure\n" +"detection, we'll be able to more safely vary those durations, reducing the\n" "network and CPU load (due to expensive tunnel creation messages)." msgstr "" #: i2p2www/pages/site/about/performance/future.html:95 msgid "" -"This appears to be an easy fix for high load on the big-bandwidth " -"routers, but\n" -"we should not resort to it until we've tuned the tunnel building " -"algorithms further.\n" -"However, the 10 minute tunnel lifetime is hardcoded in quite a few " -"places,\n" +"This appears to be an easy fix for high load on the big-bandwidth routers, but\n" +"we should not resort to it until we've tuned the tunnel building algorithms further.\n" +"However, the 10 minute tunnel lifetime is hardcoded in quite a few places,\n" "so substantial effort would be required to change the duration.\n" -"Also, it would be difficult to maintain backward compatibility with such " -"a change." +"Also, it would be difficult to maintain backward compatibility with such a change." msgstr "" #: i2p2www/pages/site/about/performance/future.html:102 msgid "" -"Currently, since the network average tunnel build success rate is fairly " -"high,\n" +"Currently, since the network average tunnel build success rate is fairly high,\n" "there are no current plans to extend tunnel lifetime." msgstr "" @@ -2069,27 +1769,19 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:109 msgid "" -"Yet another of the fairly arbitrary but \"okay feeling\" things we've got" -" are the\n" -"current timeouts for various activities. Why do we have a 60 second " -"\"peer\n" -"unreachable\" timeout? Why do we try sending through a different tunnel " -"that a\n" -"LeaseSet advertises after 10 seconds? Why are the network database " -"queries\n" -"bounded by 60 or 20 second limits? Why are destinations configured to " -"ask for a\n" -"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a " -"peer to\n" -"reply to our request that they join a tunnel? Why do we consider a " -"tunnel that\n" +"Yet another of the fairly arbitrary but \"okay feeling\" things we've got are the\n" +"current timeouts for various activities. Why do we have a 60 second \"peer\n" +"unreachable\" timeout? Why do we try sending through a different tunnel that a\n" +"LeaseSet advertises after 10 seconds? Why are the network database queries\n" +"bounded by 60 or 20 second limits? Why are destinations configured to ask for a\n" +"new set of tunnels every 10 minutes? Why do we allow 60 seconds for a peer to\n" +"reply to our request that they join a tunnel? Why do we consider a tunnel that\n" "doesn't pass our test within 60 seconds \"dead\"?" msgstr "" #: i2p2www/pages/site/about/performance/future.html:119 msgid "" -"Each of those imponderables can be addressed with more adaptive code, as " -"well\n" +"Each of those imponderables can be addressed with more adaptive code, as well\n" "as tunable parameters to allow for more appropriate tradeoffs between\n" "bandwidth, latency, and CPU usage." msgstr "" @@ -2106,17 +1798,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:134 msgid "" -"Client level bandwidth limiting (in either or both directions on a " -"stream, \n" -"or possibly shared across multiple streams). This would be in addition to" -" \n" +"Client level bandwidth limiting (in either or both directions on a stream, \n" +"or possibly shared across multiple streams). This would be in addition to \n" "the router's overall bandwidth limiting, of course." msgstr "" #: i2p2www/pages/site/about/performance/future.html:141 msgid "" -"Access control lists (only allowing streams to or from certain other " -"known \n" +"Access control lists (only allowing streams to or from certain other known \n" "destinations)." msgstr "" @@ -2129,8 +1818,7 @@ msgstr "" #: i2p2www/pages/site/about/performance/future.html:153 #, python-format msgid "" -"Additional ideas for improving the streaming library are described on the" -"\n" +"Additional ideas for improving the streaming library are described on the\n" "<a href=\"%(streaming)s#future\">streaming library page</a>." msgstr "" @@ -2141,10 +1829,8 @@ msgstr "Historik Funksionimi" #: i2p2www/pages/site/about/performance/history.html:4 #, python-format msgid "" -"Notable performance improvements have been made using the techniques " -"below.\n" -"There is more to do, see the <a href=\"%(performance)s\">Performance</a> " -"page\n" +"Notable performance improvements have been made using the techniques below.\n" +"There is more to do, see the <a href=\"%(performance)s\">Performance</a> page\n" "for current issues and thoughts." msgstr "" @@ -2163,30 +1849,23 @@ msgstr "e sendërtuar" #: i2p2www/pages/site/about/performance/history.html:12 #, python-format msgid "" -"When I last profiled the I2P code, the vast majority of time was spent " -"within\n" +"When I last profiled the I2P code, the vast majority of time was spent within\n" "one function: java.math.BigInteger's\n" "<a href=\"%(modpow)s\">modPow</a>.\n" "Rather than try to tune this method, we'll call out to\n" "<a href=\"%(gmp)s\">GNU MP</a> - an insanely fast math library\n" "(with tuned assembler for many architectures). (<i>Editor: see\n" -"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key " -"cryptography</a></i>)" +"<a href=\"%(jbigi)s\">NativeBigInteger for faster public key cryptography</a></i>)" msgstr "" #: i2p2www/pages/site/about/performance/history.html:23 msgid "" "\n" -"ugha and duck are working on the C/JNI glue code, and the existing java " -"code\n" -"is already deployed with hooks for that whenever its ready. Preliminary " -"results\n" -"look fantastic - running the router with the native GMP modPow is " -"providing over\n" -"a 800% speedup in encryption performance, and the load was cut in " -"half. This\n" -"was just on one user's machine, and things are nowhere near ready for " -"packaging\n" +"ugha and duck are working on the C/JNI glue code, and the existing java code\n" +"is already deployed with hooks for that whenever its ready. Preliminary results\n" +"look fantastic - running the router with the native GMP modPow is providing over\n" +"a 800% speedup in encryption performance, and the load was cut in half. This\n" +"was just on one user's machine, and things are nowhere near ready for packaging\n" "and deployment, yet." msgstr "" @@ -2200,55 +1879,40 @@ msgstr "e sendëruar, por lyp përimtim" #: i2p2www/pages/site/about/performance/history.html:34 msgid "" -"This algorithm tweak will only be relevant for applications that want " -"their\n" -"peers to reply to them (though that includes everything that uses " -"I2PTunnel or\n" +"This algorithm tweak will only be relevant for applications that want their\n" +"peers to reply to them (though that includes everything that uses I2PTunnel or\n" "mihi's ministreaming lib):" msgstr "" #: i2p2www/pages/site/about/performance/history.html:39 msgid "" -"Previously, when Alice sent Bob a message, when Bob replied he had to do " -"a\n" -"lookup in the network database - sending out a few requests to get " -"Alice's\n" -"current LeaseSet. If he already has Alice's current LeaseSet, he can " -"instead\n" -"just send his reply immediately - this is (part of) why it typically " -"takes a\n" -"little longer talking to someone the first time you connect, but " -"subsequent\n" +"Previously, when Alice sent Bob a message, when Bob replied he had to do a\n" +"lookup in the network database - sending out a few requests to get Alice's\n" +"current LeaseSet. If he already has Alice's current LeaseSet, he can instead\n" +"just send his reply immediately - this is (part of) why it typically takes a\n" +"little longer talking to someone the first time you connect, but subsequent\n" "communication is faster. Currently - for all clients - we wrap\n" -"the sender's current LeaseSet in the garlic that is delivered to the " -"recipient,\n" -"so that when they go to reply, they'll <i>always</i> have the LeaseSet " -"locally\n" -"stored - completely removing any need for a network database lookup on " -"replies.\n" -"This trades off a large portion of the sender's bandwidth for that faster" -" reply.\n" +"the sender's current LeaseSet in the garlic that is delivered to the recipient,\n" +"so that when they go to reply, they'll <i>always</i> have the LeaseSet locally\n" +"stored - completely removing any need for a network database lookup on replies.\n" +"This trades off a large portion of the sender's bandwidth for that faster reply.\n" "If we didn't do this very often,\n" -"overall network bandwidth usage would decrease, since the recipient " -"doesn't\n" +"overall network bandwidth usage would decrease, since the recipient doesn't\n" "have to do the network database lookup." msgstr "" #: i2p2www/pages/site/about/performance/history.html:54 msgid "" -"For unpublished LeaseSets such as \"shared clients\", this is the only " -"way to\n" +"For unpublished LeaseSets such as \"shared clients\", this is the only way to\n" "get the LeaseSet to Bob. Unfortunately this bundling every time adds\n" -"almost 100% overhead to a high-bandwidth connection, and much more to" -"\n" +"almost 100% overhead to a high-bandwidth connection, and much more to\n" "a connection with smaller messages." msgstr "" #: i2p2www/pages/site/about/performance/history.html:60 msgid "" "Changes scheduled for release 0.6.2 will bundle the LeaseSet only when\n" -"necessary, at the beginning of a connection or when the LeaseSet changes." -"\n" +"necessary, at the beginning of a connection or when the LeaseSet changes.\n" "This will substantially reduce the total overhead of I2P messaging." msgstr "" @@ -2259,20 +1923,13 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:68 msgid "" "At the moment, all TCP connections do all of their peer validation after\n" -"going through the full (expensive) Diffie-Hellman handshaking to " -"negotiate a\n" -"private session key. This means that if someone's clock is really wrong," -" or\n" -"their NAT/firewall/etc is improperly configured (or they're just running " -"an\n" -"incompatible version of the router), they're going to consistently " -"(though not\n" -"constantly, thanks to the banlist) cause a futile expensive cryptographic" -"\n" -"operation on all the peers they know about. While we will want to keep " -"some\n" -"verification/validation within the encryption boundary, we'll want to " -"update the\n" +"going through the full (expensive) Diffie-Hellman handshaking to negotiate a\n" +"private session key. This means that if someone's clock is really wrong, or\n" +"their NAT/firewall/etc is improperly configured (or they're just running an\n" +"incompatible version of the router), they're going to consistently (though not\n" +"constantly, thanks to the banlist) cause a futile expensive cryptographic\n" +"operation on all the peers they know about. While we will want to keep some\n" +"verification/validation within the encryption boundary, we'll want to update the\n" "protocol to do some of it first, so that we can reject them cleanly\n" "without wasting much CPU or other resources." msgstr "" @@ -2283,16 +1940,11 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:83 msgid "" -"Rather than going with the fairly random scheme we have now, we should " -"use a\n" -"more context aware algorithm for testing tunnels. e.g. if we already " -"know its\n" -"passing valid data correctly, there's no need to test it, while if we " -"haven't\n" -"seen any data through it recently, perhaps its worthwhile to throw some " -"data its\n" -"way. This will reduce the tunnel contention due to excess messages, as " -"well as\n" +"Rather than going with the fairly random scheme we have now, we should use a\n" +"more context aware algorithm for testing tunnels. e.g. if we already know its\n" +"passing valid data correctly, there's no need to test it, while if we haven't\n" +"seen any data through it recently, perhaps its worthwhile to throw some data its\n" +"way. This will reduce the tunnel contention due to excess messages, as well as\n" "improve the speed at which we detect - and address - failing tunnels." msgstr "" @@ -2302,17 +1954,14 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:93 msgid "" -"Outbound tunnel selection implemented in 0.6.1.30, inbound lease " -"selection \n" +"Outbound tunnel selection implemented in 0.6.1.30, inbound lease selection \n" "implemented in release 0.6.2." msgstr "" #: i2p2www/pages/site/about/performance/history.html:97 msgid "" -"Selecting tunnels and leases at random for every message creates a large" -" \n" -"incidence of out-of-order delivery, which prevents the streaming lib from" -" \n" +"Selecting tunnels and leases at random for every message creates a large \n" +"incidence of out-of-order delivery, which prevents the streaming lib from \n" "increasing its window size as much as it could. By persisting with the \n" "same selections for a given connection, the transfer rate is much faster." msgstr "" @@ -2323,20 +1972,13 @@ msgstr "Ngjeshje e disa strukturash të dhënash" #: i2p2www/pages/site/about/performance/history.html:106 msgid "" -"The I2NP messages and the data they contain is already defined in a " -"fairly\n" -"compact structure, though one attribute of the RouterInfo structure is " -"not -\n" -"\"options\" is a plain ASCII name = value mapping. Right now, we're " -"filling it\n" -"with those published statistics - around 3300 bytes per peer. Trivial to" -"\n" -"implement GZip compression would nearly cut that to 1/3 its size, and " -"when you\n" -"consider how often RouterInfo structures are passed across the network, " -"that's\n" -"significant savings - every time a router asks another router for a " -"networkDb\n" +"The I2NP messages and the data they contain is already defined in a fairly\n" +"compact structure, though one attribute of the RouterInfo structure is not -\n" +"\"options\" is a plain ASCII name = value mapping. Right now, we're filling it\n" +"with those published statistics - around 3300 bytes per peer. Trivial to\n" +"implement GZip compression would nearly cut that to 1/3 its size, and when you\n" +"consider how often RouterInfo structures are passed across the network, that's\n" +"significant savings - every time a router asks another router for a networkDb\n" "entry that the peer doesn't have, it sends back 3-10 RouterInfo of them." msgstr "" @@ -2350,26 +1992,16 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:119 msgid "" -"Currently mihi's ministreaming library has a fairly simple stream " -"negotiation\n" -"protocol - Alice sends Bob a SYN message, Bob replies with an ACK " -"message, then\n" -"Alice and Bob send each other some data, until one of them sends the " -"other a\n" -"CLOSE message. For long lasting connections (to an IRC server, for " -"instance),\n" -"that overhead is negligible, but for simple one-off request/response " -"situations\n" -"(an HTTP request/reply, for instance), that's more than twice as many " -"messages as\n" -"necessary. If, however, Alice piggybacked her first payload in with the " -"SYN\n" -"message, and Bob piggybacked his first reply with the ACK - and perhaps " -"also\n" -"included the CLOSE flag - transient streams such as HTTP requests could " -"be\n" -"reduced to a pair of messages, instead of the " -"SYN+ACK+request+response+CLOSE." +"Currently mihi's ministreaming library has a fairly simple stream negotiation\n" +"protocol - Alice sends Bob a SYN message, Bob replies with an ACK message, then\n" +"Alice and Bob send each other some data, until one of them sends the other a\n" +"CLOSE message. For long lasting connections (to an IRC server, for instance),\n" +"that overhead is negligible, but for simple one-off request/response situations\n" +"(an HTTP request/reply, for instance), that's more than twice as many messages as\n" +"necessary. If, however, Alice piggybacked her first payload in with the SYN\n" +"message, and Bob piggybacked his first reply with the ACK - and perhaps also\n" +"included the CLOSE flag - transient streams such as HTTP requests could be\n" +"reduced to a pair of messages, instead of the SYN+ACK+request+response+CLOSE." msgstr "" #: i2p2www/pages/site/about/performance/history.html:132 @@ -2378,18 +2010,12 @@ msgstr "" #: i2p2www/pages/site/about/performance/history.html:134 msgid "" -"The ministreaming protocol takes advantage of a poor design decision in " -"the\n" -"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", " -"allowing what\n" -"would otherwise be an unreliable, best-effort, message based protocol to " -"be used\n" -"for reliable, blocking operation (under the covers, its still all " -"unreliable and\n" -"message based, with the router providing delivery guarantees by garlic " -"wrapping\n" -"an \"ACK\" message in with the payload, so once the data gets to the " -"target, the\n" +"The ministreaming protocol takes advantage of a poor design decision in the\n" +"I2P client protocol (I2CP) - the exposure of \"mode=GUARANTEED\", allowing what\n" +"would otherwise be an unreliable, best-effort, message based protocol to be used\n" +"for reliable, blocking operation (under the covers, its still all unreliable and\n" +"message based, with the router providing delivery guarantees by garlic wrapping\n" +"an \"ACK\" message in with the payload, so once the data gets to the target, the\n" "ACK message is forwarded back to us [through tunnels, of course])." msgstr "" @@ -2397,16 +2023,11 @@ msgstr "" #, python-format msgid "" "As I've <a href=\"%(link)s\">said</a>, having\n" -"I2PTunnel (and the ministreaming lib) go this route was the best thing " -"that\n" -"could be done, but more efficient mechanisms are available. When we rip " -"out the\n" -"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves " -"with an\n" -"I2CP that looks like an anonymous IP layer, and as such, we'll be able to" -"\n" -"implement the streaming library to take advantage of the design " -"experiences of\n" +"I2PTunnel (and the ministreaming lib) go this route was the best thing that\n" +"could be done, but more efficient mechanisms are available. When we rip out the\n" +"\"mode=GUARANTEED\" functionality, we're essentially leaving ourselves with an\n" +"I2CP that looks like an anonymous IP layer, and as such, we'll be able to\n" +"implement the streaming library to take advantage of the design experiences of\n" "the TCP layer - selective ACKs, congestion detection, nagle, etc." msgstr "" @@ -2422,52 +2043,33 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:7 msgid "" -"Probably one of the most frequent things people ask is \"how fast is " -"I2P?\",\n" -"and no one seems to like the answer - \"it depends\". After trying out " -"I2P, the\n" -"next thing they ask is \"will it get faster?\", and the answer to that is" -" a most\n" +"Probably one of the most frequent things people ask is \"how fast is I2P?\",\n" +"and no one seems to like the answer - \"it depends\". After trying out I2P, the\n" +"next thing they ask is \"will it get faster?\", and the answer to that is a most\n" "emphatic <b>yes</b>." msgstr "" #: i2p2www/pages/site/about/performance/index.html:14 msgid "" -"I2P is a full dynamic network. Each client is known to other nodes and " -"tests local known nodes for reachability and capacity.\n" -"Only reachable and capable nodes are saved to a local NetDB (This is " -"generally only a portion of the network, around 500-1000).\n" -"When I2P builds tunnels, it selects the best resource from this pool. For" -" example, a small subset of 20-50 nodes are only available to build " -"tunnels with.\n" -"Because testing happens every minute, the pool of used nodes changes " -"every minute.\n" -"Each I2P node knows a different part of the net, meaning that each router" -" has a different set of I2P nodes to be used for tunnels.\n" -"Even if two routers have the same subset of known nodes, the tests for " -"reachability and capacity will likely show different results, as the " -"other routers could be under load just as one router tests, but be free " -"if the second router tests." +"I2P is a full dynamic network. Each client is known to other nodes and tests local known nodes for reachability and capacity.\n" +"Only reachable and capable nodes are saved to a local NetDB (This is generally only a portion of the network, around 500-1000).\n" +"When I2P builds tunnels, it selects the best resource from this pool. For example, a small subset of 20-50 nodes are only available to build tunnels with.\n" +"Because testing happens every minute, the pool of used nodes changes every minute.\n" +"Each I2P node knows a different part of the net, meaning that each router has a different set of I2P nodes to be used for tunnels.\n" +"Even if two routers have the same subset of known nodes, the tests for reachability and capacity will likely show different results, as the other routers could be under load just as one router tests, but be free if the second router tests." msgstr "" #: i2p2www/pages/site/about/performance/index.html:23 msgid "" -"The above describes why each I2P node has different nodes to build " -"tunnels.\n" -"Because every I2P node has a different latency and bandwith, tunnels " -"(which are built via those nodes) have different latency and bandwidth " -"values.\n" -"And because every I2P node has different tunnels built, no two I2P nodes " -"have the same tunnel sets." +"The above describes why each I2P node has different nodes to build tunnels.\n" +"Because every I2P node has a different latency and bandwith, tunnels (which are built via those nodes) have different latency and bandwidth values.\n" +"And because every I2P node has different tunnels built, no two I2P nodes have the same tunnel sets." msgstr "" #: i2p2www/pages/site/about/performance/index.html:29 msgid "" -"A server/client is known as a \"destination\" and each destination has at" -" least one inbound and one outbound tunnel. The default is 3 hops per " -"tunnel.\n" -"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip" -" client-server-client." +"A server/client is known as a \"destination\" and each destination has at least one inbound and one outbound tunnel. The default is 3 hops per tunnel.\n" +"This adds up to 12 hops (aka 12 different I2P nodes) for a full roundtrip client-server-client." msgstr "" #: i2p2www/pages/site/about/performance/index.html:34 @@ -2482,102 +2084,61 @@ msgstr "" #: i2p2www/pages/site/about/performance/index.html:47 msgid "" -"As most traffic on I2P (www, torrent,...) needs ack packages until new " -"data is sent, it needs to wait until a ack package returns from the " -"server.\n" +"As most traffic on I2P (www, torrent,...) needs ack packages until new data is sent, it needs to wait until a ack package returns from the server.\n" "In the end: send data, wait for ack, send more data, wait for ack,..\n" -"As the RTT (RoundTripTime) adds up from the latency of each individual " -"I2P node and each connection on this roundtrip, it takes usually 1-3 " -"seconds until a ack package comes back to the client.\n" -"With some internals of TCP and I2P transport, a data package has a " -"limited size and cannot be as large as we want it to be.\n" -"Together these conditions set a limit of max bandwidth per tunnel of " -"20-50 kbyte/sec.\n" -"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, " -"the whole tunnel is limited to 5 kb/sec, independent of the \n" +"As the RTT (RoundTripTime) adds up from the latency of each individual I2P node and each connection on this roundtrip, it takes usually 1-3 seconds until a ack package comes back to the client.\n" +"With some internals of TCP and I2P transport, a data package has a limited size and cannot be as large as we want it to be.\n" +"Together these conditions set a limit of max bandwidth per tunnel of 20-50 kbyte/sec.\n" +"But if ONLY ONE hop in the tunnel has only 5 kb/sec bandwidth to spend, the whole tunnel is limited to 5 kb/sec, independent of the \n" "latency and other limitations." msgstr "" #: i2p2www/pages/site/about/performance/index.html:57 msgid "" -"Due to encryption used and other setups in I2P (howto built up tunnels, " -"latency, ...) it is quite expensive in CPU time to build a tunnel. This " -"is \n" -"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels" -" to transport data. With a max of 50 kb/sec per tunnel, a destination " -"could \n" -"use roughly 300 kb/sec traffic combined ( in reality it could be more if " -"shorter tunnels are used with low or no anonymity available).\n" +"Due to encryption used and other setups in I2P (howto built up tunnels, latency, ...) it is quite expensive in CPU time to build a tunnel. This is \n" +"why a destination is only allowed to have a max of 6 IN and 6 OUT tunnels to transport data. With a max of 50 kb/sec per tunnel, a destination could \n" +"use roughly 300 kb/sec traffic combined ( in reality it could be more if shorter tunnels are used with low or no anonymity available).\n" "Used tunnels are discarded every 10 minutes and new ones are built up.\n" -"This change of tunnels (and sometimes clients that shutdown hard due to " -"usage of \"shut down at once\" or situations where there is power loss) " -"does \n" -"sometimes break tunnels and connections, as seen on the IRC2P Network in " -"loss of connection (ping timeout) or on when using eepget." +"This change of tunnels (and sometimes clients that shutdown hard due to usage of \"shut down at once\" or situations where there is power loss) does \n" +"sometimes break tunnels and connections, as seen on the IRC2P Network in loss of connection (ping timeout) or on when using eepget." msgstr "" #: i2p2www/pages/site/about/performance/index.html:66 msgid "" -"With a limited set of destinations and a limited set of tunnels per " -"destination, one I2P node only uses a limited set of tunnels across other" -" I2P nodes.\n" -"For example, if an I2P node is \"hop1\" in the small example above, we " -"only see 1 participating tunnel originating from the client.\n" -"If we sum up the whole I2P network, only a rather limited number of " -"participating tunnels could be built with a limited amount of bandwidth " -"all together.\n" -"If one distributes these limited numbers across the number of I2P nodes, " -"there is only a fraction of available bandwidth/capacity available for " -"use." +"With a limited set of destinations and a limited set of tunnels per destination, one I2P node only uses a limited set of tunnels across other I2P nodes.\n" +"For example, if an I2P node is \"hop1\" in the small example above, we only see 1 participating tunnel originating from the client.\n" +"If we sum up the whole I2P network, only a rather limited number of participating tunnels could be built with a limited amount of bandwidth all together.\n" +"If one distributes these limited numbers across the number of I2P nodes, there is only a fraction of available bandwidth/capacity available for use." msgstr "" #: i2p2www/pages/site/about/performance/index.html:73 msgid "" -"To remain anonymous one router should not be used by the whole network " -"for building tunnels.\n" -"If one router does act as a tunnel router for ALL I2P nodes, it becomes a" -" very real central point of failure as well as a central point to grab " -"IPs and data from the clients. This is not good.\n" -"I2P attempts to spread the load across a lot of I2P nodes because of this" -" reason." +"To remain anonymous one router should not be used by the whole network for building tunnels.\n" +"If one router does act as a tunnel router for ALL I2P nodes, it becomes a very real central point of failure as well as a central point to grab IPs and data from the clients. This is not good.\n" +"I2P attempts to spread the load across a lot of I2P nodes because of this reason." msgstr "" #: i2p2www/pages/site/about/performance/index.html:79 msgid "" -"Another point is the full mesh network. Each connection hop-hop utilizes " -"one TCP or UDP connection on the I2P nodes. With 1000 connections, one " -"sees \n" -"1000 TCP connections. That is quite a lot and some home and small office " -"routers (DSL, cable,..) only allow a small number of connections (or just" -" go mad if you use more than X connections).\n" -"I2P tries to limit these connections to be under 1500 per UDP and per TCP" -" type.\n" +"Another point is the full mesh network. Each connection hop-hop utilizes one TCP or UDP connection on the I2P nodes. With 1000 connections, one sees \n" +"1000 TCP connections. That is quite a lot and some home and small office routers (DSL, cable,..) only allow a small number of connections (or just go mad if you use more than X connections).\n" +"I2P tries to limit these connections to be under 1500 per UDP and per TCP type.\n" "This limits the amount of traffic routed across your I2P node as well." msgstr "" #: i2p2www/pages/site/about/performance/index.html:86 msgid "" -"In summary, I2P is very complex and there is no easy way to pinpoint why " -"your node is not used.\n" -"If your node is reachable and has a bandwidth setting of >128 kbyte/sec " -"shared and is reachable 24/7, it should be used after some time for " -"participating traffic.\n" -"If it is down in between, the testing of your I2P node done by other " -"nodes will tell them: you are not reachable. This blocks your node for at" -" least \n" -"24h on other nodes. So, the other nodes which tested you as down will not" -" use your node for 24h for building tunnels. This is why your traffic " -"will \n" +"In summary, I2P is very complex and there is no easy way to pinpoint why your node is not used.\n" +"If your node is reachable and has a bandwidth setting of >128 kbyte/sec shared and is reachable 24/7, it should be used after some time for participating traffic.\n" +"If it is down in between, the testing of your I2P node done by other nodes will tell them: you are not reachable. This blocks your node for at least \n" +"24h on other nodes. So, the other nodes which tested you as down will not use your node for 24h for building tunnels. This is why your traffic will \n" "be lower after a restart/shutdown for a minimum of 24h." msgstr "" #: i2p2www/pages/site/about/performance/index.html:94 msgid "" -"Also: other I2P nodes needs to know your I2P router to test it for " -"reachability and capacity. It takes time for other nodes to get known to " -"your node. \n" -"It will be faster if you use I2P and build more tunnels, e.g. use a " -"torrent or www for some time." +"Also: other I2P nodes needs to know your I2P router to test it for reachability and capacity. It takes time for other nodes to get known to your node. \n" +"It will be faster if you use I2P and build more tunnels, e.g. use a torrent or www for some time." msgstr "" #: i2p2www/pages/site/about/performance/index.html:99 @@ -2590,4 +2151,3 @@ msgid "" "For possible future performance improvements see\n" "<a href=\"%(future)s\">Future Performance Improvements</a>." msgstr "" - diff --git a/i2p2www/translations/sq/LC_MESSAGES/docs.po b/i2p2www/translations/sq/LC_MESSAGES/docs.po index 40363200e1b9c992c7868e2c7043e5401eb09c50..189275b9c3370c174d2d52db17d4c0626b0f1e40 100644 --- a/i2p2www/translations/sq/LC_MESSAGES/docs.po +++ b/i2p2www/translations/sq/LC_MESSAGES/docs.po @@ -1,21 +1,22 @@ -# Albanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:27+0000\n" -"PO-Revision-Date: 2021-10-12 09:24+0000\n" -"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: sq\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/docs/index.html:2 i2p2www/pages/site/docs/index.html:24 msgid "Index to Technical Documentation" @@ -30,16 +31,14 @@ msgid "" "This index is ordered from the highest to lowest layers.\n" "The higher layers are for \"clients\" or applications;\n" "the lower layers are inside the router itself.\n" -"The interface between applications and the router is the I2CP (I2P " -"Control\n" +"The interface between applications and the router is the I2CP (I2P Control\n" "Protocol) API." msgstr "" #: i2p2www/pages/site/docs/index.html:18 #, python-format msgid "" -"The I2P Project is committed to maintaining accurate, current " -"documentation.\n" +"The I2P Project is committed to maintaining accurate, current documentation.\n" "If you find any inaccuracies in the documents linked below, please\n" "<a href=\"%(trac)s\">enter a ticket identifying the problem</a>." msgstr "" @@ -96,8 +95,8 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:36 #, python-format msgid "" -"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a>" -" August 28, 2003 (pdf)" +"<a href=\"%(pdf)s\">Invisible Internet Project (I2P) Project Overview</a> " +"August 28, 2003 (pdf)" msgstr "" #: i2p2www/pages/site/docs/index.html:39 @@ -126,7 +125,8 @@ msgstr "" msgid "Managed Clients" msgstr "" -#: i2p2www/pages/site/docs/index.html:47 i2p2www/pages/site/docs/index.html:240 +#: i2p2www/pages/site/docs/index.html:47 +#: i2p2www/pages/site/docs/index.html:240 msgid "Embedding the router in your application" msgstr "" @@ -143,7 +143,8 @@ msgstr "" msgid "hostsdb.blockfile Format" msgstr "" -#: i2p2www/pages/site/docs/index.html:51 i2p2www/pages/site/docs/index.html:206 +#: i2p2www/pages/site/docs/index.html:51 +#: i2p2www/pages/site/docs/index.html:206 msgid "Configuration File Format" msgstr "" @@ -220,8 +221,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:101 msgid "" -"The lowest-level API used for clients (applications) to send and receive " -"traffic to a router.\n" +"The lowest-level API used for clients (applications) to send and receive traffic to a router.\n" "Traditionally used only by Java applications and higher-level APIs." msgstr "" @@ -280,8 +280,7 @@ msgstr "" #: i2p2www/pages/site/docs/index.html:127 msgid "" -"Distributed storage and retrieval of information about routers and " -"clients." +"Distributed storage and retrieval of information about routers and clients." msgstr "" #: i2p2www/pages/site/docs/index.html:129 @@ -343,8 +342,8 @@ msgstr "Tunele" #: i2p2www/pages/site/docs/index.html:154 msgid "" -"Selecting peers, requesting tunnels through those peers, and encrypting " -"and routing messages through these tunnels." +"Selecting peers, requesting tunnels through those peers, and encrypting and " +"routing messages through these tunnels." msgstr "" #: i2p2www/pages/site/docs/index.html:156 @@ -399,7 +398,8 @@ msgid "Transport Layer" msgstr "" #: i2p2www/pages/site/docs/index.html:171 -msgid "The protocols for direct (point-to-point) router to router communication." +msgid "" +"The protocols for direct (point-to-point) router to router communication." msgstr "" #: i2p2www/pages/site/docs/index.html:173 @@ -565,43 +565,30 @@ msgstr "" msgid "" "I2P ships with a generic naming library and a base implementation \n" "designed to work off a local name to destination mapping, as well as an\n" -"add-on application called the <a href=\"#addressbook\">address book</a>." -" \n" -"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to " -"Tor's .onion addresses." +"add-on application called the <a href=\"#addressbook\">address book</a>. \n" +"I2P also supports <a href=\"#base32\">Base32 hostnames</a> similar to Tor's .onion addresses." msgstr "" #: i2p2www/pages/site/docs/naming.html:15 msgid "" "The address book is a web-of-trust\n" -"driven secure, distributed, and human readable naming system, sacrificing" -" only\n" -"the call for all human readable names to be globally unique by mandating " -"only\n" -"local uniqueness. While all messages in I2P are cryptographically " -"addressed\n" -"by their destination, different people can have local address book " -"entries for\n" -"\"Alice\" which refer to different destinations. People can still " -"discover new\n" -"names by importing published address books of peers specified in their " -"web of trust,\n" -"by adding in the entries provided through a third party, or (if some " -"people organize\n" -"a series of published address books using a first come first serve " -"registration\n" -"system) people can choose to treat these address books as name servers, " -"emulating\n" +"driven secure, distributed, and human readable naming system, sacrificing only\n" +"the call for all human readable names to be globally unique by mandating only\n" +"local uniqueness. While all messages in I2P are cryptographically addressed\n" +"by their destination, different people can have local address book entries for\n" +"\"Alice\" which refer to different destinations. People can still discover new\n" +"names by importing published address books of peers specified in their web of trust,\n" +"by adding in the entries provided through a third party, or (if some people organize\n" +"a series of published address books using a first come first serve registration\n" +"system) people can choose to treat these address books as name servers, emulating\n" "traditional DNS." msgstr "" #: i2p2www/pages/site/docs/naming.html:29 #, python-format msgid "" -"NOTE: For the reasoning behind the I2P naming system, common arguments " -"against it\n" -"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming" -" discussion</a>\n" +"NOTE: For the reasoning behind the I2P naming system, common arguments against it\n" +"and possible alternatives see the <a href=\"%(namingdiscussion)s\">naming discussion</a>\n" "page." msgstr "" @@ -631,34 +618,31 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:55 msgid "" -"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for " -"lookups and points\n" +"The <a href=\"#httpproxy\">HTTP proxy</a> which asks the router for lookups and points\n" "the user to remote jump services to assist with failed lookups." msgstr "" #: i2p2www/pages/site/docs/naming.html:59 msgid "" -"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to " -"add hosts to their local hosts.txt" +"HTTP <a href=\"#add-services\">host-add forms</a> which allow users to add " +"hosts to their local hosts.txt" msgstr "" #: i2p2www/pages/site/docs/naming.html:62 msgid "" -"HTTP <a href=\"#jump-services\">jump services</a> which provide their own" -" lookups and redirection." +"HTTP <a href=\"#jump-services\">jump services</a> which provide their own " +"lookups and redirection." msgstr "" #: i2p2www/pages/site/docs/naming.html:65 msgid "" -"The <a href=\"#addressbook\">address book</a> application which merges " -"external\n" +"The <a href=\"#addressbook\">address book</a> application which merges external\n" "host lists, retrieved via HTTP, with the local list." msgstr "" #: i2p2www/pages/site/docs/naming.html:69 msgid "" -"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web " -"front-end\n" +"The <a href=\"#susidns\">SusiDNS</a> application which is a simple web front-end\n" "for address book configuration and viewing of the local host lists." msgstr "" @@ -670,15 +654,11 @@ msgstr "" #, python-format msgid "" "All destinations in I2P are 516-byte (or longer) keys.\n" -"(To be more precise, it is a 256-byte public key plus a 128-byte signing " -"key\n" -"plus a 3-or-more byte certificate, which in Base64 representation is 516 " -"or more bytes.\n" -"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> " -"are in use now\n" +"(To be more precise, it is a 256-byte public key plus a 128-byte signing key\n" +"plus a 3-or-more byte certificate, which in Base64 representation is 516 or more bytes.\n" +"Non-null <a href=\"%(namingdiscussion)s#certificates\">Certificates</a> are in use now\n" "for signature type indication.\n" -"Therefore, certificates in recently-generated destinations are more than " -"3 bytes." +"Therefore, certificates in recently-generated destinations are more than 3 bytes." msgstr "" #: i2p2www/pages/site/docs/naming.html:87 @@ -697,8 +677,7 @@ msgid "" "The hosts.txt Naming Service does a simple linear search through\n" "text files. This naming service was the default until\n" "release 0.8.8 when it was replaced by the Blockfile Naming Service.\n" -"The hosts.txt format had become too slow after the file grew to thousands" -" of entries." +"The hosts.txt format had become too slow after the file grew to thousands of entries." msgstr "" #: i2p2www/pages/site/docs/naming.html:102 @@ -706,8 +685,7 @@ msgstr "" msgid "" "It does a linear search through three local files, in order, to\n" "look up host names and convert them to a 516-byte destination key.\n" -"Each file is in a simple <a href=\"%(configuration)s\">configuration file" -" format</a>, with hostname=base64, one per line.\n" +"Each file is in a simple <a href=\"%(configuration)s\">configuration file format</a>, with hostname=base64, one per line.\n" "The files are:" msgstr "" @@ -717,8 +695,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:116 msgid "" -"The Blockfile Naming Service stores multiple \"address books\" in a " -"single\n" +"The Blockfile Naming Service stores multiple \"address books\" in a single\n" "database file named hostsdb.blockfile.\n" "This Naming Service is the default since release 0.8.8." msgstr "" @@ -726,32 +703,22 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:122 #, python-format msgid "" -"A blockfile is simply on-disk storage of multiple sorted maps (key-value " -"pairs),\n" +"A blockfile is simply on-disk storage of multiple sorted maps (key-value pairs),\n" "implemented as skiplists.\n" -"The blockfile format is specified on the <a " -"href=\"%(blockfile)s\">Blockfile page</a>.\n" -"It provides fast Destination lookup in a compact format. While the " -"blockfile overhead is substantial,\n" -"the destinations are stored in binary rather than in Base 64 as in the " -"hosts.txt format.\n" -"In addition, the blockfile provides the capability of arbitrary metadata " -"storage\n" -"(such as added date, source, and comments) for each entry to implement " -"advanced address book features.\n" -"The blockfile storage requirement is a modest increase over the hosts.txt" -" format, and the blockfile provides\n" +"The blockfile format is specified on the <a href=\"%(blockfile)s\">Blockfile page</a>.\n" +"It provides fast Destination lookup in a compact format. While the blockfile overhead is substantial,\n" +"the destinations are stored in binary rather than in Base 64 as in the hosts.txt format.\n" +"In addition, the blockfile provides the capability of arbitrary metadata storage\n" +"(such as added date, source, and comments) for each entry to implement advanced address book features.\n" +"The blockfile storage requirement is a modest increase over the hosts.txt format, and the blockfile provides\n" "approximately 10x reduction in lookup times." msgstr "" #: i2p2www/pages/site/docs/naming.html:134 msgid "" -"On creation, the naming service imports entries from the three files used" -" by the hosts.txt Naming Service.\n" -"The blockfile mimics the previous implementation by maintaining three " -"maps that\n" -"are searched in-order, named privatehosts.txt, userhosts.txt, and " -"hosts.txt.\n" +"On creation, the naming service imports entries from the three files used by the hosts.txt Naming Service.\n" +"The blockfile mimics the previous implementation by maintaining three maps that\n" +"are searched in-order, named privatehosts.txt, userhosts.txt, and hosts.txt.\n" "It also maintains a reverse-lookup map to implement rapid reverse lookups." msgstr "" @@ -781,31 +748,24 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:158 #, python-format msgid "" -"The naming service is specified with the configuration property " -"<tt>i2p.naming.impl=class</tt>.\n" +"The naming service is specified with the configuration property <tt>i2p.naming.impl=class</tt>.\n" "Other implementations are possible. For example,\n" -"there is an experimental facility for real-time lookups (a la DNS) over " -"the network within the router.\n" -"For more information see the <a " -"href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion" -" page</a>." +"there is an experimental facility for real-time lookups (a la DNS) over the network within the router.\n" +"For more information see the <a href=\"%(namingdiscussion)s#alternatives\">alternatives on the discussion page</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:165 msgid "" -"The HTTP proxy does a lookup via the router for all hostnames ending in " -"'.i2p'.\n" +"The HTTP proxy does a lookup via the router for all hostnames ending in '.i2p'.\n" "Otherwise, it forwards the request to a configured HTTP outproxy.\n" -"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-" -"Top Level Domain '.i2p'." +"Thus, in practice, all HTTP (I2P Site) hostnames must end in the pseudo-Top Level Domain '.i2p'." msgstr "" #: i2p2www/pages/site/docs/naming.html:171 #, python-format msgid "" "We have <a href=\"%(i2ptld)s\">applied to reserve the .i2p TLD</a>\n" -"following the procedures specified in <a href=\"%(rfc6761)s\">RFC " -"6761</a>." +"following the procedures specified in <a href=\"%(rfc6761)s\">RFC 6761</a>." msgstr "" #: i2p2www/pages/site/docs/naming.html:177 @@ -844,14 +804,11 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:202 msgid "" "For this reason, the only subscription configured by\n" -"default is <code>http://i2p-projekt.i2p/hosts.txt " -"(http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>," -" \n" +"default is <code>http://i2p-projekt.i2p/hosts.txt (http://udhdrtrcetjm5sxzskjyr5ztpeszydbh4dpl3pl4utgqqw2v4jna.b32.i2p/hosts.txt)</code>, \n" "which contains a copy of the hosts.txt included\n" "in the I2P release.\n" "Users must configure additional subscriptions in their\n" -"local address book application (via subscriptions.txt or <a " -"href=\"#susidns\">SusiDNS</a>)." +"local address book application (via subscriptions.txt or <a href=\"#susidns\">SusiDNS</a>)." msgstr "" #: i2p2www/pages/site/docs/naming.html:211 @@ -860,8 +817,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:218 msgid "" -"The operators of these services may have various policies for listing " -"hosts.\n" +"The operators of these services may have various policies for listing hosts.\n" "Presence on this list does not imply endorsement." msgstr "" @@ -872,12 +828,10 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:224 msgid "" -"While there are hopefully not any technical limitations within I2P on " -"host names,\n" +"While there are hopefully not any technical limitations within I2P on host names,\n" "the address book enforces several restrictions on host names\n" "imported from subscriptions.\n" -"It does this for basic typographical sanity and compatibility with " -"browsers,\n" +"It does this for basic typographical sanity and compatibility with browsers,\n" "and for security.\n" "The rules are essentially the same as those in RFC2396 Section 3.2.2.\n" "Any hostnames violating these rules may not be propagated\n" @@ -890,13 +844,13 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:243 msgid "" -"Names are checked for conflict with existing names in the existing " -"userhosts.txt and hosts.txt\n" +"Names are checked for conflict with existing names in the existing userhosts.txt and hosts.txt\n" "(but not privatehosts.txt) after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:248 -msgid "Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." +msgid "" +"Must contain only [a-z] [0-9] '.' and '-' after conversion to lower case." msgstr "" #: i2p2www/pages/site/docs/naming.html:252 @@ -932,8 +886,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:280 msgid "" "Certain hostnames reserved for project use are not allowed\n" -"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, " -"*.console.i2p, and others)" +"(proxy.i2p, router.i2p, console.i2p, *.proxy.i2p, *.router.i2p, *.console.i2p, and others)" msgstr "" #: i2p2www/pages/site/docs/naming.html:285 @@ -956,8 +909,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:302 msgid "" -"Any name received via subscription that passes all the checks is added " -"via the local naming service." +"Any name received via subscription that passes all the checks is added via " +"the local naming service." msgstr "" #: i2p2www/pages/site/docs/naming.html:306 @@ -974,19 +927,15 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:317 msgid "" -"International Domain Names (IDN) also work in i2p (using punycode 'xn--' " -"form).\n" -"To see IDN .i2p domain names rendered correctly in Firefox's location " -"bar,\n" +"International Domain Names (IDN) also work in i2p (using punycode 'xn--' form).\n" +"To see IDN .i2p domain names rendered correctly in Firefox's location bar,\n" "add 'network.IDN.whitelist.i2p (boolean) = true' in about:config." msgstr "" #: i2p2www/pages/site/docs/naming.html:323 msgid "" -"As the address book application does not use privatehosts.txt at all, in " -"practice\n" -"this file is the only place where it is appropriate to place private " -"aliases or\n" +"As the address book application does not use privatehosts.txt at all, in practice\n" +"this file is the only place where it is appropriate to place private aliases or\n" "\"pet names\" for sites already in hosts.txt." msgstr "" @@ -1001,16 +950,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:338 msgid "" "Address Book will publish the merged hosts.txt to a location\n" -"(traditionally hosts.txt in the local I2P Site's home directory) to be " -"accessed by others\n" +"(traditionally hosts.txt in the local I2P Site's home directory) to be accessed by others\n" "for their subscriptions.\n" "This step is optional and is disabled by default." msgstr "" #: i2p2www/pages/site/docs/naming.html:346 msgid "" -"The address book application, together with eepget, saves the Etag and/or" -" Last-Modified\n" +"The address book application, together with eepget, saves the Etag and/or Last-Modified\n" "information returned by the web server of the subscription.\n" "This greatly reduces the bandwidth required, as the web server will\n" "return a '304 Not Modified' on the next fetch if nothing has changed." @@ -1027,8 +974,7 @@ msgid "" "Hosts serving a static hosts.txt or an equivalent CGI application\n" "are strongly encouraged to deliver\n" "a Content-Length header, and either an Etag or Last-Modified header.\n" -"Also ensure that the server delivers a '304 Not Modified' when " -"appropriate.\n" +"Also ensure that the server delivers a '304 Not Modified' when appropriate.\n" "This will dramatically reduce the network bandwidth, and\n" "reduce chances of corruption." msgstr "" @@ -1039,8 +985,7 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:368 msgid "" -"A host add service is a simple CGI application that takes a hostname and " -"a Base64 key as parameters\n" +"A host add service is a simple CGI application that takes a hostname and a Base64 key as parameters\n" "and adds that to its local hosts.txt.\n" "If other routers subscribe to that hosts.txt, the new hostname/key\n" "will be propagated through the network." @@ -1048,10 +993,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:375 msgid "" -"It is recommended that host add services impose, at a minimum, the " -"restrictions imposed by the address book application listed above.\n" -"Host add services may impose additional restrictions on hostnames and " -"keys, for example:" +"It is recommended that host add services impose, at a minimum, the restrictions imposed by the address book application listed above.\n" +"Host add services may impose additional restrictions on hostnames and keys, for example:" msgstr "" #: i2p2www/pages/site/docs/naming.html:380 @@ -1104,10 +1047,8 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:426 msgid "" -"A jump service is a simple CGI application that takes a hostname as a " -"parameter\n" -"and returns a 301 redirect to the proper URL with a " -"<code>?i2paddresshelper=key</code>\n" +"A jump service is a simple CGI application that takes a hostname as a parameter\n" +"and returns a 301 redirect to the proper URL with a <code>?i2paddresshelper=key</code>\n" "string appended.\n" "The HTTP proxy will interpret the appended string and\n" "use that key as the actual destination.\n" @@ -1130,16 +1071,14 @@ msgstr "" #: i2p2www/pages/site/docs/naming.html:448 msgid "" -"SusiDNS is simply a web interface front-end to configuring address book " -"subscriptions\n" +"SusiDNS is simply a web interface front-end to configuring address book subscriptions\n" "and accessing the four address book files.\n" "All the real work is done by the 'address book' application." msgstr "" #: i2p2www/pages/site/docs/naming.html:454 msgid "" -"Currently, there is little enforcement of address book naming rules " -"within SusiDNS,\n" +"Currently, there is little enforcement of address book naming rules within SusiDNS,\n" "so a user may enter hostnames locally that would be rejected by\n" "the address book subscription rules." msgstr "" @@ -1153,36 +1092,29 @@ msgid "" "I2P supports Base32 hostnames similar to Tor's .onion addresses.\n" "Base32 addresses are much shorter and easier to handle than the\n" "full 516-character Base64 Destinations or addresshelpers.\n" -"Example: " -"<code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" +"Example: <code>ukeu3k5oycgaauneqgtnvselmt4yemvoilkln7jpvamvfx7dnkdq.b32.i2p</code>" msgstr "" #: i2p2www/pages/site/docs/naming.html:468 #, python-format msgid "" -"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 " -"hash.\n" +"In Tor, the address is 16 characters (80 bits), or half of the SHA-1 hash.\n" "I2P uses 52 characters (256 bits) to represent the full SHA-256 hash.\n" "The form is {52 chars}.b32.i2p.\n" "Tor has a\n" -"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94" -"-december-4th-2013\">proposal</a>\n" -"to convert to an identical format of {52 chars}.onion for their hidden " -"services.\n" +"<a href=\"https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-december-4th-2013\">proposal</a>\n" +"to convert to an identical format of {52 chars}.onion for their hidden services.\n" "Base32 is implemented in the naming service, which queries the\n" "router over I2CP to lookup the LeaseSet to get the full Destination.\n" -"Base32 lookups will only be successful when the Destination is up and " -"publishing\n" +"Base32 lookups will only be successful when the Destination is up and publishing\n" "a LeaseSet.\n" -"Because resolution may require a network database lookup, it may take " -"significantly\n" +"Because resolution may require a network database lookup, it may take significantly\n" "longer than a local address book lookup." msgstr "" #: i2p2www/pages/site/docs/naming.html:483 msgid "" -"Base32 addresses can be used in most places where hostnames or full " -"destinations\n" +"Base32 addresses can be used in most places where hostnames or full destinations\n" "are used, however there are some exceptions where they may fail if the\n" "name does not immediately resolve. I2PTunnel will fail, for example, if\n" "the name does not resolve to a destination." @@ -1208,8 +1140,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:12 msgid "" -"There are now plugins available that support distributed email, blogs, " -"IRC\n" +"There are now plugins available that support distributed email, blogs, IRC\n" "clients, distributed file storage, wikis, and more." msgstr "" @@ -1229,8 +1160,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:31 msgid "" -"Support large or special-purpose applications that would never be bundled" -"\n" +"Support large or special-purpose applications that would never be bundled\n" "with the I2P installation" msgstr "" @@ -1244,8 +1174,8 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:44 msgid "" -"Separate initial install and update packages, if desired, for smaller " -"update downloads" +"Separate initial install and update packages, if desired, for smaller update" +" downloads" msgstr "" #: i2p2www/pages/site/docs/plugins.html:48 @@ -1275,7 +1205,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/plugins.html:70 -msgid "Automatic integration and startup of webapps into console Jetty instance" +msgid "" +"Automatic integration and startup of webapps into console Jetty instance" msgstr "" #: i2p2www/pages/site/docs/plugins.html:74 @@ -1315,32 +1246,21 @@ msgstr "Instalim" #: i2p2www/pages/site/docs/plugins.html:101 msgid "" -"To install and start a plugin, copy the <code>.xpi2p</code> install link " -"to\n" +"To install and start a plugin, copy the <code>.xpi2p</code> install link to\n" "the form at the bottom of\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp" -" in\n" -"your router console</a> and click the \"install plugin\" button. After a" -"\n" -"plugin is installed and started, a link to the plugin will usually appear" -" at\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp in\n" +"your router console</a> and click the \"install plugin\" button. After a\n" +"plugin is installed and started, a link to the plugin will usually appear at\n" "the top of your summary bar." msgstr "" #: i2p2www/pages/site/docs/plugins.html:110 msgid "" -"To update a plugin to the latest version, just click the update button on" -"\n" -"<a " -"href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>." -"\n" -"There is also a button to check if the plugin has a more recent version, " -"as\n" -"well as a button to check for updates for all plugins. Plugins will be " -"checked\n" -"for updates automatically when updating to a new I2P release (not " -"including dev\n" +"To update a plugin to the latest version, just click the update button on\n" +"<a href=\"http://127.0.0.1:7657/configclients.jsp#plugin\">configclients.jsp</a>.\n" +"There is also a button to check if the plugin has a more recent version, as\n" +"well as a button to check for updates for all plugins. Plugins will be checked\n" +"for updates automatically when updating to a new I2P release (not including dev\n" "builds)." msgstr "" @@ -1351,25 +1271,21 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:121 #, python-format msgid "" -"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and " -"the\n" +"See the latest <a href=\"%(pluginspec)s\">plugin specification</a> and the\n" "<a href=\"http://%(zzz)s/forums/16\">plugin forum</a> on %(zzz)s." msgstr "" #: i2p2www/pages/site/docs/plugins.html:126 #, python-format msgid "" -"See also the sources for plugins developed by various people. Some " -"plugins, such\n" -"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were " -"developed\n" +"See also the sources for plugins developed by various people. Some plugins, such\n" +"as <a href=\"http://%(pluginsite)s/plugins/snowman\">snowman</a>, were developed\n" "specifically as examples." msgstr "" #: i2p2www/pages/site/docs/plugins.html:132 msgid "" -"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P" -"\n" +"<b>Developers wanted!</b> Plugins are a great way to learn more about I2P\n" "or easily add some feature." msgstr "" @@ -1381,8 +1297,7 @@ msgstr "Si T’ia Fillohet" #, python-format msgid "" "To create a plugin from an existing binary package you will need to get\n" -"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in " -"monotone</a>." +"makeplugin.sh from <a href=\"%(url)s\">the i2p.scripts branch in monotone</a>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:144 @@ -1398,8 +1313,7 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:151 msgid "" "Updates of a plugin with included jars (not wars) won't be recognized if\n" -"the plugin was already run, as it requires class loader trickery to flush" -" the\n" +"the plugin was already run, as it requires class loader trickery to flush the\n" "class cache; a full router restart is required." msgstr "" @@ -1409,32 +1323,27 @@ msgstr "" #: i2p2www/pages/site/docs/plugins.html:161 msgid "" -"Plugins running in a separate JVM create a <code>logs/</code> directory " -"in\n" +"Plugins running in a separate JVM create a <code>logs/</code> directory in\n" "<code>$CWD</code>." msgstr "" #: i2p2www/pages/site/docs/plugins.html:166 msgid "" -"No initial keys are present, except for those of jrandom and zzz (using " -"the\n" +"No initial keys are present, except for those of jrandom and zzz (using the\n" "same keys as for router update), so the first key seen for a signer is\n" "automatically accepted—there is no signing key authority." msgstr "" #: i2p2www/pages/site/docs/plugins.html:172 msgid "" -"When deleting a plugin, the directory is not always deleted, especially " -"on\n" +"When deleting a plugin, the directory is not always deleted, especially on\n" "Windows." msgstr "" #: i2p2www/pages/site/docs/plugins.html:177 msgid "" -"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result " -"in a\n" -"\"plugin is corrupt\" message if pack200 compression of the plugin file " -"is used." +"Installing a plugin requiring Java 1.6 on a Java 1.5 machine will result in a\n" +"\"plugin is corrupt\" message if pack200 compression of the plugin file is used." msgstr "" #: i2p2www/pages/site/docs/plugins.html:182 @@ -1451,8 +1360,7 @@ msgstr "" #: i2p2www/pages/site/docs/ports.html:7 msgid "" -"These are the ports used or reserved by I2P, including those for known " -"plugins,\n" +"These are the ports used or reserved by I2P, including those for known plugins,\n" "common alternates,\n" "and some typical related applications." msgstr "" @@ -1486,20 +1394,16 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:10 msgid "" -"Reseed hosts are needed to for bootstrapping, that is, providing the " -"initial set\n" -"of I2P nodes for your I2P node to talk to. Depending on the status of " -"your node\n" -"it may need to bootstrap every now and then if many of the nodes it knows" -" of\n" +"Reseed hosts are needed to for bootstrapping, that is, providing the initial set\n" +"of I2P nodes for your I2P node to talk to. Depending on the status of your node\n" +"it may need to bootstrap every now and then if many of the nodes it knows of\n" "aren't contactable." msgstr "" #: i2p2www/pages/site/docs/reseed.html:17 msgid "" "Reseeding is done over an encrypted connection and all of the bootstrap\n" -"information is signed by the reseed host you connect to, making it " -"impossible\n" +"information is signed by the reseed host you connect to, making it impossible\n" "for an unauthenticated source to provide you with false information." msgstr "" @@ -1510,12 +1414,9 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:26 msgid "" "Operating a reseed server can be accessible to any sysadmin familiar\n" -"with I2P, and we encourage new reseed operators to get in contact with us" -" at\n" -"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed " -"hosts that\n" -"are run, the more resilient the I2P network becomes, and the harder it is" -" to\n" +"with I2P, and we encourage new reseed operators to get in contact with us at\n" +"<a href=\"http://zzz.i2p\">the development forums</a>. The more reseed hosts that\n" +"are run, the more resilient the I2P network becomes, and the harder it is to\n" "prevent users of I2P from connecting to the network." msgstr "" @@ -1525,15 +1426,11 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:42 msgid "" -"In order to make I2P more reslient, other kinds of reseeding are " -"possible. One\n" -"important way of carrying out a reseed is the file-based reseed, where a " -"user\n" -"with a running I2P router generates a reseed file for a friend and " -"transfers it\n" +"In order to make I2P more reslient, other kinds of reseeding are possible. One\n" +"important way of carrying out a reseed is the file-based reseed, where a user\n" +"with a running I2P router generates a reseed file for a friend and transfers it\n" "to them as a .zip file. Others use cloud-based infrastructure to resist\n" -"censorship. These reseed methods provide functionality which aids people " -"in\n" +"censorship. These reseed methods provide functionality which aids people in\n" "situations where reseeds are restricted." msgstr "" @@ -1543,8 +1440,7 @@ msgstr "" #: i2p2www/pages/site/docs/reseed.html:60 msgid "" -"If you are running a reseed server, We would like to thank you for " -"helping to\n" +"If you are running a reseed server, We would like to thank you for helping to\n" "make the I2P network stronger and more resilient than ever." msgstr "" @@ -1558,12 +1454,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:12 msgid "" -"At this point, most of the good ideas from BOB have been incorporated " -"into\n" -"SAMv3, which has more features and more real-world use. BOB still works, " -"but it\n" -"is not gaining the advanced features available to SAMv3 and is " -"essentially\n" +"At this point, most of the good ideas from BOB have been incorporated into\n" +"SAMv3, which has more features and more real-world use. BOB still works, but it\n" +"is not gaining the advanced features available to SAMv3 and is essentially\n" "unsupported at this time." msgstr "" @@ -1578,27 +1471,25 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:35 msgid "" "<code>ERROR</code> as is implied returns the message <code>\"ERROR " -"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what" -" went wrong." +"\"+DESCRIPTION+\"\\n\"</code>, where the <code>DESCRIPTION</code> is what " +"went wrong." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:38 msgid "" -"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be " -"returned, it is on the same line. <code>OK</code> means the command is " -"finished." +"<code>OK</code> returns <code>\"OK\"</code>, and if data is to be returned, " +"it is on the same line. <code>OK</code> means the command is finished." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:41 msgid "" -"<code>DATA</code> lines contain information that you requested. There may" -" be multiple <code>DATA</code> lines per request." +"<code>DATA</code> lines contain information that you requested. There may be" +" multiple <code>DATA</code> lines per request." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:45 msgid "" -"<b>NOTE:</b> The help command is the ONLY command that has an exception " -"to\n" +"<b>NOTE:</b> The help command is the ONLY command that has an exception to\n" "the rules... it can actually return nothing! This is intentional, since\n" "help is a HUMAN and not an APPLICATION command." msgstr "" @@ -1609,8 +1500,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:53 msgid "" -"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated," -" depending on the system.\n" +"All BOB status output is by lines. Lines may be \\n or \\r\\n terminated, depending on the system.\n" "On connection, BOB outputs two lines:" msgstr "" @@ -1620,8 +1510,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:67 msgid "" -"Note that previous versions used upper-case hex digits and did not " -"conform to I2P versioning standards.\n" +"Note that previous versions used upper-case hex digits and did not conform to I2P versioning standards.\n" "It is recommended that subsequent versions use digits 0-9 only." msgstr "" @@ -1657,16 +1546,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:91 msgid "" "<b>PLEASE NOTE:</b>\n" -"For CURRENT details on the commands PLEASE use the built-in help command." -"\n" -"Just telnet to localhost 2827 and type help and you can get full " -"documentation on each command." +"For CURRENT details on the commands PLEASE use the built-in help command.\n" +"Just telnet to localhost 2827 and type help and you can get full documentation on each command." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:97 msgid "" -"Commands never get obsoleted or changed, however new commands do get " -"added from time to time." +"Commands never get obsoleted or changed, however new commands do get added " +"from time to time." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:102 @@ -1683,36 +1570,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:130 msgid "" -"Once set up, all TCP sockets can and will block as needed, and there is " -"no need for any\n" -"additional messages to/from the command channel. This allows the router " -"to pace the\n" -"stream without exploding with OOM like SAM does as it chokes on " -"attempting to shove\n" -"many streams in or out one socket -- that can't scale when you have alot " -"of connections!" +"Once set up, all TCP sockets can and will block as needed, and there is no need for any\n" +"additional messages to/from the command channel. This allows the router to pace the\n" +"stream without exploding with OOM like SAM does as it chokes on attempting to shove\n" +"many streams in or out one socket -- that can't scale when you have alot of connections!" msgstr "" #: i2p2www/pages/site/docs/api/bob.html:137 msgid "" -"What is also nice about this particular interface is that writing " -"anything to interface\n" -"to it, is much much easier than SAM. There is no other processing to do " -"after the set up.\n" -"It's configuration is so simple, that very simple tools, such as nc " -"(netcat) can be used\n" -"to point to some application. The value there is that one could schedule " -"up and down times\n" -"for an application, and not have to change the application to do that, or" -" to even have\n" -"to stop that application. Instead, you can literally \"unplug\" the " -"destination, and\n" -"\"plug it in\" again. As long as the same IP/port addresses and " -"destination keys are used\n" -"when bringing the bridge up, the normal TCP application won't care, and " -"won't notice.\n" -"It will simply be fooled -- the destinations are not reachable, and that " -"nothing is coming in." +"What is also nice about this particular interface is that writing anything to interface\n" +"to it, is much much easier than SAM. There is no other processing to do after the set up.\n" +"It's configuration is so simple, that very simple tools, such as nc (netcat) can be used\n" +"to point to some application. The value there is that one could schedule up and down times\n" +"for an application, and not have to change the application to do that, or to even have\n" +"to stop that application. Instead, you can literally \"unplug\" the destination, and\n" +"\"plug it in\" again. As long as the same IP/port addresses and destination keys are used\n" +"when bringing the bridge up, the normal TCP application won't care, and won't notice.\n" +"It will simply be fooled -- the destinations are not reachable, and that nothing is coming in." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:149 @@ -1721,12 +1595,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:151 msgid "" -"For the following example, we'll setup a very simple local loopback " -"connection,\n" -"with two destinations. Destination \"mouth\" will be the CHARGEN service " -"from\n" -"the INET superserver daemon. Destination \"ear\" will be a local port " -"that you\n" +"For the following example, we'll setup a very simple local loopback connection,\n" +"with two destinations. Destination \"mouth\" will be the CHARGEN service from\n" +"the INET superserver daemon. Destination \"ear\" will be a local port that you\n" "can telnet into, and watch the pretty ASCII test puke forth." msgstr "" @@ -1775,30 +1646,28 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:186 msgid "" -"At this point, there was no error, a destination with a nickname of " -"\"mouth\"\n" -"is set up. When you contact the destination provided, you actually " -"connect\n" +"At this point, there was no error, a destination with a nickname of \"mouth\"\n" +"is set up. When you contact the destination provided, you actually connect\n" "to the <code>CHARGEN</code> service on <code>19/TCP</code>." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:192 -msgid "Now for the other half, so that we can actually contact this destination." +msgid "" +"Now for the other half, so that we can actually contact this destination." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:214 msgid "" "Now all we need to do is telnet into 127.0.0.1, port 37337,\n" -"send the destination key or host address from address book we want to " -"contact.\n" +"send the destination key or host address from address book we want to contact.\n" "In this case, we want to contact \"mouth\", all we do is paste in the\n" "key and it goes." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:221 msgid "" -"<b>NOTE:</b> The \"quit\" command in the command channel does NOT " -"disconnect the tunnels like SAM." +"<b>NOTE:</b> The \"quit\" command in the command channel does NOT disconnect" +" the tunnels like SAM." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:238 @@ -1815,14 +1684,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:291 msgid "" -"Pretty cool isn't it? Try some other well known I2P SITES if you like, " -"nonexistent ones,\n" -"etc, to get a feel for what kind of output to expect in different " -"situations.\n" -"For the most part, it is suggested that you ignore any of the error " -"messages.\n" -"They would be meaningless to the application, and are only presented for " -"human debugging." +"Pretty cool isn't it? Try some other well known I2P SITES if you like, nonexistent ones,\n" +"etc, to get a feel for what kind of output to expect in different situations.\n" +"For the most part, it is suggested that you ignore any of the error messages.\n" +"They would be meaningless to the application, and are only presented for human debugging." msgstr "" #: i2p2www/pages/site/docs/api/bob.html:298 @@ -1839,8 +1704,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/bob.html:328 msgid "" -"Now to remove \"ear\", note that this is what happens when you type too " -"fast,\n" +"Now to remove \"ear\", note that this is what happens when you type too fast,\n" "and shows you what typical ERROR messages looks like." msgstr "" @@ -1895,16 +1759,11 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:7 #, python-format msgid "" -"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide " -"authenticated\n" -"and repliable messages in a standard format. This lets applications " -"reliably read\n" -"the \"from\" address out of a datagram and know that the address really " -"sent the\n" -"message. This is necessary for some applications since the base I2P " -"message is\n" -"completely raw - it has no \"from\" address (unlike IP packets). In " -"addition, the\n" +"Datagrams build upon the base <a href=\"%(i2cp)s\">I2CP</a> to provide authenticated\n" +"and repliable messages in a standard format. This lets applications reliably read\n" +"the \"from\" address out of a datagram and know that the address really sent the\n" +"message. This is necessary for some applications since the base I2P message is\n" +"completely raw - it has no \"from\" address (unlike IP packets). In addition, the\n" "message and sender are authenticated by signing the payload." msgstr "" @@ -1913,8 +1772,7 @@ msgstr "" msgid "" "Datagrams, like <a href=\"%(streaming)s\">streaming library packets</a>,\n" "are an application-level construct.\n" -"These protocols are independent of the low-level <a " -"href=\"%(transports)s\">transports</a>;\n" +"These protocols are independent of the low-level <a href=\"%(transports)s\">transports</a>;\n" "the protocols are converted to I2NP messages by the router, and\n" "either protocol may be carried by either transport." msgstr "" @@ -1930,8 +1788,7 @@ msgid "" "<a href=\"%(url)s\">datagram API</a>,\n" "while applications in other languages \n" "can use <a href=\"%(sam)s\">SAM</a>'s datagram support.\n" -"There is also limited support in i2ptunnel in the <a " -"href=\"%(socks)s\">SOCKS proxy</a>,\n" +"There is also limited support in i2ptunnel in the <a href=\"%(socks)s\">SOCKS proxy</a>,\n" "the 'streamr' tunnel types, and udpTunnel classes." msgstr "" @@ -1941,34 +1798,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:38 msgid "" -"The application designer should carefully consider the tradeoff of " -"repliable vs. non-repliable\n" -"datagrams. Also, the datagram size will affect reliability, due to tunnel" -" fragmentation into 1KB\n" -"tunnel messages. The more message fragments, the more likely that one of " -"them will be dropped\n" -"by an intermediate hop. Messages larger than a few KB are not " -"recommended.\n" +"The application designer should carefully consider the tradeoff of repliable vs. non-repliable\n" +"datagrams. Also, the datagram size will affect reliability, due to tunnel fragmentation into 1KB\n" +"tunnel messages. The more message fragments, the more likely that one of them will be dropped\n" +"by an intermediate hop. Messages larger than a few KB are not recommended.\n" "Over about 10 KB, the delivery probablility drops dramatically.\n" -"Messages over 16 KB cannot be delivered over NTCP, dropping delivery " -"chances even more." +"Messages over 16 KB cannot be delivered over NTCP, dropping delivery chances even more." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:47 #, python-format msgid "" -"Also note that the various overheads added by lower layers, in particular" -" asymmetric\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on " -"intermittent messages\n" -"such as used by a Kademlia-over-UDP application. The implementations are " -"currently tuned\n" -"for frequent traffic using the streaming library. There are a high number" -"\n" -"of session tags delivered, and a short session tag lifetime, for example." -"\n" -"There are currently no configuration parameters available within I2CP to " -"tune\n" +"Also note that the various overheads added by lower layers, in particular asymmetric\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES</a>, place a large burden on intermittent messages\n" +"such as used by a Kademlia-over-UDP application. The implementations are currently tuned\n" +"for frequent traffic using the streaming library. There are a high number\n" +"of session tags delivered, and a short session tag lifetime, for example.\n" +"There are currently no configuration parameters available within I2CP to tune\n" "the ElGamal Session Tag parameters." msgstr "" @@ -1981,38 +1827,30 @@ msgid "" "The standard I2CP protocol number for datagrams is PROTO_DATAGRAM (17).\n" "Applications may or may not choose to set the\n" "protocol in the I2CP header. It is not set by default.\n" -"It must be set to demultiplex datagram and streaming traffic received on " -"the same Destination." +"It must be set to demultiplex datagram and streaming traffic received on the same Destination." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:65 #, python-format msgid "" "As datagrams are not connection-oriented, the application may require\n" -"port numbers to correlate datagrams with particular peers or " -"communications sessions,\n" +"port numbers to correlate datagrams with particular peers or communications sessions,\n" "as is traditional with UDP over IP.\n" -"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as " -"described in\n" +"Applications may add 'from' and 'to' ports to the I2CP (gzip) header as described in\n" "the <a href=\"%(i2cp)s#format\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:73 #, python-format msgid "" -"There is no method within the datagram API to specify whether it is non-" -"repliable (raw)\n" -"or repliable. The application should be designed to expect the " -"appropriate type.\n" +"There is no method within the datagram API to specify whether it is non-repliable (raw)\n" +"or repliable. The application should be designed to expect the appropriate type.\n" "The I2CP protocol number or port should be used by the application to\n" "indicate datagram type.\n" -"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW " -"are defined in the\n" +"The I2CP protocol numbers PROTO_DATAGRAM (signed) and PROTO_DATAGRAM_RAW are defined in the\n" "<a href=\"%(i2psession)s\">I2PSession API</a>\n" -"for this purpose. A common design pattern in client/server datagram " -"applications is to\n" -"use signed datagrams for a request which includes a nonce, and use a raw " -"datagram\n" +"for this purpose. A common design pattern in client/server datagram applications is to\n" +"use signed datagrams for a request which includes a nonce, and use a raw datagram\n" "for the reply, returning the nonce from the request." msgstr "" @@ -2046,15 +1884,13 @@ msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:107 #, python-format msgid "" -"Each datagram is sent through I2P as a single message (or as an " -"individual clove in a\n" +"Each datagram is sent through I2P as a single message (or as an individual clove in a\n" "<a href=\"%(garlicrouting)s\">Garlic Message</a>).\n" "Message encapsulation is implemented in the underlying\n" "<a href=\"%(i2cp)s\">I2CP</a>,\n" "<a href=\"%(i2np)s\">I2NP</a>, and\n" "<a href=\"%(tunnelmessage)s\">tunnel message</a> layers.\n" -"There is no packet delimiter mechanism or length field in the datagram " -"protocol." +"There is no packet delimiter mechanism or length field in the datagram protocol." msgstr "" #: i2p2www/pages/site/docs/api/datagrams.html:120 @@ -2073,17 +1909,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:5 #, python-format msgid "" -"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-" -"RPC\">JSONRPC2</a> interface via the plugin <a " -"href=\"%(itoopie)s\">I2PControl</a>.\n" -"The aim of the interface is to provide simple way to interface with a " -"running I2P node. A client, itoopie, has been developed in parallel.\n" -"The JSONRPC2 implementation for the client as well as the plugin is " -"provided by the java libraries <a href=\"http://software.dzhuvinov.com" -"/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" -"A list of implementations of JSON-RPC for various languages can be found " -"at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC " -"wiki</a>." +"I2P enables a <a href=\"http://en.wikipedia.org/wiki/JSON-RPC\">JSONRPC2</a> interface via the plugin <a href=\"%(itoopie)s\">I2PControl</a>.\n" +"The aim of the interface is to provide simple way to interface with a running I2P node. A client, itoopie, has been developed in parallel.\n" +"The JSONRPC2 implementation for the client as well as the plugin is provided by the java libraries <a href=\"http://software.dzhuvinov.com/json-rpc-2.0.html\">JSON-RPC 2.0</a>. \n" +"A list of implementations of JSON-RPC for various languages can be found at <a href=\"http://json-rpc.org/wiki/implementations\">the JSON-RPC wiki</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:12 @@ -2138,8 +1967,8 @@ msgstr "Përshkrim" #: i2p2www/pages/site/docs/api/i2pcontrol.html:48 msgid "" -"Token used for authenticating every request (excluding the 'Authenticate'" -" RPC method)" +"Token used for authenticating every request (excluding the 'Authenticate' " +"RPC method)" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:56 @@ -2148,8 +1977,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:57 msgid "" -"Creates and returns an authentication token used for further " -"communication." +"Creates and returns an authentication token used for further communication." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:59 @@ -2182,8 +2010,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:117 #: i2p2www/pages/site/docs/api/i2pcontrol.html:163 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:73 @@ -2245,7 +2073,8 @@ msgid "Returns true if any changes were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:98 -msgid "Returns true if any changes requiring a restart to take effect were made." +msgid "" +"Returns true if any changes requiring a restart to take effect were made." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:101 @@ -2318,8 +2147,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:157 msgid "" -"Initiates a router reseed, fetching peers into our NetDB from a remote " -"host." +"Initiates a router reseed, fetching peers into our NetDB from a remote host." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:158 @@ -2328,8 +2156,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:159 msgid "" -"Restarts the router gracefully (waits for participating tunnels to " -"expire)." +"Restarts the router gracefully (waits for participating tunnels to expire)." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:160 @@ -2375,7 +2202,8 @@ msgid "<b>Blocking</b>. If requested, returns the status of the the update" msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:175 -msgid "Fetches or sets various network related settings. Ports, addresses etc." +msgid "" +"Fetches or sets various network related settings. Ports, addresses etc." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:177 @@ -2386,8 +2214,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:178 msgid "" -"What hostname is used for the TCP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the TCP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:179 @@ -2404,8 +2232,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:181 msgid "" -"What hostname is used for the UDP transport. If null is submitted, " -"current setting will be returned." +"What hostname is used for the UDP transport. If null is submitted, current " +"setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:182 @@ -2419,19 +2247,20 @@ msgid "What ip has been detected by the UDP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:184 -msgid "Is UPnP enabled. If null is submitted, current setting will be returned." +msgid "" +"Is UPnP enabled. If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:185 msgid "" -"How many percent of bandwidth is usable for participating tunnels. If " -"null is submitted, current setting will be returned." +"How many percent of bandwidth is usable for participating tunnels. If null " +"is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:186 msgid "" -"How many KB/s of inbound bandwidth is allowed. If null is submitted, " -"current setting will be returned." +"How many KB/s of inbound bandwidth is allowed. If null is submitted, current" +" setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:187 @@ -2442,15 +2271,15 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:188 msgid "" -"Is laptop mode enabled (change router identity and UDP port when IP " -"changes ). If null is submitted, current setting will be returned." +"Is laptop mode enabled (change router identity and UDP port when IP changes " +"). If null is submitted, current setting will be returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:189 msgid "" -"Token used for authenticating the client. Is provided by the server via " -"the 'Authenticate' RPC method. If null is submitted, current setting will" -" be returned." +"Token used for authenticating the client. Is provided by the server via the " +"'Authenticate' RPC method. If null is submitted, current setting will be " +"returned." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:192 @@ -2463,8 +2292,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:194 msgid "" -"If requested, returns the method used for automatically detecting ip for " -"the TCP transport." +"If requested, returns the method used for automatically detecting ip for the" +" TCP transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:195 @@ -2477,8 +2306,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:197 msgid "" -"If requested, returns methods used for detecting the ip address of the " -"UDP transport." +"If requested, returns methods used for detecting the ip address of the UDP " +"transport." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:198 @@ -2609,34 +2438,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:237 msgid "" -"The version of the I2PControl API used wasn't specified, but is required " -"to be specified." +"The version of the I2PControl API used wasn't specified, but is required to " +"be specified." msgstr "" #: i2p2www/pages/site/docs/api/i2pcontrol.html:238 msgid "" -"The version of the I2PControl API specified is not supported by " -"I2PControl." +"The version of the I2PControl API specified is not supported by I2PControl." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:8 #, python-format msgid "" "I2PTunnel is a tool for interfacing with and providing services on I2P.\n" -"Destination of an I2PTunnel can be defined using a <a " -"href=\"%(naming)s\">hostname</a>,\n" -"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination " -"key.\n" -"An established I2PTunnel will be available on your client machine as " -"localhost:port.\n" -"If you wish to provide a service on I2P network, you simply create " -"I2PTunnel to the\n" -"appropriate ip_address:port. A corresponding 516-byte destination key " -"will be generated\n" +"Destination of an I2PTunnel can be defined using a <a href=\"%(naming)s\">hostname</a>,\n" +"<a href=\"%(naming)s#base32\">Base32</a>, or a full 516-byte destination key.\n" +"An established I2PTunnel will be available on your client machine as localhost:port.\n" +"If you wish to provide a service on I2P network, you simply create I2PTunnel to the\n" +"appropriate ip_address:port. A corresponding 516-byte destination key will be generated\n" "for the service and it will become avaliable throughout I2P.\n" "A web interface for I2PTunnel management is avaliable on\n" -"<a " -"href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." +"<a href=\"http://localhost:7657/i2ptunnel/\">localhost:7657/i2ptunnel/</a>." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:20 @@ -2650,8 +2472,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:23 msgid "" "<b>I2P Webserver</b> - A tunnel pointed to a Jetty webserver run\n" -"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient " -"and quick hosting on I2P.\n" +"on <a href=\"http://localhost:7658\">localhost:7658</a> for convenient and quick hosting on I2P.\n" "<br>The document root is:" msgstr "" @@ -2661,10 +2482,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:33 msgid "" -"A HTTP proxy used for browsing I2P and the regular internet anonymously " -"through I2P. \n" -"Browsing internet through I2P uses a random proxy specified by the " -"\"Outproxies:\" option." +"A HTTP proxy used for browsing I2P and the regular internet anonymously through I2P. \n" +"Browsing internet through I2P uses a random proxy specified by the \"Outproxies:\" option." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:37 @@ -2707,31 +2526,26 @@ msgstr "Standard" #: i2p2www/pages/site/docs/api/i2ptunnel.html:56 msgid "" -"Opens a local TCP port that connects to a service (like HTTP, FTP or " -"SMTP) on a destination inside of I2P.\n" -"The tunnel is directed to a random host from the comma seperated (\", \")" -" list of destinations." +"Opens a local TCP port that connects to a service (like HTTP, FTP or SMTP) on a destination inside of I2P.\n" +"The tunnel is directed to a random host from the comma seperated (\", \") list of destinations." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:62 msgid "" -"A HTTP-client tunnel. The tunnel connects to the destination specified by" -" the URL\n" -"in a HTTP request. Supports proxying onto internet if an outproxy is " -"provided. Strips HTTP connections of the following headers:" +"A HTTP-client tunnel. The tunnel connects to the destination specified by the URL\n" +"in a HTTP request. Supports proxying onto internet if an outproxy is provided. Strips HTTP connections of the following headers:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:67 msgid "" "<b>Accept, Accept-Charset, Accept-Language\n" -" and Accept-Ranges</b> as they vary greatly between browsers and can be " -"used as an identifier." +" and Accept-Ranges</b> as they vary greatly between browsers and can be used as an identifier." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:90 msgid "" -"Depending on if the tunnel is using an outproxy or not it will append the" -" following User-Agent:" +"Depending on if the tunnel is using an outproxy or not it will append the " +"following User-Agent:" msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:94 @@ -2744,10 +2558,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:100 msgid "" -"Creates a connection to a random IRC server specified by the comma " -"seprated (\", \") \n" -"list of destinations. Only a whitelisted subset of IRC commands are " -"allowed due to anonymity concerns." +"Creates a connection to a random IRC server specified by the comma seprated (\", \") \n" +"list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:105 @@ -2760,8 +2572,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:144 msgid "" -"Enables using the I2P router as a SOCKS proxy with the command whitelist " -"specified by\n" +"Enables using the I2P router as a SOCKS proxy with the command whitelist specified by\n" "<a href=\"#client-mode-irc\">IRC</a> client mode." msgstr "" @@ -2773,8 +2584,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:156 msgid "" -"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr " -"client tunnel will \n" +"Creates a UDP-server attached to a Streamr client I2PTunnel. The streamr client tunnel will \n" "subscribe to a streamr server tunnel." msgstr "" @@ -2788,32 +2598,27 @@ msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:171 msgid "" -"Creates a destination to a local HTTP server ip:port. Supports gzip for " -"requests with \n" -"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in" -" such a request." +"Creates a destination to a local HTTP server ip:port. Supports gzip for requests with \n" +"Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:177 msgid "" -"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client " -"with no outproxying\n" -"capabilities. An example application would be a web application that does" -" client-type\n" +"Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying\n" +"capabilities. An example application would be a web application that does client-type\n" "requests, or loopback-testing an I2P Site as a diagnostic tool." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:184 msgid "" -"Creates a destination that filters the reqistration sequence of a client " -"and passes \n" +"Creates a destination that filters the reqistration sequence of a client and passes \n" "the clients destination key as a hostname to the IRC-server." msgstr "" #: i2p2www/pages/site/docs/api/i2ptunnel.html:190 msgid "" -"A UDP-client that connects to a media server is created. The UDP-Client " -"is coupled with a Streamr server I2PTunnel." +"A UDP-client that connects to a media server is created. The UDP-Client is " +"coupled with a Streamr server I2PTunnel." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:2 @@ -2830,14 +2635,11 @@ msgstr "Shënim" msgid "" "The ministreaming library has been enhanced and extended by the\n" "\"full\" <a href=\"%(streaming)s\">streaming library</a>.\n" -"Ministreaming is deprecated and is incompatible with today's " -"applications.\n" +"Ministreaming is deprecated and is incompatible with today's applications.\n" "The following documentation is old.\n" -"Also note that streaming extends ministreaming in the same Java package " -"(net.i2p.client.streaming),\n" +"Also note that streaming extends ministreaming in the same Java package (net.i2p.client.streaming),\n" "so the current <a href=\"%(api)s\">API documentation</a> contains both.\n" -"Obsolete ministreaming classes and methods are clearly marked as " -"deprecated in the Javadocs." +"Obsolete ministreaming classes and methods are clearly marked as deprecated in the Javadocs." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:19 @@ -2845,17 +2647,12 @@ msgstr "" msgid "" "\n" "The ministreaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP</a> that allows reliable, in order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" @@ -2863,42 +2660,29 @@ msgstr "" #, python-format msgid "" "The ministreaming library was written by mihi as a part of his \n" -"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out" -" and released\n" -"under the BSD license. It is called the \"mini\"streaming library " -"because it makes\n" -"some simplifications in the implementation, while a more robust streaming" -" library\n" -"could be further optimized for operation over I2P. The two main issues " -"with \n" +"<a href=\"%(i2ptunnel)s\">I2PTunnel</a> application and then factored out and released\n" +"under the BSD license. It is called the \"mini\"streaming library because it makes\n" +"some simplifications in the implementation, while a more robust streaming library\n" +"could be further optimized for operation over I2P. The two main issues with \n" "the ministreaming library are its use of the traditional TCP two phase \n" -"establishment protocol and the current fixed window size of 1. The " -"establishment\n" -"issue is minor for long lived streams, but for short ones, such as quick " -"HTTP\n" -"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As " -"for the window\n" -"size, the ministreaming library doesn't maintain any ID or ordering " -"within the \n" -"messages sent (or include any application level ACK or SACK), so it must " -"wait \n" -"on average twice the time it takes to send a message before sending " -"another." +"establishment protocol and the current fixed window size of 1. The establishment\n" +"issue is minor for long lived streams, but for short ones, such as quick HTTP\n" +"requests, the impact can be <a href=\"%(minwww)s\">significant</a>. As for the window\n" +"size, the ministreaming library doesn't maintain any ID or ordering within the \n" +"messages sent (or include any application level ACK or SACK), so it must wait \n" +"on average twice the time it takes to send a message before sending another." msgstr "" #: i2p2www/pages/site/docs/api/ministreaming.html:45 #, python-format msgid "" -"Even with those issues, the ministreaming library performs quite well in " -"many\n" +"Even with those issues, the ministreaming library performs quite well in many\n" "situations, and its <a href=\"%(api)s\">API</a>\n" -"is both quite simple and capable of remaining unchanged as different " -"streaming\n" +"is both quite simple and capable of remaining unchanged as different streaming\n" "implementations are introduced. The library is deployed in its own \n" "ministreaming.jar.\n" "Developers in Java who would like to use it can\n" -"access the API directly, while developers in other languages can use it " -"through\n" +"access the API directly, while developers in other languages can use it through\n" "<a href=\"%(samv3)s\">SAM</a>'s streaming support." msgstr "" @@ -2937,8 +2721,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/socks.html:5 msgid "" "\n" -"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are " -"supported.\n" +"The SOCKS proxy is working as of release 0.7.1. SOCKS 4/4a/5 are supported.\n" "Enable SOCKS by creating a SOCKS client tunnel in i2ptunnel.\n" "Both shared-clients and non-shared are supported.\n" "There is no SOCKS outproxy so it is of limited use." @@ -2959,8 +2742,7 @@ msgid "" "information as content, I2P has no way to protect your anonymity. For\n" "example, some mail applications will send the IP address of the machine\n" "they are running on to a mail server. There is no way for I2P to filter\n" -"this, thus using I2P to 'socksify' existing applications is possible, but" -"\n" +"this, thus using I2P to 'socksify' existing applications is possible, but\n" "extremely dangerous." msgstr "" @@ -3039,47 +2821,34 @@ msgstr "" #, python-format msgid "" "The streaming library is a layer on top of the core \n" -"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and " -"authenticated streams\n" -"of messages to operate across an unreliable, unordered, and " -"unauthenticated \n" +"<a href=\"%(i2cp)s\">I2CP API</a> that allows reliable, in-order, and authenticated streams\n" +"of messages to operate across an unreliable, unordered, and unauthenticated \n" "message layer. Just like the TCP to IP relationship, this streaming \n" -"functionality has a whole series of tradeoffs and optimizations " -"available, but\n" -"rather than embed that functionality into the base I2P code, it has been " -"factored\n" -"off into its own library both to keep the TCP-esque complexities separate" -" and to\n" +"functionality has a whole series of tradeoffs and optimizations available, but\n" +"rather than embed that functionality into the base I2P code, it has been factored\n" +"off into its own library both to keep the TCP-esque complexities separate and to\n" "allow alternative optimized implementations." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:29 msgid "" "In consideration of the relatively high cost of messages, \n" -"the streaming library's protocol for scheduling and delivering those " -"messages has been optimized to\n" -"allow individual messages passed to contain as much information as is " -"available.\n" -"For instance, a small HTTP transaction proxied through the streaming " -"library can\n" -"be completed in a single round trip - the first messages bundle a SYN, " -"FIN, and\n" +"the streaming library's protocol for scheduling and delivering those messages has been optimized to\n" +"allow individual messages passed to contain as much information as is available.\n" +"For instance, a small HTTP transaction proxied through the streaming library can\n" +"be completed in a single round trip - the first messages bundle a SYN, FIN, and\n" "the small HTTP request payload, and the reply bundles the SYN,\n" "FIN, ACK, and the HTTP response payload. While an additional\n" -"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has " -"been\n" -"received, the local HTTP proxy can often deliver the full response to the" -" browser \n" +"ACK must be transmitted to tell the HTTP server that the SYN/FIN/ACK has been\n" +"received, the local HTTP proxy can often deliver the full response to the browser \n" "immediately." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:42 msgid "" "The streaming library bears much resemblance to an \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms\n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK,\n" +"abstraction of TCP, with its sliding windows, congestion control algorithms\n" +"(both slow start and congestion avoidance), and general packet behavior (ACK,\n" "SYN, FIN, RST, rto calculation, etc)." msgstr "" @@ -3099,29 +2868,21 @@ msgstr "API" #: i2p2www/pages/site/docs/api/streaming.html:60 #, python-format msgid "" -"The streaming library API provides a standard socket paradigm to Java " -"applications.\n" -"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, " -"except that\n" -"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> " -"through the\n" +"The streaming library API provides a standard socket paradigm to Java applications.\n" +"The lower-level <a href=\"%(i2cp)s\">I2CP</a> API is completely hidden, except that\n" +"applications may pass <a href=\"%(i2cp)s#options\">I2CP parameters</a> through the\n" "streaming library, to be interpreted by I2CP." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:67 #, python-format msgid "" -"The standard interface to the streaming lib is for the application to use" -" the\n" +"The standard interface to the streaming lib is for the application to use the\n" "<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a> to create an\n" -"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks " -"the\n" -"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will " -"cause\n" -"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The " -"application\n" -"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> " -"or\n" +"<a href=\"%(i2psktm)s\">I2PSocketManager</a>. The application then asks the\n" +"socket manager for an <a href=\"%(i2psess)s\">I2PSession</a>, which will cause\n" +"a connection to the router via <a href=\"%(i2cp)s\">I2CP</a>. The application\n" +"can then setup connections with an <a href=\"%(i2pskt)s\">I2PSocket</a> or\n" "receive connections with an <a href=\"%(i2psskt)s\">I2PServerSocket</a>." msgstr "" @@ -3142,17 +2903,12 @@ msgstr "" #, python-format msgid "" "The options and current default values are listed below.\n" -"Options are case-sensitive and may be set for the whole router, for a " -"particular client, or for an individual socket on a\n" +"Options are case-sensitive and may be set for the whole router, for a particular client, or for an individual socket on a\n" "per-connection basis.\n" -"Many values are tuned for HTTP performance over typical I2P conditions. " -"Other applications such\n" +"Many values are tuned for HTTP performance over typical I2P conditions. Other applications such\n" "as peer-to-peer services are strongly encouraged to\n" -"modify as necessary, by setting the options and passing them via the call" -" to\n" -"<a " -"href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost," -" _i2cpPort, opts).\n" +"modify as necessary, by setting the options and passing them via the call to\n" +"<a href=\"%(i2psktmf)s\">I2PSocketManagerFactory</a>.createManager(_i2cpHost, _i2cpPort, opts).\n" "Time values are in ms." msgstr "" @@ -3160,17 +2916,14 @@ msgstr "" #, python-format msgid "" "Note that higher-layer APIs, such as <a href=\"%(samv3)s\">SAM</a>,\n" -"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>," -"\n" +"<a href=\"%(bob)s\">BOB</a>, and <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" "may override these defaults with their own defaults.\n" -"Also note that many options only apply to servers listening for incoming " -"connections." +"Also note that many options only apply to servers listening for incoming connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:110 msgid "" -"As of release 0.9.1, most, but not all, options may be changed on an " -"active socket manager or session.\n" +"As of release 0.9.1, most, but not all, options may be changed on an active socket manager or session.\n" "See the javadocs for details." msgstr "" @@ -3194,8 +2947,8 @@ msgstr "Njoftime" #: i2p2www/pages/site/docs/api/streaming.html:119 msgid "" -"Comma- or space-separated list of Base64 peer Hashes used for either " -"access list or blacklist." +"Comma- or space-separated list of Base64 peer Hashes used for either access " +"list or blacklist." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:121 @@ -3245,24 +2998,21 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes to be\n" "blacklisted for incoming connections to ALL destinations in the context.\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:175 msgid "" -"How much transmit data (in bytes) will be accepted that hasn't been " -"written out yet." +"How much transmit data (in bytes) will be accepted that hasn't been written " +"out yet." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:179 msgid "" "When we're in congestion avoidance, we grow the window size at the rate\n" -"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are" -" in bytes,\n" +"of <code>1/(windowSize*factor)</code>. In standard TCP, window sizes are in bytes,\n" "while in I2P, window sizes are in messages.\n" "A higher number means slower growth." msgstr "" @@ -3271,16 +3021,15 @@ msgstr "" msgid "" "How long to wait after instantiating a new con \n" "before actually attempting to connect. If this is\n" -"<= 0, connect immediately with no initial data. If greater than 0, " -"wait\n" +"<= 0, connect immediately with no initial data. If greater than 0, wait\n" "until the output stream is flushed, the buffer fills, \n" "or that many milliseconds pass, and include any initial data with the SYN." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:194 msgid "" -"How long to block on connect, in milliseconds. Negative means " -"indefinitely. Default is 5 minutes." +"How long to block on connect, in milliseconds. Negative means indefinitely. " +"Default is 5 minutes." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:198 @@ -3293,30 +3042,24 @@ msgstr "" msgid "" "Comma- or space-separated list of Base64 peer Hashes or host names to be\n" "contacted using an alternate DSA destination.\n" -"Only applies if multisession is enabled and the primary session is non-" -"DSA\n" +"Only applies if multisession is enabled and the primary session is non-DSA\n" "(generally for shared clients only).\n" -"This option must be set in the context properties, NOT in the " -"createManager() options argument.\n" -"Note that setting this in the router context will not affect clients " -"outside the\n" +"This option must be set in the context properties, NOT in the createManager() options argument.\n" +"Note that setting this in the router context will not affect clients outside the\n" "router in a separate JVM and context." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:216 msgid "" "Whether to listen only for the streaming protocol.\n" -"Setting to true will prohibit communication with Destinations earlier " -"than release 0.7.1\n" -"(released March 2009). Set to true if running multiple protocols on this " -"Destination." +"Setting to true will prohibit communication with Destinations earlier than release 0.7.1\n" +"(released March 2009). Set to true if running multiple protocols on this Destination." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:226 msgid "" "(0=noop, 1=disconnect)\n" -"What to do on an inactivity timeout - do nothing, disconnect, or send a " -"duplicate ack." +"What to do on an inactivity timeout - do nothing, disconnect, or send a duplicate ack." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:232 @@ -3329,8 +3072,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:237 msgid "" -"The initial value of the resend delay field in the packet header, times " -"1000.\n" +"The initial value of the resend delay field in the packet header, times 1000.\n" "Not fully implemented; see below." msgstr "" @@ -3353,8 +3095,8 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:255 msgid "" -"In standard TCP, window sizes are in bytes, while in I2P, window sizes " -"are in messages." +"In standard TCP, window sizes are in bytes, while in I2P, window sizes are " +"in messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:279 @@ -3396,12 +3138,12 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:333 msgid "" "(2=interactive not supported)\n" -"This doesn't currently do anything, but setting it to a value other than " -"1 will cause an error." +"This doesn't currently do anything, but setting it to a value other than 1 will cause an error." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:338 -msgid "How long to block on read, in milliseconds. Negative means indefinitely." +msgid "" +"How long to block on read, in milliseconds. Negative means indefinitely." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:342 @@ -3444,19 +3186,15 @@ msgstr "Ujdisje" #: i2p2www/pages/site/docs/api/streaming.html:387 msgid "" -"The initiator sends a packet with the SYNCHRONIZE flag set. This packet " -"may contain the initial data as well.\n" -"The peer replies with a packet with the SYNCHRONIZE flag set. This packet" -" may contain the initial response data as well." +"The initiator sends a packet with the SYNCHRONIZE flag set. This packet may contain the initial data as well.\n" +"The peer replies with a packet with the SYNCHRONIZE flag set. This packet may contain the initial response data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:392 msgid "" -"The initiator may send additional data packets, up to the initial window " -"size, before receiving the SYNCHRONIZE response.\n" +"The initiator may send additional data packets, up to the initial window size, before receiving the SYNCHRONIZE response.\n" "These packets will also have the send Stream ID field set to 0.\n" -"Recipients must buffer packets received on unknown streams for a short " -"period of time, as they may\n" +"Recipients must buffer packets received on unknown streams for a short period of time, as they may\n" "arrive out of order, in advance of the SYNCHRONIZE packet." msgstr "" @@ -3466,33 +3204,23 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:400 msgid "" -"The maximum message size (also called the MTU / MRU) is negotiated to the" -" lower value supported by\n" -"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection" -" will lead to\n" +"The maximum message size (also called the MTU / MRU) is negotiated to the lower value supported by\n" +"the two peers. As tunnel messages are padded to 1KB, a poor MTU selection will lead to\n" "a large amount of overhead.\n" "The MTU is specified by the option i2p.streaming.maxMessageSize.\n" -"The current default MTU of 1730 was chosen to fit precisely into two 1K " -"I2NP tunnel messages,\n" +"The current default MTU of 1730 was chosen to fit precisely into two 1K I2NP tunnel messages,\n" "including overhead for the typical case." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:417 msgid "" -"The first message in a connection includes a 387 byte (typical) " -"Destination added by the streaming layer,\n" -"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in " -"the Garlic message by the router.\n" -"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session " -"was previously established).\n" -"Therefore, the goal of fitting a complete HTTP request in a single 1KB " -"I2NP message is not always attainable.\n" -"However, the selection of the MTU, together with careful implementation " -"of fragmentation\n" -"and batching strategies in the tunnel gateway processor, are important " -"factors in network bandwidth,\n" -"latency, reliability, and efficiency, especially for long-lived " -"connections." +"The first message in a connection includes a 387 byte (typical) Destination added by the streaming layer,\n" +"and usually a 898 byte (typical) LeaseSet, and Session keys, bundled in the Garlic message by the router.\n" +"(The LeaseSet and Session Keys will not be bundled if an ElGamal Session was previously established).\n" +"Therefore, the goal of fitting a complete HTTP request in a single 1KB I2NP message is not always attainable.\n" +"However, the selection of the MTU, together with careful implementation of fragmentation\n" +"and batching strategies in the tunnel gateway processor, are important factors in network bandwidth,\n" +"latency, reliability, and efficiency, especially for long-lived connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:428 @@ -3506,14 +3234,10 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:436 #, python-format msgid "" -"Each packet is sent through I2P as a single message (or as an individual " -"clove in a\n" -"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation " -"is implemented\n" -"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a " -"href=\"%(i2np)s\">I2NP</a>, and\n" -"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no " -"packet delimiter\n" +"Each packet is sent through I2P as a single message (or as an individual clove in a\n" +"<a href=\"%(garlicrouting)s\">Garlic Message</a>). Message encapsulation is implemented\n" +"in the underlying <a href=\"%(i2cp)s\">I2CP</a>, <a href=\"%(i2np)s\">I2NP</a>, and\n" +"<a href=\"%(tunnelmessage)s\">tunnel message</a> layers. There is no packet delimiter\n" "mechanism or payload length field in the streaming protocol." msgstr "" @@ -3523,17 +3247,14 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:447 msgid "" -"Data packets may include an optional delay field specifying the requested" -" delay,\n" +"Data packets may include an optional delay field specifying the requested delay,\n" "in ms, before the receiver should ack the packet.\n" "Valid values are 0 to 60000 inclusive.\n" "A value of 0 requests an immediate ack.\n" "This is advisory only, and receivers should delay slightly so that\n" "additional packets may be acknowledged with a single ack.\n" -"Some implementations may include an advisory value of (measured RTT / 2) " -"in this field.\n" -"For nonzero optional delay values, receivers should limit the maximum " -"delay\n" +"Some implementations may include an advisory value of (measured RTT / 2) in this field.\n" +"For nonzero optional delay values, receivers should limit the maximum delay\n" "before sending an ack to a few seconds at most.\n" "Optional delay values greater than 60000 indicate choking, see below." msgstr "" @@ -3545,46 +3266,33 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:462 msgid "" "TCP headers include the receive window in bytes.\n" -"The streaming protocol does not contain a receive window, it uses only a " -"simple choke/unchoke indication.\n" -"Each endpoint must maintain its own estimate of the far-end receive " -"window, in either bytes or packets.\n" -"The recommended minimum buffer size for receiver implementations is 128 " -"packets or 217 KB (approximately 128x1730).\n" -"Because of I2P netowrk latency, packet drops, and the resulting " -"congestion control,\n" +"The streaming protocol does not contain a receive window, it uses only a simple choke/unchoke indication.\n" +"Each endpoint must maintain its own estimate of the far-end receive window, in either bytes or packets.\n" +"The recommended minimum buffer size for receiver implementations is 128 packets or 217 KB (approximately 128x1730).\n" +"Because of I2P netowrk latency, packet drops, and the resulting congestion control,\n" "a buffer of this size is rarely filled.\n" -"Overflow is, however, likely to occur on high-bandwidth \"local " -"loopback\" (same-router) connections." +"Overflow is, however, likely to occur on high-bandwidth \"local loopback\" (same-router) connections." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:471 msgid "" "To quickly indicate and smoothly recover from overflow conditions,\n" "there is a simple mechanism for pushback in the streaming protocol.\n" -"If a packet is received with an optional delay field of value of 60001 or" -" higher,\n" +"If a packet is received with an optional delay field of value of 60001 or higher,\n" "that indicates \"choking\" or a receive window of zero.\n" -"A packet with an optional delay field of value of 60000 or less indicates" -" \"unchoking\".\n" -"Packets without an optional delay field do not affect the choke/unchoke " -"state." +"A packet with an optional delay field of value of 60000 or less indicates \"unchoking\".\n" +"Packets without an optional delay field do not affect the choke/unchoke state." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:479 msgid "" -"After being choked, no more packets with data should be sent until the " -"transmitter is unchoked,\n" -"except for occasional \"probe\" data packets to compensate for possible " -"lost unchoke packets.\n" -"The choked endpoint should start a \"persist timer\" to control the " -"probing, as in TCP.\n" +"After being choked, no more packets with data should be sent until the transmitter is unchoked,\n" +"except for occasional \"probe\" data packets to compensate for possible lost unchoke packets.\n" +"The choked endpoint should start a \"persist timer\" to control the probing, as in TCP.\n" "The unchoking endpoint should send several packets with this field set,\n" -"or continue sending them periodically until data packets are received " -"again.\n" +"or continue sending them periodically until data packets are received again.\n" "Maximum time to wait for unchoking is implementation-dependent.\n" -"Transmitter window size and congestion control strategy after being " -"unchoked is implementation-dependent." +"Transmitter window size and congestion control strategy after being unchoked is implementation-dependent." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:490 @@ -3593,8 +3301,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:491 msgid "" -"The streaming lib uses standard slow-start (exponential window growth) " -"and congestion avoidance (linear window growth)\n" +"The streaming lib uses standard slow-start (exponential window growth) and congestion avoidance (linear window growth)\n" "phases, with exponential backoff.\n" "Windowing and acknowledgments use packet count, not byte count." msgstr "" @@ -3605,53 +3312,44 @@ msgstr "Mbylle" #: i2p2www/pages/site/docs/api/streaming.html:499 msgid "" -"Any packet, including one with the SYNCHRONIZE flag set, may have the " -"CLOSE flag sent as well.\n" -"The connection is not closed until the peer responds with the CLOSE flag." -"\n" +"Any packet, including one with the SYNCHRONIZE flag set, may have the CLOSE flag sent as well.\n" +"The connection is not closed until the peer responds with the CLOSE flag.\n" "CLOSE packets may contain data as well." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:507 msgid "" -"There is no ping function at the I2CP layer (equivalent to ICMP echo) or " -"in datagrams.\n" +"There is no ping function at the I2CP layer (equivalent to ICMP echo) or in datagrams.\n" "This function is provided in streaming.\n" "Pings and pongs may not be combined with a standard streaming packet;\n" "if the ECHO option is set, then\n" -"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are " -"ignored." +"most other flags, options, ackThrough, sequenceNum, NACKs, etc. are ignored." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:515 msgid "" -"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED " -"flags set.\n" -"The sendStreamId must be greater than zero, and the receiveStreamId is " -"ignored.\n" +"A ping packet must have the ECHO, SIGNATURE_INCLUDED, and FROM_INCLUDED flags set.\n" +"The sendStreamId must be greater than zero, and the receiveStreamId is ignored.\n" "The sendStreamId may or may not correspond to an existing connection." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:521 msgid "" "A pong packet must have the ECHO flag set.\n" -"The sendStreamId must be zero, and the receiveStreamId is the " -"sendStreamId from the ping.\n" -"Prior to release 0.9.18, the pong packet does not include any payload " -"that was contained in the ping." +"The sendStreamId must be zero, and the receiveStreamId is the sendStreamId from the ping.\n" +"Prior to release 0.9.18, the pong packet does not include any payload that was contained in the ping." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:527 msgid "" "As of release 0.9.18, pings and pongs may contain a payload.\n" -"The payload in the ping, up to a maximum of 32 bytes, is returned in the " -"pong." +"The payload in the ping, up to a maximum of 32 bytes, is returned in the pong." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:532 msgid "" -"Streaming may be configured to disable sending pongs with the " -"configuration i2p.streaming.answerPings=false." +"Streaming may be configured to disable sending pongs with the configuration " +"i2p.streaming.answerPings=false." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:537 @@ -3667,8 +3365,7 @@ msgid "" "This is used for \"temporal\" sharing at connection open/close time,\n" "not \"ensemble\" sharing during a connection (See\n" "<a href=\"http://www.ietf.org/rfc/rfc2140.txt\">RFC 2140</a>).\n" -"There is a separate share per ConnectionManager (i.e. per local " -"Destination)\n" +"There is a separate share per ConnectionManager (i.e. per local Destination)\n" "so that there is no information leakage to other Destinations on the\n" "same router.\n" "The share data for a given peer expires after a few minutes.\n" @@ -3681,8 +3378,7 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:560 msgid "" -"The following parameters are hardcoded, but may be of interest for " -"analysis:" +"The following parameters are hardcoded, but may be of interest for analysis:" msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:579 @@ -3692,25 +3388,16 @@ msgstr "Histori" #: i2p2www/pages/site/docs/api/streaming.html:580 msgid "" -"The streaming library has grown organically for I2P - first mihi " -"implemented the\n" -"\"mini streaming library\" as part of I2PTunnel, which was limited to a " -"window\n" -"size of 1 message (requiring an ACK before sending the next one), and " -"then it was\n" -"refactored out into a generic streaming interface (mirroring TCP sockets)" -" and the\n" -"full streaming implementation was deployed with a sliding window protocol" -" and \n" -"optimizations to take into account the high bandwidth x delay product. " -"Individual\n" -"streams may adjust the maximum packet size and other options. The default" -"\n" -"message size is selected to fit precisely in two 1K I2NP tunnel messages," -"\n" +"The streaming library has grown organically for I2P - first mihi implemented the\n" +"\"mini streaming library\" as part of I2PTunnel, which was limited to a window\n" +"size of 1 message (requiring an ACK before sending the next one), and then it was\n" +"refactored out into a generic streaming interface (mirroring TCP sockets) and the\n" +"full streaming implementation was deployed with a sliding window protocol and \n" +"optimizations to take into account the high bandwidth x delay product. Individual\n" +"streams may adjust the maximum packet size and other options. The default\n" +"message size is selected to fit precisely in two 1K I2NP tunnel messages,\n" "and is a reasonable tradeoff between the bandwidth costs of \n" -"retransmitting lost messages, and the latency and overhead of multiple " -"messages." +"retransmitting lost messages, and the latency and overhead of multiple messages." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:594 @@ -3741,20 +3428,16 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:604 #, python-format msgid "" -"Another area for research is the interaction of the streaming lib with " -"the\n" +"Another area for research is the interaction of the streaming lib with the\n" "NTCP and SSU transport layers.\n" "See <a href=\"%(ntcpdisc)s\">the NTCP discussion page</a> for details." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:609 msgid "" -"The interaction of the routing algorithms with the streaming lib strongly" -" affects performance.\n" -"In particular, random distribution of messages to multiple tunnels in a " -"pool\n" -"leads to a high degree of out-of-order delivery which results in smaller " -"window\n" +"The interaction of the routing algorithms with the streaming lib strongly affects performance.\n" +"In particular, random distribution of messages to multiple tunnels in a pool\n" +"leads to a high degree of out-of-order delivery which results in smaller window\n" "sizes than would otherwise be the case. The router currently routes \n" "messages for a single from/to destination pair through a consistent set \n" "of tunnels, until tunnel expiration or delivery failure. The router's \n" @@ -3789,11 +3472,9 @@ msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:636 msgid "" -"zzz has added debug code to the streaming library to log packets in a " -"wireshark-compatible\n" +"zzz has added debug code to the streaming library to log packets in a wireshark-compatible\n" "(pcap) format; Use this to further analyze performance.\n" -"The format may require enhancement to map more streaming lib parameters " -"to TCP fields." +"The format may require enhancement to map more streaming lib parameters to TCP fields." msgstr "" #: i2p2www/pages/site/docs/api/streaming.html:641 @@ -3812,18 +3493,15 @@ msgstr "Janar, 2017" msgid "" "There are several bittorrent clients and trackers on I2P.\n" "As I2P addressing uses a Destination instead of an IP and port, minor\n" -"changes are required to tracker and client software for operation on I2P." -"\n" +"changes are required to tracker and client software for operation on I2P.\n" "These changes are specified below.\n" -"Note carefully the guidelines for compatibility with older I2P clients " -"and trackers." +"Note carefully the guidelines for compatibility with older I2P clients and trackers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:15 msgid "" "This page specifies protocol details common to all clients and trackers.\n" -"Specific clients and trackers may implement other unique features or " -"protocols." +"Specific clients and trackers may implement other unique features or protocols." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:20 @@ -3836,8 +3514,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:27 msgid "" -"Clients generally include a fake port=6881 parameter in the announce, for" -" compatibility with older trackers.\n" +"Clients generally include a fake port=6881 parameter in the announce, for compatibility with older trackers.\n" "Trackers may ignore the port parameter, and should not require it." msgstr "" @@ -3849,8 +3526,7 @@ msgid "" "using the I2P Base 64 alphabet [A-Z][a-z][0-9]-~.\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "are 387+ bytes, so the Base 64 is 516+ bytes.\n" -"Clients generally append \".i2p\" to the Base 64 Destination for " -"compatibility with older trackers.\n" +"Clients generally append \".i2p\" to the Base 64 Destination for compatibility with older trackers.\n" "Trackers should not require an appended \".i2p\"." msgstr "" @@ -3860,18 +3536,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:46 msgid "" -"Current Destinations for clients are 387 or more bytes (516 or more in " -"Base 64 encoding).\n" +"Current Destinations for clients are 387 or more bytes (516 or more in Base 64 encoding).\n" "A reasonable maximum to assume, for now, is 475 bytes.\n" -"As the tracker must decode the Base64 to deliver compact responses (see " -"below),\n" +"As the tracker must decode the Base64 to deliver compact responses (see below),\n" "the tracker should probably decode and reject bad Base64 when announced." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:53 msgid "" -"The default response type is non-compact. Clients may request a compact " -"response with\n" +"The default response type is non-compact. Clients may request a compact response with\n" "the parameter compact=1. A tracker may, but is not required to, return\n" "a compact response when requested." msgstr "" @@ -3879,10 +3552,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:59 msgid "" "Developers of new I2P clients\n" -"are strongly encouraged to implemenent announces over their own tunnel " -"rather than\n" -"the HTTP client proxy at port 4444. Doing so is both more efficient and " -"it allows\n" +"are strongly encouraged to implemenent announces over their own tunnel rather than\n" +"the HTTP client proxy at port 4444. Doing so is both more efficient and it allows\n" "destination enforcement by the tracker (see below)." msgstr "" @@ -3904,8 +3575,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:76 msgid "" -"Trackers generally include a fake port key, or use the port from the " -"announce, for compatibility with older clients.\n" +"Trackers generally include a fake port key, or use the port from the announce, for compatibility with older clients.\n" "Clients must ignore the port parameter, and should not require it." msgstr "" @@ -3913,10 +3583,8 @@ msgstr "" #, python-format msgid "" "The value of the ip key is the base 64 of the client's\n" -"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as " -"described above.\n" -"Trackers generally append \".i2p\" to the Base 64 Destination if it " -"wasn't in the announce ip, for compatibility with older clients.\n" +"<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>, as described above.\n" +"Trackers generally append \".i2p\" to the Base 64 Destination if it wasn't in the announce ip, for compatibility with older clients.\n" "Clients should not require an appended \".i2p\" in the responses." msgstr "" @@ -3931,26 +3599,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:95 #, python-format msgid "" -"In the compact response, the value of the \"peers\" dictionary key is a " -"single byte string,\n" +"In the compact response, the value of the \"peers\" dictionary key is a single byte string,\n" "whose length is a multiple of 32 bytes.\n" "This string contains the concatenated\n" "<a href=\"%(commonstructures)s#type_Hash\">32-byte SHA-256 Hashes</a>\n" "of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This hash must be computed by the tracker, unless destination enforcement" -"\n" -"(see below) is used, in which case the hash delivered in the X-I2P-" -"DestHash\n" +"This hash must be computed by the tracker, unless destination enforcement\n" +"(see below) is used, in which case the hash delivered in the X-I2P-DestHash\n" "or X-I2P-DestB32 HTTP headers may be converted to binary and stored.\n" "The peers key may be absent, or the peers value may be zero-length." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:109 msgid "" -"While compact response support is optional for both clients and trackers," -" it is highly\n" +"While compact response support is optional for both clients and trackers, it is highly\n" "recommended as it reduces the nominal response size by over 90%." msgstr "" @@ -3961,34 +3625,27 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:117 #, python-format msgid "" -"Some, but not all, I2P bittorrent clients announce over their own " -"tunnels.\n" -"Trackers may choose to prevent spoofing by requiring this, and verifying " -"the\n" +"Some, but not all, I2P bittorrent clients announce over their own tunnels.\n" +"Trackers may choose to prevent spoofing by requiring this, and verifying the\n" "client's\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "using HTTP headers added by the I2PTunnel HTTP Server tunnel.\n" -"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which " -"are\n" +"The headers are X-I2P-DestHash, X-I2P-DestB64, and X-I2P-DestB32, which are\n" "different formats for the same information.\n" "These headers cannot be spoofed by the client.\n" -"A tracker enforcing destinations need not require the ip announce " -"parameter at all." +"A tracker enforcing destinations need not require the ip announce parameter at all." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:129 msgid "" -"As several clients use the HTTP proxy instead of their own tunnel for " -"announces,\n" -"destination enforcement will prevent usage by those clients unless or " -"until\n" +"As several clients use the HTTP proxy instead of their own tunnel for announces,\n" +"destination enforcement will prevent usage by those clients unless or until\n" "those clients are converted to announcing over their own tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:135 msgid "" -"Unfortunately, as the network grows, so will the amount of maliciousness," -"\n" +"Unfortunately, as the network grows, so will the amount of maliciousness,\n" "so we expect that all trackers will eventually enforce destinations.\n" "Both tracker and client developers should anticipate it." msgstr "" @@ -4002,12 +3659,9 @@ msgstr "" msgid "" "Announce URL host names in torrent files generally follow the\n" "<a href=\"%(naming)s\">I2P naming standards</a>.\n" -"In addition to host names from address books and \".b32.i2p\" Base 32 " -"hostnames,\n" -"the full Base 64 Destination (with [or without?] \".i2p\" appended) " -"should be supported.\n" -"Non-open trackers should recognize their own host name in any of these " -"formats." +"In addition to host names from address books and \".b32.i2p\" Base 32 hostnames,\n" +"the full Base 64 Destination (with [or without?] \".i2p\" appended) should be supported.\n" +"Non-open trackers should recognize their own host name in any of these formats." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:152 @@ -4029,27 +3683,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:165 #, python-format msgid "" -"I2P uses 387+ byte <a " -"href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" +"I2P uses 387+ byte <a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "for addresses, as explained above." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:170 msgid "" -"If the client has only the hash of the destination (such as from a " -"compact response or PEX), it must perform a lookup\n" -"by encoding it with Base 32, appending \".b32.i2p\", and querying the " -"Naming Service,\n" +"If the client has only the hash of the destination (such as from a compact response or PEX), it must perform a lookup\n" +"by encoding it with Base 32, appending \".b32.i2p\", and querying the Naming Service,\n" "which will return the full Destination if available." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:176 msgid "" -"If the client has a peer's full Destination it received in a non-compact " -"response, it should use it\n" +"If the client has a peer's full Destination it received in a non-compact response, it should use it\n" "directly in the connection setup.\n" -"Do not convert a Destination back to a Base 32 hash for lookup, this is " -"quite inefficient." +"Do not convert a Destination back to a Base 32 hash for lookup, this is quite inefficient." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:183 @@ -4059,40 +3708,32 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:184 msgid "" "To preserve anonymity,\n" -"I2P bittorrent clients generally do not support non-I2P announces or peer" -" connections.\n" +"I2P bittorrent clients generally do not support non-I2P announces or peer connections.\n" "I2P HTTP outproxies often block announces.\n" "There are no known SOCKS outproxies supporting bittorrent traffic." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:191 msgid "" -"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers " -"often\n" +"To prevent usage by non-I2P clients via an HTTP inproxy, I2P trackers often\n" "block accesses or announces that contain an X-Forwarded-For HTTP header.\n" -"Trackers should reject standard network announces with IPv4 or IPv6 IPs, " -"and not deliver them in responses." +"Trackers should reject standard network announces with IPv4 or IPv6 IPs, and not deliver them in responses." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:200 #, python-format msgid "" "I2P PEX is based on ut_pex.\n" -"As there does not appear to be a formal specification of ut_pex " -"available,\n" +"As there does not appear to be a formal specification of ut_pex available,\n" "it may be necessary to review the libtorrent source for assistance.\n" "It is an extension message, identified as \"i2p_pex\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with up to 3 keys, \"added\", " -"\"added.f\", and \"dropped\".\n" -"The added and dropped values are each a single byte string, whose length " -"is a multiple of 32 bytes.\n" +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with up to 3 keys, \"added\", \"added.f\", and \"dropped\".\n" +"The added and dropped values are each a single byte string, whose length is a multiple of 32 bytes.\n" "These byte strings are the concatenated SHA-256 Hashes of the binary\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>\n" "of the peers.\n" -"This is the same format as the peers dictionary value in the i2p compact " -"response format specified above.\n" +"This is the same format as the peers dictionary value in the i2p compact response format specified above.\n" "The added.f value, if present, is the same as in ut_pex." msgstr "" @@ -4107,13 +3748,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:226 msgid "" -"Unlike standard DHT, I2P DHT does not use a bit in the options handshake," -" or the PORT message.\n" +"Unlike standard DHT, I2P DHT does not use a bit in the options handshake, or the PORT message.\n" "It is advertised with an extension message, identified as \"i2p_dht\" in\n" -"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension " -"handshake</a>.\n" -"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", " -"both integers." +"<a href=\"http://www.bittorrent.org/beps/bep_0010.html\">the extension handshake</a>.\n" +"It contains a bencoded dictionary with two keys, \"port\" and \"rport\", both integers." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:235 @@ -4147,14 +3785,12 @@ msgstr "" msgid "" "Compact peer info is 32 bytes (32 byte SHA256 Hash)\n" "instead of 4 byte IP + 2 byte port. There is no peer port.\n" -"In a response, the \"values\" key is a list of strings, each containing a" -" single compact peer info." +"In a response, the \"values\" key is a list of strings, each containing a single compact peer info." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:264 msgid "" -"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + " -"2 byte port)\n" +"Compact node info is 54 bytes (20 byte SHA1 Hash + 32 byte SHA256 Hash + 2 byte port)\n" "instead of 20 byte SHA1 Hash + 4 byte IP + 2 byte port.\n" "In a response, the \"nodes\" key is a\n" "single byte string with concatenated compact node info." @@ -4163,10 +3799,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:271 msgid "" "Secure node ID requirement: To make various DHT attacks more difficult,\n" -"the first 4 bytes of the Node ID must match the first 4 bytes of the " -"destination Hash,\n" -"and the next two bytes of the Node ID must match the next two bytes of " -"the\n" +"the first 4 bytes of the Node ID must match the first 4 bytes of the destination Hash,\n" +"and the next two bytes of the Node ID must match the next two bytes of the\n" "destination hash exclusive-ORed with the port." msgstr "" @@ -4191,51 +3825,38 @@ msgid "" "Preliminary differences from\n" "<a href=\"http://www.bittorrent.org/beps/bep_0015.html\">BEP 15</a>\n" "are described below, and are subject to change.\n" -"Contact the I2P developers if you wish to develop a client or tracker " -"supporting datagram announces." +"Contact the I2P developers if you wish to develop a client or tracker supporting datagram announces." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:299 msgid "" "A UDP tracker listens on two ports.\n" -"The \"query port\" is the advertised port, and is used to receive " -"repliable (signed) datagrams, for the connect request only.\n" -"The \"response port\" is used to receive unsigned (raw) datagrams, and is" -" the source port for all replies.\n" +"The \"query port\" is the advertised port, and is used to receive repliable (signed) datagrams, for the connect request only.\n" +"The \"response port\" is used to receive unsigned (raw) datagrams, and is the source port for all replies.\n" "The response port is arbitrary.\n" "A client sends and receives on a single port only.\n" "It receives only unsigned (raw) datagrams.\n" -"Raw datagrams provides increased efficiency for replies since they " -"contain tokens sent in the query, and need not be signed." +"Raw datagrams provides increased efficiency for replies since they contain tokens sent in the query, and need not be signed." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:309 msgid "" -"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and" -" the port is still present,\n" +"In the announce request, the 4-byte IP is replaced by a 32-byte hash, and the port is still present,\n" "although it may be ignored by the tracker.\n" -"In the announce response, each 4-byte IP and 2-byte port is replaced by a" -" 32-byte hash (compact peer info), and no port is present.\n" -"The client sends the announce request and scrape request to the source " -"port in the announce response packet.\n" -"The connect request, connect response, scrape request, scrape response, " -"and error response are the same as in BEP 15." +"In the announce response, each 4-byte IP and 2-byte port is replaced by a 32-byte hash (compact peer info), and no port is present.\n" +"The client sends the announce request and scrape request to the source port in the announce response packet.\n" +"The connect request, connect response, scrape request, scrape response, and error response are the same as in BEP 15." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:317 msgid "" -"Source addresses in I2P cannot be spoofed, so it is possible to use a " -"simplified protocol\n" +"Source addresses in I2P cannot be spoofed, so it is possible to use a simplified protocol\n" "with 2 packets instead of 4, omitting the connect request and response.\n" -"In this case, the announce request would be a repliable datagram sent to " -"the tracker's query port,\n" +"In this case, the announce request would be a repliable datagram sent to the tracker's query port,\n" "and the tracker would not require a response port.\n" -"While this is more efficient, it would be more difficult to modify an " -"existing tracker to support this mode.\n" -"The URL for the 4-packet-mode tracker would use standard \"udp://\" " -"prefix.\n" -"The URL for a modified 2-packet-mode tracker would require a different " -"prefix if both modes are supported in I2P." +"While this is more efficient, it would be more difficult to modify an existing tracker to support this mode.\n" +"The URL for the 4-packet-mode tracker would use standard \"udp://\" prefix.\n" +"The URL for a modified 2-packet-mode tracker would require a different prefix if both modes are supported in I2P." msgstr "" #: i2p2www/pages/site/docs/applications/bittorrent.html:330 @@ -4275,19 +3896,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:8 msgid "" -"This page is about bundling the entire I2P router binary with your " -"application.\n" -"It is not about writing an application to work with I2P (either bundled " -"or external)." +"This page is about bundling the entire I2P router binary with your application.\n" +"It is not about writing an application to work with I2P (either bundled or external)." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:13 msgid "" -"Lots of projects are bundling, or talking about bundling, I2P. That's " -"great if done right.\n" +"Lots of projects are bundling, or talking about bundling, I2P. That's great if done right.\n" "If done wrong, it could cause real harm to our network.\n" -"The I2P router is complex, and it can be a challenge to hide all the " -"complexity from your users.\n" +"The I2P router is complex, and it can be a challenge to hide all the complexity from your users.\n" "This page discusses some general guidelines." msgstr "" @@ -4297,10 +3914,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:24 msgid "" -"Start a dialog. We're here to help. Applications that embed I2P are the " -"most promising - and exciting -\n" -"opportunities for us to grow the network and improve anonymity for " -"everyone." +"Start a dialog. We're here to help. Applications that embed I2P are the most promising - and exciting -\n" +"opportunities for us to grow the network and improve anonymity for everyone." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:30 @@ -4309,11 +3924,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:31 msgid "" -"If your application is in Java or Scala, it's an easy choice - use the " -"Java router.\n" +"If your application is in Java or Scala, it's an easy choice - use the Java router.\n" "If in C/C++, we recommend i2pd. The development of i2pcpp has stopped.\n" -"For apps in other languages, best to use SAM or BOB or SOCKS and bundle " -"the Java router as a separate process.\n" +"For apps in other languages, best to use SAM or BOB or SOCKS and bundle the Java router as a separate process.\n" "Some of the following only applies to the Java router." msgstr "" @@ -4322,7 +3935,8 @@ msgid "Licensing" msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:40 -msgid "Ensure you meet the license requirements of the software you are bundling." +msgid "" +"Ensure you meet the license requirements of the software you are bundling." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:45 @@ -4331,29 +3945,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:46 msgid "" -"A correct default configuration is crucial. Most users will not change " -"the defaults.\n" -"The defaults for your application may need to be different than the " -"defaults for the router you are bundling.\n" +"A correct default configuration is crucial. Most users will not change the defaults.\n" +"The defaults for your application may need to be different than the defaults for the router you are bundling.\n" "Override the router defaults if necessary." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:51 msgid "" -"Some important defaults to review: Max bandwidth, tunnel quantity and " -"length, max participating tunnels.\n" -"A lot of this depends on the expected bandwidth and usage patterns of " -"your app." +"Some important defaults to review: Max bandwidth, tunnel quantity and length, max participating tunnels.\n" +"A lot of this depends on the expected bandwidth and usage patterns of your app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:55 msgid "" -"Configure enough bandwidth and tunnels to allow your users to contribute " -"to the network.\n" -"Consider disabling external I2CP, as you probably don't need it and it " -"would conflict with any other running I2P instance.\n" -"Also look at the configs for disabling killing of the JVM on exit, for " -"example." +"Configure enough bandwidth and tunnels to allow your users to contribute to the network.\n" +"Consider disabling external I2CP, as you probably don't need it and it would conflict with any other running I2P instance.\n" +"Also look at the configs for disabling killing of the JVM on exit, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:62 @@ -4363,32 +3970,25 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:63 msgid "" "It may be tempting for you to disable participating traffic.\n" -"There's several ways to do this (hidden mode, setting max tunnels to 0, " -"setting shared bandwidth below 12 KBytes/sec).\n" -"Without participating traffic, you don't have to worry about graceful " -"shutdown,\n" +"There's several ways to do this (hidden mode, setting max tunnels to 0, setting shared bandwidth below 12 KBytes/sec).\n" +"Without participating traffic, you don't have to worry about graceful shutdown,\n" "your users don't see bandwidth usage not generated by them, etc.\n" -"However, there's lots of reasons why you should allow participating " -"tunnels." +"However, there's lots of reasons why you should allow participating tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:70 msgid "" -"First of all, the router doesn't work that well if it doesn't have a " -"chance to \"integrate\" with the network,\n" +"First of all, the router doesn't work that well if it doesn't have a chance to \"integrate\" with the network,\n" "which is helped tremendously by others building tunnels through you." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:74 msgid "" -"Secondly, over 90% of the routers in the current network allow " -"participating traffic.\n" +"Secondly, over 90% of the routers in the current network allow participating traffic.\n" "It's the default in the Java router.\n" -"If your application doesn't route for others and it gets really popular, " -"then it's a leech on the network,\n" +"If your application doesn't route for others and it gets really popular, then it's a leech on the network,\n" "and it upsets the balance we have now.\n" -"If it gets really big, then we become Tor, and spend our time begging for" -" people to enable relaying." +"If it gets really big, then we become Tor, and spend our time begging for people to enable relaying." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:81 @@ -4399,10 +3999,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:84 msgid "" -"We strongly discourage you from disabling participating traffic by " -"default.\n" -"If you do this and your application gets hugely popular, it could break " -"the network." +"We strongly discourage you from disabling participating traffic by default.\n" +"If you do this and your application gets hugely popular, it could break the network." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:90 @@ -4411,12 +4009,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:91 msgid "" -"You must save the router's data (netdb, configuration, etc.) between runs" -" of the router.\n" -"I2P does not work well if you must reseed each startup, and that's a huge" -" load on our reseed servers, and not very good for anonymity either.\n" -"Even if you bundle router infos, I2P needs saved profile data for best " -"performance." +"You must save the router's data (netdb, configuration, etc.) between runs of the router.\n" +"I2P does not work well if you must reseed each startup, and that's a huge load on our reseed servers, and not very good for anonymity either.\n" +"Even if you bundle router infos, I2P needs saved profile data for best performance." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:99 @@ -4425,12 +4020,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:100 msgid "" -"Give your users a way to change the configuration of the important " -"settings.\n" -"We understand that you will probably want to hide most of I2P's " -"complexity, but it's important to show some basic settings.\n" -"In addition to the defaults above, some network settings such as UPnP, " -"IP/port may be helpful." +"Give your users a way to change the configuration of the important settings.\n" +"We understand that you will probably want to hide most of I2P's complexity, but it's important to show some basic settings.\n" +"In addition to the defaults above, some network settings such as UPnP, IP/port may be helpful." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:108 @@ -4439,12 +4031,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:109 msgid "" -"Above a certain bandwidth setting, and meeting other health criteria, " -"your router will become floodfill,\n" -"which may cause a large increase in connections and memory usage (at " -"least with the Java router).\n" -"Think about whether that's OK. You can disable floodfill, but then your " -"fastest users aren't contributing what they could.\n" +"Above a certain bandwidth setting, and meeting other health criteria, your router will become floodfill,\n" +"which may cause a large increase in connections and memory usage (at least with the Java router).\n" +"Think about whether that's OK. You can disable floodfill, but then your fastest users aren't contributing what they could.\n" "It also depends on the typical uptime for your application." msgstr "" @@ -4455,8 +4044,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:120 msgid "" "Decide if you are bundling router infos or using our reseed hosts.\n" -"The Java reseed host list is in the source code, so if you keep your " -"source up to date, the host list will be also.\n" +"The Java reseed host list is in the source code, so if you keep your source up to date, the host list will be also.\n" "Be aware of possible blocking by hostile governments." msgstr "" @@ -4466,12 +4054,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:130 msgid "" -"Consider setting your application tunnels to delay-open, reduce-on-idle " -"and/or close-on-idle.\n" -"This is straightforward if using i2ptunnel but you'll have to implement " -"some of it yourself if using I2CP directly.\n" -"See i2psnark for code that reduces tunnel count and then closes the " -"tunnel, even in the presence of some background DHT activity." +"Consider setting your application tunnels to delay-open, reduce-on-idle and/or close-on-idle.\n" +"This is straightforward if using i2ptunnel but you'll have to implement some of it yourself if using I2CP directly.\n" +"See i2psnark for code that reduces tunnel count and then closes the tunnel, even in the presence of some background DHT activity." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:138 @@ -4480,16 +4065,11 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:139 msgid "" -"Have an auto-update feature if at all possible, or at least auto-" -"notification of a new version.\n" -"Our biggest fear is a huge number of routers out there that can't be " -"updated.\n" -"We have about 6-8 releases a year of the Java router, and it's critical " -"to the health of the network that the users keep up.\n" -"We usually have over 80% of the network on the latest release within " -"6 weeks after the release, and we'd like to keep it that way.\n" -"You don't need to worry about disabling the router's built-in auto-update" -" function, as that code is in the router console,\n" +"Have an auto-update feature if at all possible, or at least auto-notification of a new version.\n" +"Our biggest fear is a huge number of routers out there that can't be updated.\n" +"We have about 6-8 releases a year of the Java router, and it's critical to the health of the network that the users keep up.\n" +"We usually have over 80% of the network on the latest release within 6 weeks after the release, and we'd like to keep it that way.\n" +"You don't need to worry about disabling the router's built-in auto-update function, as that code is in the router console,\n" "which you presumably are not bundling." msgstr "" @@ -4500,17 +4080,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:151 msgid "" "Have a gradual rollout plan. Don't overwhelm the network all at once.\n" -"We currently have approximately 25K unique users per day and 40K uniques " -"per month.\n" -"We are probably able to handle growth of 2-3X per year without too much " -"issue.\n" -"If you anticipate a faster rampup than that, OR the bandwidth " -"distribution (or uptime distribution,\n" -"or any other significant characteristic) of your userbase is " -"significantly different from our current userbase,\n" +"We currently have approximately 25K unique users per day and 40K uniques per month.\n" +"We are probably able to handle growth of 2-3X per year without too much issue.\n" +"If you anticipate a faster rampup than that, OR the bandwidth distribution (or uptime distribution,\n" +"or any other significant characteristic) of your userbase is significantly different from our current userbase,\n" "we really need to have a discussion.\n" -"The bigger your growth plans, the more important everthing else in this " -"checklist is." +"The bigger your growth plans, the more important everthing else in this checklist is." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:163 @@ -4520,10 +4095,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:164 msgid "" "Tell your users that I2P works best if it keeps running.\n" -"It may be several minutes after startup before it works well, and even " -"more after first install.\n" -"If your average uptime is less than an hour, I2P is probably the wrong " -"solution." +"It may be several minutes after startup before it works well, and even more after first install.\n" +"If your average uptime is less than an hour, I2P is probably the wrong solution." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:172 @@ -4532,8 +4105,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:173 msgid "" -"Provide some indication to the user that the application tunnels are " -"ready. Encourage patience." +"Provide some indication to the user that the application tunnels are ready. " +"Encourage patience." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:178 @@ -4543,8 +4116,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:179 msgid "" "If possible, delay the shutdown until your participating tunnels expire.\n" -"Don't let your users break tunnels easily, or at least ask them to " -"confirm." +"Don't let your users break tunnels easily, or at least ask them to confirm." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:185 @@ -4553,8 +4125,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:186 msgid "" -"It would be nice if you give your users links to learn more about I2P and" -" to donate." +"It would be nice if you give your users links to learn more about I2P and to" +" donate." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:192 @@ -4564,8 +4136,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:193 msgid "" "Depending on your user base and application,\n" -"it may be helpful to provide an option or a separate package to use an " -"external router." +"it may be helpful to provide an option or a separate package to use an external router." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:200 @@ -4574,8 +4145,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:201 msgid "" -"If you plan to use or link to other common I2P services (news feeds, " -"hosts.txt subscriptions, trackers, outproxies, etc.),\n" +"If you plan to use or link to other common I2P services (news feeds, hosts.txt subscriptions, trackers, outproxies, etc.),\n" "make sure you aren't overloading them,\n" "and talk to the people who are running them to make sure it's ok." msgstr "" @@ -4587,10 +4157,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:210 msgid "" "I2P includes an SNTP client. I2P requires correct time to operate.\n" -"It will compensate for a skewed system clock but this may delay startup. " -"You may disable I2P's SNTP queries,\n" -"but this isn't advised unless your application makes sure the system " -"clock is correct." +"It will compensate for a skewed system clock but this may delay startup. You may disable I2P's SNTP queries,\n" +"but this isn't advised unless your application makes sure the system clock is correct." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:218 @@ -4599,41 +4167,30 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:219 msgid "" -"At a minimum you will need i2p.jar, router.jar, streaming.jar, and " -"mstreaming.jar.\n" +"At a minimum you will need i2p.jar, router.jar, streaming.jar, and mstreaming.jar.\n" "You may omit the two streaming jars for a datagram-only app.\n" "Some apps may need more, e.g. i2ptunnel.jar or addressbook.jar.\n" -"Don't forget jbigi.jar, or a subset of it for the platforms you support, " -"to make the crypto much faster.\n" +"Don't forget jbigi.jar, or a subset of it for the platforms you support, to make the crypto much faster.\n" "Java 7 or higher is required to build.\n" -"If you're building Debian / Ubuntu packages, you should require the I2P " -"package from our PPA instead of bundling it.\n" -"You almost certainly do not need susimail, susidns, the router console, " -"and i2psnark, for example." +"If you're building Debian / Ubuntu packages, you should require the I2P package from our PPA instead of bundling it.\n" +"You almost certainly do not need susimail, susidns, the router console, and i2psnark, for example." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:228 msgid "" -"The following files should be included in the I2P installation directory," -" specified with the \"i2p.dir.base\" property.\n" -"Don't forget the certificates/ directory, which is required for " -"reseeding, and blocklist.txt for IP validation.\n" -"The geoip directory is optional, but recommended so the router can make " -"decisions based on location.\n" -"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that" -" directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz)." -"\n" -"The hosts.txt file may be necessary, you may modify it to include any " -"hosts your application uses.\n" -"You may add a router.config file to the base directory to override " -"initial defaults.\n" +"The following files should be included in the I2P installation directory, specified with the \"i2p.dir.base\" property.\n" +"Don't forget the certificates/ directory, which is required for reseeding, and blocklist.txt for IP validation.\n" +"The geoip directory is optional, but recommended so the router can make decisions based on location.\n" +"If including geoip, be sure to put the file GeoLite2-Country.mmdb in that directory (gunzip it from installer/resources/GeoLite2-Country.mmdb.gz).\n" +"The hosts.txt file may be necessary, you may modify it to include any hosts your application uses.\n" +"You may add a router.config file to the base directory to override initial defaults.\n" "Review and edit or remove the clients.config and i2ptunnel.config files." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:237 msgid "" -"License requirements may require you to include the LICENSES.txt file and" -" the licenses directory." +"License requirements may require you to include the LICENSES.txt file and " +"the licenses directory." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:243 @@ -4651,17 +4208,14 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:255 msgid "" "Our Android router app may be shared by multiple clients.\n" -"If it is not installed, the user will be prompted when he starts a client" -" app." +"If it is not installed, the user will be prompted when he starts a client app." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:259 msgid "" -"Some developers have expressed concern that this is a poor user " -"experience,\n" +"Some developers have expressed concern that this is a poor user experience,\n" "and they wish to embed the router in their app.\n" -"We do have an Android router service library on our roadmap, which could " -"make embedding easier.\n" +"We do have an Android router service library on our roadmap, which could make embedding easier.\n" "More information needed." msgstr "" @@ -4676,11 +4230,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:272 msgid "" -"We have a limited number of our jars on <a " -"href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven" -" Central</a>.\n" -"There are numerous trac tickets for us to address that will improve and " -"expand the released jars on Maven Central." +"We have a limited number of our jars on <a href=\"http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22net.i2p%22\">Maven Central</a>.\n" +"There are numerous trac tickets for us to address that will improve and expand the released jars on Maven Central." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:282 @@ -4690,17 +4241,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:283 msgid "" "If your application is using I2P datagrams, e.g. for a DHT,\n" -"there's lots of advanced options available to reduce overhead and " -"increase reliability.\n" +"there's lots of advanced options available to reduce overhead and increase reliability.\n" "This may take some time and experimentation to get working well.\n" "Be aware of size/reliability tradeoffs. Talk to us for help.\n" -"It is possible - and recommended - to use Datagrams and Streaming on the " -"same Destination.\n" +"It is possible - and recommended - to use Datagrams and Streaming on the same Destination.\n" "Don't create separate Destinations for this.\n" -"Don't try to store your unrelated data in the existing network DHTs " -"(iMule, bote, bittorrent, and router).\n" -"Build your own. If you are hardcoding seed nodes, we recommend that you " -"have several." +"Don't try to store your unrelated data in the existing network DHTs (iMule, bote, bittorrent, and router).\n" +"Build your own. If you are hardcoding seed nodes, we recommend that you have several." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:296 @@ -4710,8 +4257,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:297 msgid "" "Let's work together. Don't wait until it's done.\n" -"Give us your Twitter handle and start tweeting about it, we will return " -"the favor." +"Give us your Twitter handle and start tweeting about it, we will return the favor." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:303 @@ -4730,8 +4276,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:311 msgid "" -"This may be obvious, but join the community. Run I2P 24/7. Start an I2P " -"Site about your project.\n" +"This may be obvious, but join the community. Run I2P 24/7. Start an I2P Site about your project.\n" "Hang out in IRC #i2p-dev. Post on the forums. Spread the word.\n" "We can help get you users, testers, translators, or even coders." msgstr "" @@ -4742,12 +4287,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:320 msgid "" -"You may wish to install and play with the I2P Android app, and look at " -"its code, for an example of an application that bundles the router.\n" +"You may wish to install and play with the I2P Android app, and look at its code, for an example of an application that bundles the router.\n" "See what we expose to the user and what we hide.\n" "Look at the state machine we use to start and stop the router.\n" -"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak," -" and Monero." +"Other examples are: Vuze, the Nightweb Android app, iMule, TAILS, iCloak, and Monero." msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:328 @@ -4762,10 +4305,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/embedding.html:359 msgid "" -"This code is for the case where your application starts the router, as in" -" our Android app.\n" -"You could also have the router start the application via the " -"clients.config and i2ptunnel.config files,\n" +"This code is for the case where your application starts the router, as in our Android app.\n" +"You could also have the router start the application via the clients.config and i2ptunnel.config files,\n" "together with Jetty webapps,\n" "as is done in our Java packages.\n" "As always, state management is the difficult part." @@ -4783,13 +4324,12 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:7 msgid "" -"Cloning large software repositories over I2P can be difficult, and using " -"git can sometimes make this harder. Fortunately, it can also sometimes " -"make it easier. Git has a <code>git bundle</code> command which can be " -"used to turn a git repository into a file which git can then clone, " -"fetch, or import from a location on your local disk. By combining this " -"capability with bittorrent downloads, we can solve our remaining problems" -" with <code>git clone</code>." +"Cloning large software repositories over I2P can be difficult, and using git" +" can sometimes make this harder. Fortunately, it can also sometimes make it " +"easier. Git has a <code>git bundle</code> command which can be used to turn " +"a git repository into a file which git can then clone, fetch, or import from" +" a location on your local disk. By combining this capability with bittorrent" +" downloads, we can solve our remaining problems with <code>git clone</code>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:8 @@ -4798,13 +4338,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:9 msgid "" -"If you intend to generate a git bundle, you <strong>must</strong> already" -" possess a full copy of the <strong>git</strong> repository, not the mtn " -"repository. You can get it from github or from git.idk.i2p, but a shallow" -" clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will" -" fail silently, creating what looks like a bundle, but when you try to " -"clone it it will fail. If you are just retrieving a pre-generated git " -"bundle, then this section does not apply to you." +"If you intend to generate a git bundle, you <strong>must</strong> already " +"possess a full copy of the <strong>git</strong> repository, not the mtn " +"repository. You can get it from github or from git.idk.i2p, but a shallow " +"clone(a clone done to –depth=1) <em>will not</em> <em>work</em>. It will " +"fail silently, creating what looks like a bundle, but when you try to clone " +"it it will fail. If you are just retrieving a pre-generated git bundle, then" +" this section does not apply to you." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:10 @@ -4814,23 +4354,22 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:11 msgid "" "Someone will need to supply you with a torrent file or a magnet link " -"corresponding to an existing <code>git bundle</code> that they have " -"already generated for you. A recent, correctly-generated bundle of the " -"mainline i2p.i2p source code as-of Wednesday, March 18, 2020, can be " -"found inside of I2P at my pastebin <a " +"corresponding to an existing <code>git bundle</code> that they have already " +"generated for you. A recent, correctly-generated bundle of the mainline " +"i2p.i2p source code as-of Wednesday, March 18, 2020, can be found inside of " +"I2P at my pastebin <a " "href=\"http://paste.idk.i2p/f/4h137i\">paste.idk.i2p/f/4hq37i</a>." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:12 msgid "" "Once you have a bundle, you will need to use git to create a working " -"repository from it. If you’re using GNU/Linux and i2psnark, the git " -"bundle should be located in $HOME/.i2p/i2psnark or, as a service on " -"Debian, /var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on " -"GNU/Linux, it is probably at “$HOME/BiglyBT Downloads/†instead. The " -"examples here assume I2PSnark on GNU/Linux, if you use something else, " -"replace the path to the bundle with the download directory preferred by " -"your client and platform." +"repository from it. If you’re using GNU/Linux and i2psnark, the git bundle " +"should be located in $HOME/.i2p/i2psnark or, as a service on Debian, " +"/var/lib/i2p/i2p-config/i2psnark. If you are using BiglyBT on GNU/Linux, it " +"is probably at “$HOME/BiglyBT Downloads/†instead. The examples here assume " +"I2PSnark on GNU/Linux, if you use something else, replace the path to the " +"bundle with the download directory preferred by your client and platform." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:13 @@ -4843,8 +4382,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:16 msgid "" -"If you get the following error, try using git init and git fetch manually" -" instead." +"If you get the following error, try using git init and git fetch manually " +"instead." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:18 @@ -4879,10 +4418,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:29 msgid "" -"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you " -"have a successfully <code>--unshallow</code>ed clone of clone of the " -"i2p.i2p repository. If you already have a clone, make sure you run " -"<code>git fetch --unshallow</code> before you generate a torrent bundle." +"First, follow the <a href=\"GIT.md\">Git guide for Users</a> until you have " +"a successfully <code>--unshallow</code>ed clone of clone of the i2p.i2p " +"repository. If you already have a clone, make sure you run <code>git fetch " +"--unshallow</code> before you generate a torrent bundle." msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:30 @@ -4891,8 +4430,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:32 msgid "" -"and copy the resulting bundle into your I2PSnark downloads directory. For" -" instance:" +"and copy the resulting bundle into your I2PSnark downloads directory. For " +"instance:" msgstr "" #: i2p2www/pages/site/docs/applications/git-bundle.html:34 @@ -4903,14 +4442,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:7 msgid "" -"Tutorial for setting up git access through an I2P Tunnel. This tunnel " -"will act as your access point to a single git service on I2P." +"Tutorial for setting up git access through an I2P Tunnel. This tunnel will " +"act as your access point to a single git service on I2P." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:8 msgid "" -"If you intend to use the service at i2pgit.org/git.idk.i2p, then you " -"probably already have a tunnel configured and much of this\n" +"If you intend to use the service at i2pgit.org/git.idk.i2p, then you probably already have a tunnel configured and much of this\n" "tutorial will not apply to you." msgstr "" @@ -4921,22 +4459,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:11 msgid "" "To create your repositories on a remote git service, sign up for a user " -"account at that service. Of course it’s also possible to create " -"repositories locally and push them to a remote git service, but most will" -" require an account and for you to create a space for the repository on " -"the server. Gitlab has a very simple sign-up form:" +"account at that service. Of course it’s also possible to create repositories" +" locally and push them to a remote git service, but most will require an " +"account and for you to create a space for the repository on the server. " +"Gitlab has a very simple sign-up form:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:12 msgid "" -"These are generic instructions for any in-i2p Git instance with HTTP and " -"SSH gateways.\n" -"If you intend to contribute to I2P, you should create an account at the " -"I2P gitlab, which is open to the\n" -"community. Account registration may take a few days to complete, as the " -"admin needs to sort through a large\n" -"number of spam registrations. You can help this by getting in touch with " -"the admin to confirm you are human\n" +"These are generic instructions for any in-i2p Git instance with HTTP and SSH gateways.\n" +"If you intend to contribute to I2P, you should create an account at the I2P gitlab, which is open to the\n" +"community. Account registration may take a few days to complete, as the admin needs to sort through a large\n" +"number of spam registrations. You can help this by getting in touch with the admin to confirm you are human\n" "using the instructions on the home page." msgstr "" @@ -4950,10 +4484,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:27 msgid "" -"To make sure the setup process works, it helps to make a repository to " -"test with from the server, and for the sake of this tutorial, we’re going" -" to use a fork of the I2P router. First, browse to the i2p-" -"hackers/i2p.i2p repository:" +"To make sure the setup process works, it helps to make a repository to test " +"with from the server, and for the sake of this tutorial, we’re going to use " +"a fork of the I2P router. First, browse to the i2p-hackers/i2p.i2p " +"repository:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:34 @@ -4962,20 +4496,20 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:42 msgid "" -"To have read-write access to my server, you’ll need to set up a tunnel " -"for your SSH client. As an example, we’re going to use the HTTP tunnel " -"instead, but if all you need is read-only, HTTP/S cloning, then you can " -"skip all this and just use the http_proxy environment variable to " -"configure git to use the pre-configured I2P HTTP Proxy. For example:" +"To have read-write access to my server, you’ll need to set up a tunnel for " +"your SSH client. As an example, we’re going to use the HTTP tunnel instead, " +"but if all you need is read-only, HTTP/S cloning, then you can skip all this" +" and just use the http_proxy environment variable to configure git to use " +"the pre-configured I2P HTTP Proxy. For example:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:50 msgid "" -"Then, add the address you will be pushing and pulling from. Note that " -"this example address is for Read-Only HTTP-over-I2P clones, if your admin" -" does not allow the git HTTP(Smart HTTP) protocol, then you will need to " -"get the SSH clone base32 from them. If you have an SSH clone base32, " -"substitute it for the base32 in this step, which will fail." +"Then, add the address you will be pushing and pulling from. Note that this " +"example address is for Read-Only HTTP-over-I2P clones, if your admin does " +"not allow the git HTTP(Smart HTTP) protocol, then you will need to get the " +"SSH clone base32 from them. If you have an SSH clone base32, substitute it " +"for the base32 in this step, which will fail." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:54 @@ -5003,8 +4537,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:68 msgid "" "Git Privacy: Committing to git adds a timestamp to git commit messages, " -"which may be configured to reflect your local time zone. To enforce the " -"use of UTC for all commits, you are advised to use a git alias, such as:" +"which may be configured to reflect your local time zone. To enforce the use " +"of UTC for all commits, you are advised to use a git alias, such as:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:70 @@ -5022,33 +4556,33 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:78 msgid "" "You might get an error where the remote end hangs up unexpectedly. " -"Unfortunately git still doesn’t support resumable cloning. Until it does," -" there are a couple fairly easy ways to handle this. The first and " -"easiest is to try and clone to a shallow depth:" +"Unfortunately git still doesn’t support resumable cloning. Until it does, " +"there are a couple fairly easy ways to handle this. The first and easiest is" +" to try and clone to a shallow depth:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:81 msgid "" -"Once you’ve performed a shallow clone, you can fetch the rest resumably " -"by changing to the repo directory and running:" +"Once you’ve performed a shallow clone, you can fetch the rest resumably by " +"changing to the repo directory and running:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:83 msgid "" -"At this point, you still don’t have all your branches yet. You can get " -"them by running the following commands:" +"At this point, you still don’t have all your branches yet. You can get them " +"by running the following commands:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:86 msgid "" -"Which tells git to alter the repository configuration so that fetching " -"from origin fetches all branches." +"Which tells git to alter the repository configuration so that fetching from " +"origin fetches all branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:87 msgid "" -"If that doesn’t work, you can try opening the tunnel configuration menu " -"and adding some backup tunnels." +"If that doesn’t work, you can try opening the tunnel configuration menu and " +"adding some backup tunnels." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:91 @@ -5066,26 +4600,26 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:96 msgid "" -"Revision control can make your life easier, but it works best if you use " -"it well! In light of this, we strongly suggest a fork-first, feature-" -"branch workflow as many are familiar with from Github. In such a " -"workflow, the master branch is used as a sort of “Trunk†for updates and " -"is never touched by the programmmer, instead, all changes to the master " -"are merged from branches. In order to do set up your workspace for this, " -"take the following steps:" +"Revision control can make your life easier, but it works best if you use it " +"well! In light of this, we strongly suggest a fork-first, feature-branch " +"workflow as many are familiar with from Github. In such a workflow, the " +"master branch is used as a sort of “Trunk†for updates and is never touched " +"by the programmmer, instead, all changes to the master are merged from " +"branches. In order to do set up your workspace for this, take the following " +"steps:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:98 msgid "" -"<strong>Never make changes to the Master Branch</strong>. You will be " -"using the master branch to periodially obtain updates to the official " -"source code. All changes should be made in feature branches." +"<strong>Never make changes to the Master Branch</strong>. You will be using " +"the master branch to periodially obtain updates to the official source code." +" All changes should be made in feature branches." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:101 msgid "" -"Set up a second remote in your local repository using the upstream source" -" code." +"Set up a second remote in your local repository using the upstream source " +"code." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:103 @@ -5094,33 +4628,31 @@ msgstr "" #: i2p2www/pages/site/docs/applications/git.html:105 msgid "" -"Before making any changes to the source code, check out a new feature " -"branch to develop on:" +"Before making any changes to the source code, check out a new feature branch" +" to develop on:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:107 msgid "" -"When you’re done with your changes, commit them and push them to your " -"branch" +"When you’re done with your changes, commit them and push them to your branch" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:110 msgid "" -"Submit a merge request. When the merge request is approved and brought " -"into the upstream master, check out the master locally and pull in the " -"changes:" +"Submit a merge request. When the merge request is approved and brought into " +"the upstream master, check out the master locally and pull in the changes:" msgstr "" #: i2p2www/pages/site/docs/applications/git.html:113 msgid "" -"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, " -"you can update your master code using this procedure as well." +"Whenever a change to the upstream master(i2p-hackers/i2p.i2p) is made, you " +"can update your master code using this procedure as well." msgstr "" #: i2p2www/pages/site/docs/applications/git.html:117 msgid "" -"The git utccommit alias solution to git timestamp issue was arrived at " -"from the information first published here" +"The git utccommit alias solution to git timestamp issue was arrived at from " +"the information first published here" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:6 @@ -5129,22 +4661,21 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:7 msgid "" -"Mirror I2P Git repositories and Bridge Non-private internet.repositories " -"for others." +"Mirror I2P Git repositories and Bridge Non-private internet.repositories for" +" others." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:10 msgid "" -"This is the setup process I use for configuring Gitlab and I2P, with " -"Docker in place to manage the service itself. Gitlab is very easy to host" -" on I2P in this fashion, it can be administered by one person without " -"much difficulty. In my configuration, I use a Debian VM to host docker " -"containers and an I2P router, on a Debian Host system, however, this may " -"be more than necessary for some people. These instructions should work on" -" any Debian-based system, regardless of whether it is in a VM or not, and" -" should easily translate to any system where Docker and an I2P router are" -" available. This guide starts at Docker and does not assume any VM " -"underneath." +"This is the setup process I use for configuring Gitlab and I2P, with Docker " +"in place to manage the service itself. Gitlab is very easy to host on I2P in" +" this fashion, it can be administered by one person without much difficulty." +" In my configuration, I use a Debian VM to host docker containers and an I2P" +" router, on a Debian Host system, however, this may be more than necessary " +"for some people. These instructions should work on any Debian-based system, " +"regardless of whether it is in a VM or not, and should easily translate to " +"any system where Docker and an I2P router are available. This guide starts " +"at Docker and does not assume any VM underneath." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:11 @@ -5153,15 +4684,15 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:12 msgid "" -"Because Gitlab runs in a container, we only need to install the " -"dependencies required for the container on our main system. Conveniently," -" you can install everything you need with:" +"Because Gitlab runs in a container, we only need to install the dependencies" +" required for the container on our main system. Conveniently, you can " +"install everything you need with:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:14 msgid "" -"on an otherwise unmodified Debian system, or if you have added Docker’s " -"own “Community†Debian repository, you may use:" +"on an otherwise unmodified Debian system, or if you have added Docker’s own " +"“Community†Debian repository, you may use:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:16 @@ -5174,62 +4705,61 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:18 msgid "" -"Once you have docker installed, you can fetch the docker containers " -"required for gitlab. <em>Don’t run them yet.</em>" +"Once you have docker installed, you can fetch the docker containers required" +" for gitlab. <em>Don’t run them yet.</em>" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:20 msgid "" -"For those who are concerned, the gitlab-ce Docker image is built using " -"only Ubuntu Docker images as a parent, which are built from scratch " -"images. Since there are no third-party images involved here, updates " -"should come as soon as they are available in the host images. To review " -"the Dockerfile for yourself, visit the <a href=\"https://gitlab.com" -"/gitlab-org/omnibus-gitlab/-/blob/master/docker/Dockerfile\">Gitlab " -"source code</a>." +"For those who are concerned, the gitlab-ce Docker image is built using only " +"Ubuntu Docker images as a parent, which are built from scratch images. Since" +" there are no third-party images involved here, updates should come as soon " +"as they are available in the host images. To review the Dockerfile for " +"yourself, visit the <a href=\"https://gitlab.com/gitlab-org/omnibus-" +"gitlab/-/blob/master/docker/Dockerfile\">Gitlab source code</a>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:21 msgid "" -"Set up an I2P HTTP Proxy for Gitlab to use(Important information, " -"optional steps)" +"Set up an I2P HTTP Proxy for Gitlab to use(Important information, optional " +"steps)" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:22 msgid "" "Gitlab servers inside of I2P can be run with or without the ability to " -"interact with servers on the internet outside of I2P. In the case where " -"the Gitlab server is <em>not allowed</em> to interact with servers " -"outside of I2P, they cannot be de-anonymized by cloning a git repository " -"from a git server on the internet outside of I2P. They can, however, " -"export and mirror repositories from other git services inside of I2P." +"interact with servers on the internet outside of I2P. In the case where the " +"Gitlab server is <em>not allowed</em> to interact with servers outside of " +"I2P, they cannot be de-anonymized by cloning a git repository from a git " +"server on the internet outside of I2P. They can, however, export and mirror " +"repositories from other git services inside of I2P." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:23 msgid "" "In the case where the Gitlab server is <em>allowed</em> to interact with " -"servers outside of I2P, it can act as a “Bridge†for the users, who can " -"use it to mirror content outside I2P to an I2P-accessible source, however" -" it <em>is not anonymous</em> in this case. Git services on the non-" -"anonymous internet will be connected to directly." +"servers outside of I2P, it can act as a “Bridge†for the users, who can use " +"it to mirror content outside I2P to an I2P-accessible source, however it " +"<em>is not anonymous</em> in this case. Git services on the non-anonymous " +"internet will be connected to directly." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:24 msgid "" -"<strong>If you want to have a bridged, non-anonymous Gitlab instance with" -" access to</strong> <strong>web repositories,</strong> no further " +"<strong>If you want to have a bridged, non-anonymous Gitlab instance with " +"access to</strong> <strong>web repositories,</strong> no further " "modification is necessary." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:25 msgid "" -"<strong>If you want to have an I2P-Only Gitlab instance with no access to" -" Web-Only</strong> <strong>Repositories</strong>, you will need to " -"configure Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP " -"proxy only listens on <code>127.0.0.1</code>, you will need to set up a " -"new one for Docker that listens on the Host/Gateway address of the Docker" -" network, which is usually <code>172.17.0.1</code>. I configure mine on " -"port <code>4446</code>." +"<strong>If you want to have an I2P-Only Gitlab instance with no access to " +"Web-Only</strong> <strong>Repositories</strong>, you will need to configure " +"Gitlab to use an I2P HTTP Proxy. Since the default I2P HTTP proxy only " +"listens on <code>127.0.0.1</code>, you will need to set up a new one for " +"Docker that listens on the Host/Gateway address of the Docker network, which" +" is usually <code>172.17.0.1</code>. I configure mine on port " +"<code>4446</code>." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:26 @@ -5245,8 +4775,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:37 msgid "" "Visit your Local Gitlab instance and set up your admin account. Choose a " -"strong password, and configure user account limits to match your " -"resources." +"strong password, and configure user account limits to match your resources." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:38 @@ -5257,21 +4786,19 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:39 msgid "" -"It’s also possible to apply your HTTP Proxy settings in a more granular " -"way, so that you can only allow users to mirror repositories from the " -"domains that you choose. Since the domain is presumably operated by an " -"organization, you can use this to ensure that repositories that are " -"mirrorable follow a reasonable set of policies. After all, there is far " -"more abusive content on the non-anonymous internet than there is on I2P, " -"we wouldn’t want to make it too easy to introduce abusive content from " -"such a nefarious place." +"It’s also possible to apply your HTTP Proxy settings in a more granular way," +" so that you can only allow users to mirror repositories from the domains " +"that you choose. Since the domain is presumably operated by an organization," +" you can use this to ensure that repositories that are mirrorable follow a " +"reasonable set of policies. After all, there is far more abusive content on " +"the non-anonymous internet than there is on I2P, we wouldn’t want to make it" +" too easy to introduce abusive content from such a nefarious place." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:40 msgid "" -"Add the following lines to your gitlab.rb file inside the " -"/src/gitlab/config container. These settings will take effect when you " -"restart in a moment." +"Add the following lines to your gitlab.rb file inside the /src/gitlab/config" +" container. These settings will take effect when you restart in a moment." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:56 @@ -5280,10 +4807,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:57 msgid "" -"Once you have Gitlab set up locally, go to the I2P Router console. You " -"will need to set up two server tunnels, one leading to the Gitlab " -"web(HTTP) interface on TCP port 8080, and one to the Gitlab SSH interface" -" on TCP Port 8022." +"Once you have Gitlab set up locally, go to the I2P Router console. You will " +"need to set up two server tunnels, one leading to the Gitlab web(HTTP) " +"interface on TCP port 8080, and one to the Gitlab SSH interface on TCP Port " +"8022." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:58 @@ -5294,8 +4821,7 @@ msgstr "" msgid "" "For the Web interface, use an “HTTP†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:61 @@ -5313,8 +4839,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:64 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8080</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:65 @@ -5333,19 +4859,18 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:69 msgid "" -"Web services on I2P can register hostnames for themselves by providing an" -" authentication string to a jump service provider like <a " +"Web services on I2P can register hostnames for themselves by providing an " +"authentication string to a jump service provider like <a " "href=\"http://stats.i2p\">stats.i2p</a>. To do this, open the <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" again and click on the “Gitlab Web Service†item you just set up. Scroll" -" to the bottom of the “Edit Server Settings†section and click " -"Registration Authentication. Copy the field that says “Authentication for" -" adding Hostname†and visit <a " +" again and click on the “Gitlab Web Service†item you just set up. Scroll to" +" the bottom of the “Edit Server Settings†section and click Registration " +"Authentication. Copy the field that says “Authentication for adding " +"Hostname†and visit <a " "href=\"http://stats.i2p/i2p/addkey.html\">stats.i2p</a> to add your " -"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then" -" you will have to use the correct authentication string for your " -"subdomain, which is a little bit more complicated and merits it’s own " -"instructions." +"hostname. Note that if you want to use a subdomain(Like git.idk.i2p) then " +"you will have to use the correct authentication string for your subdomain, " +"which is a little bit more complicated and merits it’s own instructions." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:70 @@ -5356,8 +4881,7 @@ msgstr "" msgid "" "For the SSH interface, use a “Standard†server tunnel. From <a " "href=\"http://127.0.0.1:7657/i2ptunnelmgr\">http://127.0.0.1:7657/i2ptunnelmgr</a>" -" launch the “New Tunnel Wizard†and enter the following values at each " -"step:" +" launch the “New Tunnel Wizard†and enter the following values at each step:" msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:74 @@ -5370,8 +4894,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:76 msgid "" -"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the" -" port." +"Fill in <code>127.0.0.1</code> for the host and <code>8022</code> for the " +"port." msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:80 @@ -5380,9 +4904,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/gitlab.html:81 msgid "" -"Finally, if you either modified <code>gitlab.rb</code> or you registered " -"a hostname, you will need to re-start the gitlab service for the settings" -" to take effect." +"Finally, if you either modified <code>gitlab.rb</code> or you registered a " +"hostname, you will need to re-start the gitlab service for the settings to " +"take effect." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:2 @@ -5400,20 +4924,16 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:15 msgid "" " There are many IRC clients that can be used with I2P. In\n" -"fact, all IRC clients can be connected to the Irc2P Service by connecting" -"\n" +"fact, all IRC clients can be connected to the Irc2P Service by connecting\n" "them to the IRC Tunnel." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:28 msgid "" "To configure any IRC client to chat on Irc2P, first, make sure that\n" -"your IRC tunnel is available. Visit the <a " -"href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" -"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" " -"indicator on\n" -"the right-hand side is yellow or green, your Irc2P tunnel is ready and " -"you should \n" +"your IRC tunnel is available. Visit the <a href=\"http://127.0.0.1:7657/i2ptunnel/\">Hidden Services Manager</a>\n" +"and look for Irc2P in your \"Client Tunnels\" section. If the \"Status\" indicator on\n" +"the right-hand side is yellow or green, your Irc2P tunnel is ready and you should \n" "proceed to the next step." msgstr "" @@ -5430,12 +4950,9 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:42 msgid "" "Pidgin is a very popular Instant Messaging client with built-in IRC\n" -"support. It is also possible to use it with many other kinds of chat " -"service, and\n" -"it supports using multiple accounts at once and has a variety of plugin-" -"ins. There\n" -"is a similar application for OSX called \"Adium.\" The instructions for " -"Pidgin are\n" +"support. It is also possible to use it with many other kinds of chat service, and\n" +"it supports using multiple accounts at once and has a variety of plugin-ins. There\n" +"is a similar application for OSX called \"Adium.\" The instructions for Pidgin are\n" "similar in Adium.\n" msgstr "" @@ -5451,8 +4968,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:52 msgid "" "After launching Pidgin, you should see a \"Buddy List\" window. From\n" -"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage" -" Accounts\" to\n" +"that window, open the \"Accounts\" menu from the toolbar. Select \"Manage Accounts\" to\n" "begin configuring your I2P account." msgstr "" @@ -5467,10 +4983,8 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:59 msgid "" "Click the \"Add\" button. In the window that opens, select \"IRC\" under\n" -"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and" -" password. IRC\n" -"does not require you to register a nickname to join, but you may if you " -"wish, after\n" +"\"Protocol,\" and set the \"Host\" to 127.0.0.1. Then pick a username and password. IRC\n" +"does not require you to register a nickname to join, but you may if you wish, after\n" "you connect to Irc2P." msgstr "" @@ -5485,8 +4999,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:67 msgid "" "Navigate to the \"Advanced\" tab and set the \"Port\" field to 6668 and\n" -"make sure that SSL is <em>disabled</em>, since your tunnel has encryption" -" provided\n" +"make sure that SSL is <em>disabled</em>, since your tunnel has encryption provided\n" "by I2P." msgstr "" @@ -5530,8 +5043,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:87 msgid "" "Change the value in \"Servers\" from the default to `localhost/6669`,\n" -"and configure the default channels you want to join. I suggest #i2p and " -"#i2p-dev\n" +"and configure the default channels you want to join. I suggest #i2p and #i2p-dev\n" msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:92 @@ -5631,8 +5143,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:143 msgid "" "Revolution IRC is an easy to use IRC client for Android. It's able to\n" -"handle multiple accounts on multiple services, so you can use it for " -"Irc2P and for\n" +"handle multiple accounts on multiple services, so you can use it for Irc2P and for\n" "your non-I2P IRC networks as well." msgstr "" @@ -5693,15 +5204,13 @@ msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:196 msgid "" "Eris is an easy-to-configure IRC server with self-configuring support\n" -"for I2P. If you want to run a private IRC server it's one of the easiest " -"ways." +"for I2P. If you want to run a private IRC server it's one of the easiest ways." msgstr "" #: i2p2www/pages/site/docs/applications/irc.html:199 msgid "" " This is a valid configuration of the Eris IRC server, but it uses a\n" -"default password for the admin account(admin). You should change the " -"operator.admin.password\n" +"default password for the admin account(admin). You should change the operator.admin.password\n" "and account.admin.password before deploying to a real service." msgstr "" @@ -5726,24 +5235,18 @@ msgstr "" msgid "" "As of release 0.9.4, the router supports managed clients.\n" "Managed clients are instantiated and started by the ClientAppManager.\n" -"The ClientAppManager maintains a reference to the client and receives " -"updates on the client's state.\n" -"Managed clients are preferred, as it is much easier to implement state " -"tracking\n" -"and to start and stop a client. It also is much easier to avoid static " -"references in the client code\n" +"The ClientAppManager maintains a reference to the client and receives updates on the client's state.\n" +"Managed clients are preferred, as it is much easier to implement state tracking\n" +"and to start and stop a client. It also is much easier to avoid static references in the client code\n" "which could lead to excessive memory usage after a client is stopped.\n" -"Managed clients may be started and stopped by the user in the router " -"console,\n" +"Managed clients may be started and stopped by the user in the router console,\n" "and are stopped at router shutdown." msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:31 msgid "" -"Managed clients implement either the net.i2p.app.ClientApp or " -"net.i2p.router.app.RouterApp interface.\n" -"Clients implementing the ClientApp interface must provide the following " -"constructor:" +"Managed clients implement either the net.i2p.app.ClientApp or net.i2p.router.app.RouterApp interface.\n" +"Clients implementing the ClientApp interface must provide the following constructor:" msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:38 @@ -5762,12 +5265,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:49 msgid "" -"If the main class specified in the clients.config file does not implement" -" a managed interface,\n" +"If the main class specified in the clients.config file does not implement a managed interface,\n" "it will be started with main() with the arguments specified,\n" "and stopped with main() with the arguments specified.\n" -"The router does not maintain a reference, since all interactions are via " -"the static main() method.\n" +"The router does not maintain a reference, since all interactions are via the static main() method.\n" "The console cannot provide accurate state information to the user." msgstr "" @@ -5777,8 +5278,7 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:58 msgid "" -"Clients, whether managed or unmanaged, may register with the " -"ClientAppManager\n" +"Clients, whether managed or unmanaged, may register with the ClientAppManager\n" "so that other clients may retrieve a reference to them.\n" "Registration is by name.\n" "Known registered clients are:" @@ -5790,12 +5290,10 @@ msgstr "" #: i2p2www/pages/site/docs/applications/managed-clients.html:69 msgid "" -"The router also provides a simple mechanism for clients to find an " -"internal socket service,\n" +"The router also provides a simple mechanism for clients to find an internal socket service,\n" "such as the HTTP proxy. This is provided by the Port Mapper.\n" "Registration is by name.\n" -"Clients that register generally provide an internal emulated socket on " -"that port." +"Clients that register generally provide an internal emulated socket on that port." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:2 @@ -5805,8 +5303,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:4 #, python-format msgid "" -"NOTE: The following is a discussion of the reasons behind the I2P naming " -"system,\n" +"NOTE: The following is a discussion of the reasons behind the I2P naming system,\n" "common arguments and possible alternatives.\n" "See <a href=\"%(naming)s\">the naming page</a> for current documentation." msgstr "" @@ -5817,72 +5314,49 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:12 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning " -"with\n" -"advocates across the spectrum of possibilities. However, given I2P's " -"inherent\n" -"demand for secure communication and decentralized operation, the " -"traditional\n" -"DNS-style naming system is clearly out, as are \"majority rules\" voting " -"systems." +"Naming within I2P has been an oft-debated topic since the very beginning with\n" +"advocates across the spectrum of possibilities. However, given I2P's inherent\n" +"demand for secure communication and decentralized operation, the traditional\n" +"DNS-style naming system is clearly out, as are \"majority rules\" voting systems." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:19 msgid "" -"I2P does not promote the use of DNS-like services though, as the damage " -"done\n" -"by hijacking a site can be tremendous - and insecure destinations have no" -"\n" -"value. DNSsec itself still falls back on registrars and certificate " -"authorities,\n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the reply\n" -"spoofed, as they are encrypted to the destination's public keys, and a " -"destination\n" -"itself is just a pair of public keys and a certificate. DNS-style " -"systems on the\n" -"other hand allow any of the name servers on the lookup path to mount " -"simple denial\n" -"of service and spoofing attacks. Adding on a certificate authenticating " -"the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"I2P does not promote the use of DNS-like services though, as the damage done\n" +"by hijacking a site can be tremendous - and insecure destinations have no\n" +"value. DNSsec itself still falls back on registrars and certificate authorities,\n" +"while with I2P, requests sent to a destination cannot be intercepted or the reply\n" +"spoofed, as they are encrypted to the destination's public keys, and a destination\n" +"itself is just a pair of public keys and a certificate. DNS-style systems on the\n" +"other hand allow any of the name servers on the lookup path to mount simple denial\n" +"of service and spoofing attacks. Adding on a certificate authenticating the\n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:33 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness of\n" -"Sybil attacks in anonymous systems - the attacker can simply create an " -"arbitrarily\n" -"high number of peers and \"vote\" with each to take over a given name. " -"Proof-of-work\n" -"methods can be used to make identity non-free, but as the network grows " -"the load\n" -"required to contact everyone to conduct online voting is implausible, or " -"if the\n" +"Voting style naming is dangerous as well, especially given the effectiveness of\n" +"Sybil attacks in anonymous systems - the attacker can simply create an arbitrarily\n" +"high number of peers and \"vote\" with each to take over a given name. Proof-of-work\n" +"methods can be used to make identity non-free, but as the network grows the load\n" +"required to contact everyone to conduct online voting is implausible, or if the\n" "full network is not queried, different sets of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:42 msgid "" -"As with the Internet however, I2P is keeping the design and operation of " -"a \n" -"naming system out of the (IP-like) communication layer. The bundled " -"naming library\n" -"includes a simple service provider interface which <a " -"href=\"#alternatives\">alternate naming systems</a> can\n" -"plug into, allowing end users to drive what sort of naming tradeoffs they" -" prefer." +"As with the Internet however, I2P is keeping the design and operation of a \n" +"naming system out of the (IP-like) communication layer. The bundled naming library\n" +"includes a simple service provider interface which <a href=\"#alternatives\">alternate naming systems</a> can\n" +"plug into, allowing end users to drive what sort of naming tradeoffs they prefer." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:50 msgid "" -"See also <a href=\"https://zooko.com/distnames.html\">Names: " -"Decentralized, Secure, Human-Meaningful: Choose Two</a>." +"See also <a href=\"https://zooko.com/distnames.html\">Names: Decentralized, " +"Secure, Human-Meaningful: Choose Two</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:55 @@ -5893,36 +5367,26 @@ msgstr "" msgid "" "Q:\n" "What to do if some hosts \n" -"do not agree on one address and if some addresses are working, others are" -" not? \n" +"do not agree on one address and if some addresses are working, others are not? \n" "Who is the right source of a name?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:64 msgid "" "A:\n" -"You don't. This is actually a critical difference between names on I2P " -"and how \n" -"DNS works - names in I2P are human readable, secure, but <b>not globally" -" \n" -"unique</b>. This is by design, and an inherent part of our need for " -"security." +"You don't. This is actually a critical difference between names on I2P and how \n" +"DNS works - names in I2P are human readable, secure, but <b>not globally \n" +"unique</b>. This is by design, and an inherent part of our need for security." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:70 msgid "" -"If I could somehow convince you to change the destination associated with" -" some \n" -"name, I'd successfully \"take over\" the site, and under no circumstances" -" is that \n" -"acceptable. Instead, what we do is make names <b>locally unique</b>: " -"they are \n" -"what <i>you</i> use to call a site, just as how you can call things " -"whatever \n" -"you want when you add them to your browser's bookmarks, or your IM " -"client's \n" -"buddy list. Who you call \"Boss\" may be who someone else calls " -"\"Sally\"." +"If I could somehow convince you to change the destination associated with some \n" +"name, I'd successfully \"take over\" the site, and under no circumstances is that \n" +"acceptable. Instead, what we do is make names <b>locally unique</b>: they are \n" +"what <i>you</i> use to call a site, just as how you can call things whatever \n" +"you want when you add them to your browser's bookmarks, or your IM client's \n" +"buddy list. Who you call \"Boss\" may be who someone else calls \"Sally\"." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:78 @@ -5938,44 +5402,33 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:89 msgid "" "<b>Inefficiency:</b>\n" -"The whole hosts.txt is downloaded (if it has changed, since eepget uses " -"the etag and last-modified headers).\n" +"The whole hosts.txt is downloaded (if it has changed, since eepget uses the etag and last-modified headers).\n" "It's about 400K right now for almost 800 hosts." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:94 msgid "" -"True, but this isn't a lot of traffic in the context of i2p, which is " -"itself wildly inefficient\n" -"(floodfill databases, huge encryption overhead and padding, garlic " -"routing, etc.).\n" -"If you downloaded a hosts.txt file from someone every 12 hours it " -"averages out to about 10 bytes/sec." +"True, but this isn't a lot of traffic in the context of i2p, which is itself wildly inefficient\n" +"(floodfill databases, huge encryption overhead and padding, garlic routing, etc.).\n" +"If you downloaded a hosts.txt file from someone every 12 hours it averages out to about 10 bytes/sec." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:99 msgid "" -"As is usually the case in i2p, there is a fundamental tradeoff here " -"between anonymity and efficiency.\n" -"Some would say that using the etag and last-modified headers is hazardous" -" because it exposes when you\n" +"As is usually the case in i2p, there is a fundamental tradeoff here between anonymity and efficiency.\n" +"Some would say that using the etag and last-modified headers is hazardous because it exposes when you\n" "last requested the data.\n" -"Others have suggested asking for specific keys only (similar to what jump" -" services do, but\n" +"Others have suggested asking for specific keys only (similar to what jump services do, but\n" "in a more automated fashion), possibly at a further cost in anonymity." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:106 #, python-format msgid "" -"Possible improvements would be a replacement or supplement to address " -"book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" -"or something simple like subscribing to http://example.i2p/cgi-" -"bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" -"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 " -"hours, for example,\n" -"that could be both more efficient and more anonymous than the current " -"hosts.txt with last-modified and etag." +"Possible improvements would be a replacement or supplement to address book (see <a href=\"http://%(i2host)s/\">%(i2host)sp</a>),\n" +"or something simple like subscribing to http://example.i2p/cgi-bin/recenthosts.cgi rather than http://example.i2p/hosts.txt.\n" +"If a hypothetical recenthosts.cgi distributed all hosts from the last 24 hours, for example,\n" +"that could be both more efficient and more anonymous than the current hosts.txt with last-modified and etag." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:112 @@ -5985,17 +5438,14 @@ msgid "" "<a href=\"%(url)s\">%(url)s</a>.\n" "This script returns an Etag with a timestamp.\n" "When a request comes in with the If-None-Match etag,\n" -"the script ONLY returns new hosts since that timestamp, or 304 Not " -"Modified if there are none.\n" -"In this way, the script efficiently returns only the hosts the subscriber" -"\n" +"the script ONLY returns new hosts since that timestamp, or 304 Not Modified if there are none.\n" +"In this way, the script efficiently returns only the hosts the subscriber\n" "does not know about, in an address book-compatible manner." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:121 msgid "" -"So the inefficiency is not a big issue and there are several ways to " -"improve things without\n" +"So the inefficiency is not a big issue and there are several ways to improve things without\n" "radical change." msgstr "" @@ -6009,38 +5459,30 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:132 msgid "" "As far as network traffic see above.\n" -"But unless you're going to do a slow real-time query over the network for" -"\n" -"a key, you need to have the whole set of keys stored locally, at a cost " -"of about 500 bytes per key." +"But unless you're going to do a slow real-time query over the network for\n" +"a key, you need to have the whole set of keys stored locally, at a cost of about 500 bytes per key." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:139 msgid "" "<b>Requires configuration and \"trust\":</b>\n" -"Out-of-the-box address book is only subscribed to " -"http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" +"Out-of-the-box address book is only subscribed to http://www.i2p2.i2p/hosts.txt, which is rarely updated,\n" "leading to poor new-user experience." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:144 msgid "" -"This is very much intentional. jrandom wants a user to \"trust\" a " -"hosts.txt\n" +"This is very much intentional. jrandom wants a user to \"trust\" a hosts.txt\n" "provider, and as he likes to say, \"trust is not a boolean\".\n" -"The configuration step attempts to force users to think about issues of " -"trust in an anonymous network." +"The configuration step attempts to force users to think about issues of trust in an anonymous network." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:149 msgid "" -"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy" -"\n" -"lists some jump services, but doesn't \"recommend\" any one in " -"particular,\n" +"As another example, the \"I2P Site Unknown\" error page in the HTTP Proxy\n" +"lists some jump services, but doesn't \"recommend\" any one in particular,\n" "and it's up to the user to pick one (or not).\n" -"jrandom would say we trust the listed providers enough to list them but " -"not enough to\n" +"jrandom would say we trust the listed providers enough to list them but not enough to\n" "automatically go fetch the key from them." msgstr "" @@ -6057,14 +5499,13 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:166 msgid "" -"Unfortunately real-time lookups over i2p would significantly slow down " -"web browsing." +"Unfortunately real-time lookups over i2p would significantly slow down web " +"browsing." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:169 msgid "" -"Also, DNS is based on lookups with limited caching and time-to-live, " -"while i2p\n" +"Also, DNS is based on lookups with limited caching and time-to-live, while i2p\n" "keys are permanent." msgstr "" @@ -6083,26 +5524,21 @@ msgid "" "Yes it depends on a few servers that you have configured.\n" "Within i2p, servers and services come and go.\n" "Any other centralized system (for example DNS root servers) would\n" -"have the same problem. A completely decentralized system (everybody is " -"authoritative)\n" -"is possible by implementing an \"everybody is a root DNS server\" " -"solution, or by\n" -"something even simpler, like a script that adds everybody in your " -"hosts.txt to your address book." +"have the same problem. A completely decentralized system (everybody is authoritative)\n" +"is possible by implementing an \"everybody is a root DNS server\" solution, or by\n" +"something even simpler, like a script that adds everybody in your hosts.txt to your address book." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:190 msgid "" -"People advocating all-authoritative solutions generally haven't thought " -"through\n" +"People advocating all-authoritative solutions generally haven't thought through\n" "the issues of conflicts and hijacking, however." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:196 msgid "" "<b>Awkward, not real-time:</b>\n" -"It's a patchwork of hosts.txt providers, key-add web form providers, jump" -" service providers,\n" +"It's a patchwork of hosts.txt providers, key-add web form providers, jump service providers,\n" "I2P Site status reporters.\n" "Jump servers and subscriptions are a pain, it should just work like DNS." msgstr "" @@ -6113,8 +5549,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:207 msgid "" -"So, in summary, the current system is not horribly broken, inefficient, " -"or un-scalable,\n" +"So, in summary, the current system is not horribly broken, inefficient, or un-scalable,\n" "and proposals to \"just use DNS\" aren't well thought-through." msgstr "" @@ -6124,8 +5559,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:213 msgid "" -"The I2P source contains several pluggable naming systems and supports " -"configuration options\n" +"The I2P source contains several pluggable naming systems and supports configuration options\n" "to enable experimentation with naming systems." msgstr "" @@ -6147,8 +5581,8 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:234 msgid "" -"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/" -" directory." +"<b>AddressDB</b> - Each host is listed in a separate file in a addressDb/ " +"directory." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:237 @@ -6173,8 +5607,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:253 msgid "" -"The current naming system can be changed with the advanced config option " -"'i2p.naming.impl'\n" +"The current naming system can be changed with the advanced config option 'i2p.naming.impl'\n" "(restart required).\n" "See core/java/src/net/i2p/client/naming for details." msgstr "" @@ -6182,8 +5615,7 @@ msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:258 msgid "" "Any new system should be stacked with HostsTxt, or should\n" -"implement local storage and/or the address book subscription functions, " -"since address book\n" +"implement local storage and/or the address book subscription functions, since address book\n" "only knows about the hosts.txt files and format." msgstr "" @@ -6193,50 +5625,40 @@ msgstr "Dëshmi" #: i2p2www/pages/site/docs/discussions/naming.html:265 msgid "" -"I2P destinations contain a certificate, however at the moment that " -"certificate\n" +"I2P destinations contain a certificate, however at the moment that certificate\n" "is always null.\n" -"With a null certificate, base64 destinations are always 516 bytes ending " -"in \"AAAA\",\n" -"and this is checked in the address book merge mechanism, and possibly " -"other places.\n" -"Also, there is no method available to generate a certificate or add it to" -" a\n" +"With a null certificate, base64 destinations are always 516 bytes ending in \"AAAA\",\n" +"and this is checked in the address book merge mechanism, and possibly other places.\n" +"Also, there is no method available to generate a certificate or add it to a\n" "destination. So these will have to be updated to implement certificates." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:273 #, python-format msgid "" -"One possible use of certificates is for <a " -"href=\"%(todo)s#hashcash\">proof of work</a>." +"One possible use of certificates is for <a href=\"%(todo)s#hashcash\">proof " +"of work</a>." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:276 msgid "" -"Another is for \"subdomains\" (in quotes because there is really no such " -"thing,\n" -"i2p uses a flat naming system) to be signed by the 2nd level domain's " -"keys." +"Another is for \"subdomains\" (in quotes because there is really no such thing,\n" +"i2p uses a flat naming system) to be signed by the 2nd level domain's keys." msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:280 msgid "" -"With any certificate implementation must come the method for verifying " -"the\n" +"With any certificate implementation must come the method for verifying the\n" "certificates.\n" "Presumably this would happen in the address book merge code.\n" -"Is there a method for multiple types of certificates, or multiple " -"certificates?" +"Is there a method for multiple types of certificates, or multiple certificates?" msgstr "" #: i2p2www/pages/site/docs/discussions/naming.html:286 msgid "" "Adding on a certificate authenticating the\n" -"responses as signed by some centralized certificate authority would " -"address many of\n" -"the hostile nameserver issues but would leave open replay attacks as well" -" as \n" +"responses as signed by some centralized certificate authority would address many of\n" +"the hostile nameserver issues but would leave open replay attacks as well as \n" "hostile certificate authority attacks." msgstr "" @@ -6255,91 +5677,58 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:11 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the use of 2048bit ElGamal, AES256, SHA256, and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:19 #: i2p2www/pages/site/docs/how/tech-intro.html:508 msgid "" -"The first time a router wants to encrypt a garlic message to another " -"router, \n" -"they encrypt the keying material for an AES256 session key with ElGamal " -"and \n" -"append the AES256/CBC encrypted payload after that encrypted ElGamal " -"block. \n" -"In addition to the encrypted payload, the AES encrypted section contains " -"the \n" -"payload length, the SHA256 hash of the unencrypted payload, as well as a " -"number \n" -"of \"session tags\" - random 32 byte nonces. The next time the sender " -"wants \n" -"to encrypt a garlic message to another router, rather than ElGamal " -"encrypt \n" -"a new session key they simply pick one of the previously delivered " -"session \n" -"tags and AES encrypt the payload like before, using the session key used " -"with \n" -"that session tag, prepended with the session tag itself. When a router " -"receives \n" -"a garlic encrypted message, they check the first 32 bytes to see if it " -"matches \n" -"an available session tag - if it does, they simply AES decrypt the " -"message, \n" +"The first time a router wants to encrypt a garlic message to another router, \n" +"they encrypt the keying material for an AES256 session key with ElGamal and \n" +"append the AES256/CBC encrypted payload after that encrypted ElGamal block. \n" +"In addition to the encrypted payload, the AES encrypted section contains the \n" +"payload length, the SHA256 hash of the unencrypted payload, as well as a number \n" +"of \"session tags\" - random 32 byte nonces. The next time the sender wants \n" +"to encrypt a garlic message to another router, rather than ElGamal encrypt \n" +"a new session key they simply pick one of the previously delivered session \n" +"tags and AES encrypt the payload like before, using the session key used with \n" +"that session tag, prepended with the session tag itself. When a router receives \n" +"a garlic encrypted message, they check the first 32 bytes to see if it matches \n" +"an available session tag - if it does, they simply AES decrypt the message, \n" "but if it does not, they ElGamal decrypt the first block." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:35 #: i2p2www/pages/site/docs/how/tech-intro.html:524 msgid "" -"Each session tag can be used only once so as to prevent internal " -"adversaries \n" -"from unnecessarily correlating different messages as being between the " -"same \n" -"routers. The sender of an ElGamal/AES+SessionTag encrypted message " -"chooses \n" -"when and how many tags to deliver, prestocking the recipient with enough " -"tags \n" -"to cover a volley of messages. Garlic messages may detect the successful " -"tag \n" -"delivery by bundling a small additional message as a clove (a \"delivery " -"status \n" -"message\") - when the garlic message arrives at the intended recipient " -"and \n" -"is decrypted successfully, this small delivery status message is one of " -"the \n" -"cloves exposed and has instructions for the recipient to send the clove " -"back \n" -"to the original sender (through an inbound tunnel, of course). When the " -"original \n" -"sender receives this delivery status message, they know that the session " -"tags \n" +"Each session tag can be used only once so as to prevent internal adversaries \n" +"from unnecessarily correlating different messages as being between the same \n" +"routers. The sender of an ElGamal/AES+SessionTag encrypted message chooses \n" +"when and how many tags to deliver, prestocking the recipient with enough tags \n" +"to cover a volley of messages. Garlic messages may detect the successful tag \n" +"delivery by bundling a small additional message as a clove (a \"delivery status \n" +"message\") - when the garlic message arrives at the intended recipient and \n" +"is decrypted successfully, this small delivery status message is one of the \n" +"cloves exposed and has instructions for the recipient to send the clove back \n" +"to the original sender (through an inbound tunnel, of course). When the original \n" +"sender receives this delivery status message, they know that the session tags \n" "bundled in the garlic message were successfully delivered." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:50 msgid "" "Session tags themselves have a short lifetime, after which they are \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption.\n" -"A session will continue to exist until all its tags are exhausted or " -"expire." +"A session will continue to exist until all its tags are exhausted or expire." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:61 @@ -6354,8 +5743,7 @@ msgid "" "between a Router and a Destination.\n" "Each Router and Destination maintains its own Session Key Manager to\n" "keep track of Session Keys and Session Tags.\n" -"Separate Session Key Managers prevents correlation of multiple " -"Destinations\n" +"Separate Session Key Managers prevents correlation of multiple Destinations\n" "to each other or a Router by adversaries." msgstr "" @@ -6376,14 +5764,14 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:85 -msgid "It is for a new session and contains both ElGamal and AES encrypted blocks" +msgid "" +"It is for a new session and contains both ElGamal and AES encrypted blocks" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:88 msgid "" "When a router receives a message, it will first assume it is from\n" -"an existing session and attempt to look up the Session Tag and decrypt " -"the following data using AES.\n" +"an existing session and attempt to look up the Session Tag and decrypt the following data using AES.\n" "If that fails, it will assume it is for a new session and attempt to\n" "decrypt it using ElGamal." msgstr "" @@ -6394,8 +5782,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:98 msgid "" -"A New Session ElGamal Message contains two parts, an encrypted ElGamal " -"block\n" +"A New Session ElGamal Message contains two parts, an encrypted ElGamal block\n" "and an encrypted AES block." msgstr "" @@ -6421,8 +5808,7 @@ msgid "" "The 32-byte\n" "<a href=\"%(commonstructures)s#type_SessionKey\">Session Key</a>\n" "is the identifier for the session.\n" -"The 32-byte Pre-IV will be used to generate the IV for the AES block that" -" follows;\n" +"The 32-byte Pre-IV will be used to generate the IV for the AES block that follows;\n" "the IV is the first 16 bytes of the SHA-256 Hash of the Pre-IV." msgstr "" @@ -6451,18 +5837,16 @@ msgstr "" #, python-format msgid "" "The data is then <a href=\"%(cryptography)s\">AES Encrypted</a>,\n" -"using the session key and IV (calculated from the pre-IV) from the " -"ElGamal section.\n" -"The encrypted AES Block length is variable but is always a multiple of 16" -" bytes.\n" +"using the session key and IV (calculated from the pre-IV) from the ElGamal section.\n" +"The encrypted AES Block length is variable but is always a multiple of 16 bytes.\n" "</p>" msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:266 #, python-format msgid "" -"Actual max payload length, and max block length, is less than 64 KB; see " -"the <a href=\"%(i2np)s\">I2NP Overview</a>." +"Actual max payload length, and max block length, is less than 64 KB; see the" +" <a href=\"%(i2np)s\">I2NP Overview</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:269 @@ -6491,18 +5875,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:318 msgid "" "The session tag also serves as\n" -"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the " -"sessionTag." +"the pre-IV. The IV is the first 16 bytes of the SHA-256 Hash of the sessionTag." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:323 msgid "" -"To decode a message from an existing session, a router looks up the " -"Session Tag to find an\n" -"associated Session Key. If the Session Tag is found, the AES block is " -"decrypted using the associated Session Key.\n" -"If the tag is not found, the message is assumed to be a <a " -"href=\"#new\">New Session Message</a>." +"To decode a message from an existing session, a router looks up the Session Tag to find an\n" +"associated Session Key. If the Session Tag is found, the AES block is decrypted using the associated Session Key.\n" +"If the tag is not found, the message is assumed to be a <a href=\"#new\">New Session Message</a>." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:331 @@ -6512,38 +5892,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:332 #, python-format msgid "" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"For brief streaming connections or datagrams, these options may be used " -"to significantly reduce bandwidth.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"For brief streaming connections or datagrams, these options may be used to significantly reduce bandwidth.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:353 msgid "" -"There are many possible areas to tune the Session Key Manager's " -"algorithms;\n" -"some may interact with the streaming library behavior, or have " -"significant\n" +"There are many possible areas to tune the Session Key Manager's algorithms;\n" +"some may interact with the streaming library behavior, or have significant\n" "impact on overall performance." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:360 msgid "" -"The number of tags delivered could depend on message size, keeping in " -"mind\n" +"The number of tags delivered could depend on message size, keeping in mind\n" "the eventual padding to 1KB at the tunnel message layer." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:365 msgid "" -"Clients could send an estimate of session lifetime to the router, as an " -"advisory\n" +"Clients could send an estimate of session lifetime to the router, as an advisory\n" "on the number of tags required." msgstr "" @@ -6555,15 +5927,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:374 msgid "" -"The router may assume delivery of Session Tags, or await acknowledgement " -"before using them;\n" +"The router may assume delivery of Session Tags, or await acknowledgement before using them;\n" "there are tradeoffs for each strategy." msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:379 msgid "" -"For very brief messages, almost the full 222 bytes of the pre-IV and " -"padding fields in the ElGamal block\n" +"For very brief messages, almost the full 222 bytes of the pre-IV and padding fields in the ElGamal block\n" "could be used for the entire message, instead of establishing a session." msgstr "" @@ -6575,10 +5945,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/elgamal-aes.html:389 msgid "" -"Perhaps things could be more efficient if the Session Tag system was " -"bidirectional,\n" -"so tags delivered in the 'forward' path could be used in the 'reverse' " -"path,\n" +"Perhaps things could be more efficient if the Session Tag system was bidirectional,\n" +"so tags delivered in the 'forward' path could be used in the 'reverse' path,\n" "thus avoiding ElGamal in the initial response.\n" "The router currently plays some tricks like this when sending\n" "tunnel test messages to itself." @@ -6596,12 +5964,9 @@ msgstr "" msgid "" "Several of these ideas may require a new I2NP message type, or\n" "set a flag in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery" -" Instructions</a>,\n" +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">Delivery Instructions</a>,\n" "or set a magic number in the first few bytes of the Session Key field\n" -"and accept a small risk of the random Session Key matching the magic " -"number." +"and accept a small risk of the random Session Key matching the magic number." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:2 @@ -6618,8 +5983,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:7 msgid "" -"The terms \"garlic routing\" and \"garlic encryption\" are often used " -"rather loosely when referring to I2P's technology.\n" +"The terms \"garlic routing\" and \"garlic encryption\" are often used rather loosely when referring to I2P's technology.\n" "Here, we explain the history of the terms, the various meanings, and\n" "the usage of \"garlic\" methods in I2P." msgstr "" @@ -6629,20 +5993,16 @@ msgid "" "\"Garlic routing\" was first coined by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>\n" "in Roger Dingledine's Free Haven \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"Section 8.1.1 (June 2000), as derived from \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> Section 8.1.1 (June 2000), as derived from \n" "<a href=\"http://www.onion-router.net/\">Onion Routing</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:21 msgid "" -"\"Garlic\" may have been used originally by I2P developers because I2P " -"implements a form of\n" -"bundling as Freedman describes, or simply to emphasize general " -"differences from Tor.\n" +"\"Garlic\" may have been used originally by I2P developers because I2P implements a form of\n" +"bundling as Freedman describes, or simply to emphasize general differences from Tor.\n" "The specific reasoning may be lost to history.\n" -"Generally, when referring to I2P, the term \"garlic\" may mean one of " -"three things:" +"Generally, when referring to I2P, the term \"garlic\" may mean one of three things:" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:28 @@ -6661,54 +6021,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:33 msgid "" -"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven " -"years has not always been precise; therefore the reader is\n" +"Unfortunately, I2P's usage of \"garlic\" terminology over the past seven years has not always been precise; therefore the reader is\n" "cautioned when encountering the term.\n" "Hopefully, the explanation below will make things clear." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:40 msgid "" -"Onion routing is a technique for building paths, or tunnels, through a " -"series of peers,\n" +"Onion routing is a technique for building paths, or tunnels, through a series of peers,\n" "and then using that tunnel.\n" -"Messages are repeatedly encrypted by the originator, and then decrypted " -"by each hop.\n" -"During the building phase, only the routing instructions for the next hop" -" are exposed to each peer.\n" -"During the operating phase, messages are passed through the tunnel, and " -"the\n" -"message and its routing instructions are only exposed to the endpoint of " -"the tunnel." +"Messages are repeatedly encrypted by the originator, and then decrypted by each hop.\n" +"During the building phase, only the routing instructions for the next hop are exposed to each peer.\n" +"During the operating phase, messages are passed through the tunnel, and the\n" +"message and its routing instructions are only exposed to the endpoint of the tunnel." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:49 #, python-format msgid "" "This is similar to the way Mixmaster\n" -"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages " -"- taking a message, encrypting it\n" -"to the recipient's public key, taking that encrypted message and " -"encrypting\n" -"it (along with instructions specifying the next hop), and then taking " -"that\n" -"resulting encrypted message and so on, until it has one layer of " -"encryption\n" +"(see <a href=\"%(comparisons)s\">network comparisons</a>) sends messages - taking a message, encrypting it\n" +"to the recipient's public key, taking that encrypted message and encrypting\n" +"it (along with instructions specifying the next hop), and then taking that\n" +"resulting encrypted message and so on, until it has one layer of encryption\n" "per hop along the path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:58 msgid "" -"In this sense, \"garlic routing\" as a general concept is identical to " -"\"onion routing\".\n" -"As implemented in I2P, of course, there are several differences from the " -"implementation in Tor; see below.\n" -"Even so, there are substantial similarities such that I2P benefits from a" -"\n" -"<a href=\"http://www.onion-router.net/Publications.html\">large amount of" -" academic research on onion routing</a>,\n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar " -"mixnets</a>." +"In this sense, \"garlic routing\" as a general concept is identical to \"onion routing\".\n" +"As implemented in I2P, of course, there are several differences from the implementation in Tor; see below.\n" +"Even so, there are substantial similarities such that I2P benefits from a\n" +"<a href=\"http://www.onion-router.net/Publications.html\">large amount of academic research on onion routing</a>,\n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">Tor, and similar mixnets</a>." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:67 @@ -6717,15 +6062,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:68 msgid "" -"Michael Freedman defined \"garlic routing\" as an extension to onion " -"routing,\n" +"Michael Freedman defined \"garlic routing\" as an extension to onion routing,\n" "in which multiple messages are bundled together.\n" "He called each message a \"bulb\".\n" -"All the messages, each with its own delivery instructions, are exposed at" -" the\n" +"All the messages, each with its own delivery instructions, are exposed at the\n" "endpoint.\n" -"This allows the efficient bundling of an onion routing \"reply block\" " -"with the original message." +"This allows the efficient bundling of an onion routing \"reply block\" with the original message." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:77 @@ -6734,10 +6076,8 @@ msgid "" "Our term for garlic \"bulbs\" is \"cloves\".\n" "Any number of messages can be\n" "contained, instead of just a single message.\n" -"This is a significant distinction from the onion routing implemented in " -"Tor.\n" -"However, it is only one of many major architectural differences between " -"I2P and Tor;\n" +"This is a significant distinction from the onion routing implemented in Tor.\n" +"However, it is only one of many major architectural differences between I2P and Tor;\n" "perhaps it is not, by itself, enough to justify a change in terminology." msgstr "" @@ -6745,10 +6085,8 @@ msgstr "" msgid "" "Another difference\n" "from the method described by Freedman\n" -"is that the path is unidirectional - there is no \"turning point\" as " -"seen in onion routing\n" -"or mixmaster reply blocks, which greatly simplifies the algorithm and " -"allows for more flexible\n" +"is that the path is unidirectional - there is no \"turning point\" as seen in onion routing\n" +"or mixmaster reply blocks, which greatly simplifies the algorithm and allows for more flexible\n" "and reliable delivery." msgstr "" @@ -6782,16 +6120,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:113 msgid "" -"For publishing some network database entries (dampening the probability " -"of a successful traffic analysis attack) (ElGamal/AES)" +"For publishing some network database entries (dampening the probability of a" +" successful traffic analysis attack) (ElGamal/AES)" msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:116 msgid "" -"There are also significant ways that this technique can be used to " -"improve the performance of the network, \n" -"exploiting transport latency/throughput tradeoffs, and branching data " -"through redundant paths to increase reliability." +"There are also significant ways that this technique can be used to improve the performance of the network, \n" +"exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:122 @@ -6802,8 +6138,7 @@ msgstr "" msgid "" "In I2P, tunnels are unidirectional. Each party builds two tunnels,\n" "one for outbound and one for inbound traffic.\n" -"Therefore, four tunnels are required for a single round-trip message and " -"reply." +"Therefore, four tunnels are required for a single round-trip message and reply." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:129 @@ -6823,12 +6158,10 @@ msgstr "" msgid "" "Tunnels are a general-purpose mechanism to transport all\n" "<a href=\"%(i2np)s\">I2NP messages</a>, and\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to " -"build tunnels.\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Messages</a> are not used to build tunnels.\n" "We do not bundle multiple\n" "<a href=\"%(i2np)s\">I2NP messages</a> into a single\n" -"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at " -"the outbound tunnel endpoint;\n" +"<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a> for unwrapping at the outbound tunnel endpoint;\n" "the tunnel encryption is sufficient." msgstr "" @@ -6842,14 +6175,12 @@ msgid "" "At the layer above tunnels, I2P delivers end-to-end messages between\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destinations</a>.\n" "Just as within a single tunnel, we use\n" -"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption." -"\n" +"<a href=\"%(elgamalaes)s\">ElGamal/AES+SessionTag</a> for the encryption.\n" "Each client message as delivered to the router through the\n" "<a href=\"%(i2cp)s\">I2CP interface</a> becomes a single\n" "<a href=\"%(i2npspec)s#struct_GarlicClove\">Garlic Clove</a>\n" "with its own\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>,\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>,\n" "inside a\n" "<a href=\"%(i2npspec)s#msg_Garlic\">Garlic Message</a>.\n" "Delivery Instructions may specify a Destination, Router, or Tunnel." @@ -6872,18 +6203,13 @@ msgid "" "A\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">Delivery Status Message</a>,\n" "with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" -"specifying that it be sent back to the originating router as an " -"acknowledgment.\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" +"specifying that it be sent back to the originating router as an acknowledgment.\n" "This is similar to the \"reply block\" or \"reply onion\"\n" "described in the references.\n" -"It is used for determining the success or failure of end to end message " -"delivery.\n" -"The originating router may, upon failure to receive the Delivery Status " -"Message\n" -"within the expected time period, modify the routing to the far-end " -"Destination,\n" +"It is used for determining the success or failure of end to end message delivery.\n" +"The originating router may, upon failure to receive the Delivery Status Message\n" +"within the expected time period, modify the routing to the far-end Destination,\n" "or take other actions." msgstr "" @@ -6895,16 +6221,12 @@ msgid "" "containing a\n" "<a href=\"%(commonstructures)s#struct_LeaseSet\">LeaseSet</a>\n" "for the originating Destination, with\n" -"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery " -"Instructions</a>\n" +"<a href=\"%(i2npspec)s#struct_GarlicCloveDeliveryInstructions\">Delivery Instructions</a>\n" "specifying the far-end destination's router.\n" -"By periodically bundling a LeaseSet, the router ensures that the far-end " -"will be able\n" +"By periodically bundling a LeaseSet, the router ensures that the far-end will be able\n" "to maintain communications.\n" -"Otherwise the far-end would have to query a floodfill router for the " -"network database entry,\n" -"and all LeaseSets would have to be published to the network database, as " -"explained on the\n" +"Otherwise the far-end would have to query a floodfill router for the network database entry,\n" +"and all LeaseSets would have to be published to the network database, as explained on the\n" "<a href=\"%(netdb)s\">network database page</a>." msgstr "" @@ -6914,31 +6236,24 @@ msgid "" "By default, the Delivery Status and Database Store Messages\n" "are bundled when the local LeaseSet changes, when additional\n" "<a href=\"%(commonstructures)s#type_SessionTag\">Session Tags</a>\n" -"are delivered, or if the messages have not been bundled in the previous " -"minute.\n" -"As of release 0.9.2, the client may configure the default number of " -"Session Tags to send\n" +"are delivered, or if the messages have not been bundled in the previous minute.\n" +"As of release 0.9.2, the client may configure the default number of Session Tags to send\n" "and the low tag threshold for the current session.\n" -"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for " -"details.\n" +"See the <a href=\"%(i2cp)s#options\">I2CP options specification</a> for details.\n" "The session settings may also be overridden on a per-message basis.\n" -"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message" -" Expires specification</a> for details." +"See the <a href=\"%(i2cpspec)s#msg_SendMessageExpires\">I2CP Send Message Expires specification</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:224 msgid "" -"Obviously, the additional messages are currently bundled for specific " -"purposes,\n" +"Obviously, the additional messages are currently bundled for specific purposes,\n" "and not part of a general-purpose routing scheme." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:229 msgid "" -"As of release 0.9.12, the Delivery Status Message is wrapped in another " -"Garlic Message\n" -"by the originator so that the contents are encrypted and not visible to " -"routers on the return path." +"As of release 0.9.12, the Delivery Status Message is wrapped in another Garlic Message\n" +"by the originator so that the contents are encrypted and not visible to routers on the return path." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:235 @@ -6962,35 +6277,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:252 #, python-format msgid "" -"The Garlic Message mechanism is very flexible and provides a structure " -"for\n" +"The Garlic Message mechanism is very flexible and provides a structure for\n" "implementing many types of mixnet delivery methods.\n" "Together with the unused delay option in the\n" -"<a " -"href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel" -" message Delivery Instructions</a>,\n" -"a wide spectrum of batching, delay, mixing, and routing strategies are " -"possible." +"<a href=\"%(tunnelmessage)s#struct_TunnelMessageDeliveryInstructions\">tunnel message Delivery Instructions</a>,\n" +"a wide spectrum of batching, delay, mixing, and routing strategies are possible." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:260 msgid "" -"In particular, there is potential for much more flexibility at the " -"outbound tunnel endpoint.\n" +"In particular, there is potential for much more flexibility at the outbound tunnel endpoint.\n" "Messages could possibly be routed from there to one of several tunnels\n" -"(thus minimizing point-to-point connections), or multicast to several " -"tunnels\n" +"(thus minimizing point-to-point connections), or multicast to several tunnels\n" "for redundancy, or streaming audio and video." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:267 msgid "" -"Such experiments may conflict with the need to ensure security and " -"anonymity, such\n" -"as limiting certain routing paths, restricting the types of I2NP messages" -" that may\n" -"be forwarded along various paths, and enforcing certain message " -"expiration times." +"Such experiments may conflict with the need to ensure security and anonymity, such\n" +"as limiting certain routing paths, restricting the types of I2NP messages that may\n" +"be forwarded along various paths, and enforcing certain message expiration times." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:273 @@ -6999,11 +6305,9 @@ msgid "" "As a part of\n" "<a href=\"%(elgamalaes)s\">ElGamal/AES encryption</a>,\n" "a garlic message contains a sender\n" -"specified amount of padding data, allowing the sender to take active " -"countermeasures \n" +"specified amount of padding data, allowing the sender to take active countermeasures \n" "against traffic analysis.\n" -"This is not currently used, beyond the requirement to pad to a multiple " -"of 16 bytes." +"This is not currently used, beyond the requirement to pad to a multiple of 16 bytes." msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:282 @@ -7020,10 +6324,8 @@ msgstr "Referenca" #: i2p2www/pages/site/docs/how/garlic-routing.html:292 msgid "" -"The term garlic routing was first coined in Roger Dingledine's Free Haven" -" \n" -"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> " -"(June 2000),\n" +"The term garlic routing was first coined in Roger Dingledine's Free Haven \n" +"<a href=\"http://www.freehaven.net/papers.html\">Master's thesis</a> (June 2000),\n" "see Section 8.1.1 authored by\n" "<a href=\"http://www.cs.princeton.edu/~mfreed/\">Michael J. Freedman</a>." msgstr "" @@ -7053,8 +6355,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/garlic-routing.html:313 msgid "" -"Onion routing was first described in <a href=\"http://www.onion-" -"router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" +"Onion routing was first described in <a href=\"http://www.onion-router.net/Publications/IH-1996.pdf\">Hiding Routing Information</a>\n" "by David M. Goldschlag, Michael G. Reed, and Paul F. Syverson in 1996." msgstr "" @@ -7064,79 +6365,51 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:4 msgid "" -"I2P is a project to build, deploy, and maintain a network supporting " -"secure and anonymous\n" -"communication. People using I2P are in control of the tradeoffs between " -"anonymity, reliability,\n" -"bandwidth usage, and latency. There is no central point in the network on" -" which pressure can be\n" -"exerted to compromise the integrity, security, or anonymity of the " -"system. The network supports\n" -"dynamic reconfiguration in response to various attacks, and has been " -"designed to make use of\n" -"additional resources as they become available. Of course, all aspects of " -"the network are open and\n" +"I2P is a project to build, deploy, and maintain a network supporting secure and anonymous\n" +"communication. People using I2P are in control of the tradeoffs between anonymity, reliability,\n" +"bandwidth usage, and latency. There is no central point in the network on which pressure can be\n" +"exerted to compromise the integrity, security, or anonymity of the system. The network supports\n" +"dynamic reconfiguration in response to various attacks, and has been designed to make use of\n" +"additional resources as they become available. Of course, all aspects of the network are open and\n" "freely available." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:14 msgid "" -"Unlike many other anonymizing networks, I2P doesn't try to provide " -"anonymity by hiding the\n" -"originator of some communication and not the recipient, or the other way " -"around. I2P is designed to\n" -"allow peers using I2P to communicate with each other anonymously — " -"both sender and recipient\n" -"are unidentifiable to each other as well as to third parties. For " -"example, today there are both\n" -"in-I2P web sites (allowing anonymous publishing / hosting) as well as " -"HTTP proxies to the normal web\n" -"(allowing anonymous web browsing). Having the ability to run servers " -"within I2P is essential, as it\n" -"is quite likely that any outbound proxies to the normal Internet will be " -"monitored, disabled, or\n" +"Unlike many other anonymizing networks, I2P doesn't try to provide anonymity by hiding the\n" +"originator of some communication and not the recipient, or the other way around. I2P is designed to\n" +"allow peers using I2P to communicate with each other anonymously — both sender and recipient\n" +"are unidentifiable to each other as well as to third parties. For example, today there are both\n" +"in-I2P web sites (allowing anonymous publishing / hosting) as well as HTTP proxies to the normal web\n" +"(allowing anonymous web browsing). Having the ability to run servers within I2P is essential, as it\n" +"is quite likely that any outbound proxies to the normal Internet will be monitored, disabled, or\n" "even taken over to attempt more malicious attacks." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:25 #, python-format msgid "" -"The network itself is message oriented - it is essentially a secure and " -"anonymous IP layer, where\n" -"messages are addressed to cryptographic keys (Destinations) and can be " -"significantly larger than IP\n" -"packets. Some example uses of the network include \"I2P Sites\" " -"(webservers hosting normal web\n" -"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a " -"distributed data store. With the\n" -"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are " -"able to stream traditional\n" -"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even " -"streaming audio. Most people\n" -"will not use I2P directly, or even need to know they're using it. Instead" -" their view will be of one\n" -"of the I2P enabled applications, or perhaps as a little controller app to" -" turn on and off various\n" +"The network itself is message oriented - it is essentially a secure and anonymous IP layer, where\n" +"messages are addressed to cryptographic keys (Destinations) and can be significantly larger than IP\n" +"packets. Some example uses of the network include \"I2P Sites\" (webservers hosting normal web\n" +"applications within I2P), a BitTorrent client (\"I2PSnark\"), or a distributed data store. With the\n" +"help of the <a href=\"%(i2ptunnel)s\">I2PTunnel</a> application, we are able to stream traditional\n" +"TCP/IP applications over I2P, such as SSH, IRC, a squid proxy, and even streaming audio. Most people\n" +"will not use I2P directly, or even need to know they're using it. Instead their view will be of one\n" +"of the I2P enabled applications, or perhaps as a little controller app to turn on and off various\n" "proxies to enable the anonymizing functionality." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:37 #, python-format msgid "" -"An essential part of designing, developing, and testing an anonymizing " -"network is to define the <a\n" -"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing " -"as \"true\" anonymity, just\n" -"increasingly expensive costs to identify someone. Briefly, I2P's intent " -"is to allow people to\n" -"communicate in arbitrarily hostile environments by providing good " -"anonymity, mixed in with\n" -"sufficient cover traffic provided by the activity of people who require " -"less anonymity. This way,\n" -"some users can avoid detection by a very powerful adversary, while others" -" will try to evade a weaker\n" -"entity, <i>all on the same network</i>, where each one's messages are " -"essentially indistinguishable\n" +"An essential part of designing, developing, and testing an anonymizing network is to define the <a\n" +"href=\"%(threatmodel)s\">threat model</a>, since there is no such thing as \"true\" anonymity, just\n" +"increasingly expensive costs to identify someone. Briefly, I2P's intent is to allow people to\n" +"communicate in arbitrarily hostile environments by providing good anonymity, mixed in with\n" +"sufficient cover traffic provided by the activity of people who require less anonymity. This way,\n" +"some users can avoid detection by a very powerful adversary, while others will try to evade a weaker\n" +"entity, <i>all on the same network</i>, where each one's messages are essentially indistinguishable\n" "from the others." msgstr "" @@ -7147,12 +6420,9 @@ msgstr "Pse?" #: i2p2www/pages/site/docs/how/intro.html:49 #, python-format msgid "" -"There are a multitude of reasons why we need a system to support " -"anonymous communication, and\n" -"everyone has their own personal rationale. There are many <a " -"href=\"%(comparisons)s\">other\n" -"efforts</a> working on finding ways to provide varying degrees of " -"anonymity to people through the\n" +"There are a multitude of reasons why we need a system to support anonymous communication, and\n" +"everyone has their own personal rationale. There are many <a href=\"%(comparisons)s\">other\n" +"efforts</a> working on finding ways to provide varying degrees of anonymity to people through the\n" "Internet, but we could not find any that met our needs or threat model." msgstr "" @@ -7163,23 +6433,14 @@ msgstr "Si?" #: i2p2www/pages/site/docs/how/intro.html:58 #, python-format msgid "" -"The network at a glance is made up of a set of nodes (\"routers\") with a" -" number of unidirectional\n" -"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a " -"href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is " -"identified by a cryptographic RouterIdentity which is\n" -"typically long lived. These routers communicate with each other through " -"existing transport\n" -"mechanisms (TCP, UDP, etc), passing various messages. Client applications" -" have their own\n" -"cryptographic identifier (\"Destination\") which enables it to send and " -"receive messages. These\n" -"clients can connect to any router and authorize the temporary allocation " -"(\"lease\") of some tunnels\n" -"that will be used for sending and receiving messages through the network." -" I2P has its own internal\n" -"<a href=\"%(netdb)s\">network database</a> (using a modification of the " -"Kademlia algorithm) for\n" +"The network at a glance is made up of a set of nodes (\"routers\") with a number of unidirectional\n" +"inbound and outbound virtual paths (\"tunnels\", as outlined on the <a href=\"%(tunnelrouting)s\">tunnel routing</a> page). Each router is identified by a cryptographic RouterIdentity which is\n" +"typically long lived. These routers communicate with each other through existing transport\n" +"mechanisms (TCP, UDP, etc), passing various messages. Client applications have their own\n" +"cryptographic identifier (\"Destination\") which enables it to send and receive messages. These\n" +"clients can connect to any router and authorize the temporary allocation (\"lease\") of some tunnels\n" +"that will be used for sending and receiving messages through the network. I2P has its own internal\n" +"<a href=\"%(netdb)s\">network database</a> (using a modification of the Kademlia algorithm) for\n" "distributing routing and contact information securely." msgstr "" @@ -7189,91 +6450,62 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:73 msgid "" -"In the above, Alice, Bob, Charlie, and Dave are all running routers with " -"a single Destination on\n" -"their local router. They each have a pair of 2-hop inbound tunnels per " -"destination (labeled 1, 2, 3,\n" -"4, 5 and 6), and a small subset of each of those router's outbound tunnel" -" pool is shown with 2-hop\n" -"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's " -"outbound tunnels are not\n" -"shown, nor are the rest of each router's outbound tunnel pool (typically " -"stocked with a few tunnels\n" -"at a time). When Alice and Bob talk to each other, Alice sends a message " -"out one of her (pink)\n" -"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3" -" or 4). She knows to send\n" -"to those tunnels on the correct router by querying the network database, " -"which is constantly updated\n" +"In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on\n" +"their local router. They each have a pair of 2-hop inbound tunnels per destination (labeled 1, 2, 3,\n" +"4, 5 and 6), and a small subset of each of those router's outbound tunnel pool is shown with 2-hop\n" +"outbound tunnels. For simplicity, Charlie's inbound tunnels and Dave's outbound tunnels are not\n" +"shown, nor are the rest of each router's outbound tunnel pool (typically stocked with a few tunnels\n" +"at a time). When Alice and Bob talk to each other, Alice sends a message out one of her (pink)\n" +"outbound tunnels targeting one of Bob's (green) inbound tunnels (tunnel 3 or 4). She knows to send\n" +"to those tunnels on the correct router by querying the network database, which is constantly updated\n" "as new leases are authorized and old ones expire." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:85 #, python-format msgid "" -"If Bob wants to reply to Alice, he simply goes through the same process -" -" send a message out one of\n" -"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 " -"or 2). To make things\n" -"easier, most messages sent between Alice and Bob are <a " -"href=\"%(garlicrouting)s\">garlic</a>\n" -"wrapped, bundling the sender's own current lease information so that the " -"recipient can reply\n" -"immediately without having to look in the network database for the " -"current data." +"If Bob wants to reply to Alice, he simply goes through the same process - send a message out one of\n" +"his outbound tunnels targeting one of Alice's inbound tunnels (tunnel 1 or 2). To make things\n" +"easier, most messages sent between Alice and Bob are <a href=\"%(garlicrouting)s\">garlic</a>\n" +"wrapped, bundling the sender's own current lease information so that the recipient can reply\n" +"immediately without having to look in the network database for the current data." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:93 #, python-format msgid "" -"To deal with a wide range of attacks, I2P is fully distributed with no " -"centralized resources - and\n" -"hence there are no directory servers keeping statistics regarding the " -"performance and reliability of\n" -"routers within the network. As such, each router must keep and maintain " -"profiles of various routers\n" -"and is responsible for selecting appropriate peers to meet the anonymity," -" performance, and\n" -"reliability needs of the users, as described in the <a " -"href=\"%(peerselection)s\">peer selection</a>\n" +"To deal with a wide range of attacks, I2P is fully distributed with no centralized resources - and\n" +"hence there are no directory servers keeping statistics regarding the performance and reliability of\n" +"routers within the network. As such, each router must keep and maintain profiles of various routers\n" +"and is responsible for selecting appropriate peers to meet the anonymity, performance, and\n" +"reliability needs of the users, as described in the <a href=\"%(peerselection)s\">peer selection</a>\n" "page." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:102 #, python-format msgid "" -"The network itself makes use of a significant number of <a " -"href=\"%(cryptography)s\">cryptographic\n" -"techniques and algorithms</a> - a full laundry list includes 2048bit " -"ElGamal encryption, 256bit AES\n" -"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, " -"2048bit Diffie-Hellman\n" -"negotiated connections with station to station authentication, and <a " -"href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." +"The network itself makes use of a significant number of <a href=\"%(cryptography)s\">cryptographic\n" +"techniques and algorithms</a> - a full laundry list includes 2048bit ElGamal encryption, 256bit AES\n" +"in CBC mode with PKCS#5 padding, 1024bit DSA signatures, SHA256 hashes, 2048bit Diffie-Hellman\n" +"negotiated connections with station to station authentication, and <a href=\"%(elgamalaes)s\">ElGamal / AES+SessionTag</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:110 msgid "" -"Content sent over I2P is encrypted through three layers garlic encryption" -" (used to verify the\n" -"delivery of the message to the recipient), tunnel encryption (all " -"messages passing through a tunnel\n" -"is encrypted by the tunnel gateway to the tunnel endpoint), and inter " -"router transport layer\n" +"Content sent over I2P is encrypted through three layers garlic encryption (used to verify the\n" +"delivery of the message to the recipient), tunnel encryption (all messages passing through a tunnel\n" +"is encrypted by the tunnel gateway to the tunnel endpoint), and inter router transport layer\n" "encryption (e.g. the TCP transport uses AES256 with ephemeral keys)." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:117 msgid "" "End-to-end (I2CP) encryption (client application to\n" -"server application) was disabled in I2P release 0.6; end-to-end (garlic) " -"encryption (I2P client router\n" -"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" " -"remains. Notice the different use of\n" -"terms! All data from a to h is end-to-end encrypted, but the I2CP " -"connection between the I2P router and\n" -"the applications is not end-to-end encrypted! A and h are the routers of " -"Alice and Bob, while Alice and\n" +"server application) was disabled in I2P release 0.6; end-to-end (garlic) encryption (I2P client router\n" +"to I2P server router) from Alice's router \"a\" to Bob's router \"h\" remains. Notice the different use of\n" +"terms! All data from a to h is end-to-end encrypted, but the I2CP connection between the I2P router and\n" +"the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and\n" "Bob in following chart are the applications running atop of I2P." msgstr "" @@ -7290,32 +6522,22 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:132 msgid "" -"The two main mechanisms for allowing people who need strong anonymity to " -"use the network are\n" -"explicitly delayed garlic routed messages and more comprehensive tunnels " -"to include support for\n" -"pooling and mixing messages. These are currently planned for release 3.0," -" but garlic routed messages\n" -"with no delays and FIFO tunnels are currently in place. Additionally, the" -" 2.0 release will allow\n" -"people to set up and operate behind restricted routes (perhaps with " -"trusted peers), as well as the\n" +"The two main mechanisms for allowing people who need strong anonymity to use the network are\n" +"explicitly delayed garlic routed messages and more comprehensive tunnels to include support for\n" +"pooling and mixing messages. These are currently planned for release 3.0, but garlic routed messages\n" +"with no delays and FIFO tunnels are currently in place. Additionally, the 2.0 release will allow\n" +"people to set up and operate behind restricted routes (perhaps with trusted peers), as well as the\n" "deployment of more flexible and anonymous transports." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:141 #, python-format msgid "" -"Some questions have been raised with regards to the scalability of I2P, " -"and reasonably so. There\n" -"will certainly be more analysis over time, but peer lookup and " -"integration should be bounded by\n" -"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network " -"database</a>'s algorithm, while end\n" -"to end messages should be <code>O(1)</code> (scale free), since messages " -"go out K hops through the\n" -"outbound tunnel and another K hops through the inbound tunnel, with K no " -"longer than 3. The size of\n" +"Some questions have been raised with regards to the scalability of I2P, and reasonably so. There\n" +"will certainly be more analysis over time, but peer lookup and integration should be bounded by\n" +"<code>O(log(N))</code> due to the <a href=\"%(netdb)s\">network database</a>'s algorithm, while end\n" +"to end messages should be <code>O(1)</code> (scale free), since messages go out K hops through the\n" +"outbound tunnel and another K hops through the inbound tunnel, with K no longer than 3. The size of\n" "the network (N) bears no impact." msgstr "" @@ -7327,13 +6549,10 @@ msgstr "Kur?" #, python-format msgid "" "I2P initially began in Feb 2003 as a proposed modification to <a\n" -"href=\"http://freenetproject.org\">Freenet</a> to allow it to use " -"alternate transports, such as <a\n" +"href=\"http://freenetproject.org\">Freenet</a> to allow it to use alternate transports, such as <a\n" "href=\"%(jms)s\">JMS</a>, then grew into its own as an\n" -"'anonCommFramework' in April 2003, turning into I2P in July, with code " -"being written in earnest\n" -"starting in August '03. I2P is currently under development, following the" -" <a href=\"%(roadmap)s\">roadmap</a>." +"'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest\n" +"starting in August '03. I2P is currently under development, following the <a href=\"%(roadmap)s\">roadmap</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:161 @@ -7343,22 +6562,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/intro.html:162 #, python-format msgid "" -"We have a small <a href=\"%(team)s\">team</a> spread around several " -"continents, working to advance\n" -"different aspects of the project. We are very open to other developers " -"who want to get involved and\n" -"anyone else who would like to contribute in other ways, such as " -"critiques, peer review, testing,\n" -"writing I2P enabled applications, or documentation. The entire system is " -"open source - the router\n" -"and most of the SDK are outright public domain with some BSD and Cryptix " -"licensed code, while some\n" -"applications like I2PTunnel and I2PSnark are GPL. Almost everything is " -"written in Java (1.5+),\n" -"though some third party applications are being written in Python and " -"other languages. The code works\n" -"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual" -" Machines." +"We have a small <a href=\"%(team)s\">team</a> spread around several continents, working to advance\n" +"different aspects of the project. We are very open to other developers who want to get involved and\n" +"anyone else who would like to contribute in other ways, such as critiques, peer review, testing,\n" +"writing I2P enabled applications, or documentation. The entire system is open source - the router\n" +"and most of the SDK are outright public domain with some BSD and Cryptix licensed code, while some\n" +"applications like I2PTunnel and I2PSnark are GPL. Almost everything is written in Java (1.5+),\n" +"though some third party applications are being written in Python and other languages. The code works\n" +"on <a href=\"http://java.com/en/\">Sun Java SE</a> and other Java Virtual Machines." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:173 @@ -7368,12 +6579,9 @@ msgstr "Ku?" #: i2p2www/pages/site/docs/how/intro.html:174 #, python-format msgid "" -"Anyone interested should join us on the IRC channel #i2p-dev (hosted " -"concurrently on irc.freenode.net,\n" -"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are" -" currently no\n" -"scheduled development meetings, however <a href=\"%(meetings)s\">archives" -" are available</a>." +"Anyone interested should join us on the IRC channel #i2p-dev (hosted concurrently on irc.freenode.net,\n" +"irc.postman.i2p, irc.echelon.i2p, irc.dg.i2p and irc.oftc.net). There are currently no\n" +"scheduled development meetings, however <a href=\"%(meetings)s\">archives are available</a>." msgstr "" #: i2p2www/pages/site/docs/how/intro.html:180 @@ -7397,39 +6605,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:8 msgid "" "I2P's netDb is a specialized distributed database, containing \n" -"just two types of data - router contact information (<b>RouterInfos</b>) " -"and destination contact\n" -"information (<b>LeaseSets</b>). Each piece of data is signed by the " -"appropriate party and verified\n" -"by anyone who uses or stores it. In addition, the data has liveliness " -"information\n" -"within it, allowing irrelevant entries to be dropped, newer entries to " -"replace\n" +"just two types of data - router contact information (<b>RouterInfos</b>) and destination contact\n" +"information (<b>LeaseSets</b>). Each piece of data is signed by the appropriate party and verified\n" +"by anyone who uses or stores it. In addition, the data has liveliness information\n" +"within it, allowing irrelevant entries to be dropped, newer entries to replace\n" "older ones, and protection against certain classes of attack." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:17 msgid "" "The netDb is distributed with a simple technique called \"floodfill\",\n" -"where a subset of all routers, called \"floodfill routers\", maintains " -"the distributed database." +"where a subset of all routers, called \"floodfill routers\", maintains the distributed database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:25 msgid "" -"When an I2P router wants to contact another router, they need to know " -"some \n" -"key pieces of data - all of which are bundled up and signed by the router" -" into\n" -"a structure called the \"RouterInfo\", which is distributed with the " -"SHA256 of the router's identity\n" +"When an I2P router wants to contact another router, they need to know some \n" +"key pieces of data - all of which are bundled up and signed by the router into\n" +"a structure called the \"RouterInfo\", which is distributed with the SHA256 of the router's identity\n" "as the key. The structure itself contains:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:32 msgid "" -"The router's identity (an encryption key, a signing key, and a " -"certificate)" +"The router's identity (an encryption key, a signing key, and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:33 @@ -7460,8 +6659,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:47 msgid "" -"Capabilities flags - used to indicate floodfill participation, " -"approximate bandwidth, and perceived reachability" +"Capabilities flags - used to indicate floodfill participation, approximate " +"bandwidth, and perceived reachability" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:49 @@ -7520,23 +6719,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:76 msgid "" -"Always sent as 90m, for compatibility with an older scheme where routers " -"published their actual uptime,\n" +"Always sent as 90m, for compatibility with an older scheme where routers published their actual uptime,\n" "and only sent tunnel requests to peers whose uptime was more than 60m" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:82 msgid "" "These values are used by other routers for basic decisions.\n" -"Should we connect to this router? Should we attempt to route a tunnel " -"through this router?\n" -"The bandwidth capability flag, in particular, is used only to determine " -"whether\n" +"Should we connect to this router? Should we attempt to route a tunnel through this router?\n" +"The bandwidth capability flag, in particular, is used only to determine whether\n" "the router meets a minimum threshold for routing tunnels.\n" -"Above the minimum threshold, the advertised bandwidth is not used or " -"trusted anywhere\n" -"in the router, except for display in the user interface and for debugging" -" and network analysis." +"Above the minimum threshold, the advertised bandwidth is not used or trusted anywhere\n" +"in the router, except for display in the user interface and for debugging and network analysis." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:102 @@ -7547,13 +6741,11 @@ msgstr "Opsionet Shtesë" #, python-format msgid "" "Additional text options include\n" -"a small number of statistics about the router's health, which are " -"aggregated by\n" +"a small number of statistics about the router's health, which are aggregated by\n" "sites such as <a href=\"http://%(stats)s/\">%(stats)s</a>\n" "for network performance analysis and debugging.\n" "These statistics were chosen to provide data crucial to the developers,\n" -"such as tunnel build success rates, while balancing the need for such " -"data\n" +"such as tunnel build success rates, while balancing the need for such data\n" "with the side-effects that could result from revealing this data.\n" "Current statistics are limited to:" msgstr "" @@ -7568,18 +6760,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:119 msgid "" -"Floodfill routers publish additional data on the number of entries in " -"their network database." +"Floodfill routers publish additional data on the number of entries in their " +"network database." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:123 msgid "" "The data published can be seen in the router's user interface,\n" "but is not used or trusted within the router.\n" -"As the network has matured, we have gradually removed most of the " -"published\n" -"statistics to improve anonymity, and we plan to remove more in future " -"releases." +"As the network has matured, we have gradually removed most of the published\n" +"statistics to improve anonymity, and we plan to remove more in future releases." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:130 @@ -7588,8 +6778,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:132 msgid "" -"As of release 0.9.24, routers may declare that they are part of a " -"\"family\", operated by the same entity.\n" +"As of release 0.9.24, routers may declare that they are part of a \"family\", operated by the same entity.\n" "Multiple routers in the same family will not be used in a single tunnel." msgstr "" @@ -7608,16 +6797,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:159 msgid "" "RouterInfos have no set expiration time.\n" -"Each router is free to maintain its own local policy to trade off the " -"frequency of RouterInfo lookups\n" +"Each router is free to maintain its own local policy to trade off the frequency of RouterInfo lookups\n" "with memory or disk usage.\n" "In the current implementation, there are the following general policies:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:166 msgid "" -"There is no expiration during the first hour of uptime, as the persistent" -" stored data may be old." +"There is no expiration during the first hour of uptime, as the persistent " +"stored data may be old." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:169 @@ -7626,25 +6814,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:172 msgid "" -"As the number of local RouterInfos grows, the expiration time shrinks, in" -" an attempt to maintain\n" -"a reasonable number RouterInfos. The expiration time with less than 120 " -"routers is 72 hours,\n" +"As the number of local RouterInfos grows, the expiration time shrinks, in an attempt to maintain\n" +"a reasonable number RouterInfos. The expiration time with less than 120 routers is 72 hours,\n" "while expiration time with 300 routers is around 30 hours." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:177 #, python-format msgid "" -"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in " -"about an hour, as\n" +"RouterInfos containing <a href=\"%(ssu)s\">SSU</a> introducers expire in about an hour, as\n" "the introducer list expires in about that time." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:181 msgid "" -"Floodfills use a short expiration time (1 hour) for all local " -"RouterInfos, as valid RouterInfos will\n" +"Floodfills use a short expiration time (1 hour) for all local RouterInfos, as valid RouterInfos will\n" "be frequently republished to them." msgstr "" @@ -7660,8 +6844,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:192 msgid "" -"It may be desirable to persistently store Meta LeaseSets with long " -"expirations.\n" +"It may be desirable to persistently store Meta LeaseSets with long expirations.\n" "This is implementation-dependent." msgstr "" @@ -7675,10 +6858,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:212 msgid "" -"The second piece of data distributed in the netDb is a \"LeaseSet\" - " -"documenting\n" -"a group of <b>tunnel entry points (leases)</b> for a particular client " -"destination.\n" +"The second piece of data distributed in the netDb is a \"LeaseSet\" - documenting\n" +"a group of <b>tunnel entry points (leases)</b> for a particular client destination.\n" "Each of these leases specify the following information:" msgstr "" @@ -7704,8 +6885,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:454 msgid "" "One exception is for Encrypted LeaseSets (LS2), as of release 0.9.38.\n" -"The SHA256 of the type byte (3) followed by the blinded public key is " -"used for the DHT key,\n" +"The SHA256 of the type byte (3) followed by the blinded public key is used for the DHT key,\n" "and then rotated as usual." msgstr "" @@ -7719,14 +6899,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:239 msgid "" -"The destination itself (an encryption key, a signing key and a " -"certificate)" +"The destination itself (an encryption key, a signing key and a certificate)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:240 msgid "" -"Additional encryption public key: used for end-to-end encryption of " -"garlic messages" +"Additional encryption public key: used for end-to-end encryption of garlic " +"messages" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:241 @@ -7737,8 +6916,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:242 msgid "" -"Signature of all the LeaseSet data, to make sure the Destination " -"published the LeaseSet." +"Signature of all the LeaseSet data, to make sure the Destination published " +"the LeaseSet." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:246 @@ -7769,13 +6948,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:263 msgid "" -"A LeaseSet for a destination used only for outgoing connections is " -"<i>unpublished</i>.\n" +"A LeaseSet for a destination used only for outgoing connections is <i>unpublished</i>.\n" "It is never sent for publication to a floodfill router.\n" -"\"Client\" tunnels, such as those for web browsing and IRC clients, are " -"unpublished.\n" -"Servers will still be able to send messages back to those unpublished " -"destinations,\n" +"\"Client\" tunnels, such as those for web browsing and IRC clients, are unpublished.\n" +"Servers will still be able to send messages back to those unpublished destinations,\n" "because of <a href=\"#lsp\">I2NP storage messages</a>." msgstr "" @@ -7785,24 +6961,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:274 msgid "" -"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero " -"leases.\n" -"Revocations must be signed by the additional signing key in the LeaseSet." -"\n" -"Revocations are not fully implemented, and it is unclear if they have any" -" practical use.\n" -"This is the only planned use for that signing key, so it is currently " -"unused." +"A LeaseSet may be <i>revoked</i> by publishing a new LeaseSet with zero leases.\n" +"Revocations must be signed by the additional signing key in the LeaseSet.\n" +"Revocations are not fully implemented, and it is unclear if they have any practical use.\n" +"This is the only planned use for that signing key, so it is currently unused." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:283 msgid "" "As of release 0.9.38, floodfills support a new LeaseSet2 structure.\n" -"This structure is very similar to the old LeaseSet structure, and serves " -"the same purpose.\n" +"This structure is very similar to the old LeaseSet structure, and serves the same purpose.\n" "The new structure provides the flexibility required to support new\n" -"encryption types, multiple encryption types, options, offline signing " -"keys,\n" +"encryption types, multiple encryption types, options, offline signing keys,\n" "and other features.\n" "See proposal 123 for details." msgstr "" @@ -7811,15 +6981,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:715 msgid "" "As of release 0.9.38, floodfills support a new Meta LeaseSet structure.\n" -"This structure provides a tree-like structure in the DHT, to refer to " -"other LeaseSets.\n" -"Using Meta LeaseSets, a site may implement large multihomed services, " -"where several\n" +"This structure provides a tree-like structure in the DHT, to refer to other LeaseSets.\n" +"Using Meta LeaseSets, a site may implement large multihomed services, where several\n" "different Destinations are used to provide a common service.\n" "The entries in a Meta LeaseSet are Destinations or other Meta LeaseSets,\n" "and may have long expirations, up to 18.2 hours.\n" -"Using this facility, it should be possible to run hundreds or thousands " -"of Destinations hosting a common service.\n" +"Using this facility, it should be possible to run hundreds or thousands of Destinations hosting a common service.\n" "See proposal 123 for details." msgstr "" @@ -7837,29 +7004,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:313 msgid "" -"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate" -" key.\n" -"The leases may only be decoded, and thus the destination may only be " -"contacted,\n" +"In an <i>encrypted</i> LeaseSet, all Leases are encrypted with a separate key.\n" +"The leases may only be decoded, and thus the destination may only be contacted,\n" "by those with the key.\n" -"There is no flag or other direct indication that the LeaseSet is " -"encrypted.\n" -"Encrypted LeaseSets are not widely used, and it is a topic for future " -"work to\n" -"research whether the user interface and implementation of encrypted " -"LeaseSets could be improved." +"There is no flag or other direct indication that the LeaseSet is encrypted.\n" +"Encrypted LeaseSets are not widely used, and it is a topic for future work to\n" +"research whether the user interface and implementation of encrypted LeaseSets could be improved." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:324 msgid "" -"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet " -"structure.\n" -"The Destination is hidden, and only a blinded public key and an " -"expiration\n" +"As of release 0.9.38, floodfills support a new, EncryptedLeaseSet structure.\n" +"The Destination is hidden, and only a blinded public key and an expiration\n" "are visible to the floodfill.\n" "Only those that have the full Destination may decrypt the structure.\n" -"The structure is stored at a DHT location based on the hash of the " -"blinded public key,\n" +"The structure is stored at a DHT location based on the hash of the blinded public key,\n" "not the hash of the Destination.\n" "See proposal 123 for details." msgstr "" @@ -7870,12 +7029,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:336 msgid "" -"For regular LeaseSets, the expiration is the time of the latest " -"expiration of its leases.\n" -"For the new LeaseSet2 data structures, the expiration is specified in the" -" header.\n" -"For LeaseSet2, the expiration should match the latest expiration of its " -"leases.\n" +"For regular LeaseSets, the expiration is the time of the latest expiration of its leases.\n" +"For the new LeaseSet2 data structures, the expiration is specified in the header.\n" +"For LeaseSet2, the expiration should match the latest expiration of its leases.\n" "For EncryptedLeaseSet and MetaLeaseSet, the expiration may vary,\n" "and maximum expiration may be enforced, to be determined." msgstr "" @@ -7886,8 +7042,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:346 msgid "" -"No persistent storage of LeaseSet data is required, since they expire so " -"quickly.\n" +"No persistent storage of LeaseSet data is required, since they expire so quickly.\n" "Howewver, persistent storage of EncryptedLeaseSet and MetaLeaseSet data\n" "with long expirations may be advisable." msgstr "" @@ -7913,42 +7068,30 @@ msgstr "" msgid "" "The netDb is decentralized, however you do need at\n" "least one reference to a peer so that the integration process\n" -"ties you in. This is accomplished by \"reseeding\" your router with the " -"RouterInfo\n" -"of an active peer - specifically, by retrieving their " -"<code>routerInfo-$hash.dat</code>\n" -"file and storing it in your <code>netDb/</code> directory. Anyone can " -"provide\n" -"you with those files - you can even provide them to others by exposing " -"your own\n" +"ties you in. This is accomplished by \"reseeding\" your router with the RouterInfo\n" +"of an active peer - specifically, by retrieving their <code>routerInfo-$hash.dat</code>\n" +"file and storing it in your <code>netDb/</code> directory. Anyone can provide\n" +"you with those files - you can even provide them to others by exposing your own\n" "netDb directory. To simplify the process,\n" -"volunteers publish their netDb directories (or a subset) on the regular " -"(non-i2p) network,\n" +"volunteers publish their netDb directories (or a subset) on the regular (non-i2p) network,\n" "and the URLs of these directories are hardcoded in I2P.\n" -"When the router starts up for the first time, it automatically fetches " -"from\n" +"When the router starts up for the first time, it automatically fetches from\n" "one of these URLs, selected at random." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:379 msgid "" -"The floodfill netDb is a simple distributed storage mechanism. The " -"storage\n" -"algorithm is simple: send the data to the closest peer that has " -"advertised\n" -"itself as a floodfill router. When the peer in the floodfill netDb " -"receives a\n" -"netDb store from a peer not in the floodfill netDb, they send it to a " -"subset of\n" -"the floodfill netDb-peers. The peers selected are the ones closest " -"(according\n" +"The floodfill netDb is a simple distributed storage mechanism. The storage\n" +"algorithm is simple: send the data to the closest peer that has advertised\n" +"itself as a floodfill router. When the peer in the floodfill netDb receives a\n" +"netDb store from a peer not in the floodfill netDb, they send it to a subset of\n" +"the floodfill netDb-peers. The peers selected are the ones closest (according\n" "to the <a href=\"#kad\">XOR-metric</a>) to a specific key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:388 msgid "" -"Determining who is part of the floodfill netDb is trivial - it is exposed" -" in each \n" +"Determining who is part of the floodfill netDb is trivial - it is exposed in each \n" "router's published routerInfo as a capability." msgstr "" @@ -7978,15 +7121,13 @@ msgid "" "Routers with high bandwidth limits (which must be manually configured,\n" "as the default is much lower) are presumed to be on lower-latency\n" "connections, and are more likely to be available 24/7.\n" -"The current minimum share bandwidth for a floodfill router is 128 " -"KBytes/sec." +"The current minimum share bandwidth for a floodfill router is 128 KBytes/sec." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:419 msgid "" "In addition, a router must pass several additional tests for health\n" -"(outbound message queue time, job lag, etc.) before floodfill operation " -"is\n" +"(outbound message queue time, job lag, etc.) before floodfill operation is\n" "automatically enabled." msgstr "" @@ -8013,13 +7154,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:441 msgid "" -"A floodfill router's only services that are in addition to those of non-" -"floodfill routers\n" +"A floodfill router's only services that are in addition to those of non-floodfill routers\n" "are in accepting netDb stores and responding to netDb queries.\n" -"Since they are generally high-bandwidth, they are more likely to " -"participate in a high number of tunnels\n" -"(i.e. be a \"relay\" for others), but this is not directly related to " -"their distributed database services." +"Since they are generally high-bandwidth, they are more likely to participate in a high number of tunnels\n" +"(i.e. be a \"relay\" for others), but this is not directly related to their distributed database services." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:449 @@ -8028,33 +7166,24 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:450 msgid "" -"The netDb uses a simple Kademlia-style XOR metric to determine closeness." -"\n" -"To create a Kademlia key, the SHA256 hash of the RouterIdentity or " -"Destination is computed." +"The netDb uses a simple Kademlia-style XOR metric to determine closeness.\n" +"To create a Kademlia key, the SHA256 hash of the RouterIdentity or Destination is computed." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:459 msgid "" -"A modification to this algorithm is done to increase the costs of <a href" -"=\"#sybil-partial\">Sybil attacks</a>.\n" -"Instead of the SHA256 hash of the key being looked up of stored, the " -"SHA256 hash is taken\n" -"of the 32-byte binary search key appended with the UTC date represented " -"as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" -"This is called the \"routing key\", and it changes every day at midnight " -"UTC.\n" -"Only the search key is modified in this way, not the floodfill router " -"hashes.\n" -"The daily transformation of the DHT is sometimes called \"keyspace " -"rotation\",\n" +"A modification to this algorithm is done to increase the costs of <a href=\"#sybil-partial\">Sybil attacks</a>.\n" +"Instead of the SHA256 hash of the key being looked up of stored, the SHA256 hash is taken\n" +"of the 32-byte binary search key appended with the UTC date represented as an 8-byte ASCII string yyyyMMdd, i.e. SHA256(key + yyyyMMdd).\n" +"This is called the \"routing key\", and it changes every day at midnight UTC.\n" +"Only the search key is modified in this way, not the floodfill router hashes.\n" +"The daily transformation of the DHT is sometimes called \"keyspace rotation\",\n" "although it isn't strictly a rotation." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:469 msgid "" -"Routing keys are never sent on-the-wire in any I2NP message, they are " -"only used locally for\n" +"Routing keys are never sent on-the-wire in any I2NP message, they are only used locally for\n" "determination of distance." msgstr "" @@ -8069,8 +7198,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:479 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"RouterInfo are exchanged with peers\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local RouterInfo are exchanged with peers\n" "as a part of the initialization of a <a href=\"%(ntcp)s\">NTCP</a>\n" "or <a href=\"%(ssu)s\">SSU</a> transport connection." msgstr "" @@ -8082,46 +7210,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:487 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local " -"LeaseSet are periodically exchanged with peers\n" -"by bundling them in a garlic message along with normal traffic from the " -"related Destination.\n" -"This allows an initial response, and later responses, to be sent to an " -"appropriate Lease,\n" -"without requiring any LeaseSet lookups, or requiring the communicating " -"Destinations to have published LeaseSets at all." +"<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessages containing the local LeaseSet are periodically exchanged with peers\n" +"by bundling them in a garlic message along with normal traffic from the related Destination.\n" +"This allows an initial response, and later responses, to be sent to an appropriate Lease,\n" +"without requiring any LeaseSet lookups, or requiring the communicating Destinations to have published LeaseSets at all." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:495 msgid "" "The DatabaseStoreMessage should be sent to the floodfill that is closest\n" "to the current routing key for the RouterInfo or LeaseSet being stored.\n" -"Currently, the closest floodfill is found by a search in the local " -"database.\n" -"Even if that floodfill is not actually closest, it will flood it " -"\"closer\" by\n" +"Currently, the closest floodfill is found by a search in the local database.\n" +"Even if that floodfill is not actually closest, it will flood it \"closer\" by\n" "sending it to multiple other floodfills.\n" "This provides a high degree of fault-tolerance." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:504 msgid "" -"In traditional Kademlia, a peer would do a \"find-closest\" search before" -" inserting\n" -"an item in the DHT to the closest target. As the verify operation will " -"tend to\n" -"discover closer floodfills if they are present, a router will quickly " -"improve\n" -"its knowledge of the DHT \"neighborhood\" for the RouterInfo and " -"LeaseSets it regularly publishes.\n" -"While I2NP does not define a \"find-closest\" message, if it becomes " -"necessary,\n" -"a router may simply do an iterative search for a key with the least " -"significant bit flipped\n" -"(i.e. key ^ 0x01) until no closer peers are received in the " -"DatabaseSearchReplyMessages.\n" -"This ensures that the true closest peer will be found even if a more-" -"distant peer had\n" +"In traditional Kademlia, a peer would do a \"find-closest\" search before inserting\n" +"an item in the DHT to the closest target. As the verify operation will tend to\n" +"discover closer floodfills if they are present, a router will quickly improve\n" +"its knowledge of the DHT \"neighborhood\" for the RouterInfo and LeaseSets it regularly publishes.\n" +"While I2NP does not define a \"find-closest\" message, if it becomes necessary,\n" +"a router may simply do an iterative search for a key with the least significant bit flipped\n" +"(i.e. key ^ 0x01) until no closer peers are received in the DatabaseSearchReplyMessages.\n" +"This ensures that the true closest peer will be found even if a more-distant peer had\n" "the netdb item." msgstr "" @@ -8132,11 +7246,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:518 #, python-format msgid "" -"A router publishes its own RouterInfo by directly connecting to a " -"floodfill router\n" +"A router publishes its own RouterInfo by directly connecting to a floodfill router\n" "and sending it a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token. The message is not end-to-end garlic " -"encrypted,\n" +"with a nonzero Reply Token. The message is not end-to-end garlic encrypted,\n" "as this is a direct connection, so there are no intervening routers\n" "(and no need to hide this data anyway).\n" "The floodfill router replies with a\n" @@ -8150,8 +7262,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:533 msgid "" -"Storage of LeaseSets is much more sensitive than for RouterInfos, as a " -"router\n" +"Storage of LeaseSets is much more sensitive than for RouterInfos, as a router\n" "must take care that the LeaseSet cannot be associated with the router." msgstr "" @@ -8160,10 +7271,8 @@ msgstr "" msgid "" "A router publishes a local LeaseSet by\n" "sending a <a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage\n" -"with a nonzero Reply Token over an outbound client tunnel for that " -"Destination.\n" -"The message is end-to-end garlic encrypted using the Destination's " -"Session Key Manager,\n" +"with a nonzero Reply Token over an outbound client tunnel for that Destination.\n" +"The message is end-to-end garlic encrypted using the Destination's Session Key Manager,\n" "to hide the message from the tunnel's outbound endpoint.\n" "The floodfill router replies with a\n" "<a href=\"%(i2np)s\">I2NP</a> DeliveryStatusMessage,\n" @@ -8179,17 +7288,12 @@ msgstr "" #, python-format msgid "" "After a floodfill router receives a DatabaseStoreMessage containing a\n" -"valid RouterInfo or LeaseSet which is newer than that previously stored " -"in its\n" +"valid RouterInfo or LeaseSet which is newer than that previously stored in its\n" "local NetDb, it \"floods\" it.\n" -"To flood a NetDb entry, it looks up several (currently %(floodsize)s) " -"floodfill routers closest to the routing key\n" -"of the NetDb entry. (The routing key is the SHA256 Hash of the " -"RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" -"By flooding to those closest to the key, not closest to itself, the " -"floodfill ensures that the storage\n" -"gets to the right place, even if the storing router did not have good " -"knowledge of the\n" +"To flood a NetDb entry, it looks up several (currently %(floodsize)s) floodfill routers closest to the routing key\n" +"of the NetDb entry. (The routing key is the SHA256 Hash of the RouterIdentity or Destination with the date (yyyyMMdd) appended.)\n" +"By flooding to those closest to the key, not closest to itself, the floodfill ensures that the storage\n" +"gets to the right place, even if the storing router did not have good knowledge of the\n" "DHT \"neighborhood\" for the routing key." msgstr "" @@ -8211,17 +7315,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:574 #, python-format msgid "" -"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to " -"request a netdb entry from a floodfill router.\n" +"The <a href=\"%(i2np)s\">I2NP</a> DatabaseLookupMessage is used to request a netdb entry from a floodfill router.\n" "Lookups are sent out one of the router's outbound exploratory tunnels.\n" -"The replies are specified to return via one of the router's inbound " -"exploratory tunnels." +"The replies are specified to return via one of the router's inbound exploratory tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:580 msgid "" -"Lookups are generally sent to the two \"good\" (the connection doesn't " -"fail) floodfill routers closest to the requested key, in parallel." +"Lookups are generally sent to the two \"good\" (the connection doesn't fail)" +" floodfill routers closest to the requested key, in parallel." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:584 @@ -8229,8 +7331,7 @@ msgstr "" msgid "" "If the key is found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseStoreMessage.\n" -"If the key is not found locally by the floodfill router, it responds with" -" a\n" +"If the key is not found locally by the floodfill router, it responds with a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "containing a list of other floodfill routers close to the key." msgstr "" @@ -8238,22 +7339,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:592 msgid "" "LeaseSet lookups are garlic encrypted end-to-end as of release 0.9.5.\n" -"RouterInfo lookups are not encrypted and thus are vulnerable to snooping " -"by the outbound endpoint\n" -"(OBEP) of the client tunnel. This is due to the expense of the ElGamal " -"encryption.\n" +"RouterInfo lookups are not encrypted and thus are vulnerable to snooping by the outbound endpoint\n" +"(OBEP) of the client tunnel. This is due to the expense of the ElGamal encryption.\n" "RouterInfo lookup encryption may be enabled in a future release." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:599 msgid "" -"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage" -" or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies to a LeaseSet lookup (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted by including the session key and tag in the lookup.\n" -"This hides the reply from the inbound gateway (IBGW) of the reply tunnel." -"\n" -"Responses to RouterInfo lookups will be encrypted if we enable the lookup" -" encryption." +"This hides the reply from the inbound gateway (IBGW) of the reply tunnel.\n" +"Responses to RouterInfo lookups will be encrypted if we enable the lookup encryption." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:606 @@ -8267,41 +7363,31 @@ msgstr "" msgid "" "Due to the relatively small size of the network and flooding redundancy,\n" "lookups are usually O(1) rather than O(log n).\n" -"A router is highly likely to know a floodfill router close enough to the " -"key to get the answer on the first try.\n" +"A router is highly likely to know a floodfill router close enough to the key to get the answer on the first try.\n" "In releases prior to 0.8.9, routers used a lookup redundancy of two\n" -"(that is, two lookups were performed in parallel to different peers), and" -"\n" -"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was " -"implemented.\n" +"(that is, two lookups were performed in parallel to different peers), and\n" +"neither <i>recursive</i> nor <i>iterative</i> routing for lookups was implemented.\n" "Queries were sent through <i>multiple routes simultaneously</i>\n" "to <i>reduce the chance of query failure</i>." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:621 msgid "" -"As of release 0.8.9, <i>iterative lookups</i> are implemented with no " -"lookup redundancy.\n" +"As of release 0.8.9, <i>iterative lookups</i> are implemented with no lookup redundancy.\n" "This is a more efficient and reliable lookup that will work much better\n" "when not all floodfill peers are known, and it removes a serious\n" -"limitation to network growth. As the network grows and each router knows " -"only a small\n" +"limitation to network growth. As the network grows and each router knows only a small\n" "subset of the floodfill peers, lookups will become O(log n).\n" -"Even if the peer does not return references closer to the key, the lookup" -" continues with\n" -"the next-closest peer, for added robustness, and to prevent a malicious " -"floodfill from\n" -"black-holing a part of the key space. Lookups continue until a total " -"lookup timeout is reached,\n" +"Even if the peer does not return references closer to the key, the lookup continues with\n" +"the next-closest peer, for added robustness, and to prevent a malicious floodfill from\n" +"black-holing a part of the key space. Lookups continue until a total lookup timeout is reached,\n" "or the maximum number of peers is queried." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:633 msgid "" -"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash " -"directly as both the node ID and the Kademlia key.\n" -"Incorrect responses that are not closer to the search key are generally " -"ignored.\n" +"<i>Node IDs</i> are <i>verifiable</i> in that we use the router hash directly as both the node ID and the Kademlia key.\n" +"Incorrect responses that are not closer to the search key are generally ignored.\n" "Given the current size of the network, a router has\n" "<i>detailed knowledge of the neighborhood of the destination ID space</i>." msgstr "" @@ -8313,8 +7399,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:643 #, python-format msgid "" -"Note: RouterInfo verification is disabled as of release 0.9.7.1 to " -"prevent\n" +"Note: RouterInfo verification is disabled as of release 0.9.7.1 to prevent\n" "the attack described in the paper\n" "<a href=\"%(egger2013)s\">Practical Attacks Against the I2P Network</a>.\n" "It is not clear if verification can be redesigned to be done safely." @@ -8322,13 +7407,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:650 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" "Lookups sent out one of the router's outbound exploratory tunnels.\n" -"Lookups are end-to-end garlic encrypted to prevent snooping by the " -"outbound endpoint(OBEP)." +"Lookups are end-to-end garlic encrypted to prevent snooping by the outbound endpoint(OBEP)." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:658 @@ -8337,22 +7420,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:659 msgid "" -"To verify a storage was successful, a router simply waits about 10 " -"seconds,\n" +"To verify a storage was successful, a router simply waits about 10 seconds,\n" "then sends a lookup to another floodfill router close to the key\n" "(but not the one the store was sent to).\n" -"Lookups sent out one of the outbound client tunnels for the destination " -"of the LeaseSet being verified.\n" +"Lookups sent out one of the outbound client tunnels for the destination of the LeaseSet being verified.\n" "To prevent snooping by the OBEP of the outbound tunnel,\n" "lookups are end-to-end garlic encrypted.\n" -"The replies are specified to return via one of the client's inbound " -"tunnels." +"The replies are specified to return via one of the client's inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:669 msgid "" -"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a " -"DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" +"As of release 0.9.7, replies for both RouterInfo and LeaseSet lookups (a DatabaseStoreMessage or a DatabaseSearchReplyMessage)\n" "will be encrypted,\n" "to hide the reply from the inbound gateway (IBGW) of the reply tunnel." msgstr "" @@ -8364,23 +7443,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:678 #, python-format msgid "" -"<i>Exploration</i> is a special form of netdb lookup, where a router " -"attempts to learn about\n" +"<i>Exploration</i> is a special form of netdb lookup, where a router attempts to learn about\n" "new routers.\n" -"It does this by sending a floodfill router a <a " -"href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random " -"key.\n" +"It does this by sending a floodfill router a <a href=\"%(i2np)s\">I2NP</a> DatabaseLookup Message, looking for a random key.\n" "As this lookup will fail, the floodfill would normally respond with a\n" -"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing " -"hashes of floodfill routers close to the key.\n" -"This would not be helpful, as the requesting router probably already " -"knows those floodfills,\n" -"and it would be impractical to add all floodfill routers to the \"don't " -"include\" field of the DatabaseLookup Message.\n" +"<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage containing hashes of floodfill routers close to the key.\n" +"This would not be helpful, as the requesting router probably already knows those floodfills,\n" +"and it would be impractical to add all floodfill routers to the \"don't include\" field of the DatabaseLookup Message.\n" "For an exploration query, the requesting router sets a special flag in\n" "the DatabaseLookup Message.\n" -"The floodfill will then respond only with non-floodfill routers close to " -"the requested key." +"The floodfill will then respond only with non-floodfill routers close to the requested key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:692 @@ -8389,14 +7461,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:693 msgid "" -"The response to a lookup request is either a Database Store Message (on " -"success) or a\n" -"Database Search Reply Message (on failure). The DSRM contains a 'from' " -"router hash field\n" +"The response to a lookup request is either a Database Store Message (on success) or a\n" +"Database Search Reply Message (on failure). The DSRM contains a 'from' router hash field\n" "to indicate the source of the reply; the DSM does not.\n" "The DSRM 'from' field is unauthenticated and may be spoofed or invalid.\n" -"There are no other response tags. Therefore, when making multiple " -"requests in parallel, it is\n" +"There are no other response tags. Therefore, when making multiple requests in parallel, it is\n" "difficult to monitor the performance of the various floodfill routers." msgstr "" @@ -8406,19 +7475,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:705 msgid "" -"Destinations may be hosted on multiple routers simultaneously, by using " -"the same\n" +"Destinations may be hosted on multiple routers simultaneously, by using the same\n" "private and public keys (traditionally stored in eepPriv.dat files).\n" -"As both instances will periodically publish their signed LeaseSets to the" -" floodfill peers,\n" -"the most recently published LeaseSet will be returned to a peer " -"requesting a database lookup.\n" -"As LeaseSets have (at most) a 10 minute lifetime, should a particular " -"instance go down,\n" -"the outage will be 10 minutes at most, and generally much less than that." -"\n" -"The multihoming function has been verified and is in use by several " -"services on the network." +"As both instances will periodically publish their signed LeaseSets to the floodfill peers,\n" +"the most recently published LeaseSet will be returned to a peer requesting a database lookup.\n" +"As LeaseSets have (at most) a 10 minute lifetime, should a particular instance go down,\n" +"the outage will be 10 minutes at most, and generally much less than that.\n" +"The multihoming function has been verified and is in use by several services on the network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:727 @@ -8448,8 +7511,7 @@ msgstr "" #, python-format msgid "" "There are currently around %(ffcount)s floodfill routers in the network.\n" -"Most of the following attacks will become more difficult, or have less " -"impact,\n" +"Most of the following attacks will become more difficult, or have less impact,\n" "as the network size and number of floodfill routers increase." msgstr "" @@ -8460,8 +7522,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:748 #, python-format msgid "" -"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill" -" routers closest to the key." +"Via flooding, all netdb entries are stored on the %(floodsize)s floodfill " +"routers closest to the key." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:753 @@ -8482,8 +7544,7 @@ msgstr "" #, python-format msgid "" "Each router maintains an expanded set of statistics in the\n" -"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router," -"\n" +"<a href=\"%(peerselection)s\">peer profile</a> for each floodfill router,\n" "covering various quality metrics for that peer.\n" "The set includes:" msgstr "" @@ -8514,14 +7575,11 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:775 msgid "" -"Each time a router needs to make a determination on which floodfill " -"router is closest to a key,\n" +"Each time a router needs to make a determination on which floodfill router is closest to a key,\n" "it uses these metrics to determine which floodfill routers are \"good\".\n" -"The methods, and thresholds, used to determine \"goodness\" are " -"relatively new, and\n" +"The methods, and thresholds, used to determine \"goodness\" are relatively new, and\n" "are subject to further analysis and improvement.\n" -"While a completely unresponsive router will quickly be identified and " -"avoided,\n" +"While a completely unresponsive router will quickly be identified and avoided,\n" "routers that are only sometimes malicious may be much harder to deal with." msgstr "" @@ -8533,8 +7591,7 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a large number of floodfill routers spread throughout the " -"keyspace." +"by creating a large number of floodfill routers spread throughout the keyspace." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:791 @@ -8542,35 +7599,29 @@ msgstr "" msgid "" "(In a related example, a researcher recently created a\n" "<a href=\"%(url)s\">large number of Tor relays</a>.)\n" -"If successful, this could be an effective DOS attack on the entire " -"network." +"If successful, this could be an effective DOS attack on the entire network." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:797 msgid "" -"If the floodfills are not sufficiently misbehaving to be marked as " -"\"bad\" using the peer profile\n" +"If the floodfills are not sufficiently misbehaving to be marked as \"bad\" using the peer profile\n" "metrics described above, this is a difficult scenario to handle.\n" -"Tor's response can be much more nimble in the relay case, as the " -"suspicious relays\n" +"Tor's response can be much more nimble in the relay case, as the suspicious relays\n" "can be manually removed from the consensus.\n" -"Some possible responses for the I2P network are listed below, however " -"none of them is completely satisfactory:" +"Some possible responses for the I2P network are listed below, however none of them is completely satisfactory:" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:805 msgid "" -"Compile a list of bad router hashes or IPs, and announce the list through" -" various means\n" -"(console news, website, forum, etc.); users would have to manually " -"download the list and\n" +"Compile a list of bad router hashes or IPs, and announce the list through various means\n" +"(console news, website, forum, etc.); users would have to manually download the list and\n" "add it to their local \"blacklist\"." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:810 msgid "" -"Ask everyone in the network to enable floodfill manually (fight Sybil " -"with more Sybil)" +"Ask everyone in the network to enable floodfill manually (fight Sybil with " +"more Sybil)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:811 @@ -8579,8 +7630,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:812 msgid "" -"Release a new software version that improves the peer profile metrics and" -" thresholds,\n" +"Release a new software version that improves the peer profile metrics and thresholds,\n" "in an attempt to automatically identify the \"bad\" peers." msgstr "" @@ -8592,12 +7642,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:817 msgid "" -"Implement an automatic subscription-based blacklist controlled by a " -"single individual or group.\n" -"This would essentially implement a portion of the Tor \"consensus\" " -"model.\n" -"Unfortunately it would also give a single individual or group the power " -"to\n" +"Implement an automatic subscription-based blacklist controlled by a single individual or group.\n" +"This would essentially implement a portion of the Tor \"consensus\" model.\n" +"Unfortunately it would also give a single individual or group the power to\n" "block participation of any particular router or IP in the network,\n" "or even to completely shutdown or destroy the entire network." msgstr "" @@ -8614,25 +7661,19 @@ msgstr "" #, python-format msgid "" "An attacker may mount a <a href=\"%(url)s\">Sybil attack</a>\n" -"by creating a small number (8-15) of floodfill routers clustered closely " -"in the keyspace,\n" +"by creating a small number (8-15) of floodfill routers clustered closely in the keyspace,\n" "and distribute the RouterInfos for these routers widely.\n" -"Then, all lookups and stores for a key in that keyspace would be directed" -"\n" +"Then, all lookups and stores for a key in that keyspace would be directed\n" "to one of the attacker's routers.\n" -"If successful, this could be an effective DOS attack on a particular I2P " -"Site, for example." +"If successful, this could be an effective DOS attack on a particular I2P Site, for example." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:842 msgid "" -"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key," -"\n" -"an attacker must use a brute-force method to repeatedly generate router " -"hashes\n" +"As the keyspace is indexed by the cryptographic (SHA256) Hash of the key,\n" +"an attacker must use a brute-force method to repeatedly generate router hashes\n" "until he has enough that are sufficiently close to the key.\n" -"The amount of computational power required for this, which is dependent " -"on network\n" +"The amount of computational power required for this, which is dependent on network\n" "size, is unknown." msgstr "" @@ -8640,14 +7681,10 @@ msgstr "" msgid "" "As a partial defense against this attack,\n" "the algorithm used to determine Kademlia \"closeness\" varies over time.\n" -"Rather than using the Hash of the key (i.e. H(k)) to determine closeness," -"\n" -"we use the Hash of the key appended with the current date string, i.e. " -"H(k + YYYYMMDD).\n" -"A function called the \"routing key generator\" does this, which " -"transforms the original key into a \"routing key\".\n" -"In other words, the entire netdb keyspace \"rotates\" every day at UTC " -"midnight.\n" +"Rather than using the Hash of the key (i.e. H(k)) to determine closeness,\n" +"we use the Hash of the key appended with the current date string, i.e. H(k + YYYYMMDD).\n" +"A function called the \"routing key generator\" does this, which transforms the original key into a \"routing key\".\n" +"In other words, the entire netdb keyspace \"rotates\" every day at UTC midnight.\n" "Any partial-keyspace attack would have to be regenerated every day, for\n" "after the rotation, the attacking routers would no longer be close\n" "to the target key, or to each other." @@ -8656,8 +7693,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:862 msgid "" "This attack becomes more difficult as the network size grows.\n" -"However, recent research demonstrates that the keyspace rotation is not " -"particularly effective.\n" +"However, recent research demonstrates that the keyspace rotation is not particularly effective.\n" "An attacker can precompute numerous router hashes in advance,\n" "and only a few routers are sufficient to \"eclipse\" a portion\n" "of the keyspace within a half hour after rotation." @@ -8665,11 +7701,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:870 msgid "" -"One consequence of daily keyspace rotation is that the distributed " -"network database\n" +"One consequence of daily keyspace rotation is that the distributed network database\n" "may become unreliable for a few minutes after the rotation --\n" -"lookups will fail because the new \"closest\" router has not received a " -"store yet.\n" +"lookups will fail because the new \"closest\" router has not received a store yet.\n" "The extent of the issue, and methods for mitigation\n" "(for example netdb \"handoffs\" at midnight)\n" "are a topic for further study." @@ -8732,24 +7766,19 @@ msgstr "" #, python-format msgid "" "See also <a href=\"#lookup\">lookup</a>\n" -"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections " -"2.2-2.3 for terms below in italics)" +"(Reference: <a href=\"%(pdf)s\">Hashing it out in Public</a> Sections 2.2-2.3 for terms below in italics)" msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:926 msgid "" -"Similar to a bootstrap attack, an attacker using a floodfill router could" -" attempt to \"steer\"\n" -"peers to a subset of routers controlled by him by returning their " -"references." +"Similar to a bootstrap attack, an attacker using a floodfill router could attempt to \"steer\"\n" +"peers to a subset of routers controlled by him by returning their references." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:931 msgid "" -"This is unlikely to work via exploration, because exploration is a low-" -"frequency task.\n" -"Routers acquire a majority of their peer references through normal tunnel" -" building activity.\n" +"This is unlikely to work via exploration, because exploration is a low-frequency task.\n" +"Routers acquire a majority of their peer references through normal tunnel building activity.\n" "Exploration results are generally limited to a few router hashes,\n" "and each exploration query is directed to a random floodfill router." msgstr "" @@ -8761,18 +7790,13 @@ msgid "" "For floodfill router references returned in a\n" "<a href=\"%(i2np)s\">I2NP</a> DatabaseSearchReplyMessage\n" "response to a lookup,\n" -"these references are followed if they are closer (or the next closest) to" -" the lookup key.\n" +"these references are followed if they are closer (or the next closest) to the lookup key.\n" "The requesting router does not trust that the references are\n" "closer to the key (i.e. they are <i>verifiably correct</i>.\n" -"The lookup also does not stop when no closer key is found, but continues " -"by querying the\n" -"next-closet node, until the timeout or maximum number of queries is " -"reached.\n" -"This prevents a malicious floodfill from black-holing a part of the key " -"space.\n" -"Also, the daily keyspace rotation requires an attacker to regenerate a " -"router info\n" +"The lookup also does not stop when no closer key is found, but continues by querying the\n" +"next-closet node, until the timeout or maximum number of queries is reached.\n" +"This prevents a malicious floodfill from black-holing a part of the key space.\n" +"Also, the daily keyspace rotation requires an attacker to regenerate a router info\n" "within the desired key space region.\n" "This design ensures that the query capture attack described in\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>\n" @@ -8810,43 +7834,30 @@ msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:973 #, python-format msgid "" -"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used " -"by Torsk and NISAN.\n" -"At first glance, these do not appear to apply to I2P. First, the use of " -"DHT by Torsk and NISAN\n" -"is significantly different from that in I2P. Second, I2P's network " -"database lookups are only\n" -"loosely correlated to the <a href=\"%(peerselection)s\">peer " -"selection</a> and\n" -"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only " -"previously-known peers\n" +"This paper addresses weaknesses in the \"Finger Table\" DHT lookups used by Torsk and NISAN.\n" +"At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN\n" +"is significantly different from that in I2P. Second, I2P's network database lookups are only\n" +"loosely correlated to the <a href=\"%(peerselection)s\">peer selection</a> and\n" +"<a href=\"%(tunnelrouting)s\">tunnel building</a> processes; only previously-known peers\n" "are used for tunnels.\n" "Also, peer selection is unrelated to any notion of DHT key-closeness." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:984 msgid "" -"Some of this may actually be more interesting when the I2P network gets " -"much larger.\n" -"Right now, each router knows a large proportion of the network, so " -"looking up a particular\n" -"Router Info in the network database is not strongly indicative of a " -"future intent to use\n" -"that router in a tunnel. Perhaps when the network is 100 times larger, " -"the lookup may be\n" -"more correlative. Of course, a larger network makes a Sybil attack that " -"much harder." +"Some of this may actually be more interesting when the I2P network gets much larger.\n" +"Right now, each router knows a large proportion of the network, so looking up a particular\n" +"Router Info in the network database is not strongly indicative of a future intent to use\n" +"that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be\n" +"more correlative. Of course, a larger network makes a Sybil attack that much harder." msgstr "" #: i2p2www/pages/site/docs/how/network-database.html:992 #, python-format msgid "" -"However, the general issue of DHT information leakage in I2P needs " -"further investigation.\n" -"The floodfill routers are in a position to observe queries and gather " -"information.\n" -"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as " -"specifed in the paper)\n" +"However, the general issue of DHT information leakage in I2P needs further investigation.\n" +"The floodfill routers are in a position to observe queries and gather information.\n" +"Certainly, at a level of <i>f</i> = 0.2 (20% malicious nodes, as specifed in the paper)\n" "we expect that many of the Sybil threats we describe\n" "(<a href=\"%(threatmodel)s#sybil\">here</a>,\n" "<a href=\"#sybil\">here</a> and\n" @@ -8881,11 +7892,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:10 #, python-format msgid "" -"<b>Peer profiling</b> is the process of collecting data based on the " -"<b>observed</b> performance\n" +"<b>Peer profiling</b> is the process of collecting data based on the <b>observed</b> performance\n" "of other routers or peers, and classifying those peers into groups.\n" -"Profiling does <b>not</b> use any claimed performance data published by " -"the peer itself\n" +"Profiling does <b>not</b> use any claimed performance data published by the peer itself\n" "in the <a href=\"%(netdb)s\">network database</a>." msgstr "" @@ -8900,8 +7909,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:20 #, python-format msgid "" -"Choosing peers from the set of floodfill routers to use for network " -"database storage and queries,\n" +"Choosing peers from the set of floodfill routers to use for network database storage and queries,\n" "which is discussed on the <a href=\"%(netdb)s\">network database</a> page" msgstr "" @@ -8914,11 +7922,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:28 msgid "" "<b>Peer selection</b> is the process of choosing which routers\n" -"on the network we want to relay our messages to go through (which peers " -"will we \n" +"on the network we want to relay our messages to go through (which peers will we \n" "ask to join our tunnels). To accomplish this, we keep track of how each\n" -"peer performs (the peer's \"profile\") and use that data to estimate how" -" \n" +"peer performs (the peer's \"profile\") and use that data to estimate how \n" "fast they are, how often they will be able to accept our requests, and \n" "whether they seem to be overloaded or otherwise unable to perform what\n" "they agree to reliably." @@ -8928,8 +7934,7 @@ msgstr "" #, python-format msgid "" "Unlike some other anonymous networks, in I2P,\n" -"claimed bandwidth is untrusted and is <b>only</b> used to avoid those " -"peers\n" +"claimed bandwidth is untrusted and is <b>only</b> used to avoid those peers\n" "advertising very low bandwidth insufficient for routing tunnels.\n" "All peer selection is done through profiling.\n" "This prevents simple attacks based on peers claiming high bandwidth\n" @@ -8941,10 +7946,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:50 msgid "" -"Peer selection is done quite frequently, as a router may maintain a large" -" number\n" -"of client and exploratory tunnels, and a tunnel lifetime is only 10 " -"minutes." +"Peer selection is done quite frequently, as a router may maintain a large number\n" +"of client and exploratory tunnels, and a tunnel lifetime is only 10 minutes." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:56 @@ -8955,11 +7958,9 @@ msgstr "" #, python-format msgid "" "For more information see the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>\n" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>\n" "presented at <a href=\"%(url)s\">PET-CON 2009.1</a>.\n" -"See <a href=\"#notes\">below</a> for notes on minor changes since the " -"paper was published." +"See <a href=\"#notes\">below</a> for notes on minor changes since the paper was published." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:65 @@ -8969,30 +7970,21 @@ msgstr "Profile" #: i2p2www/pages/site/docs/how/peer-selection.html:66 #, python-format msgid "" -"Each peer has a set of data points collected about them, including " -"statistics \n" -"about how long it takes for them to reply to a network database query, " -"how \n" -"often their tunnels fail, and how many new peers they are able to " -"introduce \n" -"us to, as well as simple data points such as when we last heard from them" -" or\n" -"when the last communication error occurred. The specific data points " -"gathered\n" +"Each peer has a set of data points collected about them, including statistics \n" +"about how long it takes for them to reply to a network database query, how \n" +"often their tunnels fail, and how many new peers they are able to introduce \n" +"us to, as well as simple data points such as when we last heard from them or\n" +"when the last communication error occurred. The specific data points gathered\n" "can be found in the <a href=\"%(url)s\">code</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:75 msgid "" -"Profiles are fairly small, a few KB. To control memory usage, the profile" -" expiration time\n" +"Profiles are fairly small, a few KB. To control memory usage, the profile expiration time\n" "lessens as the number of profiles grows.\n" -"Profiles are kept in memory until router shutdown, when they are written " -"to disk.\n" -"At startup, the profiles are read so the router need not reinitialize all" -" profiles,\n" -"thus allowing a router to quickly re-integrate into the network after " -"startup." +"Profiles are kept in memory until router shutdown, when they are written to disk.\n" +"At startup, the profiles are read so the router need not reinitialize all profiles,\n" +"thus allowing a router to quickly re-integrate into the network after startup." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:85 @@ -9002,10 +7994,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:86 msgid "" "While the profiles themselves can be considered a summary of a peer's \n" -"performance, to allow for effective peer selection we break each summary " -"down \n" -"into four simple values, representing the peer's speed, its capacity, how" -" well \n" +"performance, to allow for effective peer selection we break each summary down \n" +"into four simple values, representing the peer's speed, its capacity, how well \n" "integrated into the network it is, and whether it is failing." msgstr "" @@ -9017,8 +8007,7 @@ msgstr "Shpejtësi" msgid "" "The speed calculation\n" "simply goes through the profile and estimates how much data we can\n" -"send or receive on a single tunnel through the peer in a minute. For " -"this estimate it just looks at\n" +"send or receive on a single tunnel through the peer in a minute. For this estimate it just looks at\n" "performance in the previous minute." msgstr "" @@ -9030,13 +8019,11 @@ msgstr "" msgid "" "The capacity calculation\n" "simply goes through the profile and estimates how many tunnels the peer\n" -"would agree to participate in over a given time period. For this " -"estimate it looks at \n" +"would agree to participate in over a given time period. For this estimate it looks at \n" "how many tunnel build requests\n" "the peer has accepted, rejected, and dropped, and how many\n" "of the agreed-to tunnels later failed.\n" -"While the calculation is time-weighted so that recent activity counts " -"more than later activity,\n" +"While the calculation is time-weighted so that recent activity counts more than later activity,\n" "statistics up to 48 hours old may be included." msgstr "" @@ -9044,10 +8031,8 @@ msgstr "" msgid "" "Recognizing and avoiding unreliable and unreachable\n" "peers is critically important.\n" -"Unfortunately, as the tunnel building and testing require the " -"participation of several peers,\n" -"it is difficult to positively identify the cause of a dropped build " -"request or test failure.\n" +"Unfortunately, as the tunnel building and testing require the participation of several peers,\n" +"it is difficult to positively identify the cause of a dropped build request or test failure.\n" "The router assigns a probability of failure to each of the\n" "peers, and uses that probability in the capacity calculation.\n" "Drops and test failures are weighted much higher than rejections." @@ -9059,10 +8044,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:124 msgid "" -"As mentioned above, we drill through each peer's profile to come up with " -"a \n" -"few key calculations, and based upon those, we organize each peer into " -"three\n" +"As mentioned above, we drill through each peer's profile to come up with a \n" +"few key calculations, and based upon those, we organize each peer into three\n" "groups - fast, high capacity, and standard." msgstr "" @@ -9072,15 +8055,13 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:134 msgid "" -"A peer is considered \"high capacity\" if its capacity calculation meets " -"or \n" +"A peer is considered \"high capacity\" if its capacity calculation meets or \n" "exceeds the median of all peers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:138 msgid "" -"A peer is considered \"fast\" if they are already \"high capacity\" and " -"their \n" +"A peer is considered \"fast\" if they are already \"high capacity\" and their \n" "speed calculation meets or exceeds the median of all peers." msgstr "" @@ -9106,25 +8087,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:156 msgid "" "The fast group is limited to 30 peers.\n" -"If there would be more, only the ones with the highest speed rating are " -"placed in the group." +"If there would be more, only the ones with the highest speed rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:160 msgid "" -"The high capacity group is limited to 75 peers (including the fast group)" -"\n" -"If there would be more, only the ones with the highest capacity rating " -"are placed in the group." +"The high capacity group is limited to 75 peers (including the fast group)\n" +"If there would be more, only the ones with the highest capacity rating are placed in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:164 msgid "" -"The standard group has no fixed limit, but is somewhat smaller than the " -"number of RouterInfos\n" +"The standard group has no fixed limit, but is somewhat smaller than the number of RouterInfos\n" "stored in the local network database.\n" -"On an active router in today's network, there may be about 1000 " -"RouterInfos and 500 peer profiles\n" +"On an active router in today's network, there may be about 1000 RouterInfos and 500 peer profiles\n" "(including those in the fast and high capacity groups)" msgstr "" @@ -9140,16 +8116,15 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:177 msgid "" -"The groups tend to be fairly stable, that is, there is not much \"churn\"" -" in the rankings\n" +"The groups tend to be fairly stable, that is, there is not much \"churn\" in the rankings\n" "at each recalculation.\n" -"Peers in the fast and high capacity groups get more tunnels build through" -" them, which increases their speed and capacity ratings,\n" +"Peers in the fast and high capacity groups get more tunnels build through them, which increases their speed and capacity ratings,\n" "which reinforces their presence in the group." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:188 -msgid "The router selects peers from the above groups to build tunnels through." +msgid "" +"The router selects peers from the above groups to build tunnels through." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:193 @@ -9158,19 +8133,16 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:194 msgid "" -"Client tunnels are used for application traffic, such as for HTTP proxies" -" and web servers." +"Client tunnels are used for application traffic, such as for HTTP proxies " +"and web servers." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:198 msgid "" -"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog" -"/one-cell-enough\">some attacks</a>,\n" +"To reduce the susceptibility to <a href=\"http://blog.torproject.org/blog/one-cell-enough\">some attacks</a>,\n" "and increase performance,\n" -"peers for building client tunnels are chosen randomly from the smallest " -"group, which is the \"fast\" group.\n" -"There is no bias toward selecting peers that were previously participants" -" in a tunnel for the same client." +"peers for building client tunnels are chosen randomly from the smallest group, which is the \"fast\" group.\n" +"There is no bias toward selecting peers that were previously participants in a tunnel for the same client." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:206 @@ -9179,35 +8151,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:207 msgid "" -"Exploratory tunnels are used for router administrative purposes, such as " -"network database traffic\n" +"Exploratory tunnels are used for router administrative purposes, such as network database traffic\n" "and testing client tunnels.\n" -"Exploratory tunnels are also used to contact previously unconnected " -"routers, which is why\n" +"Exploratory tunnels are also used to contact previously unconnected routers, which is why\n" "they are called \"exploratory\".\n" "These tunnels are usually low-bandwidth." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:215 msgid "" -"Peers for building exploratory tunnels are generally chosen randomly from" -" the standard group.\n" -"If the success rate of these build attempts is low compared to the client" -" tunnel build success rate,\n" -"the router will select a weighted average of peers randomly from the high" -" capacity group instead.\n" -"This helps maintain a satisfactory build success rate even when network " -"performance is poor.\n" -"There is no bias toward selecting peers that were previously participants" -" in an exploratory tunnel." +"Peers for building exploratory tunnels are generally chosen randomly from the standard group.\n" +"If the success rate of these build attempts is low compared to the client tunnel build success rate,\n" +"the router will select a weighted average of peers randomly from the high capacity group instead.\n" +"This helps maintain a satisfactory build success rate even when network performance is poor.\n" +"There is no bias toward selecting peers that were previously participants in an exploratory tunnel." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:223 msgid "" -"As the standard group includes a very large subset of all peers the " -"router knows about,\n" -"exploratory tunnels are essentially built through a random selection of " -"all peers,\n" +"As the standard group includes a very large subset of all peers the router knows about,\n" +"exploratory tunnels are essentially built through a random selection of all peers,\n" "until the build success rate becomes too low." msgstr "" @@ -9217,8 +8180,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:232 msgid "" -"To prevent some simple attacks, and for performance, there are the " -"following restrictions:" +"To prevent some simple attacks, and for performance, there are the following" +" restrictions:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:236 @@ -9227,8 +8190,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:239 msgid "" -"A peer may participate in a maximum of 33% of all tunnels created by " -"the router." +"A peer may participate in a maximum of 33% of all tunnels created by the" +" router." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:242 @@ -9249,18 +8212,18 @@ msgid "" "Peers are ordered within tunnels to\n" "to deal with the <a href=\"%(pdf)s\">predecessor attack</a>\n" "<a href=\"%(pdf2008)s\">(2008 update)</a>.\n" -"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel " -"page</a>." +"More information is on the <a href=\"%(tunnelimpl)s#ordering\">tunnel page</a>." msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:268 -msgid "Continue to analyze an tune speed and capacity calculations as necessary" +msgid "" +"Continue to analyze an tune speed and capacity calculations as necessary" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:271 msgid "" -"Implement a more aggressive ejection strategy if necessary to control " -"memory usage as the network grows" +"Implement a more aggressive ejection strategy if necessary to control memory" +" usage as the network grows" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:274 @@ -9275,10 +8238,8 @@ msgstr "" #, python-format msgid "" "For those reading the paper\n" -"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous " -"Network</a>,\n" -"please keep in mind the following minor changes in I2P since the paper's " -"publication:" +"<a href=\"%(pdf)s\">Peer Profiling and Selection in the I2P Anonymous Network</a>,\n" +"please keep in mind the following minor changes in I2P since the paper's publication:" msgstr "" #: i2p2www/pages/site/docs/how/peer-selection.html:289 @@ -9344,24 +8305,18 @@ msgstr "Kriptografi" #: i2p2www/pages/site/docs/how/tech-intro.html:21 msgid "" "I2P is a scalable, self organizing, resilient packet switched anonymous \n" -"network layer, upon which any number of different anonymity or security " -"conscious \n" -"applications can operate. Each of these applications may make their own " -"anonymity, \n" -"latency, and throughput tradeoffs without worrying about the proper " -"implementation \n" -"of a free route mixnet, allowing them to blend their activity with the " -"larger \n" +"network layer, upon which any number of different anonymity or security conscious \n" +"applications can operate. Each of these applications may make their own anonymity, \n" +"latency, and throughput tradeoffs without worrying about the proper implementation \n" +"of a free route mixnet, allowing them to blend their activity with the larger \n" "anonymity set of users already running on top of I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:30 msgid "" -"Applications available already provide the full range of typical Internet" -" activities -\n" +"Applications available already provide the full range of typical Internet activities -\n" "<b>anonymous</b> web browsing, web hosting, chat, file sharing, e-mail,\n" -"blogging and content syndication, newsgroups, as well as several other " -"applications under development." +"blogging and content syndication, newsgroups, as well as several other applications under development." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:36 @@ -9374,29 +8329,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:38 msgid "" -"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a " -"href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" -"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a " -"href=\"#app.i2pbt\">I2P-bt</a>\n" +"File sharing: <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.robert\">Robert</a>, <a href=\"#app.imule\">iMule</a>, \n" +"<a href=\"#app.i2phex\">I2Phex</a>, <a href=\"#app.pybit\">PyBit</a>, <a href=\"#app.i2pbt\">I2P-bt</a>\n" "and others." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:43 msgid "" -"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a href=\"#app.i2pbote" -"\">I2P-Bote</a>." +"E-mail: <a href=\"#app.i2pmail\">susimail</a> and <a " +"href=\"#app.i2pbote\">I2P-Bote</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:44 msgid "" -"Blog: using e.g. the pebble plugin or the distributed blogging software " -"<a href=\"#app.syndie\">Syndie</a>." +"Blog: using e.g. the pebble plugin or the distributed blogging software <a " +"href=\"#app.syndie\">Syndie</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:45 msgid "" -"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS " -"cloud over I2P." +"Distributed Data Store: Save your data redundantly in the Tahoe-LAFS cloud " +"over I2P." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:46 @@ -9405,77 +8358,47 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:49 msgid "" -"Unlike web sites hosted within content distribution networks like <a " -"href=\"#similar.freenet\">Freenet</a> \n" -"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services " -"hosted on \n" -"I2P are fully interactive - there are traditional web-style search " -"engines, \n" -"bulletin boards, blogs you can comment on, database driven sites, and " -"bridges \n" -"to query static systems like Freenet without needing to install it " -"locally." +"Unlike web sites hosted within content distribution networks like <a href=\"#similar.freenet\">Freenet</a> \n" +"or <a href=\"http://www.ovmj.org/GNUnet/\">GNUnet</a>, the services hosted on \n" +"I2P are fully interactive - there are traditional web-style search engines, \n" +"bulletin boards, blogs you can comment on, database driven sites, and bridges \n" +"to query static systems like Freenet without needing to install it locally." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:57 msgid "" "With all of these anonymity enabled applications, I2P takes on the role \n" -"of the message oriented middleware - applications say that they want to " -"send \n" -"some data to a cryptographic identifier (a \"destination\") and I2P takes" -" care \n" -"of making sure it gets there securely and anonymously. I2P also bundles a" -" \n" -"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's " -"anonymous \n" -"best-effort messages to transfer as reliable, in-order streams, " -"transparently \n" -"offering a TCP based congestion control algorithm tuned for the high " -"bandwidth \n" -"delay product of the network. While there have been several simple SOCKS " -"proxies \n" -"available to tie existing applications into the network, their value has " -"been \n" -"limited as nearly every application routinely exposes what, in an " -"anonymous \n" -"context, is sensitive information. The only safe way to go is to fully " -"audit \n" -"an application to ensure proper operation and to assist in that we " -"provide \n" -"a series of APIs in various languages which can be used to make the most " -"out \n" +"of the message oriented middleware - applications say that they want to send \n" +"some data to a cryptographic identifier (a \"destination\") and I2P takes care \n" +"of making sure it gets there securely and anonymously. I2P also bundles a \n" +"simple <a href=\"#app.streaming\">streaming</a> library to allow I2P's anonymous \n" +"best-effort messages to transfer as reliable, in-order streams, transparently \n" +"offering a TCP based congestion control algorithm tuned for the high bandwidth \n" +"delay product of the network. While there have been several simple SOCKS proxies \n" +"available to tie existing applications into the network, their value has been \n" +"limited as nearly every application routinely exposes what, in an anonymous \n" +"context, is sensitive information. The only safe way to go is to fully audit \n" +"an application to ensure proper operation and to assist in that we provide \n" +"a series of APIs in various languages which can be used to make the most out \n" "of the network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:74 #, python-format msgid "" -"I2P is not a research project - academic, commercial, or governmental, " -"but \n" -"is instead an engineering effort aimed at doing whatever is necessary to " -"provide \n" -"a sufficient level of anonymity to those who need it. It has been in " -"active \n" -"development since early 2003 with one full time developer and a dedicated" -" \n" -"group of part time contributors from all over the world. All of the work " -"done \n" -"on I2P is open source and freely available on the <a " -"href=\"%(site)s\">website</a>, \n" -"with the majority of the code released outright into the public domain, " -"though \n" -"making use of a few cryptographic routines under BSD-style licenses. The " -"people \n" -"working on I2P do not control what people release client applications " -"under, \n" -"and there are several GPL'ed applications available (<a " -"href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" -"<a href=\"#app.i2pmail\">susimail</a>, <a " -"href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-" -"Bote</a>, \n" +"I2P is not a research project - academic, commercial, or governmental, but \n" +"is instead an engineering effort aimed at doing whatever is necessary to provide \n" +"a sufficient level of anonymity to those who need it. It has been in active \n" +"development since early 2003 with one full time developer and a dedicated \n" +"group of part time contributors from all over the world. All of the work done \n" +"on I2P is open source and freely available on the <a href=\"%(site)s\">website</a>, \n" +"with the majority of the code released outright into the public domain, though \n" +"making use of a few cryptographic routines under BSD-style licenses. The people \n" +"working on I2P do not control what people release client applications under, \n" +"and there are several GPL'ed applications available (<a href=\"#app.i2ptunnel\">I2PTunnel</a>, \n" +"<a href=\"#app.i2pmail\">susimail</a>, <a href=\"#app.i2psnark\">I2PSnark</a>, <a href=\"#app.i2pbote\">I2P-Bote</a>, \n" "<a href=\"#app.i2phex\">I2Phex</a> and others.).\n" -"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from " -"donations,\n" +"<a href=\"%(halloffame)s\">Funding</a> for I2P comes entirely from donations,\n" "and does not receive any tax breaks in any jurisdiction at this time,\n" "as many of the developers are themselves anonymous." msgstr "" @@ -9486,40 +8409,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:94 msgid "" -"To understand I2P's operation, it is essential to understand a few key " -"concepts. \n" -"First, I2P makes a strict separation between the software participating " -"in \n" -"the network (a \"router\") and the anonymous endpoints (\"destinations\")" -" associated \n" -"with individual applications. The fact that someone is running I2P is not" -" \n" -"usually a secret. What is hidden is information on what the user is " -"doing, \n" -"if anything at all, as well as what router a particular destination is " -"connected \n" -"to. End users will typically have several local destinations on their " -"router \n" -"- for instance, one proxying in to IRC servers, another supporting the " -"user's \n" -"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, " -"another for \n" +"To understand I2P's operation, it is essential to understand a few key concepts. \n" +"First, I2P makes a strict separation between the software participating in \n" +"the network (a \"router\") and the anonymous endpoints (\"destinations\") associated \n" +"with individual applications. The fact that someone is running I2P is not \n" +"usually a secret. What is hidden is information on what the user is doing, \n" +"if anything at all, as well as what router a particular destination is connected \n" +"to. End users will typically have several local destinations on their router \n" +"- for instance, one proxying in to IRC servers, another supporting the user's \n" +"anonymous webserver (\"I2P Site\"), another for an I2Phex instance, another for \n" "torrents, etc." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:107 msgid "" "Another critical concept to understand is the \"tunnel\".\n" -"A tunnel is a directed path through an explicitly selected list of " -"routers.\n" -"Layered encryption is used, so each of the routers can only decrypt a " -"single layer.\n" +"A tunnel is a directed path through an explicitly selected list of routers.\n" +"Layered encryption is used, so each of the routers can only decrypt a single layer.\n" "The decrypted information contains the IP of the next router, along with\n" "the encrypted information to be forwarded.\n" -"Each tunnel has a starting point (the first router, also known as " -"\"gateway\")\n" -"and an end point. Messages can be sent only in one way. To send messages " -"back,\n" +"Each tunnel has a starting point (the first router, also known as \"gateway\")\n" +"and an end point. Messages can be sent only in one way. To send messages back,\n" "another tunnel is required." msgstr "" @@ -9539,15 +8449,12 @@ msgid "" "while <b>\"inbound\" tunnels</b> bring messages to the tunnel creator.\n" "Combining these two tunnels allows users to send messages to each other.\n" "The sender (\"Alice\" in the above image) sets up an outbound tunnel,\n" -"while the receiver (\"Bob\" in the above image) creates an inbound " -"tunnel.\n" -"The gateway of an inbound tunnel can receive messages from any other user" -"\n" +"while the receiver (\"Bob\" in the above image) creates an inbound tunnel.\n" +"The gateway of an inbound tunnel can receive messages from any other user\n" "and will send them on until the endpoint (\"Bob\").\n" "The endpoint of the outbound tunnel will need to send the message\n" "on to the gateway of the inbound tunnel.\n" -"To do this, the sender (\"Alice\") adds instructions to her encrypted " -"message.\n" +"To do this, the sender (\"Alice\") adds instructions to her encrypted message.\n" "Once the endpoint of the outbound tunnel decrypts the message,\n" "it will have instructions to forward the message to the correct\n" "inbound gateway (the gateway to \"Bob\")." @@ -9555,25 +8462,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:140 msgid "" -"A third critical concept to understand is I2P's <b>\"network " -"database\"</b> (or \"netDb\") \n" -"- a pair of algorithms used to share network metadata. The two types of " -"metadata \n" -"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the " -"routerInfo gives routers the \n" -"data necessary for contacting a particular router (their public keys, " -"transport \n" -"addresses, etc), while the leaseSet gives routers the information " -"necessary \n" -"for contacting a particular destination. A leaseSet contains a number of " -"\"leases\".\n" -"Each of this leases specifies a tunnel gateway, which allows reaching a " -"specific destination.\n" +"A third critical concept to understand is I2P's <b>\"network database\"</b> (or \"netDb\") \n" +"- a pair of algorithms used to share network metadata. The two types of metadata \n" +"carried are <b>\"routerInfo\"</b> and <b>\"leaseSets\"</b> - the routerInfo gives routers the \n" +"data necessary for contacting a particular router (their public keys, transport \n" +"addresses, etc), while the leaseSet gives routers the information necessary \n" +"for contacting a particular destination. A leaseSet contains a number of \"leases\".\n" +"Each of this leases specifies a tunnel gateway, which allows reaching a specific destination.\n" "The full information contained in a lease:" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:151 -msgid "Inbound gateway for a tunnel that allows reaching a specific destination." +msgid "" +"Inbound gateway for a tunnel that allows reaching a specific destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:152 @@ -9588,10 +8489,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:155 msgid "" -"Routers themselves send their routerInfo to the netDb directly, while " -"leaseSets are sent through outbound tunnels\n" -"(leaseSets need to be sent anonymously, to avoid correlating a router " -"with his leaseSets)." +"Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" +"(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:160 @@ -9602,13 +8501,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" -"To build up her own inbound and outbound tunnels, Alice does a lookup in " -"the netDb to collect routerInfo.\n" +"To build up her own inbound and outbound tunnels, Alice does a lookup in the netDb to collect routerInfo.\n" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" -"She can then send a build message to the first hop, requesting the " -"construction of a tunnel and asking\n" -"that router to send the construction message onward, until the tunnel has" -" been constructed." +"She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" +"that router to send the construction message onward, until the tunnel has been constructed." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:171 @@ -9625,30 +8521,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" -"When Alice wants to send a message to Bob, she first does a lookup in the" -" \n" -"netDb to find Bob's leaseSet, giving her his current inbound tunnel " -"gateways. \n" -"She then picks one of her outbound tunnels and sends the message down it " -"with \n" -"instructions for the outbound tunnel's endpoint to forward the message on" -" \n" -"to one of Bob's inbound tunnel gateways. When the outbound tunnel " -"endpoint \n" -"receives those instructions, it forwards the message as requested, and " -"when \n" -"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel" -" \n" -"to Bob's router. If Alice wants Bob to be able to reply to the message, " -"she \n" -"needs to transmit her own destination explicitly as part of the message " -"itself.\n" -"This can be done by introducing a higher-level layer, which is done in " -"the\n" +"When Alice wants to send a message to Bob, she first does a lookup in the \n" +"netDb to find Bob's leaseSet, giving her his current inbound tunnel gateways. \n" +"She then picks one of her outbound tunnels and sends the message down it with \n" +"instructions for the outbound tunnel's endpoint to forward the message on \n" +"to one of Bob's inbound tunnel gateways. When the outbound tunnel endpoint \n" +"receives those instructions, it forwards the message as requested, and when \n" +"Bob's inbound tunnel gateway receives it, it is forwarded down the tunnel \n" +"to Bob's router. If Alice wants Bob to be able to reply to the message, she \n" +"needs to transmit her own destination explicitly as part of the message itself.\n" +"This can be done by introducing a higher-level layer, which is done in the\n" "<a href=\"#app.streaming\">streaming</a> library.\n" "Alice may also cut down on the response time by bundling her most \n" -"recent LeaseSet with the message so that Bob doesn't need to do a netDb " -"lookup \n" +"recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." msgstr "" @@ -9666,208 +8551,126 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:200 msgid "" -"While the tunnels themselves have layered encryption to prevent " -"unauthorized \n" -"disclosure to peers inside the network (as the transport layer itself " -"does \n" -"to prevent unauthorized disclosure to peers outside the network), it is " -"necessary \n" -"to add an additional end to end layer of encryption to hide the message " -"from \n" -"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a " -"href=\"#op.garlic\">garlic \n" -"encryption</a>\" lets Alice's router wrap up multiple messages into a " -"single \n" -"\"garlic message\", encrypted to a particular public key so that " -"intermediary \n" -"peers cannot determine either how many messages are within the garlic, " -"what \n" -"those messages say, or where those individual cloves are destined. For " -"typical \n" -"end to end communication between Alice and Bob, the garlic will be " -"encrypted \n" -"to the public key published in Bob's leaseSet, allowing the message to be" -" \n" +"While the tunnels themselves have layered encryption to prevent unauthorized \n" +"disclosure to peers inside the network (as the transport layer itself does \n" +"to prevent unauthorized disclosure to peers outside the network), it is necessary \n" +"to add an additional end to end layer of encryption to hide the message from \n" +"the outbound tunnel endpoint and the inbound tunnel gateway. This \"<a href=\"#op.garlic\">garlic \n" +"encryption</a>\" lets Alice's router wrap up multiple messages into a single \n" +"\"garlic message\", encrypted to a particular public key so that intermediary \n" +"peers cannot determine either how many messages are within the garlic, what \n" +"those messages say, or where those individual cloves are destined. For typical \n" +"end to end communication between Alice and Bob, the garlic will be encrypted \n" +"to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" -"Another important fact to keep in mind is that I2P is entirely message " -"based \n" -"and that some messages may be lost along the way. Applications using I2P " -"can \n" -"use the message oriented interfaces and take care of their own congestion" -" \n" -"control and reliability needs, but most would be best served by reusing " -"the \n" -"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as " -"a streams \n" +"Another important fact to keep in mind is that I2P is entirely message based \n" +"and that some messages may be lost along the way. Applications using I2P can \n" +"use the message oriented interfaces and take care of their own congestion \n" +"control and reliability needs, but most would be best served by reusing the \n" +"provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n" "based network." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" "Both inbound and outbound tunnels work along similar principles.\n" -"The tunnel gateway accumulates a number of tunnel messages, eventually " -"preprocessing \n" -"them into something for tunnel delivery. Next, the gateway encrypts that " -"preprocessed \n" -"data and forwards it to the first hop. That peer and subsequent tunnel " -"participants \n" -"add on a layer of encryption after verifying that it isn't a duplicate " -"before \n" -"forward it on to the next peer. Eventually, the message arrives at the " -"endpoint \n" -"where the messages are split out again and forwarded on as requested. The" -" \n" -"difference arises in what the tunnel's creator does - for inbound " -"tunnels, \n" -"the creator is the endpoint and they simply decrypt all of the layers " -"added, \n" -"while for outbound tunnels, the creator is the gateway and they pre-" -"decrypt \n" -"all of the layers so that after all of the layers of per-hop encryption " -"are \n" +"The tunnel gateway accumulates a number of tunnel messages, eventually preprocessing \n" +"them into something for tunnel delivery. Next, the gateway encrypts that preprocessed \n" +"data and forwards it to the first hop. That peer and subsequent tunnel participants \n" +"add on a layer of encryption after verifying that it isn't a duplicate before \n" +"forward it on to the next peer. Eventually, the message arrives at the endpoint \n" +"where the messages are split out again and forwarded on as requested. The \n" +"difference arises in what the tunnel's creator does - for inbound tunnels, \n" +"the creator is the endpoint and they simply decrypt all of the layers added, \n" +"while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" +"all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" -"The choice of specific peers to pass on messages as well as their " -"particular \n" -"ordering is important to understanding both I2P's anonymity and " -"performance \n" -"characteristics. While the network database (below) has its own criteria " -"for \n" -"picking what peers to query and store entries on, tunnel creators may use" -" any peers \n" -"in the network in any order (and even any number of times) in a single " -"tunnel. \n" -"If perfect latency and capacity data were globally known, selection and " -"ordering \n" -"would be driven by the particular needs of the client in tandem with " -"their \n" -"threat model. Unfortunately, latency and capacity data is not trivial to " -"gather \n" -"anonymously, and depending upon untrusted peers to provide this " -"information \n" +"The choice of specific peers to pass on messages as well as their particular \n" +"ordering is important to understanding both I2P's anonymity and performance \n" +"characteristics. While the network database (below) has its own criteria for \n" +"picking what peers to query and store entries on, tunnel creators may use any peers \n" +"in the network in any order (and even any number of times) in a single tunnel. \n" +"If perfect latency and capacity data were globally known, selection and ordering \n" +"would be driven by the particular needs of the client in tandem with their \n" +"threat model. Unfortunately, latency and capacity data is not trivial to gather \n" +"anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" -"From an anonymity perspective, the simplest technique would be to pick " -"peers \n" -"randomly from the entire network, order them randomly and use those peers" -" \n" -"in that order for all eternity. From a performance perspective, the " -"simplest \n" -"technique would be to pick the fastest peers with the necessary spare " -"capacity, \n" -"spreading the load across different peers to handle transparent failover," -" \n" -"and to rebuild the tunnel whenever capacity information changes. While " -"the \n" -"former is both brittle and inefficient, the later requires inaccessible " -"information \n" -"and offers insufficient anonymity. I2P is instead working on offering a " -"range \n" -"of peer selection strategies, coupled with anonymity aware measurement " -"code \n" +"From an anonymity perspective, the simplest technique would be to pick peers \n" +"randomly from the entire network, order them randomly and use those peers \n" +"in that order for all eternity. From a performance perspective, the simplest \n" +"technique would be to pick the fastest peers with the necessary spare capacity, \n" +"spreading the load across different peers to handle transparent failover, \n" +"and to rebuild the tunnel whenever capacity information changes. While the \n" +"former is both brittle and inefficient, the later requires inaccessible information \n" +"and offers insufficient anonymity. I2P is instead working on offering a range \n" +"of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" -"As a base, I2P is constantly profiling the peers with which it interacts" -" \n" -"with by measuring their indirect behavior - for instance, when a peer " -"responds \n" -"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in " -"the \n" -"profiles for all of the routers involved in the two tunnels (inbound and " -"outbound) \n" -"through which the request and response passed, as well as the queried " -"peer's \n" -"profile. Direct measurement, such as transport layer latency or " -"congestion, \n" -"is not used as part of the profile, as it can be manipulated and " -"associated \n" -"with the measuring router, exposing them to trivial attacks. While " -"gathering \n" -"these profiles, a series of calculations are run on each to summarize its" -" \n" -"performance - its latency, capacity to handle lots of activity, whether " -"they \n" -"are currently overloaded, and how well integrated into the network they " -"seem \n" -"to be. These calculations are then compared for active peers to organize " -"the \n" -"routers into four tiers - fast and high capacity, high capacity, not " -"failing, \n" -"and failing. The thresholds for those tiers are determined dynamically, " -"and \n" +"As a base, I2P is constantly profiling the peers with which it interacts \n" +"with by measuring their indirect behavior - for instance, when a peer responds \n" +"to a netDb lookup in 1.3 seconds, that round trip latency is recorded in the \n" +"profiles for all of the routers involved in the two tunnels (inbound and outbound) \n" +"through which the request and response passed, as well as the queried peer's \n" +"profile. Direct measurement, such as transport layer latency or congestion, \n" +"is not used as part of the profile, as it can be manipulated and associated \n" +"with the measuring router, exposing them to trivial attacks. While gathering \n" +"these profiles, a series of calculations are run on each to summarize its \n" +"performance - its latency, capacity to handle lots of activity, whether they \n" +"are currently overloaded, and how well integrated into the network they seem \n" +"to be. These calculations are then compared for active peers to organize the \n" +"routers into four tiers - fast and high capacity, high capacity, not failing, \n" +"and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" -"Using this profile data, the simplest reasonable peer selection strategy " -"is to\n" -"pick peers randomly from the top tier (fast and high capacity), and this " -"is\n" -"currently deployed for client tunnels. Exploratory tunnels (used for " -"netDb and\n" -"tunnel management) pick peers randomly from the \"not failing\" tier " -"(which\n" +"Using this profile data, the simplest reasonable peer selection strategy is to\n" +"pick peers randomly from the top tier (fast and high capacity), and this is\n" +"currently deployed for client tunnels. Exploratory tunnels (used for netDb and\n" +"tunnel management) pick peers randomly from the \"not failing\" tier (which\n" "includes routers in 'better' tiers as well), allowing the peer to sample\n" -"routers more widely, in effect optimizing the peer selection through " -"randomized\n" -"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill " -"climbing</a>. These\n" +"routers more widely, in effect optimizing the peer selection through randomized\n" +"<a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">hill climbing</a>. These\n" "strategies alone do however leak information regarding the peers in the\n" -"router's top tier through predecessor and netDb harvesting attacks. In " -"turn,\n" -"several alternatives exist which, while not balancing the load as evenly," -" will\n" +"router's top tier through predecessor and netDb harvesting attacks. In turn,\n" +"several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" -"By picking a random key and ordering the peers according to their XOR " -"distance \n" -"from it, the information leaked is reduced in predecessor and harvesting " -"attacks \n" -"according to the peers' failure rate and the tier's churn. Another simple" -" \n" -"strategy for dealing with netDb harvesting attacks is to simply fix the " -"inbound \n" -"tunnel gateway(s) yet randomize the peers further on in the tunnels. To " -"deal \n" -"with predecessor attacks for adversaries which the client contacts, the " -"outbound \n" -"tunnel endpoints would also remain fixed. The selection of which peer to " -"fix \n" -"on the most exposed point would of course need to have a limit to the " -"duration, \n" -"as all peers fail eventually, so it could either be reactively adjusted " -"or \n" -"proactively avoided to mimic a measured mean time between failures of " -"other \n" -"routers. These two strategies can in turn be combined, using a fixed " -"exposed \n" -"peer and an XOR based ordering within the tunnels themselves. A more " -"rigid \n" -"strategy would fix the exact peers and ordering of a potential tunnel, " -"only \n" -"using individual peers if all of them agree to participate in the same " -"way \n" -"each time. This varies from the XOR based ordering in that the " -"predecessor \n" -"and successor of each peer is always the same, while the XOR only makes " -"sure \n" +"By picking a random key and ordering the peers according to their XOR distance \n" +"from it, the information leaked is reduced in predecessor and harvesting attacks \n" +"according to the peers' failure rate and the tier's churn. Another simple \n" +"strategy for dealing with netDb harvesting attacks is to simply fix the inbound \n" +"tunnel gateway(s) yet randomize the peers further on in the tunnels. To deal \n" +"with predecessor attacks for adversaries which the client contacts, the outbound \n" +"tunnel endpoints would also remain fixed. The selection of which peer to fix \n" +"on the most exposed point would of course need to have a limit to the duration, \n" +"as all peers fail eventually, so it could either be reactively adjusted or \n" +"proactively avoided to mimic a measured mean time between failures of other \n" +"routers. These two strategies can in turn be combined, using a fixed exposed \n" +"peer and an XOR based ordering within the tunnels themselves. A more rigid \n" +"strategy would fix the exact peers and ordering of a potential tunnel, only \n" +"using individual peers if all of them agree to participate in the same way \n" +"each time. This varies from the XOR based ordering in that the predecessor \n" +"and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." msgstr "" @@ -9876,10 +8679,8 @@ msgstr "" msgid "" "As mentioned before, I2P currently (release 0.8) includes the tiered \n" "random strategy above, with XOR-based ordering. A \n" -"more detailed discussion of the mechanics involved in tunnel operation, " -"management, \n" -"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel " -"spec</a>." +"more detailed discussion of the mechanics involved in tunnel operation, management, \n" +"and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:326 @@ -9893,27 +8694,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" "A percentage of I2P users are appointed as 'floodfill peers'.\n" -"Currently, I2P installations that have a lot of bandwidth and are fast " -"enough,\n" -"will appoint themselves as floodfill as soon as the number of existing " -"floodfill routers\n" +"Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" +"will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format msgid "" -"Other I2P routers will store their data and lookup data by sending simple" -" 'store' and 'lookup' queries to the floodfills.\n" -"If a floodfill router receives a 'store' query, it will spread the " -"information to other floodfill routers\n" -"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia " -"algorithm</a>.\n" -"The 'lookup' queries currently function differently, to avoid an " -"important\n" +"Other I2P routers will store their data and lookup data by sending simple 'store' and 'lookup' queries to the floodfills.\n" +"If a floodfill router receives a 'store' query, it will spread the information to other floodfill routers\n" +"using the <a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algorithm</a>.\n" +"The 'lookup' queries currently function differently, to avoid an important\n" "<a href=\"%(netdb)s#lookup\">security issue</a>.\n" -"When a lookup is done, the floodfill router will not forward the lookup " -"to other peers,\n" +"When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." msgstr "" @@ -9923,8 +8717,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" -"A <b>RouterInfo</b> stores information on a specific I2P router and how " -"to contact it" +"A <b>RouterInfo</b> stores information on a specific I2P router and how to " +"contact it" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:354 @@ -9935,14 +8729,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" -"All of this information is signed by the publishing party and verified by" -" any I2P router using or storing the information.\n" -"In addition, the data contains timing information, to avoid storage of " -"old entries and possible attacks.\n" -"This is also why I2P bundles the necessary code for maintaining the " -"correct time, occasionally querying some SNTP servers \n" -"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by" -" default)\n" +"All of this information is signed by the publishing party and verified by any I2P router using or storing the information.\n" +"In addition, the data contains timing information, to avoid storage of old entries and possible attacks.\n" +"This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" +"(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n" "and detecting skew between routers at the transport layer." msgstr "" @@ -9957,10 +8747,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:370 msgid "" "One could only want specific people to be able to reach a destination.\n" -"This is possible by not publishing the destination in the netDb. You will" -" however have to transmit the destination by other means.\n" -"An alternative are the 'encrypted leaseSets'. These leaseSets can only be" -" decoded by people with access to the decryption key." +"This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" +"An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:377 @@ -9969,13 +8757,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:378 msgid "" -"Bootstrapping the netDb is quite simple. Once a router manages to receive" -" a single routerInfo of a reachable peer,\n" +"Bootstrapping the netDb is quite simple. Once a router manages to receive a single routerInfo of a reachable peer,\n" "it can query that router for references to other routers in the network.\n" -"Currently, a number of users post their routerInfo files to a website to " -"make this information available.\n" -"I2P automatically connects to one of these websites to gather routerInfo " -"files and bootstrap." +"Currently, a number of users post their routerInfo files to a website to make this information available.\n" +"I2P automatically connects to one of these websites to gather routerInfo files and bootstrap." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:386 @@ -9985,26 +8770,18 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:387 msgid "" "Lookups in the I2P network are not forwarded to other netDb routers.\n" -"Currently, this is not a major problem, since the network is not very " -"large.\n" -"However, as the network grows, not all routerInfo and leaseSet files will" -" be present\n" -"on each netDb router. This will cause a deterioration of the percentage " -"of successful lookups.\n" -"Because of this, refinements to the netDb will be done in the next " -"releases." +"Currently, this is not a major problem, since the network is not very large.\n" +"However, as the network grows, not all routerInfo and leaseSet files will be present\n" +"on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" +"Because of this, refinements to the netDb will be done in the next releases." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" -"Communication between routers needs to provide confidentiality and " -"integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" -"is the one who should receive a given message. The particulars of how " -"routers \n" -"communicate with other routers aren't critical - three separate protocols" -" \n" +"Communication between routers needs to provide confidentiality and integrity \n" +"against external adversaries while authenticating that the router contacted \n" +"is the one who should receive a given message. The particulars of how routers \n" +"communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." msgstr "" @@ -10012,12 +8789,9 @@ msgstr "" #, python-format msgid "" "I2P started with a TCP-based protocol which \n" -"has since been disabled. Then, to accommodate the need for high degree " -"communication \n" -"(as a number of routers will end up speaking with many others), I2P moved" -" \n" -"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - " -"\"Secure \n" +"has since been disabled. Then, to accommodate the need for high degree communication \n" +"(as a number of routers will end up speaking with many others), I2P moved \n" +"from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n" "Semireliable UDP\", or \"SSU\"." msgstr "" @@ -10029,46 +8803,32 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" "The goal of this protocol is to provide secure, authenticated, \n" -"semireliable and unordered message delivery, exposing only a minimal " -"amount \n" -"of data easily discernible to third parties. It should support high " -"degree \n" -"communication as well as TCP-friendly congestion control and may include" -" \n" -"PMTU detection. It should be capable of efficiently moving bulk data at " -"rates \n" -"sufficient for home users. In addition, it should support techniques for " -"addressing \n" +"semireliable and unordered message delivery, exposing only a minimal amount \n" +"of data easily discernible to third parties. It should support high degree \n" +"communication as well as TCP-friendly congestion control and may include \n" +"PMTU detection. It should be capable of efficiently moving bulk data at rates \n" +"sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format msgid "" -"Following the introduction of SSU, after issues with congestion collapse" -" \n" -"appeared, a new NIO-based TCP transport called <a " -"href=\"%(ntcp)s\">NTCP</a> \n" -"was implemented. It is enabled by default for outbound connections only. " -"Those \n" -"who configure their NAT/firewall to allow inbound connections and specify" -" \n" -"the external host and port (dyndns/etc is ok) on /config.jsp can receive " -"inbound \n" -"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread" -" \n" +"Following the introduction of SSU, after issues with congestion collapse \n" +"appeared, a new NIO-based TCP transport called <a href=\"%(ntcp)s\">NTCP</a> \n" +"was implemented. It is enabled by default for outbound connections only. Those \n" +"who configure their NAT/firewall to allow inbound connections and specify \n" +"the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" +"connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" "I2P supports multiple transports simultaneously. A particular transport \n" -"for an outbound connection is selected with \"bids\". Each transport bids" -" for \n" -"the connection and the relative value of these bids assigns the priority." -" \n" -"Transports may reply with different bids, depending on whether there is " -"already \n" +"for an outbound connection is selected with \"bids\". Each transport bids for \n" +"the connection and the relative value of these bids assigns the priority. \n" +"Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." msgstr "" @@ -10076,38 +8836,25 @@ msgstr "" #, python-format msgid "" "The current implementation ranks NTCP as the highest-priority transport \n" -"for outbound connections in most situations. SSU is enabled for both " -"outbound \n" -"and inbound connections. Your firewall and your I2P router must be " -"configured \n" -"to allow inbound NTCP connections. For further information see the <a " -"href=\"%(ntcp)s\">NTCP \n" +"for outbound connections in most situations. SSU is enabled for both outbound \n" +"and inbound connections. Your firewall and your I2P router must be configured \n" +"to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n" "page</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" "A bare minimum set of cryptographic primitives are combined together to \n" -"provide I2P's layered defenses against a variety of adversaries. At the " -"lowest \n" -"level, inter router communication is protected by the transport layer " -"security \n" -"- SSU encrypts each packet with AES256/CBC with both an explicit IV and " -"MAC \n" -"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a " -"2048bit \n" -"Diffie-Hellman exchange, station-to-station authentication with the other" -" \n" -"router's DSA key, plus each network message has their own hash for local " -"integrity \n" -"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the " -"transports \n" -"have their own layered AES256/CBC encryption with an explicit IV and " -"verified \n" -"at the tunnel endpoint with an additional SHA256 hash. Various other " -"messages \n" -"are passed along inside \"garlic messages\", which are encrypted with " -"ElGamal/AES+SessionTags \n" +"provide I2P's layered defenses against a variety of adversaries. At the lowest \n" +"level, inter router communication is protected by the transport layer security \n" +"- SSU encrypts each packet with AES256/CBC with both an explicit IV and MAC \n" +"(HMAC-MD5-128) after agreeing upon an ephemeral session key through a 2048bit \n" +"Diffie-Hellman exchange, station-to-station authentication with the other \n" +"router's DSA key, plus each network message has their own hash for local integrity \n" +"checking. <a href=\"#op.tunnels\">Tunnel</a> messages passed over the transports \n" +"have their own layered AES256/CBC encryption with an explicit IV and verified \n" +"at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" +"are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." msgstr "" @@ -10117,51 +8864,31 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:471 msgid "" -"Garlic messages are an extension of \"onion\" layered encryption, " -"allowing \n" -"the contents of a single message to contain multiple \"cloves\" - fully " -"formed \n" -"messages alongside their own instructions for delivery. Messages are " -"wrapped \n" -"into a garlic message whenever the message would otherwise be passing in " -"cleartext \n" -"through a peer who should not have access to the information - for " -"instance, \n" -"when a router wants to ask another router to participate in a tunnel, " -"they \n" -"wrap the request inside a garlic, encrypt that garlic to the receiving " -"router's \n" -"2048bit ElGamal public key, and forward it through a tunnel. Another " -"example \n" -"is when a client wants to send a message to a destination - the sender's " -"router \n" -"will wrap up that data message (alongside some other messages) into a " -"garlic, \n" -"encrypt that garlic to the 2048bit ElGamal public key published in the " -"recipient's \n" +"Garlic messages are an extension of \"onion\" layered encryption, allowing \n" +"the contents of a single message to contain multiple \"cloves\" - fully formed \n" +"messages alongside their own instructions for delivery. Messages are wrapped \n" +"into a garlic message whenever the message would otherwise be passing in cleartext \n" +"through a peer who should not have access to the information - for instance, \n" +"when a router wants to ask another router to participate in a tunnel, they \n" +"wrap the request inside a garlic, encrypt that garlic to the receiving router's \n" +"2048bit ElGamal public key, and forward it through a tunnel. Another example \n" +"is when a client wants to send a message to a destination - the sender's router \n" +"will wrap up that data message (alongside some other messages) into a garlic, \n" +"encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" -"The \"instructions\" attached to each clove inside the encryption layer " -"includes \n" -"the ability to request that the clove be forwarded locally, to a remote " -"router, \n" -"or to a remote tunnel on a remote router. There are fields in those " -"instructions \n" -"allowing a peer to request that the delivery be delayed until a certain " -"time \n" -"or condition has been met, though they won't be honored until the <a " -"href=\"#future.variablelatency\">nontrivial \n" -"delays</a> are deployed. It is possible to explicitly route garlic " -"messages \n" -"any number of hops without building tunnels, or even to reroute tunnel " -"messages \n" -"by wrapping them in garlic messages and forwarding them a number of hops " -"prior \n" -"to delivering them to the next hop in the tunnel, but those techniques " -"are \n" +"The \"instructions\" attached to each clove inside the encryption layer includes \n" +"the ability to request that the clove be forwarded locally, to a remote router, \n" +"or to a remote tunnel on a remote router. There are fields in those instructions \n" +"allowing a peer to request that the delivery be delayed until a certain time \n" +"or condition has been met, though they won't be honored until the <a href=\"#future.variablelatency\">nontrivial \n" +"delays</a> are deployed. It is possible to explicitly route garlic messages \n" +"any number of hops without building tunnels, or even to reroute tunnel messages \n" +"by wrapping them in garlic messages and forwarding them a number of hops prior \n" +"to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." msgstr "" @@ -10171,54 +8898,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:500 msgid "" -"As an unreliable, unordered, message based system, I2P uses a simple " -"combination \n" -"of asymmetric and symmetric encryption algorithms to provide data " -"confidentiality \n" -"and integrity to garlic messages. As a whole, the combination is referred" -" \n" -"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to " -"describe \n" +"As an unreliable, unordered, message based system, I2P uses a simple combination \n" +"of asymmetric and symmetric encryption algorithms to provide data confidentiality \n" +"and integrity to garlic messages. As a whole, the combination is referred \n" +"to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" -"Session tags themselves have a very short lifetime, after which they are" -" \n" -"discarded if not used. In addition, the quantity stored for each key is " -"limited, \n" -"as are the number of keys themselves - if too many arrive, either new or " -"old \n" -"messages may be dropped. The sender keeps track whether messages using " -"session \n" -"tags are getting through, and if there isn't sufficient communication it " -"may \n" -"drop the ones previously assumed to be properly delivered, reverting back" -" \n" +"Session tags themselves have a very short lifetime, after which they are \n" +"discarded if not used. In addition, the quantity stored for each key is limited, \n" +"as are the number of keys themselves - if too many arrive, either new or old \n" +"messages may be dropped. The sender keeps track whether messages using session \n" +"tags are getting through, and if there isn't sufficient communication it may \n" +"drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" -"One alternative is to transmit only a single session tag, and from that," -" \n" -"seed a deterministic PRNG for determining what tags to use or expect. By " -"keeping \n" -"this PRNG roughly synchronized between the sender and recipient (the " -"recipient \n" -"precomputes a window of the next e.g. 50 tags), the overhead of " -"periodically \n" -"bundling a large number of tags is removed, allowing more options in the " -"space/time \n" -"tradeoff, and perhaps reducing the number of ElGamal encryptions " -"necessary. \n" -"However, it would depend upon the strength of the PRNG to provide the " -"necessary \n" -"cover against internal adversaries, though perhaps by limiting the amount" -" \n" -"of times each PRNG is used, any weaknesses can be minimized. At the " -"moment, \n" +"One alternative is to transmit only a single session tag, and from that, \n" +"seed a deterministic PRNG for determining what tags to use or expect. By keeping \n" +"this PRNG roughly synchronized between the sender and recipient (the recipient \n" +"precomputes a window of the next e.g. 50 tags), the overhead of periodically \n" +"bundling a large number of tags is removed, allowing more options in the space/time \n" +"tradeoff, and perhaps reducing the number of ElGamal encryptions necessary. \n" +"However, it would depend upon the strength of the PRNG to provide the necessary \n" +"cover against internal adversaries, though perhaps by limiting the amount \n" +"of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." msgstr "" @@ -10228,12 +8936,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:563 msgid "" -"While I2P is currently functional and sufficient for many scenarios, " -"there \n" -"are several areas which require further improvement to meet the needs of " -"those \n" -"facing more powerful adversaries as well as substantial user experience " -"optimization." +"While I2P is currently functional and sufficient for many scenarios, there \n" +"are several areas which require further improvement to meet the needs of those \n" +"facing more powerful adversaries as well as substantial user experience optimization." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:569 @@ -10242,106 +8947,64 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:570 msgid "" -"I2P is an overlay network designed to be run on top of a functional " -"packet \n" -"switched network, exploiting the end to end principle to offer anonymity " -"and \n" -"security. While the Internet no longer fully embraces the end to end " -"principle\n" +"I2P is an overlay network designed to be run on top of a functional packet \n" +"switched network, exploiting the end to end principle to offer anonymity and \n" +"security. While the Internet no longer fully embraces the end to end principle\n" "(due to the usage of NAT), \n" -"I2P does require a substantial portion of the network to be reachable - " -"there \n" -"may be a number of peers along the edges running using restricted routes," -" \n" -"but I2P does not include an appropriate routing algorithm for the " -"degenerate \n" -"case where most peers are unreachable. It would, however work on top of a" -" \n" +"I2P does require a substantial portion of the network to be reachable - there \n" +"may be a number of peers along the edges running using restricted routes, \n" +"but I2P does not include an appropriate routing algorithm for the degenerate \n" +"case where most peers are unreachable. It would, however work on top of a \n" "network employing such an algorithm." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:582 msgid "" -"Restricted route operation, where there are limits to what peers are " -"reachable \n" -"directly, has several different functional and anonymity implications, " -"dependent \n" -"upon how the restricted routes are handled. At the most basic level, " -"restricted \n" -"routes exist when a peer is behind a NAT or firewall which does not allow" -" \n" -"inbound connections. This was largely addressed in I2P 0.6.0.6 by " -"integrating \n" -"distributed hole punching into the transport layer, allowing people " -"behind \n" -"most NATs and firewalls to receive unsolicited connections without any " -"configuration. \n" -"However, this does not limit the exposure of the peer's IP address to " -"routers \n" -"inside the network, as they can simply get introduced to the peer through" -" \n" +"Restricted route operation, where there are limits to what peers are reachable \n" +"directly, has several different functional and anonymity implications, dependent \n" +"upon how the restricted routes are handled. At the most basic level, restricted \n" +"routes exist when a peer is behind a NAT or firewall which does not allow \n" +"inbound connections. This was largely addressed in I2P 0.6.0.6 by integrating \n" +"distributed hole punching into the transport layer, allowing people behind \n" +"most NATs and firewalls to receive unsolicited connections without any configuration. \n" +"However, this does not limit the exposure of the peer's IP address to routers \n" +"inside the network, as they can simply get introduced to the peer through \n" "the published introducer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:595 msgid "" -"Beyond the functional handling of restricted routes, there are two levels" -" \n" -"of restricted operation that can be used to limit the exposure of one's " -"IP \n" -"address - using router-specific tunnels for communication, and offering " -"'client \n" -"routers'. For the former, routers can either build a new pool of tunnels " -"or \n" -"reuse their exploratory pool, publishing the inbound gateways to some of " -"them \n" -"as part of their routerInfo in place of their transport addresses. When a" -" \n" -"peer wants to get in touch with them, they see those tunnel gateways in " -"the \n" -"netDb and simply send the relevant message to them through one of the " -"published \n" -"tunnels. If the peer behind the restricted route wants to reply, it may " -"do \n" -"so either directly (if they are willing to expose their IP to the peer) " -"or \n" -"indirectly through their outbound tunnels. When the routers that the peer" -" \n" -"has direct connections to want to reach it (to forward tunnel messages, " -"for \n" -"instance), they simply prioritize their direct connection over the " -"published \n" -"tunnel gateway. The concept of 'client routers' simply extends the " -"restricted \n" -"route by not publishing any router addresses. Such a router would not " -"even \n" -"need to publish their routerInfo in the netDb, merely providing their " -"self \n" -"signed routerInfo to the peers that it contacts (necessary to pass the " -"router's \n" -"public keys). Both levels of restricted route operation are planned for " -"I2P \n" +"Beyond the functional handling of restricted routes, there are two levels \n" +"of restricted operation that can be used to limit the exposure of one's IP \n" +"address - using router-specific tunnels for communication, and offering 'client \n" +"routers'. For the former, routers can either build a new pool of tunnels or \n" +"reuse their exploratory pool, publishing the inbound gateways to some of them \n" +"as part of their routerInfo in place of their transport addresses. When a \n" +"peer wants to get in touch with them, they see those tunnel gateways in the \n" +"netDb and simply send the relevant message to them through one of the published \n" +"tunnels. If the peer behind the restricted route wants to reply, it may do \n" +"so either directly (if they are willing to expose their IP to the peer) or \n" +"indirectly through their outbound tunnels. When the routers that the peer \n" +"has direct connections to want to reach it (to forward tunnel messages, for \n" +"instance), they simply prioritize their direct connection over the published \n" +"tunnel gateway. The concept of 'client routers' simply extends the restricted \n" +"route by not publishing any router addresses. Such a router would not even \n" +"need to publish their routerInfo in the netDb, merely providing their self \n" +"signed routerInfo to the peers that it contacts (necessary to pass the router's \n" +"public keys). Both levels of restricted route operation are planned for I2P \n" "2.0." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:617 msgid "" -"There are tradeoffs for those behind restricted routes, as they would " -"likely \n" -"participate in other people's tunnels less frequently, and the routers " -"which \n" -"they are connected to would be able to infer traffic patterns that would " -"not \n" -"otherwise be exposed. On the other hand, if the cost of that exposure is " -"less \n" -"than the cost of an IP being made available, it may be worthwhile. This, " -"of \n" -"course, assumes that the peers that the router behind a restricted route " -"contacts \n" -"are not hostile - either the network is large enough that the probability" -" \n" -"of using a hostile peer to get connected is small enough, or trusted (and" -" \n" +"There are tradeoffs for those behind restricted routes, as they would likely \n" +"participate in other people's tunnels less frequently, and the routers which \n" +"they are connected to would be able to infer traffic patterns that would not \n" +"otherwise be exposed. On the other hand, if the cost of that exposure is less \n" +"than the cost of an IP being made available, it may be worthwhile. This, of \n" +"course, assumes that the peers that the router behind a restricted route contacts \n" +"are not hostile - either the network is large enough that the probability \n" +"of using a hostile peer to get connected is small enough, or trusted (and \n" "perhaps temporary) peers are used instead." msgstr "" @@ -10351,45 +9014,28 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:630 msgid "" -"Even though the bulk of I2P's initial efforts have been on low latency " -"communication, \n" -"it was designed with variable latency services in mind from the " -"beginning. \n" -"At the most basic level, applications running on top of I2P can offer the" -" \n" -"anonymity of medium and high latency communication while still blending " -"their \n" -"traffic patterns in with low latency traffic. Internally though, I2P can " -"offer \n" -"its own medium and high latency communication through the garlic " -"encryption \n" -"- specifying that the message should be sent after a certain delay, at a " -"certain \n" -"time, after a certain number of messages have passed, or another mix " -"strategy. \n" -"With the layered encryption, only the router that the clove exposed the " -"delay \n" -"request would know that the message requires high latency, allowing the " -"traffic \n" -"to blend in further with the low latency traffic. Once the transmission " -"precondition \n" -"is met, the router holding on to the clove (which itself would likely be " -"a \n" -"garlic message) simply forwards it as requested - to a router, to a " -"tunnel, \n" +"Even though the bulk of I2P's initial efforts have been on low latency communication, \n" +"it was designed with variable latency services in mind from the beginning. \n" +"At the most basic level, applications running on top of I2P can offer the \n" +"anonymity of medium and high latency communication while still blending their \n" +"traffic patterns in with low latency traffic. Internally though, I2P can offer \n" +"its own medium and high latency communication through the garlic encryption \n" +"- specifying that the message should be sent after a certain delay, at a certain \n" +"time, after a certain number of messages have passed, or another mix strategy. \n" +"With the layered encryption, only the router that the clove exposed the delay \n" +"request would know that the message requires high latency, allowing the traffic \n" +"to blend in further with the low latency traffic. Once the transmission precondition \n" +"is met, the router holding on to the clove (which itself would likely be a \n" +"garlic message) simply forwards it as requested - to a router, to a tunnel, \n" "or, most likely, to a remote client destination." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:647 msgid "" -"There are a substantial number of ways to exploit this capacity for high" -" \n" -"latency comm in I2P, but for the moment, doing so has been scheduled for " -"the \n" -"I2P 3.0 release. In the meantime, those requiring the anonymity that high" -" \n" -"latency comm can offer should look towards the application layer to " -"provide \n" +"There are a substantial number of ways to exploit this capacity for high \n" +"latency comm in I2P, but for the moment, doing so has been scheduled for the \n" +"I2P 3.0 release. In the meantime, those requiring the anonymity that high \n" +"latency comm can offer should look towards the application layer to provide \n" "it." msgstr "" @@ -10423,18 +9069,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:665 msgid "" -"I2P's architecture builds on the concepts of message oriented middleware," -" \n" -"the topology of DHTs, the anonymity and cryptography of free route " -"mixnets, \n" -"and the adaptability of packet switched networking. The value comes not " -"from \n" -"novel concepts of algorithms though, but from careful engineering " -"combining \n" -"the research results of existing systems and papers. While there are a " -"few \n" -"similar efforts worth reviewing, both for technical and functional " -"comparisons, \n" +"I2P's architecture builds on the concepts of message oriented middleware, \n" +"the topology of DHTs, the anonymity and cryptography of free route mixnets, \n" +"and the adaptability of packet switched networking. The value comes not from \n" +"novel concepts of algorithms though, but from careful engineering combining \n" +"the research results of existing systems and papers. While there are a few \n" +"similar efforts worth reviewing, both for technical and functional comparisons, \n" "two in particular are pulled out here - Tor and Freenet." msgstr "" @@ -10451,209 +9091,127 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:682 msgid "" "At first glance, Tor and I2P have many functional and anonymity related \n" -"similarities. While I2P's development began before we were aware of the " -"early \n" -"stage efforts on Tor, many of the lessons of the original onion routing " -"and \n" -"ZKS efforts were integrated into I2P's design. Rather than building an " -"essentially \n" -"trusted, centralized system with directory servers, I2P has a self " -"organizing \n" -"network database with each peer taking on the responsibility of profiling" -" \n" -"other routers to determine how best to exploit available resources. " -"Another \n" -"key difference is that while both I2P and Tor use layered and ordered " -"paths \n" -"(tunnels and circuits/streams), I2P is fundamentally a packet switched " -"network, \n" -"while Tor is fundamentally a circuit switched one, allowing I2P to " -"transparently \n" -"route around congestion or other network failures, operate redundant " -"pathways, \n" -"and load balance the data across available resources. While Tor offers " -"the \n" -"useful outproxy functionality by offering integrated outproxy discovery " -"and \n" -"selection, I2P leaves such application layer decisions up to applications" -" \n" -"running on top of I2P - in fact, I2P has even externalized the TCP-like " -"streaming \n" -"library itself to the application layer, allowing developers to " -"experiment \n" -"with different strategies, exploiting their domain specific knowledge to " -"offer \n" +"similarities. While I2P's development began before we were aware of the early \n" +"stage efforts on Tor, many of the lessons of the original onion routing and \n" +"ZKS efforts were integrated into I2P's design. Rather than building an essentially \n" +"trusted, centralized system with directory servers, I2P has a self organizing \n" +"network database with each peer taking on the responsibility of profiling \n" +"other routers to determine how best to exploit available resources. Another \n" +"key difference is that while both I2P and Tor use layered and ordered paths \n" +"(tunnels and circuits/streams), I2P is fundamentally a packet switched network, \n" +"while Tor is fundamentally a circuit switched one, allowing I2P to transparently \n" +"route around congestion or other network failures, operate redundant pathways, \n" +"and load balance the data across available resources. While Tor offers the \n" +"useful outproxy functionality by offering integrated outproxy discovery and \n" +"selection, I2P leaves such application layer decisions up to applications \n" +"running on top of I2P - in fact, I2P has even externalized the TCP-like streaming \n" +"library itself to the application layer, allowing developers to experiment \n" +"with different strategies, exploiting their domain specific knowledge to offer \n" "better performance." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:703 msgid "" -"From an anonymity perspective, there is much similarity when the core " -"networks \n" -"are compared. However, there are a few key differences. When dealing with" -" \n" -"an internal adversary or most external adversaries, I2P's simplex tunnels" -" \n" -"expose half as much traffic data than would be exposed with Tor's duplex " -"circuits \n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels. \n" -"While I2P's peer selection and ordering strategies should sufficiently " -"address \n" -"predecessor attacks, should a switch to bidirectional tunnels be " -"necessary,\n" -"we could simply build an inbound and outbound tunnel along the same " -"routers." +"From an anonymity perspective, there is much similarity when the core networks \n" +"are compared. However, there are a few key differences. When dealing with \n" +"an internal adversary or most external adversaries, I2P's simplex tunnels \n" +"expose half as much traffic data than would be exposed with Tor's duplex circuits \n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels. \n" +"While I2P's peer selection and ordering strategies should sufficiently address \n" +"predecessor attacks, should a switch to bidirectional tunnels be necessary,\n" +"we could simply build an inbound and outbound tunnel along the same routers." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:717 msgid "" -"Another anonymity issue comes up in Tor's use of telescopic tunnel " -"creation, \n" -"as simple packet counting and timing measurements as the cells in a " -"circuit \n" -"pass through an adversary's node exposes statistical information " -"regarding \n" -"where the adversary is within the circuit. I2P's unidirectional tunnel " -"creation \n" -"with a single message so that this data is not exposed. Protecting the " -"position \n" -"in a tunnel is important, as an adversary would otherwise be able to " -"mount \n" -"a series of powerful predecessor, intersection, and traffic confirmation " -"attacks." +"Another anonymity issue comes up in Tor's use of telescopic tunnel creation, \n" +"as simple packet counting and timing measurements as the cells in a circuit \n" +"pass through an adversary's node exposes statistical information regarding \n" +"where the adversary is within the circuit. I2P's unidirectional tunnel creation \n" +"with a single message so that this data is not exposed. Protecting the position \n" +"in a tunnel is important, as an adversary would otherwise be able to mount \n" +"a series of powerful predecessor, intersection, and traffic confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:727 msgid "" -"Tor's support for a second tier of \"onion proxies\" does offer a non-" -"trivial \n" -"degree of anonymity while requiring a low cost of entry, while I2P will " -"not \n" +"Tor's support for a second tier of \"onion proxies\" does offer a non-trivial \n" +"degree of anonymity while requiring a low cost of entry, while I2P will not \n" "offer this topology until <a href=\"#future.restricted\">2.0</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:733 msgid "" -"On the whole, Tor and I2P complement each other in their focus - Tor " -"works \n" -"towards offering high speed anonymous Internet outproxying, while I2P " -"works \n" -"towards offering a decentralized resilient network in itself. In theory, " -"both \n" -"can be used to achieve both purposes, but given limited development " -"resources, \n" -"they both have their strengths and weaknesses. The I2P developers have " -"considered \n" -"the steps necessary to modify Tor to take advantage of I2P's design, but " -"concerns \n" -"of Tor's viability under resource scarcity suggest that I2P's packet " -"switching \n" +"On the whole, Tor and I2P complement each other in their focus - Tor works \n" +"towards offering high speed anonymous Internet outproxying, while I2P works \n" +"towards offering a decentralized resilient network in itself. In theory, both \n" +"can be used to achieve both purposes, but given limited development resources, \n" +"they both have their strengths and weaknesses. The I2P developers have considered \n" +"the steps necessary to modify Tor to take advantage of I2P's design, but concerns \n" +"of Tor's viability under resource scarcity suggest that I2P's packet switching \n" "architecture will be able to exploit scarce resources more effectively." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:747 msgid "" -"Freenet played a large part in the initial stages of I2P's design - " -"giving \n" -"proof to the viability of a vibrant pseudonymous community completely " -"contained \n" -"within the network, demonstrating that the dangers inherent in outproxies" -" \n" -"could be avoided. The first seed of I2P began as a replacement " -"communication \n" -"layer for Freenet, attempting to factor out the complexities of a " -"scalable, \n" -"anonymous and secure point to point communication from the complexities " -"of \n" -"a censorship resistant distributed data store. Over time however, some of" -" \n" -"the anonymity and scalability issues inherent in Freenet's algorithms " -"made \n" -"it clear that I2P's focus should stay strictly on providing a generic " -"anonymous \n" -"communication layer, rather than as a component of Freenet. Over the " -"years, \n" -"the Freenet developers have come to see the weaknesses in the older " -"design, \n" -"prompting them to suggest that they will require a \"premix\" layer to " -"offer \n" -"substantial anonymity. In other words, Freenet needs to run on top of a " -"mixnet \n" -"such as I2P or Tor, with \"client nodes\" requesting and publishing data " -"through \n" -"the mixnet to the \"server nodes\" which then fetch and store the data " -"according \n" +"Freenet played a large part in the initial stages of I2P's design - giving \n" +"proof to the viability of a vibrant pseudonymous community completely contained \n" +"within the network, demonstrating that the dangers inherent in outproxies \n" +"could be avoided. The first seed of I2P began as a replacement communication \n" +"layer for Freenet, attempting to factor out the complexities of a scalable, \n" +"anonymous and secure point to point communication from the complexities of \n" +"a censorship resistant distributed data store. Over time however, some of \n" +"the anonymity and scalability issues inherent in Freenet's algorithms made \n" +"it clear that I2P's focus should stay strictly on providing a generic anonymous \n" +"communication layer, rather than as a component of Freenet. Over the years, \n" +"the Freenet developers have come to see the weaknesses in the older design, \n" +"prompting them to suggest that they will require a \"premix\" layer to offer \n" +"substantial anonymity. In other words, Freenet needs to run on top of a mixnet \n" +"such as I2P or Tor, with \"client nodes\" requesting and publishing data through \n" +"the mixnet to the \"server nodes\" which then fetch and store the data according \n" "to Freenet's heuristic distributed data storage algorithms." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:766 msgid "" -"Freenet's functionality is very complementary to I2P's, as Freenet " -"natively \n" -"provides many of the tools for operating medium and high latency systems," -" \n" -"while I2P natively provides the low latency mix network suitable for " -"offering \n" -"adequate anonymity. The logic of separating the mixnet from the " -"censorship-\n" -"resistant distributed data store still seems self-evident from an " -"engineering, \n" -"anonymity, security, and resource allocation perspective, so hopefully " -"the \n" -"Freenet team will pursue efforts in that direction, if not simply reusing" -" \n" +"Freenet's functionality is very complementary to I2P's, as Freenet natively \n" +"provides many of the tools for operating medium and high latency systems, \n" +"while I2P natively provides the low latency mix network suitable for offering \n" +"adequate anonymity. The logic of separating the mixnet from the censorship-\n" +"resistant distributed data store still seems self-evident from an engineering, \n" +"anonymity, security, and resource allocation perspective, so hopefully the \n" +"Freenet team will pursue efforts in that direction, if not simply reusing \n" "(or helping to improve, as necessary) existing mixnets like I2P or Tor." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:777 msgid "" "It is worth mentioning that there has recently been discussion and work \n" -"by the Freenet developers on a \"globally scalable darknet\" using " -"restricted \n" -"routes between peers of various trust. While insufficient information has" -" \n" -"been made publicly available regarding how such a system would operate " -"for \n" -"a full review, from what has been said the anonymity and scalability " -"claims \n" -"seem highly dubious. In particular, the appropriateness for use in " -"hostile \n" -"regimes against state level adversaries has been tremendously overstated," -" \n" -"and any analysis on the implications of resource scarcity upon the " -"scalability \n" -"of the network has seemingly been avoided. Further questions regarding " -"susceptibility \n" -"to traffic analysis, trust and other topics do exist, but a more in-depth" -" \n" -"review of this \"globally scalable darknet\" will have to wait until the " -"Freenet \n" +"by the Freenet developers on a \"globally scalable darknet\" using restricted \n" +"routes between peers of various trust. While insufficient information has \n" +"been made publicly available regarding how such a system would operate for \n" +"a full review, from what has been said the anonymity and scalability claims \n" +"seem highly dubious. In particular, the appropriateness for use in hostile \n" +"regimes against state level adversaries has been tremendously overstated, \n" +"and any analysis on the implications of resource scarcity upon the scalability \n" +"of the network has seemingly been avoided. Further questions regarding susceptibility \n" +"to traffic analysis, trust and other topics do exist, but a more in-depth \n" +"review of this \"globally scalable darknet\" will have to wait until the Freenet \n" "team makes more information available." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:793 msgid "" -"I2P itself doesn't really do much - it simply sends messages to remote " -"destinations \n" -"and receives messages targeting local destinations - most of the " -"interesting \n" -"work goes on at the layers above it. By itself, I2P could be seen as an " -"anonymous \n" -"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming" -" library</a> \n" -"as an implementation of an anonymous and secure TCP layer on top of it. " -"Beyond \n" -"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP " -"proxying \n" -"system for either getting into or out of the I2P network, plus a variety " -"of \n" +"I2P itself doesn't really do much - it simply sends messages to remote destinations \n" +"and receives messages targeting local destinations - most of the interesting \n" +"work goes on at the layers above it. By itself, I2P could be seen as an anonymous \n" +"and secure IP layer, and the bundled <a href=\"#app.streaming\">streaming library</a> \n" +"as an implementation of an anonymous and secure TCP layer on top of it. Beyond \n" +"that, <a href=\"#app.i2ptunnel\">I2PTunnel</a> exposes a generic TCP proxying \n" +"system for either getting into or out of the I2P network, plus a variety of \n" "network applications provide further functionality for end users." msgstr "" @@ -10663,51 +9221,34 @@ msgstr "Librari transmetimi" #: i2p2www/pages/site/docs/how/tech-intro.html:805 msgid "" -"The I2P streaming library can be viewed as a generic streaming interface " -"(mirroring TCP sockets),\n" -"and the implementation supports a <a " -"href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding " -"window protocol</a>\n" -"with several optimizations, to take into account the high delay over I2P." -"\n" +"The I2P streaming library can be viewed as a generic streaming interface (mirroring TCP sockets),\n" +"and the implementation supports a <a href=\"http://en.wikipedia.org/wiki/Sliding_Window_Protocol\">sliding window protocol</a>\n" +"with several optimizations, to take into account the high delay over I2P.\n" "Individual streams may adjust the maximum packet size and \n" -"other options, though the default of 4KB compressed seems a reasonable " -"tradeoff \n" -"between the bandwidth costs of retransmitting lost messages and the " -"latency \n" +"other options, though the default of 4KB compressed seems a reasonable tradeoff \n" +"between the bandwidth costs of retransmitting lost messages and the latency \n" "of multiple messages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:815 msgid "" "In addition, in consideration of the relatively high cost of subsequent \n" -"messages, the streaming library's protocol for scheduling and delivering " -"messages \n" -"has been optimized to allow individual messages passed to contain as much" -" \n" -"information as is available. For instance, a small HTTP transaction " -"proxied \n" -"through the streaming library can be completed in a single round trip - " -"the \n" -"first message bundles a SYN, FIN and the small payload (an HTTP request " -"typically \n" -"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many" -" \n" -"HTTP responses fit). While an additional ACK must be transmitted to tell " -"the \n" -"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy " -"can \n" +"messages, the streaming library's protocol for scheduling and delivering messages \n" +"has been optimized to allow individual messages passed to contain as much \n" +"information as is available. For instance, a small HTTP transaction proxied \n" +"through the streaming library can be completed in a single round trip - the \n" +"first message bundles a SYN, FIN and the small payload (an HTTP request typically \n" +"fits) and the reply bundles the SYN, FIN, ACK and the small payload (many \n" +"HTTP responses fit). While an additional ACK must be transmitted to tell the \n" +"HTTP server that the SYN/FIN/ACK has been received, the local HTTP proxy can \n" "deliver the full response to the browser immediately." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:828 msgid "" -"On the whole, however, the streaming library bears much resemblance to an" -" \n" -"abstraction of TCP, with its sliding windows, congestion control " -"algorithms \n" -"(both slow start and congestion avoidance), and general packet behavior " -"(ACK, \n" +"On the whole, however, the streaming library bears much resemblance to an \n" +"abstraction of TCP, with its sliding windows, congestion control algorithms \n" +"(both slow start and congestion avoidance), and general packet behavior (ACK, \n" "SYN, FIN, RST, etc)." msgstr "" @@ -10737,227 +9278,142 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:842 msgid "" -"Naming within I2P has been an oft-debated topic since the very beginning" -" \n" -"with advocates across the spectrum of possibilities. However, given I2P's" -" \n" -"inherent demand for secure communication and decentralized operation, the" -" \n" -"traditional DNS-style naming system is clearly out, as are \"majority " -"rules\" \n" -"voting systems. Instead, I2P ships with a generic naming library and a " -"base \n" -"implementation designed to work off a local name to destination mapping, " -"as \n" -"well as an optional add-on application called the \"Address Book\". The " -"address book \n" -"is a web-of-trust-driven secure, distributed, and human readable naming " -"system, \n" -"sacrificing only the call for all human readable names to be globally " -"unique \n" -"by mandating only local uniqueness. While all messages in I2P are " -"cryptographically \n" -"addressed by their destination, different people can have local address " -"book \n" -"entries for \"Alice\" which refer to different destinations. People can " -"still \n" -"discover new names by importing published address books of peers " -"specified \n" -"in their web of trust, by adding in the entries provided through a third " -"party, \n" -"or (if some people organize a series of published address books using a " -"first \n" -"come first serve registration system) people can choose to treat these " -"address books \n" +"Naming within I2P has been an oft-debated topic since the very beginning \n" +"with advocates across the spectrum of possibilities. However, given I2P's \n" +"inherent demand for secure communication and decentralized operation, the \n" +"traditional DNS-style naming system is clearly out, as are \"majority rules\" \n" +"voting systems. Instead, I2P ships with a generic naming library and a base \n" +"implementation designed to work off a local name to destination mapping, as \n" +"well as an optional add-on application called the \"Address Book\". The address book \n" +"is a web-of-trust-driven secure, distributed, and human readable naming system, \n" +"sacrificing only the call for all human readable names to be globally unique \n" +"by mandating only local uniqueness. While all messages in I2P are cryptographically \n" +"addressed by their destination, different people can have local address book \n" +"entries for \"Alice\" which refer to different destinations. People can still \n" +"discover new names by importing published address books of peers specified \n" +"in their web of trust, by adding in the entries provided through a third party, \n" +"or (if some people organize a series of published address books using a first \n" +"come first serve registration system) people can choose to treat these address books \n" "as name servers, emulating traditional DNS." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:862 msgid "" "I2P does not promote the use of DNS-like services though, as the damage \n" -"done by hijacking a site can be tremendous - and insecure destinations " -"have \n" -"no value. DNSsec itself still falls back on registrars and certificate " -"authorities, \n" -"while with I2P, requests sent to a destination cannot be intercepted or " -"the \n" -"reply spoofed, as they are encrypted to the destination's public keys, " -"and \n" -"a destination itself is just a pair of public keys and a certificate. " -"DNS-style \n" -"systems on the other hand allow any of the name servers on the lookup " -"path \n" -"to mount simple denial of service and spoofing attacks. Adding on a " -"certificate \n" -"authenticating the responses as signed by some centralized certificate " -"authority \n" -"would address many of the hostile nameserver issues but would leave open " -"replay \n" +"done by hijacking a site can be tremendous - and insecure destinations have \n" +"no value. DNSsec itself still falls back on registrars and certificate authorities, \n" +"while with I2P, requests sent to a destination cannot be intercepted or the \n" +"reply spoofed, as they are encrypted to the destination's public keys, and \n" +"a destination itself is just a pair of public keys and a certificate. DNS-style \n" +"systems on the other hand allow any of the name servers on the lookup path \n" +"to mount simple denial of service and spoofing attacks. Adding on a certificate \n" +"authenticating the responses as signed by some centralized certificate authority \n" +"would address many of the hostile nameserver issues but would leave open replay \n" "attacks as well as hostile certificate authority attacks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:876 msgid "" -"Voting style naming is dangerous as well, especially given the " -"effectiveness \n" -"of Sybil attacks in anonymous systems - the attacker can simply create an" -" \n" -"arbitrarily high number of peers and \"vote\" with each to take over a " -"given \n" -"name. Proof-of-work methods can be used to make identity non-free, but as" -" \n" -"the network grows the load required to contact everyone to conduct online" -" \n" -"voting is implausible, or if the full network is not queried, different " -"sets \n" +"Voting style naming is dangerous as well, especially given the effectiveness \n" +"of Sybil attacks in anonymous systems - the attacker can simply create an \n" +"arbitrarily high number of peers and \"vote\" with each to take over a given \n" +"name. Proof-of-work methods can be used to make identity non-free, but as \n" +"the network grows the load required to contact everyone to conduct online \n" +"voting is implausible, or if the full network is not queried, different sets \n" "of answers may be reachable." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:886 msgid "" -"As with the Internet however, I2P is keeping the design and operation of" -" \n" -"a naming system out of the (IP-like) communication layer. The bundled " -"naming \n" -"library includes a simple service provider interface which alternate " -"naming \n" -"systems can plug into, allowing end users to drive what sort of naming " -"tradeoffs \n" +"As with the Internet however, I2P is keeping the design and operation of \n" +"a naming system out of the (IP-like) communication layer. The bundled naming \n" +"library includes a simple service provider interface which alternate naming \n" +"systems can plug into, allowing end users to drive what sort of naming tradeoffs \n" "they prefer." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:895 msgid "" -"The old Syndie bundled with I2P has been replaced by the new Syndie which" -"\n" -"is distributed separately. For more information see the <a " -"href=\"http://syndie.i2p2.de/\">Syndie</a>\n" +"The old Syndie bundled with I2P has been replaced by the new Syndie which\n" +"is distributed separately. For more information see the <a href=\"http://syndie.i2p2.de/\">Syndie</a>\n" "pages." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:901 msgid "" -"Syndie is a safe, anonymous blogging / content publication / content " -"aggregation \n" -"system. It lets you create information, share it with others, and read " -"posts \n" -"from those you're interested in, all while taking into consideration your" -" \n" -"needs for security and anonymity. Rather than building its own content " -"distribution \n" -"network, Syndie is designed to run on top of existing networks, " -"syndicating \n" -"content through I2P Sites, Tor hidden services, Freenet freesites, normal" -" websites, \n" -"usenet newsgroups, email lists, RSS feeds, etc. Data published with " -"Syndie \n" -"is done so as to offer pseudonymous authentication to anyone reading or " -"archiving \n" +"Syndie is a safe, anonymous blogging / content publication / content aggregation \n" +"system. It lets you create information, share it with others, and read posts \n" +"from those you're interested in, all while taking into consideration your \n" +"needs for security and anonymity. Rather than building its own content distribution \n" +"network, Syndie is designed to run on top of existing networks, syndicating \n" +"content through I2P Sites, Tor hidden services, Freenet freesites, normal websites, \n" +"usenet newsgroups, email lists, RSS feeds, etc. Data published with Syndie \n" +"is done so as to offer pseudonymous authentication to anyone reading or archiving \n" "it." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:916 msgid "" -"I2PTunnel is probably I2P's most popular and versatile client " -"application, \n" -"allowing generic proxying both into and out of the I2P network. I2PTunnel" -" \n" -"can be viewed as four separate proxying applications - a \"client\" which" -" receives \n" -"inbound TCP connections and forwards them to a given I2P destination, an " -"\"httpclient\" \n" -"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the " -"requests to \n" -"the appropriate I2P destination (after querying the naming service if " -"necessary), \n" -"a \"server\" which receives inbound I2P streaming connections on a " -"destination \n" -"and forwards them to a given TCP host+port, and an \"httpserver\" which " -"extends \n" -"the \"server\" by parsing the HTTP request and responses to allow safer " -"operation. \n" -"There is an additional \"socksclient\" application, but its use is not " -"encouraged \n" +"I2PTunnel is probably I2P's most popular and versatile client application, \n" +"allowing generic proxying both into and out of the I2P network. I2PTunnel \n" +"can be viewed as four separate proxying applications - a \"client\" which receives \n" +"inbound TCP connections and forwards them to a given I2P destination, an \"httpclient\" \n" +"(aka \"eepproxy\") which acts like an HTTP proxy and forwards the requests to \n" +"the appropriate I2P destination (after querying the naming service if necessary), \n" +"a \"server\" which receives inbound I2P streaming connections on a destination \n" +"and forwards them to a given TCP host+port, and an \"httpserver\" which extends \n" +"the \"server\" by parsing the HTTP request and responses to allow safer operation. \n" +"There is an additional \"socksclient\" application, but its use is not encouraged \n" "for reasons previously mentioned." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:930 msgid "" -"I2P itself is not an outproxy network - the anonymity and security " -"concerns \n" -"inherent in a mix net which forwards data into and out of the mix have " -"kept \n" -"I2P's design focused on providing an anonymous network which capable of " -"meeting \n" -"the user's needs without requiring external resources. However, the " -"I2PTunnel \n" -"\"httpclient\" application offers a hook for outproxying - if the " -"hostname requested \n" -"doesn't end in \".i2p\", it picks a random destination from a user-" -"provided \n" -"set of outproxies and forwards the request to them. These destinations " -"are \n" -"simply I2PTunnel \"server\" instances run by volunteers who have " -"explicitly \n" -"chosen to run outproxies - no one is an outproxy by default, and running " -"an \n" -"outproxy doesn't automatically tell other people to proxy through you. " -"While \n" -"outproxies do have inherent weaknesses, they offer a simple proof of " -"concept \n" -"for using I2P and provide some functionality under a threat model which " -"may \n" +"I2P itself is not an outproxy network - the anonymity and security concerns \n" +"inherent in a mix net which forwards data into and out of the mix have kept \n" +"I2P's design focused on providing an anonymous network which capable of meeting \n" +"the user's needs without requiring external resources. However, the I2PTunnel \n" +"\"httpclient\" application offers a hook for outproxying - if the hostname requested \n" +"doesn't end in \".i2p\", it picks a random destination from a user-provided \n" +"set of outproxies and forwards the request to them. These destinations are \n" +"simply I2PTunnel \"server\" instances run by volunteers who have explicitly \n" +"chosen to run outproxies - no one is an outproxy by default, and running an \n" +"outproxy doesn't automatically tell other people to proxy through you. While \n" +"outproxies do have inherent weaknesses, they offer a simple proof of concept \n" +"for using I2P and provide some functionality under a threat model which may \n" "be sufficient for some users." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:946 msgid "" -"I2PTunnel enables most of the applications in use. An \"httpserver\" " -"pointing \n" -"at a webserver lets anyone run their own anonymous website (or \"I2P " -"Site\") \n" -"- a webserver is bundled with I2P for this purpose, but any webserver can" -" \n" -"be used. Anyone may run a \"client\" pointing at one of the anonymously " -"hosted \n" -"IRC servers, each of which are running a \"server\" pointing at their " -"local \n" -"IRCd and communicating between IRCds over their own \"client\" tunnels. " -"End \n" -"users also have \"client\" tunnels pointing at <a " -"href=\"#app.i2pmail\">I2Pmail's</a> \n" -"POP3 and SMTP destinations (which in turn are simply \"server\" instances" -" pointing \n" -"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at " -"I2P's CVS \n" -"server, allowing anonymous development. At times people have even run " -"\"client\" \n" +"I2PTunnel enables most of the applications in use. An \"httpserver\" pointing \n" +"at a webserver lets anyone run their own anonymous website (or \"I2P Site\") \n" +"- a webserver is bundled with I2P for this purpose, but any webserver can \n" +"be used. Anyone may run a \"client\" pointing at one of the anonymously hosted \n" +"IRC servers, each of which are running a \"server\" pointing at their local \n" +"IRCd and communicating between IRCds over their own \"client\" tunnels. End \n" +"users also have \"client\" tunnels pointing at <a href=\"#app.i2pmail\">I2Pmail's</a> \n" +"POP3 and SMTP destinations (which in turn are simply \"server\" instances pointing \n" +"at POP3 and SMTP servers), as well as \"client\" tunnels pointing at I2P's CVS \n" +"server, allowing anonymous development. At times people have even run \"client\" \n" "proxies to access the \"server\" instances pointing at an NNTP server." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:963 msgid "" -"i2p-bt is a port of the mainline python BitTorrent client to run both the" -" \n" -"tracker and peer communication over I2P. Tracker requests are forwarded " -"through \n" -"the eepproxy to I2P Sites specified in the torrent file while tracker " -"responses \n" -"refer to peers by their destination explicitly, allowing i2p-bt to open " -"up \n" -"a <a href=\"#app.streaming\">streaming lib</a> connection to query them " -"for \n" +"i2p-bt is a port of the mainline python BitTorrent client to run both the \n" +"tracker and peer communication over I2P. Tracker requests are forwarded through \n" +"the eepproxy to I2P Sites specified in the torrent file while tracker responses \n" +"refer to peers by their destination explicitly, allowing i2p-bt to open up \n" +"a <a href=\"#app.streaming\">streaming lib</a> connection to query them for \n" "blocks." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:972 msgid "" -"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making" -" \n" -"a few modifications as necessary to strip any anonymity-compromising " -"information \n" -"from the application and to take into consideration the fact that IPs " -"cannot \n" +"In addition to i2p-bt, a port of bytemonsoon has been made to I2P, making \n" +"a few modifications as necessary to strip any anonymity-compromising information \n" +"from the application and to take into consideration the fact that IPs cannot \n" "be used for identifying peers." msgstr "" @@ -10970,10 +9426,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:986 msgid "" -"Bundled with the I2P install, I2PSnark offers a simple anonymous " -"BitTorrent \n" -"client with multitorrent capabilities, exposing all of the functionality " -"through \n" +"Bundled with the I2P install, I2PSnark offers a simple anonymous BitTorrent \n" +"client with multitorrent capabilities, exposing all of the functionality through \n" "a plain HTML web interface." msgstr "" @@ -10981,9 +9435,7 @@ msgstr "" #, python-format msgid "" "Robert is a Bittorrent client written in Python.\n" -"It is hosted on <a " -"href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- " -"TODO: expand -->" +"It is hosted on <a href=\"http://%(bob)s/Robert.html\">http://%(bob)s/Robert.html</a> <!-- TODO: expand -->" msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1003 @@ -10995,12 +9447,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1011 msgid "" -"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to" -" \n" -"run entirely on top of I2P. While it has disabled some of Phex's " -"functionality, \n" -"such as integration with Gnutella webcaches, the basic file sharing and " -"chatting \n" +"I2Phex is a fairly direct port of the Phex Gnutella filesharing client to \n" +"run entirely on top of I2P. While it has disabled some of Phex's functionality, \n" +"such as integration with Gnutella webcaches, the basic file sharing and chatting \n" "system is fully functional." msgstr "" @@ -11013,62 +9462,39 @@ msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1029 #, python-format msgid "" -"I2Pmail is more a service than an application - postman offers both " -"internal \n" -"and external email with POP3 and SMTP service through I2PTunnel instances" -" \n" -"accessing a series of components developed with mastiejaner, allowing " -"people \n" -"to use their preferred mail clients to send and receive mail " -"pseudonymously. \n" -"However, as most mail clients expose substantial identifying information," -" \n" -"I2P bundles susi23's web based susimail client which has been built " -"specifically \n" -"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers " -"transparent \n" -"virus filtering as well as denial of service prevention with hashcash " -"augmented \n" -"quotas. In addition, each user has control of their batching strategy " -"prior \n" -"to delivery through the mail.i2p outproxies, which are separate from the " -"mail.i2p \n" -"SMTP and POP3 servers - both the outproxies and inproxies communicate " -"with \n" -"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising " -"those \n" -"non-anonymous locations does not give access to the mail accounts or " -"activity \n" -"patterns of the user. At the moment the developers work on a " -"decentralized \n" -"mailsystem, called \"v2mail\". More information can be found on the I2P " -"Site \n" +"I2Pmail is more a service than an application - postman offers both internal \n" +"and external email with POP3 and SMTP service through I2PTunnel instances \n" +"accessing a series of components developed with mastiejaner, allowing people \n" +"to use their preferred mail clients to send and receive mail pseudonymously. \n" +"However, as most mail clients expose substantial identifying information, \n" +"I2P bundles susi23's web based susimail client which has been built specifically \n" +"with I2P's anonymity needs in mind. The I2Pmail/mail.i2p service offers transparent \n" +"virus filtering as well as denial of service prevention with hashcash augmented \n" +"quotas. In addition, each user has control of their batching strategy prior \n" +"to delivery through the mail.i2p outproxies, which are separate from the mail.i2p \n" +"SMTP and POP3 servers - both the outproxies and inproxies communicate with \n" +"the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those \n" +"non-anonymous locations does not give access to the mail accounts or activity \n" +"patterns of the user. At the moment the developers work on a decentralized \n" +"mailsystem, called \"v2mail\". More information can be found on the I2P Site \n" "<a href=\"http://%(postman)s/\">%(postman)s</a>." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1051 msgid "" -"I2P-Bote is a distributed e-mail application. It does not use the " -"traditional\n" -"e-mail concept of sending an e-mail to a server and retrieving it from a " -"server.\n" +"I2P-Bote is a distributed e-mail application. It does not use the traditional\n" +"e-mail concept of sending an e-mail to a server and retrieving it from a server.\n" "Instead, it uses a Kademlia Distributed Hash Table to store mails.\n" -"One user can push a mail into the DHT, while another can request the " -"e-mail from the DHT.\n" -"And all the mails sent within the I2P-Bote network are automatically " -"encrypted end-to-end. <br>\n" -"Furthermore, I2P-Bote offers a remailer function on top of I2P, for " -"increased high-latency anonymity." +"One user can push a mail into the DHT, while another can request the e-mail from the DHT.\n" +"And all the mails sent within the I2P-Bote network are automatically encrypted end-to-end. <br>\n" +"Furthermore, I2P-Bote offers a remailer function on top of I2P, for increased high-latency anonymity." msgstr "" #: i2p2www/pages/site/docs/how/tech-intro.html:1061 msgid "" -"I2P-Messenger is an end-to-end encrypted serverless communication " -"application.\n" -"For communication between two users, they need to give each other their " -"destination keys, to allow the other to connect.\n" -"It supports file transfer and has a search for other users, based on " -"Seedless." +"I2P-Messenger is an end-to-end encrypted serverless communication application.\n" +"For communication between two users, they need to give each other their destination keys, to allow the other to connect.\n" +"It supports file transfer and has a search for other users, based on Seedless." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:2 @@ -11218,18 +9644,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:71 msgid "" "Your level of anonymity can be described as \"how hard it is for someone\n" -"to find out information you don't want them to know?\" - who you are, " -"where\n" -"you are located, who you communicate with, or even when you communicate." -" \n" -"\"Perfect\" anonymity is not a useful concept here - software will not " -"make \n" -"you indistinguishable from people that don't use computers or who are not" -" on\n" -"the Internet. Instead, we are working to provide sufficient anonymity to" -" meet the\n" -"real needs of whomever we can - from those simply browsing websites, to " -"those exchanging\n" +"to find out information you don't want them to know?\" - who you are, where\n" +"you are located, who you communicate with, or even when you communicate. \n" +"\"Perfect\" anonymity is not a useful concept here - software will not make \n" +"you indistinguishable from people that don't use computers or who are not on\n" +"the Internet. Instead, we are working to provide sufficient anonymity to meet the\n" +"real needs of whomever we can - from those simply browsing websites, to those exchanging\n" "data, to those fearful of discovery by powerful organizations or states." msgstr "" @@ -11237,17 +9657,14 @@ msgstr "" msgid "" "The question of whether I2P provides sufficient anonymity for your \n" "particular needs is a hard one, but this page will hopefully assist in \n" -"answering that question by exploring how I2P operates under various " -"attacks\n" +"answering that question by exploring how I2P operates under various attacks\n" "so that you may decide whether it meets your needs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:89 msgid "" -"We welcome further research and analysis on I2P's resistance to the " -"threats described below.\n" -"More review of existing literature (much of it focused on Tor) and " -"original\n" +"We welcome further research and analysis on I2P's resistance to the threats described below.\n" +"More review of existing literature (much of it focused on Tor) and original\n" "work focused on I2P is needed." msgstr "" @@ -11259,69 +9676,52 @@ msgstr "" #, python-format msgid "" "I2P builds off the ideas of many <a href=\"%(comparisons)s\">other</a> \n" -"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in" -" mind when \n" +"<a href=\"%(links)s\">systems</a>, but a few key points should be kept in mind when \n" "reviewing related literature:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:102 msgid "" -"<b>I2P is a free route mixnet</b> - the message creator explicitly " -"defines the\n" -"path that messages will be sent out (the outbound tunnel), and the " -"message \n" -"recipient explicitly defines the path that messages will be received on " -"(the\n" +"<b>I2P is a free route mixnet</b> - the message creator explicitly defines the\n" +"path that messages will be sent out (the outbound tunnel), and the message \n" +"recipient explicitly defines the path that messages will be received on (the\n" "inbound tunnel)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:108 msgid "" -"<b>I2P has no official entry and exit points</b> - all peers fully " -"participate in the \n" +"<b>I2P has no official entry and exit points</b> - all peers fully participate in the \n" "mix, and there are no network layer in- or out-proxies (however, at the \n" "application layer, a few proxies do exist)" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:113 msgid "" -"<b>I2P is fully distributed</b> - there are no central controls or " -"authorities.\n" -"One could modify some routers to operate mix cascades (building tunnels " -"and giving\n" -"out the keys necessary to control the forwarding at the tunnel endpoint) " -"or directory \n" -"based profiling and selection, all without breaking compatibility with " -"the rest of \n" -"the network, but doing so is of course not necessary (and may even harm " -"one's\n" +"<b>I2P is fully distributed</b> - there are no central controls or authorities.\n" +"One could modify some routers to operate mix cascades (building tunnels and giving\n" +"out the keys necessary to control the forwarding at the tunnel endpoint) or directory \n" +"based profiling and selection, all without breaking compatibility with the rest of \n" +"the network, but doing so is of course not necessary (and may even harm one's\n" "anonymity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:123 #, python-format msgid "" -"We have documented plans to implement <a " -"href=\"%(todo)s#stop\">nontrivial delays</a>\n" +"We have documented plans to implement <a href=\"%(todo)s#stop\">nontrivial delays</a>\n" "and <a href=\"%(todo)s#batching\">batching strategies</a> \n" -"whose existence is only known to the particular hop or tunnel gateway " -"that \n" -"receives the message, allowing a mostly low latency mixnet to provide " -"cover \n" +"whose existence is only known to the particular hop or tunnel gateway that \n" +"receives the message, allowing a mostly low latency mixnet to provide cover \n" "traffic for higher latency communication (e.g. email).\n" -"However we are aware that significant delays are required to provide " -"meaningful\n" -"protection, and that implementation of such delays will be a significant " -"challenge.\n" -"It is not clear at this time whether we will actually implement these " -"delay features." +"However we are aware that significant delays are required to provide meaningful\n" +"protection, and that implementation of such delays will be a significant challenge.\n" +"It is not clear at this time whether we will actually implement these delay features." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:134 msgid "" "In theory, routers along the message path may inject an \n" -"arbitrary number of hops before forwarding the message to the next peer, " -"though\n" +"arbitrary number of hops before forwarding the message to the next peer, though\n" "the current implementation does not." msgstr "" @@ -11335,8 +9735,7 @@ msgid "" "<a href=\"http://www.onion-router.net\">[Onion Routing]</a>,\n" "<a href=\"http://freenetproject.org/\">[Freenet]</a>, and\n" "<a href=\"https://www.torproject.org/\">[Tor]</a>.\n" -"Our design benefits substantially from the research published around that" -" time.\n" +"Our design benefits substantially from the research published around that time.\n" "I2P uses several onion routing techniques, so we continue to benefit\n" "from the significant academic interest in Tor." msgstr "" @@ -11344,12 +9743,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:152 msgid "" "Taking from the attacks and analysis put forth in the \n" -"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity " -"literature</a> (largely \n" -"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: " -"Protocols, Attacks, Design \n" -"Issues and Open Problems</a>), the following briefly describes a wide " -"variety \n" +"<a href=\"http://freehaven.net/anonbib/topic.html\">anonymity literature</a> (largely \n" +"<a href=\"http://citeseer.ist.psu.edu/454354.html\">Traffic Analysis: Protocols, Attacks, Design \n" +"Issues and Open Problems</a>), the following briefly describes a wide variety \n" "of attacks as well as many of I2Ps defenses. We update\n" "this list to include new attacks as they are identified." msgstr "" @@ -11377,66 +9773,46 @@ msgstr "" msgid "" "The\n" "<a href=\"%(comparisons)s\">network comparisons</a> and\n" -"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also " -"be helpful\n" +"<a href=\"%(garlicrouting)s\">\"garlic\" terminology</a> pages may also be helpful\n" "to review." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:210 msgid "" -"A brute force attack can be mounted by a global passive or active " -"adversary, \n" -"watching all the messages pass between all of the nodes and attempting to" -" correlate\n" -"which message follows which path. Mounting this attack against I2P " -"should be \n" -"nontrivial, as all peers in the network are frequently sending messages " -"(both\n" -"end to end and network maintenance messages), plus an end to end message " -"changes\n" -"size and data along its path. In addition, the external adversary does " -"not have\n" -"access to the messages either, as inter-router communication is both " -"encrypted\n" -"and streamed (making two 1024 byte messages indistinguishable from one " -"2048 byte\n" +"A brute force attack can be mounted by a global passive or active adversary, \n" +"watching all the messages pass between all of the nodes and attempting to correlate\n" +"which message follows which path. Mounting this attack against I2P should be \n" +"nontrivial, as all peers in the network are frequently sending messages (both\n" +"end to end and network maintenance messages), plus an end to end message changes\n" +"size and data along its path. In addition, the external adversary does not have\n" +"access to the messages either, as inter-router communication is both encrypted\n" +"and streamed (making two 1024 byte messages indistinguishable from one 2048 byte\n" "message)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:222 msgid "" -"However, a powerful attacker can use brute force to detect trends - if " -"they \n" -"can send 5GB to an I2P destination and monitor everyone's network " -"connection,\n" -"they can eliminate all peers who did not receive 5GB of data. Techniques" -" to \n" +"However, a powerful attacker can use brute force to detect trends - if they \n" +"can send 5GB to an I2P destination and monitor everyone's network connection,\n" +"they can eliminate all peers who did not receive 5GB of data. Techniques to \n" "defeat this attack exist, but may be prohibitively expensive (see: \n" -"<a " -"href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s " -"mimics\n" -"or constant rate traffic). Most users are not concerned with this " -"attack, as \n" -"the cost of mounting it are extreme (and often require illegal activity)." -" \n" +"<a href=\"http://citeseer.ist.psu.edu/freedman02tarzan.html\">Tarzan</a>'s mimics\n" +"or constant rate traffic). Most users are not concerned with this attack, as \n" +"the cost of mounting it are extreme (and often require illegal activity). \n" "However, the attack is still possible, for example by an observer at\n" "a large ISP or an Internet exchange point.\n" "Those who want to defend against it \n" "would want to take appropriate countermeasures, such as\n" -"setting low bandwidth limits, and using unpublished or encrypted " -"leasesets for I2P Sites.\n" -"Other countermeasures, such as nontrivial delays and restricted routes, " -"are\n" +"setting low bandwidth limits, and using unpublished or encrypted leasesets for I2P Sites.\n" +"Other countermeasures, such as nontrivial delays and restricted routes, are\n" "not currently implemented." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:239 #, python-format msgid "" -"As a partial defense against a single router or group of routers trying " -"to route all the network's traffic,\n" -"routers contain limits as to how many tunnels can be routed through a " -"single peer.\n" +"As a partial defense against a single router or group of routers trying to route all the network's traffic,\n" +"routers contain limits as to how many tunnels can be routed through a single peer.\n" "As the network grows, these limits are subject to further adjustment.\n" "Other mechanisms for peer rating, selection and avoidance\n" "are discussed on the\n" @@ -11445,51 +9821,34 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:254 msgid "" -"I2P's messages are unidirectional and do not necessarily imply that a " -"reply\n" +"I2P's messages are unidirectional and do not necessarily imply that a reply\n" "will be sent. However, applications on top of I2P will most likely have\n" -"recognizable patterns within the frequency of their messages - for " -"instance, an \n" -"HTTP request will be a small message with a large sequence of reply " -"messages \n" -"containing the HTTP response. Using this data as well as a broad view of" -" the \n" -"network topology, an attacker may be able to disqualify some links as " -"being too \n" +"recognizable patterns within the frequency of their messages - for instance, an \n" +"HTTP request will be a small message with a large sequence of reply messages \n" +"containing the HTTP response. Using this data as well as a broad view of the \n" +"network topology, an attacker may be able to disqualify some links as being too \n" "slow to have passed the message along." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:264 msgid "" -"This sort of attack is powerful, but its applicability to I2P is non " -"obvious,\n" -"as the variation on message delays due to queuing, message processing, " -"and \n" -"throttling will often meet or exceed the time of passing a message along " -"a \n" -"single link - even when the attacker knows that a reply will be sent as " -"soon as\n" -"the message is received. There are some scenarios which will expose " -"fairly \n" -"automatic replies though - the streaming library does (with the SYN+ACK) " -"as does the \n" -"message mode of guaranteed delivery (with the " -"DataMessage+DeliveryStatusMessage)." +"This sort of attack is powerful, but its applicability to I2P is non obvious,\n" +"as the variation on message delays due to queuing, message processing, and \n" +"throttling will often meet or exceed the time of passing a message along a \n" +"single link - even when the attacker knows that a reply will be sent as soon as\n" +"the message is received. There are some scenarios which will expose fairly \n" +"automatic replies though - the streaming library does (with the SYN+ACK) as does the \n" +"message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:274 #, python-format msgid "" -"Without protocol scrubbing or higher latency, global active adversaries " -"can \n" -"gain substantial information. As such, people concerned with these " -"attacks could\n" -"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> or \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol " -"scrubbing, or\n" -"other advanced tunnel routing <a " -"href=\"%(todo)s#batching\">techniques</a>,\n" +"Without protocol scrubbing or higher latency, global active adversaries can \n" +"gain substantial information. As such, people concerned with these attacks could\n" +"increase the latency (using <a href=\"%(todo)s#stop\">nontrivial delays</a> or \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>), include protocol scrubbing, or\n" +"other advanced tunnel routing <a href=\"%(todo)s#batching\">techniques</a>,\n" "but these are unimplemented in I2P." msgstr "" @@ -11502,25 +9861,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:291 msgid "" -"Intersection attacks against low latency systems are extremely powerful -" -"\n" -"periodically make contact with the target and keep track of what peers " -"are on\n" +"Intersection attacks against low latency systems are extremely powerful -\n" +"periodically make contact with the target and keep track of what peers are on\n" "the network. Over time, as node churn occurs the attacker will gain \n" -"significant information about the target by simply intersecting the sets " -"of\n" -"peers that are online when a message successfully goes through. The cost" -" of \n" -"this attack is significant as the network grows, but may be feasible in " -"some\n" +"significant information about the target by simply intersecting the sets of\n" +"peers that are online when a message successfully goes through. The cost of \n" +"this attack is significant as the network grows, but may be feasible in some\n" "scenarios." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:301 #, python-format msgid "" -"In summary, if an attacker is at both ends of your tunnel at the same " -"time,\n" +"In summary, if an attacker is at both ends of your tunnel at the same time,\n" "he may be successful.\n" "I2P does not have a full defense to this for low latency communication.\n" "This is an inherent weakness of low-latency onion routing.\n" @@ -11539,8 +9892,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:316 #, python-format msgid "" -"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a " -"small group that changes slowly" +"<a href=\"%(peerselection)s\">peer profiling and selection</a> from a small " +"group that changes slowly" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:319 @@ -11563,8 +9916,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:332 msgid "" "Even in total, these defenses are not a complete solution.\n" -"Also, we have made some design choices that may significantly increase " -"our vulnerability:" +"Also, we have made some design choices that may significantly increase our vulnerability:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:337 @@ -11573,8 +9925,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:340 msgid "" -"We use tunnel pools comprised of several tunnels, and traffic can shift " -"from tunnel to tunnel." +"We use tunnel pools comprised of several tunnels, and traffic can shift from" +" tunnel to tunnel." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:343 @@ -11584,8 +9936,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:346 msgid "" "Tunnel lengths are configurable.\n" -"While 3-hop tunnels are recommended for full protection, several " -"applications and\n" +"While 3-hop tunnels are recommended for full protection, several applications and\n" "services use 2-hop tunnels by default." msgstr "" @@ -11593,14 +9944,10 @@ msgstr "" #, python-format msgid "" "In the future, it could\n" -"for peers who can afford significant delays (per <a " -"href=\"%(todo)s#stop\">nontrivial\n" -"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). " -"In addition,\n" -"this is only relevant for destinations that other people know about - a " -"private\n" -"group whose destination is only known to trusted peers does not have to " -"worry,\n" +"for peers who can afford significant delays (per <a href=\"%(todo)s#stop\">nontrivial\n" +"delays</a> and <a href=\"%(todo)s#batching\">batching strategies</a>). In addition,\n" +"this is only relevant for destinations that other people know about - a private\n" +"group whose destination is only known to trusted peers does not have to worry,\n" "as an adversary can't \"ping\" them to mount the attack.</p>" msgstr "" @@ -11611,8 +9958,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:369 msgid "" -"There are a whole slew of denial of service attacks available against " -"I2P,\n" +"There are a whole slew of denial of service attacks available against I2P,\n" "each with different costs and consequences:" msgstr "" @@ -11635,10 +9981,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:387 msgid "" "Provide easy configuration options so that users may increase their\n" -"contribution (share percentage) to the network. Display easy-to-" -"understand\n" -"metrics such as \"share ratio\" so that users may see what they are " -"contributing." +"contribution (share percentage) to the network. Display easy-to-understand\n" +"metrics such as \"share ratio\" so that users may see what they are contributing." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:392 @@ -11650,29 +9994,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:399 #, python-format msgid "" -"<b>Starvation attack:</b> A hostile user may attempt to harm the network " -"by\n" -"creating a significant number of peers in the network who are not " -"identified as\n" -"being under control of the same entity (as with Sybil). These nodes then" -" \n" -"decide not to provide any resources to the network, causing existing " -"peers \n" -"to search through a larger network database or request more tunnels than" -" \n" +"<b>Starvation attack:</b> A hostile user may attempt to harm the network by\n" +"creating a significant number of peers in the network who are not identified as\n" +"being under control of the same entity (as with Sybil). These nodes then \n" +"decide not to provide any resources to the network, causing existing peers \n" +"to search through a larger network database or request more tunnels than \n" "should be necessary. \n" -"Alternatively, the nodes may provide intermittent service by periodically" -"\n" +"Alternatively, the nodes may provide intermittent service by periodically\n" "dropping selected traffic, or refusing connections to certain peers.\n" -"This behavior may be indistinguishable from that of a heavily-loaded or " -"failing node.\n" -"I2P addresses these issues by maintaining <a " -"href=\"%(peerselection)s\">profiles</a> on the \n" +"This behavior may be indistinguishable from that of a heavily-loaded or failing node.\n" +"I2P addresses these issues by maintaining <a href=\"%(peerselection)s\">profiles</a> on the \n" "peers, attempting to identify underperforming ones and simply ignoring \n" "them, or using them rarely.\n" "We have significantly enhanced the\n" -"ability to recognize and avoid troublesome peers; however there are still" -"\n" +"ability to recognize and avoid troublesome peers; however there are still\n" "significant efforts required in this area." msgstr "" @@ -11680,30 +10015,18 @@ msgstr "" #, python-format msgid "" "<b>Flooding attack:</b> A hostile user may attempt to flood the network,\n" -"a peer, a destination, or a tunnel. Network and peer flooding is " -"possible,\n" -"and I2P does nothing to prevent standard IP layer flooding. The flooding" -" of\n" -"a destination with messages by sending a large number to the target's " -"various\n" -"inbound tunnel gateways is possible, but the destination will know this " -"both\n" -"by the contents of the message and because the tunnel's tests will fail." -" The\n" -"same goes for flooding just a single tunnel. I2P has no defenses for a " -"network\n" -"flooding attack. For a destination and tunnel flooding attack, the " -"target\n" -"identifies which tunnels are unresponsive and builds new ones. New code " -"could\n" -"also be written to add even more tunnels if the client wishes to handle " -"the\n" -"larger load. If, on the other hand, the load is more than the client can" -"\n" -"deal with, they can instruct the tunnels to throttle the number of " -"messages or\n" -"bytes they should pass on (once the <a " -"href=\"%(todo)s#batching\">advanced tunnel\n" +"a peer, a destination, or a tunnel. Network and peer flooding is possible,\n" +"and I2P does nothing to prevent standard IP layer flooding. The flooding of\n" +"a destination with messages by sending a large number to the target's various\n" +"inbound tunnel gateways is possible, but the destination will know this both\n" +"by the contents of the message and because the tunnel's tests will fail. The\n" +"same goes for flooding just a single tunnel. I2P has no defenses for a network\n" +"flooding attack. For a destination and tunnel flooding attack, the target\n" +"identifies which tunnels are unresponsive and builds new ones. New code could\n" +"also be written to add even more tunnels if the client wishes to handle the\n" +"larger load. If, on the other hand, the load is more than the client can\n" +"deal with, they can instruct the tunnels to throttle the number of messages or\n" +"bytes they should pass on (once the <a href=\"%(todo)s#batching\">advanced tunnel\n" "operation</a> is implemented)." msgstr "" @@ -11711,13 +10034,10 @@ msgstr "" msgid "" "<b>CPU load attack:</b> There are currently some methods for people to \n" "remotely request that a peer perform some cryptographically expensive \n" -"operation, and a hostile attacker could use these to flood that peer with" -"\n" -"a large number of them in an attempt to overload the CPU. Both using " -"good \n" +"operation, and a hostile attacker could use these to flood that peer with\n" +"a large number of them in an attempt to overload the CPU. Both using good \n" "engineering practices and potentially requiring nontrivial certificates \n" -"(e.g. HashCash) to be attached to these expensive requests should " -"mitigate\n" +"(e.g. HashCash) to be attached to these expensive requests should mitigate\n" "the issue, though there may be room for an attacker to exploit various\n" "bugs in the implementation." msgstr "" @@ -11725,8 +10045,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:451 #, python-format msgid "" -"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the " -"network by\n" +"<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by\n" "becoming a floodfill router. The current defenses against unreliable,\n" "intermittent, or malicious floodfill routers are poor.\n" "A floodfill router may provide bad or no response to lookups, and\n" @@ -11741,134 +10060,86 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:470 #, python-format msgid "" -"Tagging attacks - modifying a message so that it can later be identified" -" \n" -"further along the path - are by themselves impossible in I2P, as messages" -" \n" -"passed through tunnels are signed. However, if an attacker is the " -"inbound \n" -"tunnel gateway as well as a participant further along in that tunnel, " -"with\n" -"collusion they can identify the fact that they are in the same tunnel " -"(and \n" -"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and " -"other updates,\n" -"colluding peers within the same tunnel can recognize that fact without " -"any \n" -"effort). An attacker in an outbound tunnel and any part of an inbound " -"tunnel cannot \n" -"collude however, as the tunnel encryption pads and modifies the data " -"separately\n" -"for the inbound and outbound tunnels. External attackers cannot do " -"anything,\n" +"Tagging attacks - modifying a message so that it can later be identified \n" +"further along the path - are by themselves impossible in I2P, as messages \n" +"passed through tunnels are signed. However, if an attacker is the inbound \n" +"tunnel gateway as well as a participant further along in that tunnel, with\n" +"collusion they can identify the fact that they are in the same tunnel (and \n" +"prior to adding <a href=\"%(todo)s#tunnelId\">unique hop ids</a> and other updates,\n" +"colluding peers within the same tunnel can recognize that fact without any \n" +"effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot \n" +"collude however, as the tunnel encryption pads and modifies the data separately\n" +"for the inbound and outbound tunnels. External attackers cannot do anything,\n" "as the links are encrypted and messages signed." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:488 msgid "" -"Partitioning attacks - finding ways to segregate (technically or " -"analytically)\n" -"the peers in a network - are important to keep in mind when dealing with " -"a \n" -"powerful adversary, since the size of the network plays a key role in " -"determining\n" -"your anonymity. Technical partitioning by cutting links between peers to" -" create\n" -"fragmented networks is addressed by I2P's built in network database, " -"which \n" -"maintains statistics about various peers so as to allow any existing " -"connections\n" -"to other fragmented sections to be exploited so as to heal the network. " -"However,\n" -"if the attacker does disconnect all links to uncontrolled peers, " -"essentially\n" -"isolating the target, no amount of network database healing will fix it." -" At\n" -"that point, the only thing the router can hope to do is notice that a " -"significant\n" -"number of previously reliable peers have become unavailable and alert the" -" client\n" -"that it is temporarily disconnected (this detection code is not " -"implemented at\n" +"Partitioning attacks - finding ways to segregate (technically or analytically)\n" +"the peers in a network - are important to keep in mind when dealing with a \n" +"powerful adversary, since the size of the network plays a key role in determining\n" +"your anonymity. Technical partitioning by cutting links between peers to create\n" +"fragmented networks is addressed by I2P's built in network database, which \n" +"maintains statistics about various peers so as to allow any existing connections\n" +"to other fragmented sections to be exploited so as to heal the network. However,\n" +"if the attacker does disconnect all links to uncontrolled peers, essentially\n" +"isolating the target, no amount of network database healing will fix it. At\n" +"that point, the only thing the router can hope to do is notice that a significant\n" +"number of previously reliable peers have become unavailable and alert the client\n" +"that it is temporarily disconnected (this detection code is not implemented at\n" "the moment)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:504 #, python-format msgid "" -"Partitioning the network analytically by looking for differences in how " -"routers \n" -"and destinations behave and grouping them accordingly is also a very " -"powerful\n" -"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a>" -" the network\n" -"database will know when a particular destination has 5 inbound tunnels in" -" their\n" -"LeaseSet while others have only 2 or 3, allowing the adversary to " -"potentially \n" -"partition clients by the number of tunnels selected. Another partition " -"is \n" -"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial " -"delays</a> and \n" -"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel " -"gateways and the\n" -"particular hops with non-zero delays will likely stand out. However, " -"this data\n" -"is only exposed to those specific hops, so to partition effectively on " -"that \n" -"matter, the attacker would need to control a significant portion of the " -"network\n" -"(and still that would only be a probabilistic partition, as they wouldn't" -" know\n" +"Partitioning the network analytically by looking for differences in how routers \n" +"and destinations behave and grouping them accordingly is also a very powerful\n" +"attack. For instance, an attacker <a href=\"#harvesting\">harvesting</a> the network\n" +"database will know when a particular destination has 5 inbound tunnels in their\n" +"LeaseSet while others have only 2 or 3, allowing the adversary to potentially \n" +"partition clients by the number of tunnels selected. Another partition is \n" +"possible when dealing with the <a href=\"%(todo)s#stop\">nontrivial delays</a> and \n" +"<a href=\"%(todo)s#batching\">batching strategies</a>, as the tunnel gateways and the\n" +"particular hops with non-zero delays will likely stand out. However, this data\n" +"is only exposed to those specific hops, so to partition effectively on that \n" +"matter, the attacker would need to control a significant portion of the network\n" +"(and still that would only be a probabilistic partition, as they wouldn't know\n" "which other tunnels or messages have those delays)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:520 #, python-format msgid "" -"Also discussed on the <a href=\"%(netdb)s#threat\">network database " -"page</a> (bootstrap attack)." +"Also discussed on the <a href=\"%(netdb)s#threat\">network database page</a>" +" (bootstrap attack)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:528 msgid "" -"The predecessor attack is passively gathering statistics in an attempt to" -" see\n" -"what peers are 'close' to the destination by participating in their " -"tunnels and\n" -"keeping track of the previous or next hop (for outbound or inbound " -"tunnels, \n" -"respectively). Over time, using a perfectly random sample of peers and " -"random\n" -"ordering, an attacker would be able to see which peer shows up as " -"'closer' \n" -"statistically more than the rest, and that peer would in turn be where " -"the\n" +"The predecessor attack is passively gathering statistics in an attempt to see\n" +"what peers are 'close' to the destination by participating in their tunnels and\n" +"keeping track of the previous or next hop (for outbound or inbound tunnels, \n" +"respectively). Over time, using a perfectly random sample of peers and random\n" +"ordering, an attacker would be able to see which peer shows up as 'closer' \n" +"statistically more than the rest, and that peer would in turn be where the\n" "target is located." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:538 #, python-format msgid "" -"I2P avoids this in four ways: first, the peers selected to participate in" -"\n" -"tunnels are not randomly sampled throughout the network - they are " -"derived from\n" -"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which " -"breaks them\n" -"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict " -"ordering</a> of peers\n" -"in a tunnel, the fact that a peer shows up more frequently does not mean " -"they're\n" -"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted " -"tunnel length</a>\n" +"I2P avoids this in four ways: first, the peers selected to participate in\n" +"tunnels are not randomly sampled throughout the network - they are derived from\n" +"the <a href=\"%(peerselection)s\">peer selection</a> algorithm which breaks them\n" +"into tiers. Second, with <a href=\"%(tunnelimpl)s#ordering\">strict ordering</a> of peers\n" +"in a tunnel, the fact that a peer shows up more frequently does not mean they're\n" +"the source. Third, with <a href=\"%(tunnelimpl)s#length\">permuted tunnel length</a>\n" "(not enabled by default)\n" "even 0 hop tunnels can provide plausible deniability as the occasional \n" "variation of the gateway will look like normal tunnels. Fourth, with \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> " -"(unimplemented), only the peer with\n" -"a restricted connection to the target will ever contact the target, while" -" \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">restricted routes</a> (unimplemented), only the peer with\n" +"a restricted connection to the target will ever contact the target, while \n" "attackers will merely run into that gateway." msgstr "" @@ -11906,8 +10177,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:587 msgid "" -"Network growth will make it more difficult to obtain a given proportion " -"of the network" +"Network growth will make it more difficult to obtain a given proportion of " +"the network" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:590 @@ -11916,10 +10187,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:593 msgid "" -"\"Hidden mode\", which prevents a router from publishing its information " -"to the netDb,\n" -"(but also prevents it from relaying data) is not widely used now but " -"could be." +"\"Hidden mode\", which prevents a router from publishing its information to the netDb,\n" +"(but also prevents it from relaying data) is not widely used now but could be." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:599 @@ -11927,19 +10196,15 @@ msgstr "" msgid "" "In future implementations,\n" "<a href=\"%(todo)s#nat\">basic</a> and \n" -"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted " -"routes,\n" -"this attack loses much of its power, as the \"hidden\" peers do not " -"publish their\n" -"contact addresses in the network database - only the tunnels through " -"which \n" +"<a href=\"%(todo)s#fullRestrictedRoutes\">comprehensive</a> restricted routes,\n" +"this attack loses much of its power, as the \"hidden\" peers do not publish their\n" +"contact addresses in the network database - only the tunnels through which \n" "they can be reached (as well as their public keys, etc)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:608 msgid "" -"In the future, routers could use GeoIP to identify if they are in a " -"particular\n" +"In the future, routers could use GeoIP to identify if they are in a particular\n" "country where identification as an I2P node would be risky.\n" "In that case, the router could automatically enable hidden mode, or\n" "enact other restricted route methods." @@ -11950,10 +10215,8 @@ msgstr "" msgid "" "By inspecting the traffic into and out of a router, a malicious ISP\n" "or state-level firewall could identify that a computer is running I2P.\n" -"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically " -"designed\n" -"to hide that a computer is running I2P. However, several design decisions" -" made\n" +"As discussed <a href=\"#harvesting\">above</a>, I2P is not specifically designed\n" +"to hide that a computer is running I2P. However, several design decisions made\n" "in the design of the\n" "<a href=\"%(transport)s\">transport layer and protocols</a>\n" "make it somewhat difficult to identify I2P traffic:" @@ -11969,8 +10232,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:636 msgid "" -"DH key exchange with no protocol bytes or other unencrypted constant " -"fields" +"DH key exchange with no protocol bytes or other unencrypted constant fields" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:639 @@ -11979,14 +10241,13 @@ msgid "" "Simultaneous use of both\n" "<a href=\"%(ntcp)s\">TCP</a> and\n" "<a href=\"%(ssu)s\">UDP</a> transports.\n" -"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to" -" track." +"UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:647 msgid "" -"In the near future, we plan to directly address traffic analysis issues " -"by further obfuscation of I2P transport protocols, possibly including:" +"In the near future, we plan to directly address traffic analysis issues by " +"further obfuscation of I2P transport protocols, possibly including:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:651 @@ -12003,20 +10264,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:657 msgid "" -"Development of additional transport methods that mimic SSL or other " -"common protocols" +"Development of additional transport methods that mimic SSL or other common " +"protocols" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:660 msgid "" -"Review of padding strategies at higher layers to see how they affect " -"packet sizes at the transport layer" +"Review of padding strategies at higher layers to see how they affect packet " +"sizes at the transport layer" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:663 msgid "" -"Review of methods implemented by various state-level firewalls to block " -"Tor" +"Review of methods implemented by various state-level firewalls to block Tor" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:666 @@ -12032,36 +10292,26 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:680 msgid "" -"Sybil describes a category of attacks where the adversary creates " -"arbitrarily\n" +"Sybil describes a category of attacks where the adversary creates arbitrarily\n" "large numbers of colluding nodes and uses the increased numbers to help \n" -"mounting other attacks. For instance, if an attacker is in a network " -"where peers\n" -"are selected randomly and they want an 80% chance to be one of those " -"peers, they\n" -"simply create five times the number of nodes that are in the network and " -"roll \n" -"the dice. When identity is free, Sybil can be a very potent technique " -"for a \n" -"powerful adversary. The primary technique to address this is simply to " -"make \n" -"identity 'non free' - <a " -"href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" +"mounting other attacks. For instance, if an attacker is in a network where peers\n" +"are selected randomly and they want an 80% chance to be one of those peers, they\n" +"simply create five times the number of nodes that are in the network and roll \n" +"the dice. When identity is free, Sybil can be a very potent technique for a \n" +"powerful adversary. The primary technique to address this is simply to make \n" +"identity 'non free' - <a href=\"http://www.pdos.lcs.mit.edu/tarzan/\">Tarzan</a>\n" "(among others) uses the fact that IP addresses are limited, while \n" "IIP used \n" -"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for " -"creating a new\n" -"identity. We currently have not implemented any particular technique to " -"address\n" +"<a href=\"http://www.hashcash.org/\">HashCash</a> to 'charge' for creating a new\n" +"identity. We currently have not implemented any particular technique to address\n" "Sybil, but do include placeholder certificates in the router's and \n" -"destination's data structures which can contain a HashCash certificate of" -" \n" -"appropriate value when necessary (or some other certificate proving " -"scarcity)." +"destination's data structures which can contain a HashCash certificate of \n" +"appropriate value when necessary (or some other certificate proving scarcity)." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:698 -msgid "Requiring HashCash Certificates in various places has two major problems:" +msgid "" +"Requiring HashCash Certificates in various places has two major problems:" msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:702 @@ -12071,17 +10321,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:705 msgid "" "The classic HashCash problem -\n" -"selecting HashCash values that are meaningful proofs of work on high-end " -"machines,\n" +"selecting HashCash values that are meaningful proofs of work on high-end machines,\n" "while still being feasible on low-end machines such as mobile devices." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:712 msgid "" -"Various limitations on the number of routers in a given IP range restrict" -"\n" -"the vulnerability to attackers that don't have the ability to put " -"machines\n" +"Various limitations on the number of routers in a given IP range restrict\n" +"the vulnerability to attackers that don't have the ability to put machines\n" "in several IP blocks.\n" "However, this is not a meaningful defense against a powerful adversary." msgstr "" @@ -12103,22 +10350,17 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:733 #, python-format msgid "" -"By refusing to accept or forward tunnel build requests, except to a " -"colluding peer, a router could ensure\n" +"By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure\n" "that a tunnel is formed wholly from its set of colluding routers.\n" -"The chances of success are enhanced if there is a large number of " -"colluding routers,\n" +"The chances of success are enhanced if there is a large number of colluding routers,\n" "i.e. a <a href=\"#sybil\">Sybil attack</a>.\n" "This is somewhat mitigated by our\n" -"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor " -"the performance\n" +"<a href=\"%(peerselection)s\">peer profiling</a> methods used to monitor the performance\n" "of peers.\n" "However, this is a powerful attack as the number of routers approaches\n" "<i>f</i> = 0.2, or 20% malicious nodes, as specifed in the paper.\n" -"The malicous routers could also maintain connections to the target router" -" and provide\n" -"excellent forwarding bandwidth for traffic over those connections, in an " -"attempt\n" +"The malicous routers could also maintain connections to the target router and provide\n" +"excellent forwarding bandwidth for traffic over those connections, in an attempt\n" "to manipulate the profiles managed by the target and appear attractive.\n" "Further research and defenses may be necessary." msgstr "" @@ -12127,38 +10369,29 @@ msgstr "" #, python-format msgid "" "We use strong cryptography with long keys, and\n" -"we assume the security of the industry-standard cryptographic primitives " -"used in I2P, as documented\n" +"we assume the security of the industry-standard cryptographic primitives used in I2P, as documented\n" "<a href=\"%(cryptography)s\">on the low-level cryptography page</a>. \n" "Security features include the immediate detection of \n" -"altered messages along the path, the inability to decrypt messages not " -"addressed to you,\n" +"altered messages along the path, the inability to decrypt messages not addressed to you,\n" "and defense against man-in-the-middle attacks.\n" -"The key sizes chosen in 2003 were quite conservative at the time, and are" -" still longer than\n" -"those used in <a href=\"https://torproject.org/\">other anonymity " -"networks</a>.\n" +"The key sizes chosen in 2003 were quite conservative at the time, and are still longer than\n" +"those used in <a href=\"https://torproject.org/\">other anonymity networks</a>.\n" "We don't think the current key lengths are our biggest weakness,\n" "especially for traditional, non-state-level adversaries;\n" "bugs and the small size of the network are much more worrisome.\n" -"Of course, all cryptographic algorithms eventually become obsolete due to" -"\n" -"the advent of faster processors, cryptographic research, and advancements" -" in\n" +"Of course, all cryptographic algorithms eventually become obsolete due to\n" +"the advent of faster processors, cryptographic research, and advancements in\n" "methods such as rainbow tables, clusters of video game hardware, etc.\n" -"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys" -" or change\n" +"Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change\n" "shared secret values while maintaining backward compatibility." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:773 #, python-format msgid "" -"Upgrading the various data structures and protocols to support longer " -"keys\n" +"Upgrading the various data structures and protocols to support longer keys\n" "will have to be tackled eventually, and this will be a\n" -"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be " -"for \n" +"<a href=\"%(cryptography)s\">major undertaking</a>, just as it will be for \n" "<a href=\"https://torproject.org/\">others</a>.\n" "Hopefully, through careful planning, we can minimize the disruption, and\n" "implement mechanisms to make it easier for future transitions." @@ -12167,12 +10400,9 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:782 msgid "" "In the future, several I2P protocols and data structures\n" -"support securely padding messages to arbitrary sizes, so messages could " -"be made constant\n" -"size or garlic messages could be modified randomly so that some cloves " -"appear to contain\n" -"more subcloves than they actually do. At the moment, however, garlic, " -"tunnel, and \n" +"support securely padding messages to arbitrary sizes, so messages could be made constant\n" +"size or garlic messages could be modified randomly so that some cloves appear to contain\n" +"more subcloves than they actually do. At the moment, however, garlic, tunnel, and \n" "end to end messages include simple random padding." msgstr "" @@ -12186,18 +10416,14 @@ msgid "" "In addition to the floodfill DOS attacks described\n" "<a href=\"#ffdos\">above</a>, floodfill routers are uniquely positioned\n" "to learn about network participants, due to their role\n" -"in the netDb, and the high frequency of communication with those " -"participants.\n" -"This is somewhat mitigated because floodfill routers only manage a " -"portion\n" +"in the netDb, and the high frequency of communication with those participants.\n" +"This is somewhat mitigated because floodfill routers only manage a portion\n" "of the total keyspace, and the keyspace rotates daily, as explained \n" "on the <a href=\"%(netdb)s#threat\">network database page</a>.\n" -"The specific mechanisms by which routers communicate with floodfills have" -" been\n" +"The specific mechanisms by which routers communicate with floodfills have been\n" "<a href=\"%(netdb)s#delivery\">carefully designed</a>.\n" "However, these threats should be studied further.\n" -"The specific potential threats and corresponding defenses are a topic for" -" future research." +"The specific potential threats and corresponding defenses are a topic for future research." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:812 @@ -12216,33 +10442,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:826 msgid "" -"There are a few centralized or limited resources (some inside I2P, some " -"not)\n" +"There are a few centralized or limited resources (some inside I2P, some not)\n" "that could be attacked or used as a vector for attacks.\n" -"The absence of jrandom starting November 2007, followed by the loss of " -"the i2p.net hosting service in January 2008,\n" -"highlighted numerous centralized resources in the development and " -"operation of the I2P network,\n" +"The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,\n" +"highlighted numerous centralized resources in the development and operation of the I2P network,\n" "most of which are now distributed.\n" -"Attacks on externally-reachable resources mainly affect the ability of " -"new users to find us,\n" +"Attacks on externally-reachable resources mainly affect the ability of new users to find us,\n" "not the operation of the network itself." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:836 #, python-format msgid "" -"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin" -" for external public access." +"The <a href=\"%(site)s\">website</a> is mirrored and uses DNS round-robin " +"for external public access." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:839 #, python-format msgid "" -"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed " -"locations</a>,\n" -"however more reseed hosts may be needed, and the handling of unreliable " -"or malicious\n" +"Routers now support <a href=\"%(faq)s#reseed\">multiple external reseed locations</a>,\n" +"however more reseed hosts may be needed, and the handling of unreliable or malicious\n" "reseed hosts may need improvement." msgstr "" @@ -12258,10 +10478,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:851 msgid "" -"Routers now better handle <a href=\"#ffdos\">multiple unreliable " -"floodfill peers</a>.\n" -"Malicious floodfills <a href=\"#ffdos\">needs</a> <a " -"href=\"#floodfill\">more</a> study." +"Routers now better handle <a href=\"#ffdos\">multiple unreliable floodfill peers</a>.\n" +"Malicious floodfills <a href=\"#ffdos\">needs</a> <a href=\"#floodfill\">more</a> study." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:855 @@ -12273,47 +10491,35 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:858 msgid "" -"Routers rely on a single news host, but there is a hardcoded backup URL " -"pointing to a different host.\n" +"Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.\n" "A malicious news host could feed a huge file, need to limit the size." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:862 #, python-format msgid "" -"<a href=\"%(naming)s\">Naming system services</a>, including address book" -" subscription providers, add-host services,\n" -"and jump services, could be malicious. Substantial protections for " -"subscriptions were implemented\n" -"in release 0.6.1.31, with additional enhancements in subsequent releases." -"\n" +"<a href=\"%(naming)s\">Naming system services</a>, including address book subscription providers, add-host services,\n" +"and jump services, could be malicious. Substantial protections for subscriptions were implemented\n" +"in release 0.6.1.31, with additional enhancements in subsequent releases.\n" "However, all naming services require some measure of trust, see\n" "<a href=\"%(naming)s\">the naming page</a> for details." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:869 msgid "" -"We remain reliant on the DNS service for i2p2.de, losing this would cause" -" substantial\n" +"We remain reliant on the DNS service for i2p2.de, losing this would cause substantial\n" "disruption in our ability to attract new users,\n" -"and would shrink the network (in the short-to-medium term), just as the " -"loss of i2p.net did." +"and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:881 msgid "" -"These attacks aren't directly on the network, but instead go after its " -"development team \n" -"by either introducing legal hurdles on anyone contributing to the " -"development\n" -"of the software, or by using whatever means are available to get the " -"developers to \n" -"subvert the software. Traditional technical measures cannot defeat these" -" attacks, and\n" -"if someone threatened the life or livelihood of a developer (or even just" -" issuing a \n" -"court order along with a gag order, under threat of prison), we would " -"have a big problem." +"These attacks aren't directly on the network, but instead go after its development team \n" +"by either introducing legal hurdles on anyone contributing to the development\n" +"of the software, or by using whatever means are available to get the developers to \n" +"subvert the software. Traditional technical measures cannot defeat these attacks, and\n" +"if someone threatened the life or livelihood of a developer (or even just issuing a \n" +"court order along with a gag order, under threat of prison), we would have a big problem." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:890 @@ -12323,26 +10529,19 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:894 #, python-format msgid "" -"All components of the network must be open source to enable inspection, " -"verification, \n" -"modification, and improvement. If a developer is compromised, once it is" -" noticed \n" -"the community should demand explanation and cease to accept that " -"developer's work.\n" -"All checkins to our <a href=\"%(monotone)s\">distributed source control " -"system</a>\n" -"are cryptographically signed, and the release packagers use a trust-list " -"system\n" +"All components of the network must be open source to enable inspection, verification, \n" +"modification, and improvement. If a developer is compromised, once it is noticed \n" +"the community should demand explanation and cease to accept that developer's work.\n" +"All checkins to our <a href=\"%(monotone)s\">distributed source control system</a>\n" +"are cryptographically signed, and the release packagers use a trust-list system\n" "to restrict modifications to those previously approved." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:902 #, python-format msgid "" -"Development over the network itself, allowing developers to stay " -"anonymous but still \n" -"secure the development process. All I2P development can occur through " -"I2P - using\n" +"Development over the network itself, allowing developers to stay anonymous but still \n" +"secure the development process. All I2P development can occur through I2P - using\n" "a <a href=\"%(monotone)s\">distributed source control system</a>,\n" "a distributed source control system, IRC chat,\n" "public web servers,\n" @@ -12352,8 +10551,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:913 msgid "" -"We also maintain relationships with various organizations that offer " -"legal advice,\n" +"We also maintain relationships with various organizations that offer legal advice,\n" "should any defense be necessary." msgstr "" @@ -12363,52 +10561,38 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:922 msgid "" -"Try as we might, most nontrivial applications include errors in the " -"design or \n" -"implementation, and I2P is no exception. There may be bugs that could be" -" exploited to \n" -"attack the anonymity or security of the communication running over I2P in" -" unexpected \n" -"ways. To help withstand attacks against the design or protocols in use, " -"we publish \n" +"Try as we might, most nontrivial applications include errors in the design or \n" +"implementation, and I2P is no exception. There may be bugs that could be exploited to \n" +"attack the anonymity or security of the communication running over I2P in unexpected \n" +"ways. To help withstand attacks against the design or protocols in use, we publish \n" "all designs and documentation and solicit review and criticism with \n" "the hope that many eyes will improve the system.\n" "We do not believe in\n" -"<a href=\"http://www.haystacknetwork.com/\">security through " -"obscurity</a>." +"<a href=\"http://www.haystacknetwork.com/\">security through obscurity</a>." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:933 msgid "" "In addition, the code is being \n" -"treated the same way, with little aversion towards reworking or throwing " -"out \n" -"something that isn't meeting the needs of the software system (including " -"ease of \n" -"modification). Documentation for the design and implementation of the " -"network and \n" -"the software components are an essential part of security, as without " -"them it is \n" -"unlikely that developers would be willing to spend the time to learn the " -"software \n" +"treated the same way, with little aversion towards reworking or throwing out \n" +"something that isn't meeting the needs of the software system (including ease of \n" +"modification). Documentation for the design and implementation of the network and \n" +"the software components are an essential part of security, as without them it is \n" +"unlikely that developers would be willing to spend the time to learn the software \n" "enough to identify shortcomings and bugs." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:943 msgid "" -"Our software is likely, in particular, to contain bugs related to denial " -"of service\n" -"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues " -"in the router console,\n" -"and other vulnerabilities to non-standard inputs via the various " -"protocols." +"Our software is likely, in particular, to contain bugs related to denial of service\n" +"through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,\n" +"and other vulnerabilities to non-standard inputs via the various protocols." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:949 #, python-format msgid "" -"I2P is still a small network with a small development community and " -"almost no\n" +"I2P is still a small network with a small development community and almost no\n" "interest from academic or research groups.\n" "Therefore we lack the analysis that\n" "<a href=\"https://torproject.org/\">other anonymity networks</a>\n" @@ -12422,18 +10606,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:963 msgid "" -"To some extent, I2P could be enhanced to avoid peers operating at IP " -"addresses\n" -"listed in a blocklist. Several blocklists are commonly available in " -"standard formats,\n" -"listing anti-P2P organizations, potential state-level adversaries, and " -"others." +"To some extent, I2P could be enhanced to avoid peers operating at IP addresses\n" +"listed in a blocklist. Several blocklists are commonly available in standard formats,\n" +"listing anti-P2P organizations, potential state-level adversaries, and others." msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:969 msgid "" -"To the extent that active peers actually do show up in the actual " -"blocklist,\n" +"To the extent that active peers actually do show up in the actual blocklist,\n" "blocking by only a subset of peers would tend to segment the network,\n" "exacerbate reachability problems, and decrease overall reliability.\n" "Therefore we would want to agree on a particular blocklist and\n" @@ -12442,8 +10622,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/threat-model.html:977 msgid "" -"Blocklists are only a part (perhaps a small part) of an array of defenses" -"\n" +"Blocklists are only a part (perhaps a small part) of an array of defenses\n" "against maliciousness.\n" "In large part the profiling system does a good job of measuring\n" "router behavior so that we don't need to trust anything in netDb.\n" @@ -12456,8 +10635,7 @@ msgid "" "If a blocklist is hosted at a central location with automatic updates\n" "the network is vulnerable to a\n" "<a href=\"#central\">central resource attack</a>.\n" -"Automatic subscription to a list gives the list provider the power to " -"shut\n" +"Automatic subscription to a list gives the list provider the power to shut\n" "the i2p network down. Completely." msgstr "" @@ -12466,8 +10644,7 @@ msgid "" "Currently, a default blocklist is distributed with our software,\n" "listing only the IPs of past DOS sources.\n" "There is no automatic update mechanism.\n" -"Should a particular IP range implement serious attacks on the I2P " -"network,\n" +"Should a particular IP range implement serious attacks on the I2P network,\n" "we would have to ask people to update their blocklist manually through\n" "out-of-band mechanisms such as forums, blogs, etc." msgstr "" @@ -12482,30 +10659,27 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:7 msgid "" -"This page contains an overview of I2P tunnel terminology and operation, " -"with\n" +"This page contains an overview of I2P tunnel terminology and operation, with\n" "links to more technical pages, details, and specifications." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:12 #, python-format msgid "" -"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P " -"builds virtual \"tunnels\" -\n" -"temporary and unidirectional paths through a sequence of routers. These" -" \n" +"As briefly explained in the <a href=\"%(intro)s\">introduction</a>, I2P builds virtual \"tunnels\" -\n" +"temporary and unidirectional paths through a sequence of routers. These \n" "tunnels are classified as either inbound tunnels (where everything \n" "given to it goes towards the creator of the tunnel) or outbound tunnels\n" "(where the tunnel creator shoves messages away from them). When Alice\n" "wants to send a message to Bob, she will (typically) send it out one of\n" -"her existing outbound tunnels with instructions for that tunnel's " -"endpoint\n" +"her existing outbound tunnels with instructions for that tunnel's endpoint\n" "to forward it to the gateway router for one of Bob's current inbound \n" "tunnels, which in turn passes it to Bob." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:25 -msgid "Alice connecting through her outbound tunnel to Bob via his inbound tunnel" +msgid "" +"Alice connecting through her outbound tunnel to Bob via his inbound tunnel" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:27 @@ -12541,8 +10715,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:38 #, python-format msgid "" -"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound " -"tunnels,\n" +"<b>Tunnel gateway</b> - the first router in a tunnel. For inbound tunnels,\n" "this is the one mentioned in the LeaseSet published in the\n" "<a href=\"%(netdb)s\">network database</a>. For outbound tunnels, the\n" "gateway is the originating router. (e.g. both A and D above)" @@ -12550,21 +10723,20 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:44 msgid "" -"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F" -" above)" +"<b>Tunnel endpoint</b> - the last router in a tunnel. (e.g. both C and F " +"above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:45 msgid "" -"<b>Tunnel participant</b> - all routers in a tunnel except for the " -"gateway or\n" +"<b>Tunnel participant</b> - all routers in a tunnel except for the gateway or\n" "endpoint (e.g. both B and E above)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:49 msgid "" -"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router " -"jumps, e.g.:" +"<b>n-Hop tunnel</b> - a tunnel with a specific number of inter-router jumps," +" e.g.:" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:51 @@ -12579,8 +10751,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:53 msgid "" -"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one " -"intermediate\n" +"<b>2-(or more)-hop tunnel</b> - a tunnel where there is at least one intermediate\n" "tunnel participant. (the above diagram includes two 2-hop tunnels - one\n" "outbound from Alice, one inbound to Bob)" msgstr "" @@ -12588,10 +10759,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:60 #, python-format msgid "" -"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 " -"byte integer</a>\n" -"different for each hop in a tunnel, and unique among all tunnels on a " -"router.\n" +"<b>Tunnel ID</b> - A <a href=\"%(commonstructures)s#type_TunnelId\">4 byte integer</a>\n" +"different for each hop in a tunnel, and unique among all tunnels on a router.\n" "Chosen randomly by the tunnel creator." msgstr "" @@ -12602,8 +10771,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:68 #, python-format msgid "" -"Routers performing the three roles (gateway, participant, endpoint) are " -"given\n" +"Routers performing the three roles (gateway, participant, endpoint) are given\n" "different pieces of data in the initial\n" "<a href=\"%(tunnelcreation)s\">Tunnel Build Message</a>\n" "to accomplish their tasks:" @@ -12617,9 +10785,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:97 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the next hop" msgstr "" @@ -12627,9 +10793,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:101 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the next hop" msgstr "" @@ -12637,9 +10801,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:105 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request" msgstr "" @@ -12656,8 +10818,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:91 msgid "" -"<b>next hop</b> - what router is the next one in the path (unless this is" -" a 0-hop tunnel, and the gateway is also the endpoint)" +"<b>next hop</b> - what router is the next one in the path (unless this is a " +"0-hop tunnel, and the gateway is also the endpoint)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:92 @@ -12684,27 +10846,21 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:117 #, python-format msgid "" -"<b>tunnel encryption key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"encrypting\n" +"<b>tunnel encryption key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for encrypting\n" "messages and instructions to the the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:121 #, python-format msgid "" -"<b>tunnel IV key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for " -"double-encrypting\n" +"<b>tunnel IV key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES private key</a> for double-encrypting\n" "the IV to the endpoint (itself)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:125 #, python-format msgid "" -"<b>reply key</b> - an <a " -"href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for " -"encrypting\n" +"<b>reply key</b> - an <a href=\"%(commonstructures)s#type_SessionKey\">AES public key</a> for encrypting\n" "the reply to the tunnel build request (outbound endpoints only)" msgstr "" @@ -12720,8 +10876,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:131 msgid "" -"<b>reply router</b> - the inbound gateway of the tunnel to send the reply" -" through (outbound endpoints only)" +"<b>reply router</b> - the inbound gateway of the tunnel to send the reply " +"through (outbound endpoints only)" msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:132 @@ -12744,8 +10900,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:143 #, python-format msgid "" -"Several tunnels for a particular purpose may be grouped into a \"tunnel " -"pool\",\n" +"Several tunnels for a particular purpose may be grouped into a \"tunnel pool\",\n" "as described in the\n" "<a href=\"%(tunnelimpl)s#tunnel.pooling\">tunnel specification</a>.\n" "This provides redundancy and additional bandwidth.\n" @@ -12760,20 +10915,14 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:155 #, python-format msgid "" -"As mentioned above, each client requests that their router provide " -"tunnels to\n" +"As mentioned above, each client requests that their router provide tunnels to\n" "include at least a certain number of hops.\n" "The decision as to how many routers\n" -"to have in one's outbound and inbound tunnels has an important effect " -"upon the\n" -"latency, throughput, reliability, and anonymity provided by I2P - the " -"more peers\n" -"that messages have to go through, the longer it takes to get there and " -"the more\n" -"likely that one of those routers will fail prematurely. The less routers" -" in a\n" -"tunnel, the easier it is for an adversary to mount traffic analysis " -"attacks and\n" +"to have in one's outbound and inbound tunnels has an important effect upon the\n" +"latency, throughput, reliability, and anonymity provided by I2P - the more peers\n" +"that messages have to go through, the longer it takes to get there and the more\n" +"likely that one of those routers will fail prematurely. The less routers in a\n" +"tunnel, the easier it is for an adversary to mount traffic analysis attacks and\n" "pierce someone's anonymity.\n" "Tunnel lengths are specified by clients via\n" "<a href=\"%(i2cp)s#options\">I2CP options</a>.\n" @@ -12787,18 +10936,12 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:172 msgid "" "With no remote routers in a tunnel, the user has very basic plausible\n" -"deniability (since no one knows for sure that the peer that sent them the" -"\n" -"message wasn't simply just forwarding it on as part of the tunnel). " -"However, it\n" -"would be fairly easy to mount a statistical analysis attack and notice " -"that\n" -"messages targeting a specific destination are always sent through a " -"single\n" -"gateway. Statistical analysis against outbound 0-hop tunnels are more " -"complex,\n" -"but could show similar information (though would be slightly harder to " -"mount)." +"deniability (since no one knows for sure that the peer that sent them the\n" +"message wasn't simply just forwarding it on as part of the tunnel). However, it\n" +"would be fairly easy to mount a statistical analysis attack and notice that\n" +"messages targeting a specific destination are always sent through a single\n" +"gateway. Statistical analysis against outbound 0-hop tunnels are more complex,\n" +"but could show similar information (though would be slightly harder to mount)." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:182 @@ -12809,14 +10952,10 @@ msgstr "" #, python-format msgid "" "With only one remote router in a tunnel, the user has both plausible\n" -"deniability and basic anonymity, as long as they are not up against an " -"internal\n" -"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>)." -" However,\n" -"if the adversary ran a sufficient number of routers such that the single " -"remote\n" -"router in the tunnel is often one of those compromised ones, they would " -"be able\n" +"deniability and basic anonymity, as long as they are not up against an internal\n" +"adversary (as described on <a href=\"%(threatmodel)s\">threat model</a>). However,\n" +"if the adversary ran a sufficient number of routers such that the single remote\n" +"router in the tunnel is often one of those compromised ones, they would be able\n" "to mount the above statistical traffic analysis attack." msgstr "" @@ -12826,10 +10965,8 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:193 msgid "" -"With two or more remote routers in a tunnel, the costs of mounting the " -"traffic\n" -"analysis attack increases, since many remote routers would have to be " -"compromised\n" +"With two or more remote routers in a tunnel, the costs of mounting the traffic\n" +"analysis attack increases, since many remote routers would have to be compromised\n" "to mount it." msgstr "" @@ -12843,8 +10980,7 @@ msgid "" "To reduce the susceptibility to <a href=\"%(url)s\">some attacks</a>,\n" "3 or more hops are recommended for the highest level of protection.\n" "<a href=\"%(url)s\">Recent studies</a>\n" -"also conclude that more than 3 hops does not provide additional " -"protection." +"also conclude that more than 3 hops does not provide additional protection." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:208 @@ -12868,15 +11004,12 @@ msgstr "" #, python-format msgid "" "All tunnels are periodically tested by their creator by sending a\n" -"DeliveryStatusMessage out an outbound tunnel and bound for another " -"inbound tunnel\n" -"(testing both tunnels at once). If either fails a number of consecutive " -"tests, it is marked as no longer\n" +"DeliveryStatusMessage out an outbound tunnel and bound for another inbound tunnel\n" +"(testing both tunnels at once). If either fails a number of consecutive tests, it is marked as no longer\n" "functional. If it was used for a client's inbound tunnel, a new leaseSet\n" "is created.\n" "Tunnel test failures are also reflected in the\n" -"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer " -"profile</a>." +"<a href=\"%(peerselection)s#capacity\">capacity rating in the peer profile</a>." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:230 @@ -12886,14 +11019,10 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:231 #, python-format msgid "" -"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic " -"routing</a>\n" -"a Tunnel Build Message to a router, requesting that they participate in " -"the\n" -"tunnel (providing them with all of the appropriate information, as above," -" along\n" -"with a certificate, which right now is a 'null' cert, but will support " -"hashcash\n" +"Tunnel creation is handled by <a href=\"%(garlicrouting)s\">garlic routing</a>\n" +"a Tunnel Build Message to a router, requesting that they participate in the\n" +"tunnel (providing them with all of the appropriate information, as above, along\n" +"with a certificate, which right now is a 'null' cert, but will support hashcash\n" "or other non-free certificates when necessary).\n" "That router forwards the message to the next hop in the tunnel.\n" "Details are in the\n" @@ -12903,8 +11032,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:245 #, python-format msgid "" -"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic" -" encryption</a>\n" +"Multi-layer encryption is handled by <a href=\"%(garlicrouting)s\">garlic encryption</a>\n" "of tunnel messages.\n" "Details are in the\n" "<a href=\"%(tunnelimpl)s\">tunnel specification</a>.\n" @@ -12925,8 +11053,7 @@ msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:267 msgid "" "In a distant future release,\n" -"options specifying the pooling, mixing, and chaff generation settings may" -" be implemented." +"options specifying the pooling, mixing, and chaff generation settings may be implemented." msgstr "" #: i2p2www/pages/site/docs/how/tunnel-routing.html:272 @@ -12969,20 +11096,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:6 msgid "" -"The I2P Client Protocol (I2CP) exposes a strong separation of concerns " -"between\n" -"the router and any client that wishes to communicate over the network. " -"It enables\n" -"secure and asynchronous messaging by sending and receiving messages over " -"a \n" +"The I2P Client Protocol (I2CP) exposes a strong separation of concerns between\n" +"the router and any client that wishes to communicate over the network. It enables\n" +"secure and asynchronous messaging by sending and receiving messages over a \n" "single TCP socket.\n" "With I2CP, a client application tells the\n" -"router who they are (their \"destination\"), what anonymity, reliability," -" and \n" -"latency tradeoffs to make, and where to send messages. In turn the " -"router uses\n" -"I2CP to tell the client when any messages have arrived, and to request " -"authorization\n" +"router who they are (their \"destination\"), what anonymity, reliability, and \n" +"latency tradeoffs to make, and where to send messages. In turn the router uses\n" +"I2CP to tell the client when any messages have arrived, and to request authorization\n" "for some tunnels to be used." msgstr "" @@ -12991,10 +11112,8 @@ msgstr "" msgid "" "The protocol itself is implemented in Java, to provide the\n" "<a href=\"%(url)s\">Client SDK</a>.\n" -"This SDK is exposed in the i2p.jar package, which implements the client-" -"side of I2CP.\n" -"Clients should never need to access the router.jar package, which " -"contains the\n" +"This SDK is exposed in the i2p.jar package, which implements the client-side of I2CP.\n" +"Clients should never need to access the router.jar package, which contains the\n" "router itself and the router-side of I2CP.\n" "There is also a <a href=\"%(libi2cp)s\">C library implementation</a>.\n" "A non-Java client would also have to implement the\n" @@ -13005,45 +11124,35 @@ msgstr "" #, python-format msgid "" "Applications can take advantage of the base I2CP plus the \n" -"<a href=\"%(streaming)s\">streaming</a> and <a " -"href=\"%(datagrams)s\">datagram</a> libraries\n" -"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a " -"href=\"%(bob)s\">BOB</a> protocols,\n" +"<a href=\"%(streaming)s\">streaming</a> and <a href=\"%(datagrams)s\">datagram</a> libraries\n" +"by using the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> or <a href=\"%(bob)s\">BOB</a> protocols,\n" "which do not require clients to deal with any sort of cryptography.\n" "Also, clients may access the network by one of several proxies -\n" "HTTP, CONNECT, and SOCKS 4/4a/5.\n" -"Alternatively, Java clients may access those libraries in " -"ministreaming.jar and streaming.jar.\n" +"Alternatively, Java clients may access those libraries in ministreaming.jar and streaming.jar.\n" "So there are several options for both Java and non-Java applications." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:43 #, python-format msgid "" -"Client-side end-to-end encryption (encrypting the data over the I2CP " -"connection)\n" +"Client-side end-to-end encryption (encrypting the data over the I2CP connection)\n" "was disabled in I2P release 0.6,\n" -"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end " -"encryption</a>\n" +"leaving in place the <a href=\"%(elgamalaes)s\">ElGamal/AES end-to-end encryption</a>\n" "which is implemented in the router.\n" "The only cryptography that client libraries must still implement is\n" "<a href=\"%(cryptography)s#DSA\">DSA public/private key signing</a>\n" "for <a href=\"%(i2cp)s#msg_CreateLeaseSet\">LeaseSets</a> and\n" -"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and" -" management of those keys." +"<a href=\"%(i2cp)s#struct_SessionConfig\">Session Configurations</a>, and management of those keys." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:56 msgid "" -"In a standard I2P installation, port 7654 is used by external java " -"clients to communicate\n" +"In a standard I2P installation, port 7654 is used by external java clients to communicate\n" "with the local router via I2CP.\n" -"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, " -"set the\n" -"router advanced configuration option " -"<tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" -"Clients in the same JVM as the router pass messages directly to the " -"router\n" +"By default, the router binds to address 127.0.0.1. To bind to 0.0.0.0, set the\n" +"router advanced configuration option <tt>i2cp.tcp.bindAllInterfaces=true</tt> and restart.\n" +"Clients in the same JVM as the router pass messages directly to the router\n" "through an internal JVM interface." msgstr "" @@ -13051,13 +11160,10 @@ msgstr "" #, python-format msgid "" "The router also supports external connections over SSL.\n" -"While SSL is not the default, it is strongly recommended for any traffic " -"that may\n" -"be exposed to the open Internet. The authorization user/password (if " -"any), the\n" +"While SSL is not the default, it is strongly recommended for any traffic that may\n" +"be exposed to the open Internet. The authorization user/password (if any), the\n" "<a href=\"%(commonstructures)s#type_PrivateKey\">Private Key</a> and\n" -"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private " -"Key</a> for the\n" +"<a href=\"%(commonstructures)s#type_SigningPrivateKey\">Signing Private Key</a> for the\n" "<a href=\"%(commonstructures)s#struct_Destination\">Destination</a>\n" "are all transmitted in-the-clear unless SSL is enabled." msgstr "" @@ -13078,19 +11184,12 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:82 #, python-format msgid "" -"When a client connects to the router, it first sends a single protocol " -"version byte (0x2A).\n" -"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and " -"waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> " -"response.\n" -"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession " -"Message</a> containing the session configuration.\n" -"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet" -" Message</a> from the router, indicating that inbound tunnels\n" -"have been built, and responds with a CreateLeaseSetMessage containing the" -" signed LeaseSet.\n" -"The client may now initiate or receive connections from other I2P " -"destinations." +"When a client connects to the router, it first sends a single protocol version byte (0x2A).\n" +"Then it sends a <a href=\"%(i2cp)s#msg_GetDate\">GetDate Message</a> and waits for the <a href=\"%(i2cp)s#msg_SetDate\">SetDate Message</a> response.\n" +"Next, it sends a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> containing the session configuration.\n" +"It next awaits a <a href=\"%(i2cp)s#msg_RequestLeaseSet\">RequestLeaseSet Message</a> from the router, indicating that inbound tunnels\n" +"have been built, and responds with a CreateLeaseSetMessage containing the signed LeaseSet.\n" +"The client may now initiate or receive connections from other I2P destinations." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:91 @@ -13106,10 +11205,7 @@ msgstr "" #, python-format msgid "" "The following options are traditionally passed to the router via\n" -"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained " -"in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or " -"a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession " -"Message</a>." +"a <a href=\"%(i2cp)s#struct_SessionConfig\">SessionConfig</a> contained in a <a href=\"%(i2cp)s#msg_CreateSession\">CreateSession Message</a> or a <a href=\"%(i2cp)s#msg_ReconfigureSession\">ReconfigureSession Message</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:104 @@ -13142,14 +11238,13 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:167 msgid "" "Number of ElGamal/AES Session Tags to send at a time.\n" -"For clients with relatively low bandwidth per-client-pair (IRC, some UDP " -"apps), this may be set lower." +"For clients with relatively low bandwidth per-client-pair (IRC, some UDP apps), this may be set lower." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:179 msgid "" -"Comma-separated list of Base 64 Hashes of peers to build tunnels through;" -" for debugging only" +"Comma-separated list of Base 64 Hashes of peers to build tunnels through; " +"for debugging only" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:188 @@ -13166,17 +11261,14 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:322 msgid "" "Guaranteed is disabled;\n" -"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1," -" the client side default is None as of 0.9.4" +"None implemented in 0.8.1; the streaming lib default is None as of 0.8.1, the client side default is None as of 0.9.4" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:334 msgid "" "For authorization, if required by the router.\n" -"If the client is running in the same JVM as a router, this option is not " -"required.\n" -"Warning - username and password are sent in the clear to the router, " -"unless using SSL (i2cp.SSL=true).\n" +"If the client is running in the same JVM as a router, this option is not required.\n" +"Warning - username and password are sent in the clear to the router, unless using SSL (i2cp.SSL=true).\n" "Authorization is only recommended when using SSL." msgstr "" @@ -13250,8 +11342,7 @@ msgid "" "Random amount to add or subtract to the length of tunnels in.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" @@ -13260,16 +11351,14 @@ msgid "" "Random amount to add or subtract to the length of tunnels out.\n" "A positive number x means add a random amount from 0 to x inclusive.\n" "A negative number -x means add a random amount from -x to x inclusive.\n" -"The router will limit the total length of the tunnel to 0 to 7 inclusive." -"\n" +"The router will limit the total length of the tunnel to 0 to 7 inclusive.\n" "The default variance was 1 prior to release 0.7.6." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:464 msgid "" "Name of tunnel - generally used in routerconsole, which will\n" -"use the first few characters of the Base64 hash of the destination by " -"default." +"use the first few characters of the Base64 hash of the destination by default." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:476 @@ -13285,8 +11374,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:497 msgid "" "Number of tunnels in.\n" -"Limit was increased from 6 to 16 in release 0.9; however, numbers higher " -"than 6 are\n" +"Limit was increased from 6 to 16 in release 0.9; however, numbers higher than 6 are\n" "incompatible with older releases." msgstr "" @@ -13301,32 +11389,27 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:538 msgid "" "Any other options prefixed with \"inbound.\" are stored\n" -"in the \"unknown options\" properties of the inbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the inbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:550 msgid "" "Any other options prefixed with \"outbound.\" are stored\n" -"in the \"unknown options\" properties of the outbound tunnel pool's " -"settings." +"in the \"unknown options\" properties of the outbound tunnel pool's settings." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:562 msgid "" "Set to false to disable ever bundling a reply LeaseSet.\n" "For clients that do not publish their LeaseSet, this option must be true\n" -"for any reply to be possible. \"true\" is also recommended for multihomed" -" servers\n" +"for any reply to be possible. \"true\" is also recommended for multihomed servers\n" "with long connection times." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:569 msgid "" -"Setting to \"false\" may save significant outbound bandwidth, especially " -"if\n" -"the client is configured with a large number of inbound tunnels (Leases)." -"\n" +"Setting to \"false\" may save significant outbound bandwidth, especially if\n" +"the client is configured with a large number of inbound tunnels (Leases).\n" "If replies are still required, this may shift the bandwidth burden to\n" "the far-end client and the floodfill.\n" "There are several cases where \"false\" may be appropriate:" @@ -13342,14 +11425,10 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:579 msgid "" -"LeaseSet is published, client is a \"server\", all connections are " -"inbound\n" -"so the connecting far-end destination obviously has the leaseset already." -"\n" -"Connections are either short, or it is acceptable for latency on a long-" -"lived\n" -"connection to temporarily increase while the other end re-fetches the " -"LeaseSet\n" +"LeaseSet is published, client is a \"server\", all connections are inbound\n" +"so the connecting far-end destination obviously has the leaseset already.\n" +"Connections are either short, or it is acceptable for latency on a long-lived\n" +"connection to temporarily increase while the other end re-fetches the LeaseSet\n" "after expiration.\n" "HTTP servers may fit these requirements." msgstr "" @@ -13363,15 +11442,11 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:596 #, python-format msgid "" -"Note: As of release 0.7.7, option names and values must use UTF-8 " -"encoding.\n" +"Note: As of release 0.7.7, option names and values must use UTF-8 encoding.\n" "This is primarily useful for nicknames.\n" -"Prior to that release, options with multi-byte characters were corrupted." -"\n" -"Since options are encoded in a <a " -"href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" -"all option names and values are limited to 255 bytes (not characters) " -"maximum." +"Prior to that release, options with multi-byte characters were corrupted.\n" +"Since options are encoded in a <a href=\"%(commonstructures)s#type_Mapping\">Mapping</a>,\n" +"all option names and values are limited to 255 bytes (not characters) maximum." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:610 @@ -13382,8 +11457,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:611 msgid "" "The following options are interpreted on the client side,\n" -"and will be interpreted if passed to the I2PSession via the " -"I2PClient.createSession() call.\n" +"and will be interpreted if passed to the I2PSession via the I2PClient.createSession() call.\n" "The streaming lib should also pass these options through to I2CP.\n" "Other implementations may have different defaults." msgstr "" @@ -13459,28 +11533,24 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:871 msgid "" "Connect to the router using SSL.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:883 msgid "" "Router hostname.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:895 msgid "" "Router I2CP port.\n" -"If the client is running in the same JVM as a router, this option is " -"ignored, and the client connects to that router internally." +"If the client is running in the same JVM as a router, this option is ignored, and the client connects to that router internally." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:902 msgid "" -"Note: All arguments, including numbers, are strings. True/false values " -"are case-insensitive strings.\n" +"Note: All arguments, including numbers, are strings. True/false values are case-insensitive strings.\n" "Anything other than case-insensitive \"true\" is interpreted as false.\n" "All option names are case-sensitive." msgstr "" @@ -13492,28 +11562,22 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:909 #, python-format msgid "" -"The end-to-end messages handled by I2CP (i.e. the data sent by the client" -" in a\n" +"The end-to-end messages handled by I2CP (i.e. the data sent by the client in a\n" "<a href=\"%(i2cp)s#msg_SendMessage\">SendMessageMessage</a>\n" "and received by the client in a\n" "<a href=\"%(i2cp)s#msg_MessagePayload\">MessagePayloadMessage</a>)\n" "are gzipped with a standard 10-byte gzip\n" "header beginning with 0x1F 0x8B 0x08 as\n" -"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC " -"1952</a>.\n" -"As of release 0.7.1, I2P uses ignored portions of the gzip header to " -"include\n" -"protocol, from-port, and to-port information, thus supporting streaming " -"and\n" -"datagrams on the same destination, and allowing query/response using " -"datagrams\n" +"specified by <a href=\"http://www.ietf.org/rfc/rfc1952.txt\">RFC 1952</a>.\n" +"As of release 0.7.1, I2P uses ignored portions of the gzip header to include\n" +"protocol, from-port, and to-port information, thus supporting streaming and\n" +"datagrams on the same destination, and allowing query/response using datagrams\n" "to work reliably in the presence of multiple channels." msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:923 msgid "" -"The gzip function cannot be completely turned off, however setting " -"i2cp.gzip=false\n" +"The gzip function cannot be completely turned off, however setting i2cp.gzip=false\n" "turns the gzip effort setting to 0, which may save a little CPU." msgstr "" @@ -13547,7 +11611,8 @@ msgid "Gzip xflags" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:960 -msgid "I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" +msgid "" +"I2P Protocol (6 = Streaming, 17 = Datagram, 18 = Raw Datagrams) (Gzip OS)" msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:969 @@ -13572,8 +11637,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2cp.html:987 #, python-format msgid "" -"Some improvements may be able to use messages previously defined but not " -"implemented.\n" +"Some improvements may be able to use messages previously defined but not implemented.\n" "For reference, here is the\n" "<a href=\"%(pdf1)s\">I2CP Protocol Specification Version 0.9</a>\n" "(PDF) dated August 28, 2003.\n" @@ -13592,12 +11656,9 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:6 msgid "" "The I2P Network Protocol (I2NP),\n" -"which is sandwiched between I2CP and the various I2P transport protocols," -" manages the\n" -"routing and mixing of messages between routers, as well as the selection " -"of what\n" -"transports to use when communicating with a peer for which there are " -"multiple\n" +"which is sandwiched between I2CP and the various I2P transport protocols, manages the\n" +"routing and mixing of messages between routers, as well as the selection of what\n" +"transports to use when communicating with a peer for which there are multiple\n" "common transports supported." msgstr "" @@ -13607,20 +11668,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:15 msgid "" -"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-" -"router, point-to-point messages.\n" -"By encrypting and wrapping messages in other messages, they can be sent " -"in a secure way\n" +"I2NP (I2P Network Protocol) messages can be used for one-hop, router-to-router, point-to-point messages.\n" +"By encrypting and wrapping messages in other messages, they can be sent in a secure way\n" "through multiple hops to the ultimate destination.\n" -"Priority is only used locally at the origin, i.e. when queuing for " -"outbound delivery." +"Priority is only used locally at the origin, i.e. when queuing for outbound delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:22 #, python-format msgid "" -"The priorities listed below may not be current and are subject to change." -"\n" +"The priorities listed below may not be current and are subject to change.\n" "See the <a href=\"%(outnetmessage)s\">OutNetMessage Javadocs</a>\n" "for the current priority settings.\n" "Priority queueing implementation may vary." @@ -13632,8 +11689,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:31 msgid "" -"The following table specifies the traditional 16-byte header used in " -"NTCP.\n" +"The following table specifies the traditional 16-byte header used in NTCP.\n" "The SSU and NTCP2 transports use modified headers." msgstr "" @@ -13670,23 +11726,18 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:46 #, python-format msgid "" -"While the maximum payload size is nominally 64KB, the size is further " -"constrained by the\n" -"method of fragmenting I2NP messages into multiple 1KB tunnel messages as " -"described on\n" +"While the maximum payload size is nominally 64KB, the size is further constrained by the\n" +"method of fragmenting I2NP messages into multiple 1KB tunnel messages as described on\n" "<a href=\"%(tunnelimpl)s\">the tunnel implementation page</a>.\n" -"The maximum number of fragments is 64, and the message may not be " -"perfectly aligned,\n" +"The maximum number of fragments is 64, and the message may not be perfectly aligned,\n" "So the message must nominally fit in 63 fragments." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:54 msgid "" -"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL " -"delivery mode);\n" +"The maximum size of an initial fragment is 956 bytes (assuming TUNNEL delivery mode);\n" "the maximum size of a follow-on fragment is 996 bytes.\n" -"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 " -"bytes, or 61.2 KB." +"Therefore the maximum size is approximately 956 + (62 * 996) = 62708 bytes, or 61.2 KB." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:60 @@ -13694,16 +11745,13 @@ msgid "" "In addition, the transports may have additional restrictions.\n" "The NTCP limit is 16KB - 6 = 16378 bytes.\n" "The SSU limit is approximately 32 KB.\n" -"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher" -" than what a tunnel can support." +"The NTCP2 limit is approximately 64KB - 20 = 65516 bytes, which is higher than what a tunnel can support." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:67 msgid "" -"Note that these are not the limits for datagrams that the client sees, as" -" the\n" -"router may bundle a reply leaseset and/or session tags together with the " -"client message\n" +"Note that these are not the limits for datagrams that the client sees, as the\n" +"router may bundle a reply leaseset and/or session tags together with the client message\n" "in a garlic message. The leaseset and tags together may add about 5.5KB.\n" "Therefore the current datagram limit is about 10KB. This limit will be\n" "increased in a future release." @@ -13760,8 +11808,7 @@ msgid "" "Priority may vary.\n" "Size is 898 bytes for a typical 2-lease leaseSet.\n" "RouterInfo structures are compressed, and size varies; however\n" -"there is a continuing effort to reduce the amount of data published in a " -"RouterInfo\n" +"there is a continuing effort to reduce the amount of data published in a RouterInfo\n" "as we approach release 1.0." msgstr "" @@ -13771,8 +11818,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:150 msgid "" -"Used for message replies, and for testing tunnels - generally wrapped in " -"a GarlicMessage" +"Used for message replies, and for testing tunnels - generally wrapped in a " +"GarlicMessage" msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:158 @@ -13783,8 +11830,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:185 msgid "" -"The most common message. Priority for tunnel participants, outbound " -"endpoints, and inbound gateways was\n" +"The most common message. Priority for tunnel participants, outbound endpoints, and inbound gateways was\n" "reduced to 200 as of release 0.6.1.33.\n" "Outbound gateway messages (i.e. those originated locally) remains at 400." msgstr "" @@ -13815,16 +11861,13 @@ msgstr "" msgid "" "<a href=\"%(i2npspec)s\">On the I2NP Specification page</a>.\n" "See also the\n" -"<a href=\"%(commonstructures)s\">Common Data Structure Specification " -"page</a>." +"<a href=\"%(commonstructures)s\">Common Data Structure Specification page</a>." msgstr "" #: i2p2www/pages/site/docs/protocol/i2np.html:234 msgid "" -"It isn't clear whether the current priority scheme is generally " -"effective,\n" -"and whether the priorities for various messages should be adjusted " -"further.\n" +"It isn't clear whether the current priority scheme is generally effective,\n" +"and whether the priorities for various messages should be adjusted further.\n" "This is a topic for further research, analysis and testing." msgstr "" @@ -13846,8 +11889,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:12 msgid "" "Each of the layers in the stack provides extra capabilities.\n" -"The capabilities are listed below, starting at the bottom of the protocol" -" stack." +"The capabilities are listed below, starting at the bottom of the protocol stack." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:18 @@ -13856,8 +11898,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:20 msgid "" -"IP: Internet Protocol, allow addressing hosts on the regular internet and" -" routing packets across the internet using best-effort delivery." +"IP: Internet Protocol, allow addressing hosts on the regular internet and " +"routing packets across the internet using best-effort delivery." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:23 @@ -13878,11 +11920,8 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:30 msgid "" -"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P " -"routers. These are not anonymous yet, this is strictly a hop-to-hop " -"connection.\n" -"Two protocols are implemented to provide these capabilities. NTCP builds " -"on top of TCP, while SSU uses UDP." +"<b>I2P Transport Layer:</b> provide encrypted connections between 2 I2P routers. These are not anonymous yet, this is strictly a hop-to-hop connection.\n" +"Two protocols are implemented to provide these capabilities. NTCP builds on top of TCP, while SSU uses UDP." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:35 @@ -13900,20 +11939,16 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:42 #, python-format msgid "" -"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are " -"large messages containing encrypted I2NP (see below) messages and " -"encrypted instructions for their delivery.\n" -"The encryption is layered. The first hop will decrypt the tunnel message " -"and read a part. Another part can still be encrypted (with another key)," -"\n" +"<a href=\"%(tunnelmessage)s\">Tunnel messages</a>: tunnel messages are large messages containing encrypted I2NP (see below) messages and encrypted instructions for their delivery.\n" +"The encryption is layered. The first hop will decrypt the tunnel message and read a part. Another part can still be encrypted (with another key),\n" "so it will be forwarded." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:48 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" used to pass messages through multiple routers. These I2NP messages are " +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"used to pass messages through multiple routers. These I2NP messages are " "combined in tunnel messages." msgstr "" @@ -13926,54 +11961,51 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:55 #, python-format msgid "" -"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are" -" wrapped in each other and used to ensure encryption between two tunnels " -"and are passed along from source to destination, keeping both anonymous." +"<a href=\"%(i2np)s\">I2NP messages</a>: I2P Network Protocol messages are " +"wrapped in each other and used to ensure encryption between two tunnels and " +"are passed along from source to destination, keeping both anonymous." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:61 msgid "" -"The following layers are strictly speaking no longer part of the I2P " -"Protocol stack, they are not part of the core 'I2P router' functionality." -"\n" -"However, each of these layers adds additional functionality, to allow " -"applications simple and convenient I2P usage." +"The following layers are strictly speaking no longer part of the I2P Protocol stack, they are not part of the core 'I2P router' functionality.\n" +"However, each of these layers adds additional functionality, to allow applications simple and convenient I2P usage." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:67 msgid "" -"<b>I2P Client Layer:</b> allow any client to use I2P functionality, " -"without requiring the direct use of the router API." +"<b>I2P Client Layer:</b> allow any client to use I2P functionality, without " +"requiring the direct use of the router API." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:69 #, python-format msgid "" "<a href=\"%(i2cp)s\">I2CP</a>: I2P Client Protocol, allows secure and " -"asynchronous messaging over I2P by communicating messages over the I2CP " -"TCP socket." +"asynchronous messaging over I2P by communicating messages over the I2CP TCP " +"socket." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:74 msgid "" -"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like " -"functionality on top of I2P." +"<b>I2P End-to-end Transport Layer:</b> allow TCP- or UDP-like functionality " +"on top of I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:76 #, python-format msgid "" -"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of " -"TCP-like streams over I2P. This allows easier porting of existing " -"applications to I2P." +"<a href=\"%(streaming)s\">Streaming Library</a>: an implementation of TCP-" +"like streams over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:80 #, python-format msgid "" "<a href=\"%(datagrams)s\">Datagram Library</a>: an implementation of UDP-" -"like messages over I2P. This allows easier porting of existing " -"applications to I2P." +"like messages over I2P. This allows easier porting of existing applications " +"to I2P." msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:85 @@ -13993,8 +12025,7 @@ msgstr "" #: i2p2www/pages/site/docs/protocol/index.html:99 msgid "" -"Finally, what could be considered the <b>'I2P application layer'</b>, is " -"a large number of applications on top of I2P.\n" +"Finally, what could be considered the <b>'I2P application layer'</b>, is a large number of applications on top of I2P.\n" "We can order this based on the I2P stack layer they use." msgstr "" @@ -14046,12 +12077,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:8 msgid "" -"A \"transport\" in I2P is a method for direct, point-to-point " -"communication\n" +"A \"transport\" in I2P is a method for direct, point-to-point communication\n" "between two routers.\n" "Transports must provide confidentiality and integrity \n" -"against external adversaries while authenticating that the router " -"contacted \n" +"against external adversaries while authenticating that the router contacted \n" "is the one who should receive a given message." msgstr "" @@ -14105,8 +12134,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:44 msgid "" "Maintain a set of router addresses, one or more for each transport,\n" -"that the router publishes as its global contact information (the " -"RouterInfo).\n" +"that the router publishes as its global contact information (the RouterInfo).\n" "Each transport may connect using one of these addresses, which may be\n" "IPv4 or (as of version 0.9.8) IPv6." msgstr "" @@ -14135,10 +12163,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:55 msgid "" -"Maintenance of connection limits for each transport, implementation of " -"various thresholds for these limits,\n" -"and communication of threshold status to the router so it may make " -"operational changes based on the status" +"Maintenance of connection limits for each transport, implementation of various thresholds for these limits,\n" +"and communication of threshold status to the router so it may make operational changes based on the status" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:59 @@ -14157,27 +12183,26 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:62 msgid "" -"Coordination of firewall status and local IP, and changes to either, " -"among the transports" +"Coordination of firewall status and local IP, and changes to either, among " +"the transports" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:63 #: i2p2www/pages/site/docs/transport/ssu.html:35 msgid "" -"Communication of firewall status and local IP, and changes to either, to " -"the router and the user interface" +"Communication of firewall status and local IP, and changes to either, to the" +" router and the user interface" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:64 msgid "" -"Determination of a consensus clock, which is used to periodically update " -"the router's clock, as a backup for NTP" +"Determination of a consensus clock, which is used to periodically update the" +" router's clock, as a backup for NTP" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:65 msgid "" -"Maintenance of status for each peer, including whether it is connected, " -"whether it was recently connected,\n" +"Maintenance of status for each peer, including whether it is connected, whether it was recently connected,\n" "and whether it was reachable in the last attempt" msgstr "" @@ -14187,8 +12212,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:70 msgid "" -"Honoring the automated and manual lists of banned peers maintained by the" -" router,\n" +"Honoring the automated and manual lists of banned peers maintained by the router,\n" "and refusing outbound and inbound connections to those peers" msgstr "" @@ -14198,10 +12222,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:79 msgid "" -"The transport subsystem maintains a set of router addresses, each of " -"which lists a transport method, IP, and port.\n" -"These addresses constitute the advertised contact points, and are " -"published by the router to the network database.\n" +"The transport subsystem maintains a set of router addresses, each of which lists a transport method, IP, and port.\n" +"These addresses constitute the advertised contact points, and are published by the router to the network database.\n" "Addresses may also contain an arbitrary set of additional options." msgstr "" @@ -14222,16 +12244,13 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:92 #, python-format msgid "" -"A router is firewalled, and therefore publishes an SSU address which " -"contains a list of cooperating\n" -"peers or \"introducers\" who will assist in NAT traversal (see <a " -"href=\"%(ssu)s\">the SSU spec</a> for details)" +"A router is firewalled, and therefore publishes an SSU address which contains a list of cooperating\n" +"peers or \"introducers\" who will assist in NAT traversal (see <a href=\"%(ssu)s\">the SSU spec</a> for details)" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:96 msgid "" -"A router is not firewalled or its NAT ports are open; it publishes both " -"NTCP and SSU addresses containing\n" +"A router is not firewalled or its NAT ports are open; it publishes both NTCP and SSU addresses containing\n" "directly-accessible IP and ports." msgstr "" @@ -14242,10 +12261,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:104 #, python-format msgid "" -"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> " -"only. The transport selected for any message is\n" -"independent of the upper-layer protocols and contents (router or client " -"messages, whether an external application was using\n" +"The transport system delivers <a href=\"%(i2np)s\">I2NP messages</a> only. The transport selected for any message is\n" +"independent of the upper-layer protocols and contents (router or client messages, whether an external application was using\n" "TCP or UDP to connect to I2P, whether the upper layer was using\n" "<a href=\"%(streaming)s\">the streaming library</a>\n" "streaming\n" @@ -14257,15 +12274,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:118 msgid "" -"For each outgoing message, the transport system solicits \"bids\" from " -"each transport.\n" -"The transport bidding the lowest (best) value wins the bid and receives " -"the message for delivery.\n" +"For each outgoing message, the transport system solicits \"bids\" from each transport.\n" +"The transport bidding the lowest (best) value wins the bid and receives the message for delivery.\n" "A transport may refuse to bid." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:124 -msgid "Whether a transport bids, and with what value, depend on numerous factors:" +msgid "" +"Whether a transport bids, and with what value, depend on numerous factors:" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:128 @@ -14288,8 +12304,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:132 msgid "" -"The size of the message, as different transports have different size " -"limits" +"The size of the message, as different transports have different size limits" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:133 @@ -14299,7 +12314,8 @@ msgid "" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:134 -msgid "Whether the connection would be indirect (requiring introducers) or direct" +msgid "" +"Whether the connection would be indirect (requiring introducers) or direct" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:135 @@ -14308,8 +12324,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:138 msgid "" -"In general, the bid values are selected so that two routers are only " -"connected by a single transport\n" +"In general, the bid values are selected so that two routers are only connected by a single transport\n" "at any one time. However, this is not a requirement." msgstr "" @@ -14327,8 +12342,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:153 msgid "" -"An \"indirect\" transport for routers that are not reachable by all other" -" routers (one form of \"restricted routes\")" +"An \"indirect\" transport for routers that are not reachable by all other " +"routers (one form of \"restricted routes\")" msgstr "" #: i2p2www/pages/site/docs/transport/index.html:154 @@ -14337,31 +12352,24 @@ msgstr "" #: i2p2www/pages/site/docs/transport/index.html:157 msgid "" -"Work continues on adjusting default connection limits for each transport." -"\n" -"I2P is designed as a \"mesh network\", where it is assumed that any " -"router can connect to any other router.\n" -"This assumption may be broken by routers that have exceeded their " -"connection limits, and by\n" +"Work continues on adjusting default connection limits for each transport.\n" +"I2P is designed as a \"mesh network\", where it is assumed that any router can connect to any other router.\n" +"This assumption may be broken by routers that have exceeded their connection limits, and by\n" "routers that are behind restrictive state firewalls (restricted routes)." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:164 msgid "" -"The current connection limits are higher for SSU than for NTCP, based on " -"the assumption that\n" -"the memory requirements for an NTCP connection are higher than that for " -"SSU.\n" -"However, as NTCP buffers are partially in the kernel and SSU buffers are " -"on the Java heap,\n" +"The current connection limits are higher for SSU than for NTCP, based on the assumption that\n" +"the memory requirements for an NTCP connection are higher than that for SSU.\n" +"However, as NTCP buffers are partially in the kernel and SSU buffers are on the Java heap,\n" "that assumption is difficult to verify." msgstr "" #: i2p2www/pages/site/docs/transport/index.html:171 #, python-format msgid "" -"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol " -"Obfuscation</a>\n" +"Analyze <a href=\"%(pdf)s\">Breaking and Improving Protocol Obfuscation</a>\n" "and see how transport-layer padding may improve things." msgstr "" @@ -14372,11 +12380,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:6 #, python-format msgid "" -"The others are <a href=\"%(ssu)s\">SSU</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>.\n" +"The others are <a href=\"%(ssu)s\">SSU</a> and <a href=\"%(ntcp2)s\">NTCP2</a>.\n" "NTCP is a Java NIO-based transport introduced in I2P release 0.6.1.22.\n" -"Java NIO (new I/O) does not suffer from the 1 thread per connection " -"issues of the old TCP transport.\n" +"Java NIO (new I/O) does not suffer from the 1 thread per connection issues of the old TCP transport.\n" "NTCP-over-IPv6 is supported as of version 0.9.8." msgstr "" @@ -14391,8 +12397,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:21 msgid "" -"The NTCP code within I2P is relatively lightweight (1/4 the size of the " -"SSU code)\n" +"The NTCP code within I2P is relatively lightweight (1/4 the size of the SSU code)\n" "because it uses the underlying Java TCP transport for reliable delivery." msgstr "" @@ -14417,21 +12422,17 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:47 msgid "" "After establishment,\n" -"the NTCP transport sends individual I2NP messages, with a simple " -"checksum.\n" +"the NTCP transport sends individual I2NP messages, with a simple checksum.\n" "The unencrypted message is encoded as follows:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:65 msgid "" -"The data is then AES/256/CBC encrypted. The session key for the " -"encryption\n" +"The data is then AES/256/CBC encrypted. The session key for the encryption\n" "is negotiated during establishment (using Diffie-Hellman 2048 bit).\n" -"The establishment between two routers is implemented in the " -"EstablishState class\n" +"The establishment between two routers is implemented in the EstablishState class\n" "and detailed below.\n" -"The IV for AES/256/CBC encryption is the last 16 bytes of the previous " -"encrypted message." +"The IV for AES/256/CBC encryption is the last 16 bytes of the previous encrypted message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:73 @@ -14455,8 +12456,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:93 msgid "" -"Total length: 16 bytes. The time sync message is sent at approximately 15" -" minute intervals.\n" +"Total length: 16 bytes. The time sync message is sent at approximately 15 minute intervals.\n" "The message is encrypted just as standard messages are." msgstr "" @@ -14479,14 +12479,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:107 #: i2p2www/pages/site/docs/transport/ssu.html:188 msgid "" -"Idle timeout and connection close is at the discretion of each endpoint " -"and may vary.\n" -"The current implementation lowers the timeout as the number of " -"connections approaches the\n" -"configured maximum, and raises the timeout when the connection count is " -"low.\n" -"The recommended minimum timeout is two minutes or more, and the " -"recommended\n" +"Idle timeout and connection close is at the discretion of each endpoint and may vary.\n" +"The current implementation lowers the timeout as the number of connections approaches the\n" +"configured maximum, and raises the timeout when the connection count is low.\n" +"The recommended minimum timeout is two minutes or more, and the recommended\n" "maximum timeout is ten minutes or more." msgstr "" @@ -14497,12 +12493,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:117 msgid "" "After establishment, and every 30-60 minutes thereafter,\n" -"the two routers should generally exchange RouterInfos using a " -"DatabaseStoreMessage.\n" -"However, Alice should check if the first queued message is a " -"DatabaseStoreMessage\n" -"so as not to send a duplicate message; this is often the case when " -"connecting to a floodfill router." +"the two routers should generally exchange RouterInfos using a DatabaseStoreMessage.\n" +"However, Alice should check if the first queued message is a DatabaseStoreMessage\n" +"so as not to send a duplicate message; this is often the case when connecting to a floodfill router." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:125 @@ -14511,11 +12504,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:126 msgid "" -"In the establish state, there is a 4-phase message sequence to exchange " -"DH keys and signatures.\n" +"In the establish state, there is a 4-phase message sequence to exchange DH keys and signatures.\n" "In the first two messages there is a 2048-bit Diffie Hellman exchange.\n" -"Then, signatures of the critical data are exchanged to confirm the " -"connection." +"Then, signatures of the critical data are exchanged to confirm the connection." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:142 @@ -14553,15 +12544,14 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:159 msgid "" "The DH key exchange consists of a number of steps, displayed below.\n" -"The mapping between these steps and the messages sent between I2P " -"routers,\n" +"The mapping between these steps and the messages sent between I2P routers,\n" "is marked in bold." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:165 msgid "" -"Alice generates a secret integer x. She then calculates <code>X = g^x mod" -" p</code>." +"Alice generates a secret integer x. She then calculates <code>X = g^x mod " +"p</code>." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:166 @@ -14595,8 +12585,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:173 #, python-format msgid "" -"The sessionKey is then used to exchange identities in <b>Message 3</b> " -"and <b>Message 4</b>.\n" +"The sessionKey is then used to exchange identities in <b>Message 3</b> and <b>Message 4</b>.\n" "The exponent (x and y) length for the DH exchange is documented on the\n" "<a href=\"%(crypto)s#exponent\">cryptography page</a>." msgstr "" @@ -14609,8 +12598,7 @@ msgstr "" #, python-format msgid "" "This is the DH request. Alice already has Bob's\n" -"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router " -"Identity</a>,\n" +"<a href=\"%(commonstructures)s#struct_RouterIdentity\">Router Identity</a>,\n" "IP address, and port, as contained in his\n" "<a href=\"%(commonstructures)s#struct_RouterInfo\">Router Info</a>,\n" "which was published to the\n" @@ -14690,8 +12678,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:312 #, python-format msgid "" -"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" +"48 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" " the last 16 bytes of Y as the IV" msgstr "" @@ -14707,8 +12694,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:326 msgid "" -"This contains Alice's router identity, and a signature of the critical " -"data. Alice sends Bob:" +"This contains Alice's router identity, and a signature of the critical data." +" Alice sends Bob:" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:360 @@ -14728,17 +12715,14 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Bob's `RouterIdentity`, tsA, tsB.\n" -" Alice signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in her `RouterIdentity`" +" Alice signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in her `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:389 #, python-format msgid "" -"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH" -" session key and\n" -" the last 16 bytes of HXxorHI (i.e., the last 16 bytes " -"of message #1) as the IV" +"448 bytes <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of HXxorHI (i.e., the last 16 bytes of message #1) as the IV" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:400 @@ -14753,8 +12737,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:406 msgid "" -"Alice will use the last 16 bytes of the encrypted contents of this " -"message as the IV for the next message." +"Alice will use the last 16 bytes of the encrypted contents of this message " +"as the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:430 @@ -14769,19 +12753,15 @@ msgstr "" msgid "" "the `Signature` of the following concatenated data:\n" " X, Y, Alice's `RouterIdentity`, tsA, tsB.\n" -" Bob signs it with the `SigningPrivateKey` associated with " -"the `SigningPublicKey` in his `RouterIdentity`" +" Bob signs it with the `SigningPrivateKey` associated with the `SigningPublicKey` in his `RouterIdentity`" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:479 #, python-format msgid "" -"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH " -"session key and\n" -" the last 16 bytes of the encrypted contents of message " -"#2 as the IV\n" -" 48 bytes for a DSA signature, may vary for other " -"signature types" +"Data <a href=\"%(cryptography)s#AES\">AES encrypted</a> using the DH session key and\n" +" the last 16 bytes of the encrypted contents of message #2 as the IV\n" +" 48 bytes for a DSA signature, may vary for other signature types" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:488 @@ -14790,8 +12770,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:491 msgid "" -"Bob will use the last 16 bytes of the encrypted contents of this message " -"as the IV for the next message." +"Bob will use the last 16 bytes of the encrypted contents of this message as " +"the IV for the next message." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:506 @@ -14800,14 +12780,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:507 msgid "" -"The connection is established, and standard or time sync messages may be " -"exchanged.\n" -"All subsequent messages are AES encrypted using the negotiated DH session" -" key.\n" -"Alice will use the last 16 bytes of the encrypted contents of message #3 " -"as the next IV.\n" -"Bob will use the last 16 bytes of the encrypted contents of message #4 as" -" the next IV." +"The connection is established, and standard or time sync messages may be exchanged.\n" +"All subsequent messages are AES encrypted using the negotiated DH session key.\n" +"Alice will use the last 16 bytes of the encrypted contents of message #3 as the next IV.\n" +"Bob will use the last 16 bytes of the encrypted contents of message #4 as the next IV." msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:516 @@ -14834,8 +12810,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:528 msgid "" -"that many bytes making up the local router's IP address (as reached by " -"the remote side)" +"that many bytes making up the local router's IP address (as reached by the " +"remote side)" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:529 @@ -14854,8 +12830,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:532 msgid "" -"xor of the local router's identity hash and the SHA256 of bytes 32 " -"through bytes 223" +"xor of the local router's identity hash and the SHA256 of bytes 32 through " +"bytes 223" msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:535 @@ -14878,11 +12854,9 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ntcp.html:550 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then.\n" -"However, there is currently no provision for padding beyond the next " -"16-byte boundary,\n" +"However, there is currently no provision for padding beyond the next 16-byte boundary,\n" "to create a limited number of message sizes." msgstr "" @@ -14905,28 +12879,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:7 #, python-format msgid "" -"SSU (also called \"UDP\" in much of the I2P documentation and user " -"interfaces)\n" -"is one of three <a href=\"%(transports)s\">transports</a> currently " -"implemented in I2P.\n" -"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a " -"href=\"%(ntcp2)s\">NTCP2</a>." +"SSU (also called \"UDP\" in much of the I2P documentation and user interfaces)\n" +"is one of three <a href=\"%(transports)s\">transports</a> currently implemented in I2P.\n" +"The others are <a href=\"%(ntcp)s\">NTCP</a> and <a href=\"%(ntcp2)s\">NTCP2</a>." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:13 msgid "" "SSU was introduced in I2P release 0.6.\n" -"In a standard I2P installation, the router uses both NTCP and SSU for " -"outbound connections.\n" +"In a standard I2P installation, the router uses both NTCP and SSU for outbound connections.\n" "SSU-over-IPv6 is supported as of version 0.9.8." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:19 msgid "" -"SSU is called \"semireliable\" because it will repeatedly retransmit " -"unacknowledged messages,\n" -"but only up to a maximum number of times. After that, the message is " -"dropped." +"SSU is called \"semireliable\" because it will repeatedly retransmit unacknowledged messages,\n" +"but only up to a maximum number of times. After that, the message is dropped." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:24 @@ -14935,10 +12903,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:26 msgid "" -"Like the NTCP transport, SSU provides reliable, encrypted, connection-" -"oriented, point-to-point data transport.\n" -"Unique to SSU, it also provides IP detection and NAT traversal services, " -"including:" +"Like the NTCP transport, SSU provides reliable, encrypted, connection-oriented, point-to-point data transport.\n" +"Unique to SSU, it also provides IP detection and NAT traversal services, including:" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:32 @@ -14955,8 +12921,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:34 msgid "" -"Communication of firewall status and local IP, and changes to either to " -"NTCP" +"Communication of firewall status and local IP, and changes to either to NTCP" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:46 @@ -14991,26 +12956,20 @@ msgid "" "Packets are scheduled according to the router's policy, taking care\n" "not to exceed the router's outbound capacity or to exceed the measured \n" "capacity of the remote peer. The measured capacity operates along the\n" -"lines of TCP's slow start and congestion avoidance, with additive " -"increases\n" -"to the sending capacity and multiplicative decreases in face of " -"congestion.\n" +"lines of TCP's slow start and congestion avoidance, with additive increases\n" +"to the sending capacity and multiplicative decreases in face of congestion.\n" "Unlike for TCP, routers may give up on some messages after\n" -"a given period or number of retransmissions while continuing to transmit" -" \n" +"a given period or number of retransmissions while continuing to transmit \n" "other messages." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:106 msgid "" "The congestion detection techniques vary from TCP as well, since each \n" -"message has its own unique and nonsequential identifier, and each message" -"\n" -"has a limited size - at most, 32KB. To efficiently transmit this " -"feedback\n" +"message has its own unique and nonsequential identifier, and each message\n" +"has a limited size - at most, 32KB. To efficiently transmit this feedback\n" "to the sender, the receiver periodically includes a list of fully ACKed \n" -"message identifiers and may also include bitfields for partially received" -"\n" +"message identifiers and may also include bitfields for partially received\n" "messages, where each bit represents the reception of a fragment. If \n" "duplicate fragments arrive, the message should be ACKed again, or if the\n" "message has still not been fully received, the bitfield should be \n" @@ -15020,8 +12979,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:118 msgid "" "The current implementation does not pad the packets to\n" -"any particular size, but instead just places a single message fragment " -"into\n" +"any particular size, but instead just places a single message fragment into\n" "a packet and sends it off (careful not to exceed the MTU)." msgstr "" @@ -15029,8 +12987,7 @@ msgstr "" msgid "" "As of router version 0.8.12,\n" "two MTU values are used for IPv4: 620 and 1484.\n" -"The MTU value is adjusted based on the percentage of packets that are " -"retransmitted." +"The MTU value is adjusted based on the percentage of packets that are retransmitted." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:131 @@ -15049,10 +13006,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:143 msgid "" -"Based on measurements, 1492 fits nearly all reasonably small I2NP " -"messages\n" -"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going " -"to fit\n" +"Based on measurements, 1492 fits nearly all reasonably small I2NP messages\n" +"(larger I2NP messages may be up to 1900 to 4500 bytes, which isn't going to fit\n" "into a live network MTU anyway)." msgstr "" @@ -15072,8 +13027,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:161 msgid "" -"As of release 0.9.2, if a router's network interface MTU is less than " -"1484,\n" +"As of release 0.9.2, if a router's network interface MTU is less than 1484,\n" "it will publish that in the network database, and other routers should\n" "honor that when a connection is established." msgstr "" @@ -15093,13 +13047,10 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:175 msgid "" "While the maximum message size is nominally 32KB, the practical\n" -"limit differs. The protocol limits the number of fragments to 7 bits, or " -"128.\n" -"The current implementation, however, limits each message to a maximum of " -"64 fragments,\n" +"limit differs. The protocol limits the number of fragments to 7 bits, or 128.\n" +"The current implementation, however, limits each message to a maximum of 64 fragments,\n" "which is sufficient for 64 * 534 = 33.3 KB when using the 608 MTU.\n" -"Due to overhead for bundled LeaseSets and session keys, the practical " -"limit\n" +"Due to overhead for bundled LeaseSets and session keys, the practical limit\n" "at the application level is about 6KB lower, or about 26KB.\n" "Further work is necessary to raise the UDP transport limit above 32KB.\n" "For connections using the larger MTU, larger messages are possible." @@ -15113,8 +13064,7 @@ msgstr "Kyçe" msgid "" "All encryption used is AES256/CBC with 32 byte keys and 16 byte IVs.\n" "When Alice originates a session with Bob,\n" -"the MAC and session keys are negotiated as part of the DH exchange, and " -"are then used\n" +"the MAC and session keys are negotiated as part of the DH exchange, and are then used\n" "for the HMAC and encryption, respectively. During the DH exchange, \n" "Bob's publicly knowable introKey is used for the MAC and encryption." msgstr "" @@ -15131,8 +13081,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:216 msgid "" -"Upon receiving a message, the receiver checks the \"from\" IP address and" -" port\n" +"Upon receiving a message, the receiver checks the \"from\" IP address and port\n" "with all established sessions - if there are matches,\n" "that session's MAC keys are tested in the HMAC. If none\n" "of those verify or if there are no matching IP addresses, the \n" @@ -15222,8 +13171,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:296 msgid "" -"Direct session establishment is used when no third party is required for " -"NAT traversal.\n" +"Direct session establishment is used when no third party is required for NAT traversal.\n" "The message sequence is as follows:" msgstr "" @@ -15243,10 +13191,8 @@ msgid "" "After the SessionConfirmed message is received, Bob sends a small\n" "<a href=\"%(i2npspec)s#msg_DeliveryStatus\">DeliveryStatus message</a>\n" "as a confirmation.\n" -"In this message, the 4-byte message ID is set to a random number, and the" -"\n" -"8-byte \"arrival time\" is set to the current network-wide ID, which is 2" -"\n" +"In this message, the 4-byte message ID is set to a random number, and the\n" +"8-byte \"arrival time\" is set to the current network-wide ID, which is 2\n" "(i.e. 0x0000000000000002)." msgstr "" @@ -15262,8 +13208,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:335 msgid "" -"It does not appear that the type of the status message or its contents " -"matters.\n" +"It does not appear that the type of the status message or its contents matters.\n" "It was originally added becasue the DatabaseStore message was delayed\n" "several seconds; since the store is now sent immediately, perhaps\n" "the status message can be eliminated." @@ -15273,8 +13218,7 @@ msgstr "" msgid "" "Introduction keys are delivered through an external channel \n" "(the network database),\n" -"where they have traditionally been identical to the router Hash through " -"release 0.9.47,\n" +"where they have traditionally been identical to the router Hash through release 0.9.47,\n" "but may be random as of release 0.9.48.\n" "They must be used when establishing a session key. For the indirect\n" "address, the peer must first contact the relayhost and ask them for\n" @@ -15293,24 +13237,16 @@ msgid "" "is necessary for efficient NAT traversal. Charlie, a router behind a\n" "NAT or firewall which does not allow unsolicited inbound UDP packets,\n" "first contacts a few peers, choosing some to serve as introducers. Each\n" -"of these peers (Bob, Bill, Betty, etc) provide Charlie with an " -"introduction\n" -"tag - a 4 byte random number - which he then makes available to the " -"public\n" -"as methods of contacting him. Alice, a router who has Charlie's " -"published\n" -"contact methods, first sends a RelayRequest packet to one or more of the" -" \n" +"of these peers (Bob, Bill, Betty, etc) provide Charlie with an introduction\n" +"tag - a 4 byte random number - which he then makes available to the public\n" +"as methods of contacting him. Alice, a router who has Charlie's published\n" +"contact methods, first sends a RelayRequest packet to one or more of the \n" "introducers, asking each to introduce her to Charlie (offering the \n" "introduction tag to identify Charlie). Bob then forwards a RelayIntro\n" -"packet to Charlie including Alice's public IP and port number, then sends" -"\n" -"Alice back a RelayResponse packet containing Charlie's public IP and port" -"\n" -"number. When Charlie receives the RelayIntro packet, he sends off a " -"small\n" -"random packet to Alice's IP and port (poking a hole in his NAT/firewall)," -"\n" +"packet to Charlie including Alice's public IP and port number, then sends\n" +"Alice back a RelayResponse packet containing Charlie's public IP and port\n" +"number. When Charlie receives the RelayIntro packet, he sends off a small\n" +"random packet to Alice's IP and port (poking a hole in his NAT/firewall),\n" "and when Alice receives Bob's RelayResponse packet, she begins a new \n" "full direction session establishment with the specified IP and port." msgstr "" @@ -15320,13 +13256,14 @@ msgid "Connection establishment (indirect using an introducer)" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:389 -msgid "Alice first connects to introducer Bob, who relays the request to Charlie." +msgid "" +"Alice first connects to introducer Bob, who relays the request to Charlie." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:407 msgid "" -"After the hole punch, the session is established between Alice and " -"Charlie as in a direct establishment." +"After the hole punch, the session is established between Alice and Charlie " +"as in a direct establishment." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:427 @@ -15430,14 +13367,12 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:543 #, python-format msgid "" -"The details of windowing, ACK, and retransmission strategies are not " -"specified\n" +"The details of windowing, ACK, and retransmission strategies are not specified\n" "here. See the Java code for the current implementation.\n" "During the establishment phase, and for peer testing, routers\n" "should implement exponential backoff for retransmission.\n" "For an established connection, routers should implement\n" -"an adjustable transmission window, RTT estimate and timeout, similar to " -"TCP\n" +"an adjustable transmission window, RTT estimate and timeout, similar to TCP\n" "or <a href=\"%(streaming)s\">streaming</a>.\n" "See the code for initial, min and max parameters." msgstr "" @@ -15474,27 +13409,22 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:617 msgid "" -"Analysis of current SSU performance, including assessment of window size " -"adjustment\n" -"and other parameters, and adjustment of the protocol implementation to " -"improve\n" +"Analysis of current SSU performance, including assessment of window size adjustment\n" +"and other parameters, and adjustment of the protocol implementation to improve\n" "performance, is a topic for future work." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:623 msgid "" -"The current implementation repeatedly sends acknowledgments for the same " -"packets,\n" +"The current implementation repeatedly sends acknowledgments for the same packets,\n" "which unnecessarily increases overhead." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:628 msgid "" -"The default small MTU value of 620 should be analyzed and possibly " -"increased.\n" +"The default small MTU value of 620 should be analyzed and possibly increased.\n" "The current MTU adjustment strategy should be evaluated.\n" -"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? " -"Probably not." +"Does a streaming lib 1730-byte packet fit in 3 small SSU packets? Probably not." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:634 @@ -15507,32 +13437,28 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:642 msgid "" -"The potential use of the 'challenge' fields in RelayIntro and " -"RelayResponse,\n" -"and use of the padding field in SessionRequest and SessionCreated, is " -"undocumented." +"The potential use of the 'challenge' fields in RelayIntro and RelayResponse,\n" +"and use of the padding field in SessionRequest and SessionCreated, is undocumented." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:647 msgid "" "Instead of a single fragment per packet, a more efficient\n" -"strategy may be to bundle multiple message fragments into the same " -"packet,\n" +"strategy may be to bundle multiple message fragments into the same packet,\n" "so long as it doesn't exceed the MTU." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:653 msgid "" "A set of fixed packet sizes may be appropriate to further hide the data \n" -"fragmentation to external adversaries, but the tunnel, garlic, and end to" -" \n" +"fragmentation to external adversaries, but the tunnel, garlic, and end to \n" "end padding should be sufficient for most needs until then." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:659 msgid "" -"Why are introduction keys the same as the router hash, should it be " -"changed, would there be any benefit?" +"Why are introduction keys the same as the router hash, should it be changed," +" would there be any benefit?" msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:663 @@ -15541,8 +13467,8 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:667 msgid "" -"Signed-on times in SessionCreated and SessionConfirmed appear to be " -"unused or unverified." +"Signed-on times in SessionCreated and SessionConfirmed appear to be unused " +"or unverified." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:672 @@ -15552,8 +13478,7 @@ msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:673 msgid "" "This diagram\n" -"should accurately reflect the current implementation, however there may " -"be small differences." +"should accurately reflect the current implementation, however there may be small differences." msgstr "" #: i2p2www/pages/site/docs/transport/ssu.html:681 @@ -15577,12 +13502,9 @@ msgid "" "Within I2P, messages are passed in one direction through a virtual\n" "tunnel of peers, using whatever means are available to pass the \n" "message on to the next hop. Messages arrive at the tunnel's \n" -"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel " -"messages, \n" -"and are forwarded on to the next hop in the tunnel, which processes and " -"verifies\n" -"the validity of the message and sends it on to the next hop, and so on, " -"until\n" +"</i>gateway</i>, get bundled up and/or fragmented into fixed-size tunnel messages, \n" +"and are forwarded on to the next hop in the tunnel, which processes and verifies\n" +"the validity of the message and sends it on to the next hop, and so on, until\n" "it reaches the tunnel endpoint. That <i>endpoint</i> takes the messages\n" "bundled up by the gateway and forwards them as instructed - either\n" "to another router, to another tunnel on another router, or locally." @@ -15604,12 +13526,9 @@ msgid "" "in the tunnel, and provides each with the necessary configuration\n" "data. They may have any number of hops.\n" "It is the intent to make\n" -"it hard for either participants or third parties to determine the length " -"of \n" -"a tunnel, or even for colluding participants to determine whether they " -"are a\n" -"part of the same tunnel at all (barring the situation where colluding " -"peers are\n" +"it hard for either participants or third parties to determine the length of \n" +"a tunnel, or even for colluding participants to determine whether they are a\n" +"part of the same tunnel at all (barring the situation where colluding peers are\n" "next to each other in the tunnel)." msgstr "" @@ -15647,8 +13566,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:69 #, python-format msgid "" -"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are " -"processed and passed through it.\n" +"After a tunnel is built, <a href=\"%(i2np)s\">I2NP messages</a> are processed and passed through it.\n" "Tunnel operation has four distinct processes, taken on by various \n" "peers in the tunnel." msgstr "" @@ -15675,8 +13593,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:89 msgid "" -"Eventually, the tunnel messages arrive at the endpoint where the I2NP " -"messages\n" +"Eventually, the tunnel messages arrive at the endpoint where the I2NP messages\n" "originally bundled by the gateway are reassembled and forwarded on as \n" "requested." msgstr "" @@ -15736,11 +13653,13 @@ msgid "Decrypt (using an encryption operation)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:133 -msgid "Decrypt (using an encryption operation) to reveal plaintext tunnel message" +msgid "" +"Decrypt (using an encryption operation) to reveal plaintext tunnel message" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:134 -msgid "Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" +msgid "" +"Reassemble Fragments, Forward as instructed to Inbound Gateway or Router" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:142 @@ -15801,10 +13720,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:181 msgid "" "Tunnel IDs are 4 byte numbers used at each hop - participants know what\n" -"tunnel ID to listen for messages with and what tunnel ID they should be " -"forwarded\n" -"on as to the next hop, and each hop chooses the tunnel ID which they " -"receive messages\n" +"tunnel ID to listen for messages with and what tunnel ID they should be forwarded\n" +"on as to the next hop, and each hop chooses the tunnel ID which they receive messages\n" "on. Tunnels themselves are short-lived (10 minutes).\n" "Even if subsequent tunnels are built using the same sequence of \n" "peers, each hop's tunnel ID will change." @@ -15812,16 +13729,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:190 msgid "" -"To prevent adversaries from tagging the messages along the path by " -"adjusting\n" -"the message size, all tunnel messages are a fixed 1024 bytes in size. To" -" accommodate \n" -"larger I2NP messages as well as to support smaller ones more efficiently," -" the\n" -"gateway splits up the larger I2NP messages into fragments contained " -"within each\n" -"tunnel message. The endpoint will attempt to rebuild the I2NP message " -"from the\n" +"To prevent adversaries from tagging the messages along the path by adjusting\n" +"the message size, all tunnel messages are a fixed 1024 bytes in size. To accommodate \n" +"larger I2NP messages as well as to support smaller ones more efficiently, the\n" +"gateway splits up the larger I2NP messages into fragments contained within each\n" +"tunnel message. The endpoint will attempt to rebuild the I2NP message from the\n" "fragments for a short period of time, but will discard them as necessary." msgstr "" @@ -15838,30 +13750,20 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:207 msgid "" -"After the preprocessing of messages into a padded payload, the gateway " -"builds\n" -"a random 16 byte IV value, iteratively encrypting it and the tunnel " -"message as\n" -"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel " -"message} to the next hop." +"After the preprocessing of messages into a padded payload, the gateway builds\n" +"a random 16 byte IV value, iteratively encrypting it and the tunnel message as\n" +"necessary, and forwards the tuple {tunnelID, IV, encrypted tunnel message} to the next hop." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:213 msgid "" -"How encryption at the gateway is done depends on whether the tunnel is an" -"\n" -"inbound or an outbound tunnel. For inbound tunnels, they simply select a" -" random\n" -"IV, postprocessing and updating it to generate the IV for the gateway and" -" using \n" -"that IV along side their own layer key to encrypt the preprocessed data." -" For outbound \n" -"tunnels they must iteratively decrypt the (unencrypted) IV and " -"preprocessed \n" -"data with the IV and layer keys for all hops in the tunnel. The result " -"of the outbound\n" -"tunnel encryption is that when each peer encrypts it, the endpoint will " -"recover \n" +"How encryption at the gateway is done depends on whether the tunnel is an\n" +"inbound or an outbound tunnel. For inbound tunnels, they simply select a random\n" +"IV, postprocessing and updating it to generate the IV for the gateway and using \n" +"that IV along side their own layer key to encrypt the preprocessed data. For outbound \n" +"tunnels they must iteratively decrypt the (unencrypted) IV and preprocessed \n" +"data with the IV and layer keys for all hops in the tunnel. The result of the outbound\n" +"tunnel encryption is that when each peer encrypts it, the endpoint will recover \n" "the initial preprocessed data." msgstr "" @@ -15871,46 +13773,29 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:227 msgid "" -"When a peer receives a tunnel message, it checks that the message came " -"from\n" -"the same previous hop as before (initialized when the first message comes" -" through\n" -"the tunnel). If the previous peer is a different router, or if the " -"message has\n" -"already been seen, the message is dropped. The participant then encrypts" -" the \n" -"received IV with AES256/ECB using their IV key to determine the current " -"IV, uses \n" -"that IV with the participant's layer key to encrypt the data, encrypts " -"the \n" -"current IV with AES256/ECB using their IV key again, then forwards the " -"tuple \n" -"{nextTunnelId, nextIV, encryptedData} to the next hop. This double " -"encryption\n" +"When a peer receives a tunnel message, it checks that the message came from\n" +"the same previous hop as before (initialized when the first message comes through\n" +"the tunnel). If the previous peer is a different router, or if the message has\n" +"already been seen, the message is dropped. The participant then encrypts the \n" +"received IV with AES256/ECB using their IV key to determine the current IV, uses \n" +"that IV with the participant's layer key to encrypt the data, encrypts the \n" +"current IV with AES256/ECB using their IV key again, then forwards the tuple \n" +"{nextTunnelId, nextIV, encryptedData} to the next hop. This double encryption\n" "of the IV (both before and after use) help address a certain class of\n" "confirmation attacks." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:243 msgid "" -"Duplicate message detection is handled by a decaying Bloom filter on " -"message\n" -"IVs. Each router maintains a single Bloom filter to contain the XOR of " -"the IV and\n" -"the first block of the message received for all of the tunnels it is " -"participating\n" -"in, modified to drop seen entries after 10-20 minutes (when the tunnels " -"will have\n" -"expired). The size of the bloom filter and the parameters used are " -"sufficient to\n" -"more than saturate the router's network connection with a negligible " -"chance of \n" -"false positive. The unique value fed into the Bloom filter is the XOR of" -" the IV \n" -"and the first block so as to prevent nonsequential colluding peers in the" -" tunnel \n" -"from tagging a message by resending it with the IV and first block " -"switched." +"Duplicate message detection is handled by a decaying Bloom filter on message\n" +"IVs. Each router maintains a single Bloom filter to contain the XOR of the IV and\n" +"the first block of the message received for all of the tunnels it is participating\n" +"in, modified to drop seen entries after 10-20 minutes (when the tunnels will have\n" +"expired). The size of the bloom filter and the parameters used are sufficient to\n" +"more than saturate the router's network connection with a negligible chance of \n" +"false positive. The unique value fed into the Bloom filter is the XOR of the IV \n" +"and the first block so as to prevent nonsequential colluding peers in the tunnel \n" +"from tagging a message by resending it with the IV and first block switched." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:256 @@ -15919,27 +13804,19 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:258 msgid "" -"After receiving and validating a tunnel message at the last hop in the " -"tunnel,\n" -"how the endpoint recovers the data encoded by the gateway depends upon " -"whether \n" -"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, " -"the \n" -"endpoint encrypts the message with its layer key just like any other " -"participant, \n" -"exposing the preprocessed data. For inbound tunnels, the endpoint is " -"also the \n" -"tunnel creator so they can merely iteratively decrypt the IV and message," -" using the \n" +"After receiving and validating a tunnel message at the last hop in the tunnel,\n" +"how the endpoint recovers the data encoded by the gateway depends upon whether \n" +"the tunnel is an inbound or an outbound tunnel. For outbound tunnels, the \n" +"endpoint encrypts the message with its layer key just like any other participant, \n" +"exposing the preprocessed data. For inbound tunnels, the endpoint is also the \n" +"tunnel creator so they can merely iteratively decrypt the IV and message, using the \n" "layer and IV keys of each step in reverse order." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:268 msgid "" -"At this point, the tunnel endpoint has the preprocessed data sent by the " -"gateway,\n" -"which it may then parse out into the included I2NP messages and forwards " -"them as\n" +"At this point, the tunnel endpoint has the preprocessed data sent by the gateway,\n" +"which it may then parse out into the included I2NP messages and forwards them as\n" "requested in their delivery instructions." msgstr "" @@ -15949,30 +13826,21 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:277 msgid "" -"When building a tunnel, the creator must send a request with the " -"necessary\n" -"configuration data to each of the hops and wait for all of them to agree " -"before\n" -"enabling the tunnel. The requests are encrypted so that only the peers " -"who need\n" -"to know a piece of information (such as the tunnel layer or IV key) has " -"that\n" -"data. In addition, only the tunnel creator will have access to the " -"peer's\n" -"reply. There are three important dimensions to keep in mind when " -"producing\n" -"the tunnels: what peers are used (and where), how the requests are sent " -"(and \n" +"When building a tunnel, the creator must send a request with the necessary\n" +"configuration data to each of the hops and wait for all of them to agree before\n" +"enabling the tunnel. The requests are encrypted so that only the peers who need\n" +"to know a piece of information (such as the tunnel layer or IV key) has that\n" +"data. In addition, only the tunnel creator will have access to the peer's\n" +"reply. There are three important dimensions to keep in mind when producing\n" +"the tunnels: what peers are used (and where), how the requests are sent (and \n" "replies received), and how they are maintained." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:291 msgid "" -"Beyond the two types of tunnels - inbound and outbound - there are two " -"styles\n" +"Beyond the two types of tunnels - inbound and outbound - there are two styles\n" "of peer selection used for different tunnels - exploratory and client.\n" -"Exploratory tunnels are used for both network database maintenance and " -"tunnel\n" +"Exploratory tunnels are used for both network database maintenance and tunnel\n" "maintenance, while client tunnels are used for end to end client messages." msgstr "" @@ -15982,18 +13850,12 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:301 msgid "" -"Exploratory tunnels are built out of a random selection of peers from a " -"subset\n" -"of the network. The particular subset varies on the local router and on " -"what their\n" -"tunnel routing needs are. In general, the exploratory tunnels are built " -"out of\n" -"randomly selected peers who are in the peer's \"not failing but active\" " -"profile\n" -"category. The secondary purpose of the tunnels, beyond merely tunnel " -"routing,\n" -"is to find underutilized high capacity peers so that they can be promoted" -" for\n" +"Exploratory tunnels are built out of a random selection of peers from a subset\n" +"of the network. The particular subset varies on the local router and on what their\n" +"tunnel routing needs are. In general, the exploratory tunnels are built out of\n" +"randomly selected peers who are in the peer's \"not failing but active\" profile\n" +"category. The secondary purpose of the tunnels, beyond merely tunnel routing,\n" +"is to find underutilized high capacity peers so that they can be promoted for\n" "use in client tunnels." msgstr "" @@ -16010,14 +13872,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:319 msgid "" -"Client tunnels are built with a more stringent set of requirements - the " -"local\n" -"router will select peers out of its \"fast and high capacity\" profile " -"category so\n" -"that performance and reliability will meet the needs of the client " -"application.\n" -"However, there are several important details beyond that basic selection " -"that \n" +"Client tunnels are built with a more stringent set of requirements - the local\n" +"router will select peers out of its \"fast and high capacity\" profile category so\n" +"that performance and reliability will meet the needs of the client application.\n" +"However, there are several important details beyond that basic selection that \n" "should be adhered to, depending upon the client's anonymity needs." msgstr "" @@ -16043,10 +13901,8 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:341 msgid "" "To frustrate the predecessor \n" -"attack, the tunnel selection keeps the peers selected in a strict order -" -"\n" -"if A, B, and C are in a tunnel for a particular tunnel pool, the hop " -"after A is always B, and the hop after\n" +"attack, the tunnel selection keeps the peers selected in a strict order -\n" +"if A, B, and C are in a tunnel for a particular tunnel pool, the hop after A is always B, and the hop after\n" "B is always C." msgstr "" @@ -16055,18 +13911,15 @@ msgid "" "Ordering is implemented by generating a random 32-byte key for each\n" "tunnel pool at startup.\n" "Peers should not be able to guess the ordering, or an attacker could\n" -"craft two router hashes far apart to maximize the chance of being at both" -"\n" +"craft two router hashes far apart to maximize the chance of being at both\n" "ends of a tunnel.\n" "Peers are sorted by XOR distance of the\n" -"SHA256 Hash of (the peer's hash concatenated with the random key) from " -"the random key" +"SHA256 Hash of (the peer's hash concatenated with the random key) from the random key" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:363 msgid "" -"Because each tunnel pool uses a different random key, ordering is " -"consistent\n" +"Because each tunnel pool uses a different random key, ordering is consistent\n" "within a single pool but not between different pools.\n" "New keys are generated at each router restart." msgstr "" @@ -16078,8 +13931,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:372 #, python-format msgid "" -"A multi-hop tunnel is built using a single build message which is " -"repeatedly\n" +"A multi-hop tunnel is built using a single build message which is repeatedly\n" "decrypted and forwarded. In the terminology of\n" "<a href=\"%(pdf)s\">Hashing it out in Public</a>,\n" "this is \"non-interactive\" telescopic tunnel building." @@ -16090,38 +13942,28 @@ msgstr "" msgid "" "This tunnel request preparation, delivery, and response method is\n" "<a href=\"%(tunnelcreation)s\">designed</a> to reduce the number of\n" -"predecessors exposed, cuts the number of messages transmitted, verifies " -"proper\n" -"connectivity, and avoids the message counting attack of traditional " -"telescopic\n" +"predecessors exposed, cuts the number of messages transmitted, verifies proper\n" +"connectivity, and avoids the message counting attack of traditional telescopic\n" "tunnel creation.\n" -"(This method, which sends messages to extend a tunnel through the " -"already-established\n" -"part of the tunnel, is termed \"interactive\" telescopic tunnel building " -"in\n" +"(This method, which sends messages to extend a tunnel through the already-established\n" +"part of the tunnel, is termed \"interactive\" telescopic tunnel building in\n" "the \"Hashing it out\" paper.)" msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:390 #, python-format msgid "" -"The details of tunnel request and response messages, and their " -"encryption,\n" +"The details of tunnel request and response messages, and their encryption,\n" "<a href=\"%(tunnelcreation)s\">are specified here</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:395 msgid "" -"Peers may reject tunnel creation requests for a variety of reasons, " -"though\n" -"a series of four increasingly severe rejections are known: probabilistic " -"rejection\n" -"(due to approaching the router's capacity, or in response to a flood of " -"requests), \n" -"transient overload, bandwidth overload, and critical failure. When " -"received, \n" -"those four are interpreted by the tunnel creator to help adjust their " -"profile of\n" +"Peers may reject tunnel creation requests for a variety of reasons, though\n" +"a series of four increasingly severe rejections are known: probabilistic rejection\n" +"(due to approaching the router's capacity, or in response to a flood of requests), \n" +"transient overload, bandwidth overload, and critical failure. When received, \n" +"those four are interpreted by the tunnel creator to help adjust their profile of\n" "the router in question." msgstr "" @@ -16139,37 +13981,26 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:412 #, python-format msgid "" -"To allow efficient operation, the router maintains a series of tunnel " -"pools,\n" -"each managing a group of tunnels used for a specific purpose with their " -"own\n" -"configuration. When a tunnel is needed for that purpose, the router " -"selects one\n" -"out of the appropriate pool at random. Overall, there are two " -"exploratory tunnel\n" -"pools - one inbound and one outbound - each using the router's default " -"configuration.\n" +"To allow efficient operation, the router maintains a series of tunnel pools,\n" +"each managing a group of tunnels used for a specific purpose with their own\n" +"configuration. When a tunnel is needed for that purpose, the router selects one\n" +"out of the appropriate pool at random. Overall, there are two exploratory tunnel\n" +"pools - one inbound and one outbound - each using the router's default configuration.\n" "In addition, there is a pair of pools for each local destination -\n" -"one inbound and one outbound tunnel pool. Those pools use the " -"configuration specified\n" -"when the local destination connects to the router via <a " -"href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" +"one inbound and one outbound tunnel pool. Those pools use the configuration specified\n" +"when the local destination connects to the router via <a href=\"%(i2cp)s\">I2CP</a>, or the router's defaults if\n" "not specified." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:424 #, python-format msgid "" -"Each pool has within its configuration a few key settings, defining how " -"many\n" -"tunnels to keep active, how many backup tunnels to maintain in case of " -"failure,\n" +"Each pool has within its configuration a few key settings, defining how many\n" +"tunnels to keep active, how many backup tunnels to maintain in case of failure,\n" "how long the tunnels should be, whether those\n" "lengths should be randomized, as \n" -"well as any of the other settings allowed when configuring individual " -"tunnels.\n" -"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP " -"page</a>." +"well as any of the other settings allowed when configuring individual tunnels.\n" +"Configuration options are specified on the <a href=\"%(i2cp)s\">I2CP page</a>." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:434 @@ -16186,20 +14017,14 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:440 msgid "" -"Tunnel building is expensive, and tunnels expire a fixed time after they " -"are built.\n" -"However, when a pool that runs out of tunnels, the Destination is " -"essentially dead.\n" -"In addition, tunnel build success rate may vary greatly with both local " -"and global\n" +"Tunnel building is expensive, and tunnels expire a fixed time after they are built.\n" +"However, when a pool that runs out of tunnels, the Destination is essentially dead.\n" +"In addition, tunnel build success rate may vary greatly with both local and global\n" "network conditions.\n" -"Therefore, it is important to maintain an anticipatory, adaptive build " -"strategy\n" -"to ensure that new tunnels are successfully built before they are needed," -"\n" +"Therefore, it is important to maintain an anticipatory, adaptive build strategy\n" +"to ensure that new tunnels are successfully built before they are needed,\n" "without building an excess of tunnels, building them too soon,\n" -"or consuming too much CPU or bandwidth creating and sending the encrypted" -" build messages." +"or consuming too much CPU or bandwidth creating and sending the encrypted build messages." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:451 @@ -16207,8 +14032,7 @@ msgid "" "For each tuple {exploratory/client, in/out, length, length variance}\n" "the router maintains statistics on the time required for a successful\n" "tunnel build.\n" -"Using these statistics, it calculates how long before a tunnel's " -"expiration\n" +"Using these statistics, it calculates how long before a tunnel's expiration\n" "it should start attempting to build a replacement.\n" "As the expiration time approaches without a successful replacement,\n" "it starts multiple build attempts in parallel, and then\n" @@ -16230,30 +14054,18 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:473 msgid "" -"Even though the tunnels within I2P bear a resemblance to a circuit " -"switched\n" -"network, everything within I2P is strictly message based - tunnels are " -"merely\n" -"accounting tricks to help organize the delivery of messages. No " -"assumptions are\n" -"made regarding reliability or ordering of messages, and retransmissions " -"are left\n" -"to higher levels (e.g. I2P's client layer streaming library). This " -"allows I2P\n" -"to take advantage of throttling techniques available to both packet " -"switched and\n" -"circuit switched networks. For instance, each router may keep track of " -"the \n" -"moving average of how much data each tunnel is using, combine that with " -"all of \n" -"the averages used by other tunnels the router is participating in, and be" -" able\n" -"to accept or reject additional tunnel participation requests based on its" -" \n" -"capacity and utilization. On the other hand, each router can simply drop" -" \n" -"messages that are beyond its capacity, exploiting the research used on " -"the \n" +"Even though the tunnels within I2P bear a resemblance to a circuit switched\n" +"network, everything within I2P is strictly message based - tunnels are merely\n" +"accounting tricks to help organize the delivery of messages. No assumptions are\n" +"made regarding reliability or ordering of messages, and retransmissions are left\n" +"to higher levels (e.g. I2P's client layer streaming library). This allows I2P\n" +"to take advantage of throttling techniques available to both packet switched and\n" +"circuit switched networks. For instance, each router may keep track of the \n" +"moving average of how much data each tunnel is using, combine that with all of \n" +"the averages used by other tunnels the router is participating in, and be able\n" +"to accept or reject additional tunnel participation requests based on its \n" +"capacity and utilization. On the other hand, each router can simply drop \n" +"messages that are beyond its capacity, exploiting the research used on the \n" "normal Internet." msgstr "" @@ -16261,23 +14073,16 @@ msgstr "" msgid "" "In the current implementation, routers implement a\n" "weighted random early discard (WRED) strategy.\n" -"For all participating routers (internal participant, inbound gateway, and" -" outbound endpoint),\n" +"For all participating routers (internal participant, inbound gateway, and outbound endpoint),\n" "the router will start randomly dropping a portion of messages as the\n" "bandwidth limits are approached.\n" -"As traffic gets closer to, or exceeds, the limits, more messages are " -"dropped.\n" -"For an internal participant, all messages are fragmented and padded and " -"therefore are the same size.\n" -"At the inbound gateway and outbound endpoint, however, the dropping " -"decision is made\n" -"on the full (coalesced) message, and the message size is taken into " -"account.\n" +"As traffic gets closer to, or exceeds, the limits, more messages are dropped.\n" +"For an internal participant, all messages are fragmented and padded and therefore are the same size.\n" +"At the inbound gateway and outbound endpoint, however, the dropping decision is made\n" +"on the full (coalesced) message, and the message size is taken into account.\n" "Larger messages are more likely to be dropped.\n" -"Also, messages are more likely to be dropped at the outbound endpoint " -"than the inbound gateway,\n" -"as those messages are not as \"far along\" in their journey and thus the " -"network cost of\n" +"Also, messages are more likely to be dropped at the outbound endpoint than the inbound gateway,\n" +"as those messages are not as \"far along\" in their journey and thus the network cost of\n" "dropping those messages is lower." msgstr "" @@ -16287,16 +14092,11 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:509 msgid "" -"What strategies could be used at the gateway and at each hop for " -"delaying,\n" -"reordering, rerouting, or padding messages? To what extent should this " -"be done\n" -"automatically, how much should be configured as a per tunnel or per hop " -"setting,\n" -"and how should the tunnel's creator (and in turn, user) control this " -"operation?\n" -"All of this is left as unknown, to be worked out for a distant future " -"release." +"What strategies could be used at the gateway and at each hop for delaying,\n" +"reordering, rerouting, or padding messages? To what extent should this be done\n" +"automatically, how much should be configured as a per tunnel or per hop setting,\n" +"and how should the tunnel's creator (and in turn, user) control this operation?\n" +"All of this is left as unknown, to be worked out for a distant future release." msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:518 @@ -16305,13 +14105,10 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/implementation.html:519 msgid "" -"The padding strategies can be used on a variety of levels, addressing the" -"\n" +"The padding strategies can be used on a variety of levels, addressing the\n" "exposure of message size information to different adversaries.\n" -"The current fixed tunnel message size is 1024 bytes. Within this " -"however, the fragmented\n" -"messages themselves are not padded by the tunnel at all, though for end " -"to end \n" +"The current fixed tunnel message size is 1024 bytes. Within this however, the fragmented\n" +"messages themselves are not padded by the tunnel at all, though for end to end \n" "messages, they may be padded as part of the garlic wrapping." msgstr "" @@ -16339,8 +14136,7 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:7 msgid "" -"This page describes the origins and design of I2P's unidirectional " -"tunnels.\n" +"This page describes the origins and design of I2P's unidirectional tunnels.\n" "For further information see:" msgstr "" @@ -16374,8 +14170,7 @@ msgid "" "Several apps and protocols, notably HTTP,\n" "do transfer data in such manner. Having the traffic follow the same \n" "route to its destination and back could make it easier for an \n" -"attacker who has only timing and traffic volume data to infer the path a" -" \n" +"attacker who has only timing and traffic volume data to infer the path a \n" "tunnel is taking.\n" "Having the response come back along a different path arguably \n" "makes it harder." @@ -16384,42 +14179,27 @@ msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:45 msgid "" "When dealing with \n" -"an internal adversary or most external adversaries, I2P's undirectional " -"tunnels\n" -"expose half as much traffic data than would be exposed with bidirectional" -" circuits\n" -"by simply looking at the flows themselves - an HTTP request and response " -"would \n" -"follow the same path in Tor, while in I2P the packets making up the " -"request \n" -"would go out through one or more outbound tunnels and the packets making " -"up \n" -"the response would come back through one or more different inbound " -"tunnels." +"an internal adversary or most external adversaries, I2P's undirectional tunnels\n" +"expose half as much traffic data than would be exposed with bidirectional circuits\n" +"by simply looking at the flows themselves - an HTTP request and response would \n" +"follow the same path in Tor, while in I2P the packets making up the request \n" +"would go out through one or more outbound tunnels and the packets making up \n" +"the response would come back through one or more different inbound tunnels." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:55 msgid "" "The strategy of using two separate tunnels for inbound and outbound\n" -"communication is not the only technique available, and it does have " -"anonymity\n" -"implications. On the positive side, by using separate tunnels it lessens" -" the\n" -"traffic data exposed for analysis to participants in a tunnel - for " -"instance,\n" -"peers in an outbound tunnel from a web browser would only see the traffic" -" of\n" +"communication is not the only technique available, and it does have anonymity\n" +"implications. On the positive side, by using separate tunnels it lessens the\n" +"traffic data exposed for analysis to participants in a tunnel - for instance,\n" +"peers in an outbound tunnel from a web browser would only see the traffic of\n" "an HTTP GET, while the peers in an inbound tunnel would see the payload \n" -"delivered along the tunnel. With bidirectional tunnels, all participants" -" would\n" -"have access to the fact that e.g. 1KB was sent in one direction, then " -"100KB\n" -"in the other. On the negative side, using unidirectional tunnels means " -"that\n" -"there are two sets of peers which need to be profiled and accounted for, " -"and\n" -"additional care must be taken to address the increased speed of " -"predecessor\n" +"delivered along the tunnel. With bidirectional tunnels, all participants would\n" +"have access to the fact that e.g. 1KB was sent in one direction, then 100KB\n" +"in the other. On the negative side, using unidirectional tunnels means that\n" +"there are two sets of peers which need to be profiled and accounted for, and\n" +"additional care must be taken to address the increased speed of predecessor\n" "attacks. The tunnel pooling and building process\n" "(peer selection and ordering strategies)\n" "should minimize the worries of the predecessor attack." @@ -16433,28 +14213,22 @@ msgstr "" #, python-format msgid "" "A recent <a href=\"%(pdf)s\">paper by Hermann and Grothoff</a>\n" -"declared that I2P's unidirectional tunnels \"seems to be a bad design " -"decision\"." +"declared that I2P's unidirectional tunnels \"seems to be a bad design decision\"." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:80 msgid "" "The paper's main point is that\n" -"deanonymizations on unidirectional tunnels take a longer time, which is " -"an \n" -"advantage, but that an attacker can be more certain in the unidirectional" -" case. \n" -"Therefore, the paper claims it isn't an advantage at all, but a " -"disadvantage, at least\n" +"deanonymizations on unidirectional tunnels take a longer time, which is an \n" +"advantage, but that an attacker can be more certain in the unidirectional case. \n" +"Therefore, the paper claims it isn't an advantage at all, but a disadvantage, at least\n" "with long-living I2P Sites." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:88 msgid "" -"This conclusion is not fully supported by the paper. Unidirectional " -"tunnels clearly \n" -"mitigate other attacks and it's not clear how to trade off the risk of " -"the \n" +"This conclusion is not fully supported by the paper. Unidirectional tunnels clearly \n" +"mitigate other attacks and it's not clear how to trade off the risk of the \n" "attack in the paper\n" "with attacks on a bidirectional tunnel architecture." msgstr "" @@ -16463,63 +14237,45 @@ msgstr "" msgid "" "This conclusion is based on an arbitrary certainty vs. time weighting \n" "(tradeoff) that may not be applicable in all cases. For \n" -"example, somebody could make a list of possible IPs then issue subpoenas " -"to \n" +"example, somebody could make a list of possible IPs then issue subpoenas to \n" "each. Or the attacker could DDoS each in turn and via a simple \n" -"intersection attack see if the I2P Site goes down or is slowed down. So " -"close \n" +"intersection attack see if the I2P Site goes down or is slowed down. So close \n" "may be good enough, or time may be more important." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:104 msgid "" -"The conclusion is based on a specific weighting of the importance of " -"certainty \n" -"vs. time, and that weighting may be wrong, and it's definitely debatable," -" \n" -"especially in a real world with subpoenas, search warrants, and other " -"methods \n" +"The conclusion is based on a specific weighting of the importance of certainty \n" +"vs. time, and that weighting may be wrong, and it's definitely debatable, \n" +"especially in a real world with subpoenas, search warrants, and other methods \n" "available for final confirmation." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:111 msgid "" "A full analysis of the tradeoffs of unidirectional vs. bidirectional \n" -"tunnels is clearly outside the scope of the paper, and has not been done" -" \n" -"elsewhere. For example, how does this attack compare to the numerous " -"possible \n" -"timing attacks published about onion-routed networks? Clearly the authors" -" have not\n" +"tunnels is clearly outside the scope of the paper, and has not been done \n" +"elsewhere. For example, how does this attack compare to the numerous possible \n" +"timing attacks published about onion-routed networks? Clearly the authors have not\n" "done that analysis, if it's even possible to do it\n" "effectively." msgstr "" #: i2p2www/pages/site/docs/tunnels/unidirectional.html:120 msgid "" -"Tor uses bidirectional tunnels and has had a lot of academic review. I2P" -" \n" -"uses unidirectional tunnels and has had very little review. Does the lack" -" of a \n" -"research paper defending unidirectional tunnels mean that it is a poor " -"design \n" +"Tor uses bidirectional tunnels and has had a lot of academic review. I2P \n" +"uses unidirectional tunnels and has had very little review. Does the lack of a \n" +"research paper defending unidirectional tunnels mean that it is a poor design \n" "choice, or just that it needs more study? Timing attacks and \n" -"distributed attacks are difficult to defend against in both I2P and Tor. " -"The \n" -"design intent (see references above) was that unidirectional tunnels are " -"more \n" -"resistant to timing attacks. However, the paper presents a somewhat " -"different type of timing \n" +"distributed attacks are difficult to defend against in both I2P and Tor. The \n" +"design intent (see references above) was that unidirectional tunnels are more \n" +"resistant to timing attacks. However, the paper presents a somewhat different type of timing \n" "attack. Is this attack, innovative as it is, sufficient to label I2P's \n" "tunnel architecture (and thus I2P as a whole) a \"bad design\", and by \n" -"implication clearly inferior to Tor, or is it just a design alternative " -"that \n" -"clearly needs further investigation and analysis? There are several other" -" reasons \n" -"to consider I2P currently inferior to Tor and other projects (small " -"network \n" -"size, lack of funding, lack of review) but is unidirectional tunnels " -"really a \n" +"implication clearly inferior to Tor, or is it just a design alternative that \n" +"clearly needs further investigation and analysis? There are several other reasons \n" +"to consider I2P currently inferior to Tor and other projects (small network \n" +"size, lack of funding, lack of review) but is unidirectional tunnels really a \n" "reason?" msgstr "" @@ -16530,4 +14286,3 @@ msgid "" "tunnels are unequivocally inferior to bidirectional tunnels\", yet this \n" "conclusion is not supported by the paper." msgstr "" - diff --git a/i2p2www/translations/sq/LC_MESSAGES/get-involved.po b/i2p2www/translations/sq/LC_MESSAGES/get-involved.po index 074f931aad4e22249ef787e06424ded020061d65..60bd0d42ab6ec7c9cf06220a1fac3d8018a861c8 100644 --- a/i2p2www/translations/sq/LC_MESSAGES/get-involved.po +++ b/i2p2www/translations/sq/LC_MESSAGES/get-involved.po @@ -1,22 +1,24 @@ -# Albanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Besnik Bleta <besnik@programeshqip.org>, 2018 +# Besnik Bleta <besnik@programeshqip.org>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-04-26 14:56+0000\n" -"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n" "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: sq\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/get-involved/donate.html:2 #: i2p2www/pages/site/get-involved/index.html:107 @@ -31,12 +33,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:5 msgid "" "For almost two decades the Invisible Internet Project (I2P) has\n" -"researched and developed a transport layer and software with a focus on " -"providing\n" -"privacy and security for online communication. The Invisible Internet " -"Project\n" -"(I2P) supports the right to access. The project works to constantly " -"improve\n" +"researched and developed a transport layer and software with a focus on providing\n" +"privacy and security for online communication. The Invisible Internet Project\n" +"(I2P) supports the right to access. The project works to constantly improve\n" "its circumvention abilities and resistance." msgstr "" @@ -51,44 +50,33 @@ msgstr "" #: i2p2www/pages/site/get-involved/donate.html:16 msgid "" "\n" -"People who are concerned about their privacy and interested in " -"alternatives to the internet make use of the network and its applications" -" to chat, email, torrent and run their own sites and forums. In some " -"circumstances individuals rely on the network to communicate due to " -"safety issues or censorship. Researchers, developers and digital rights " -"defenders make use of the network as well.\n" +"People who are concerned about their privacy and interested in alternatives to the internet make use of the network and its applications to chat, email, torrent and run their own sites and forums. In some circumstances individuals rely on the network to communicate due to safety issues or censorship. Researchers, developers and digital rights defenders make use of the network as well.\n" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:20 -msgid "How Is The Invisible Internet Project Funded and How Is That Funding Used?" +msgid "" +"How Is The Invisible Internet Project Funded and How Is That Funding Used?" msgstr "" #: i2p2www/pages/site/get-involved/donate.html:22 #, python-format msgid "" -"The Invisible Internet Project (I2P) is 100% community funded. In the " -"past the Project has received a grant from DuckDuckGo, and has received " -"support from the OTF Usability Lab providers. This helped to guide " -"improvements to the Java software and website UX and information " -"architecture.\n" -"Donations support I2P maintainers server costs, and other costs " -"associated with keeping the network services up and running. Donations " -"support improving the I2P protocol, application layer, outreach and " -"design." +"The Invisible Internet Project (I2P) is 100% community funded. In the past the Project has received a grant from DuckDuckGo, and has received support from the OTF Usability Lab providers. This helped to guide improvements to the Java software and website UX and information architecture.\n" +"Donations support I2P maintainers server costs, and other costs associated with keeping the network services up and running. Donations support improving the I2P protocol, application layer, outreach and design." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:25 msgid "" -"I2P accepts donations in cryptocurrencies and via Paypal. Android users " -"may also support the project through the Google Play Store by choosing " -"the \"Donate\" edition. I2P funding is handled by meeh." +"I2P accepts donations in cryptocurrencies and via Paypal. Android users may " +"also support the project through the Google Play Store by choosing the " +"\"Donate\" edition. I2P funding is handled by meeh." msgstr "" #: i2p2www/pages/site/get-involved/donate.html:28 msgid "" -"The following addresses are valid as of June 10th, 2019. Please note that" -" any other addresses not listed here are no longer valid. Please note " -"that addresses may update and more coins may be added. " +"The following addresses are valid as of June 10th, 2019. Please note that " +"any other addresses not listed here are no longer valid. Please note that " +"addresses may update and more coins may be added. " msgstr "" #: i2p2www/pages/site/get-involved/donate.html:31 @@ -127,10 +115,8 @@ msgstr "Na tregoni rreth dhurimit tuaj" #: i2p2www/pages/site/get-involved/donate.html:55 msgid "" -"If you wish, you can inform us of your donation using the form just " -"below.\n" -"This is not a required step for your donation to succeed, but if you want" -" to\n" +"If you wish, you can inform us of your donation using the form just below.\n" +"This is not a required step for your donation to succeed, but if you want to\n" "make sure we know you're out there, get ahold of us here." msgstr "" @@ -160,10 +146,8 @@ msgstr "Ngjitës" #: i2p2www/pages/site/get-involved/donate.html:84 msgid "" -"I2P makes stickers available at conferences - please refer to the " -"official I2P\n" -"Twitter and Masdodon accounts to contact the I2P team. Stickers can also" -" be\n" +"I2P makes stickers available at conferences - please refer to the official I2P\n" +"Twitter and Masdodon accounts to contact the I2P team. Stickers can also be\n" "sent by post with your donation while supplies last." msgstr "" @@ -178,25 +162,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:5 #, python-format msgid "" -"To get involved, please feel free to join us on the forum, which is " -"available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" -"on the non-private internet and at <a " -"href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" -"inside the I2P network, or to create an account on our project Gitlab <a " -"href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a " -"href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you" -" don't want to create an account on our forum, some \n" -"of our developers are active Redditors who will talk to you on <a " -"href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" -"us also operate <a href=\"https://github.com/\">Github</a> accounts where" -" we work on I2P-Related projects, but we do not\n" +"To get involved, please feel free to join us on the forum, which is available at <a href=\"https://i2pforum.net\">i2pforum.net</a>\n" +"on the non-private internet and at <a href=\"http://i2pforum.i2p\">i2pforum.i2p</a>\n" +"inside the I2P network, or to create an account on our project Gitlab <a href=\"http://git.idk.i2p\">inside the I2P network here</a> or <a href=\"https://i2pgit.org\"> on the non-private internet here</a>. If you don't want to create an account on our forum, some \n" +"of our developers are active Redditors who will talk to you on <a href=\"https://reddit.com/r/i2p\">r/i2p</a> and many of\n" +"us also operate <a href=\"https://github.com/\">Github</a> accounts where we work on I2P-Related projects, but we do not\n" "offer official support for I2P contributions via Github.\n" -"For real-time chat, there is an IRC network within I2P. Please join the " -"#i2p-dev IRC channel (on\n" -"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, " -"irc.dg.i2p or irc.postman.i2p).\n" -"Other contact information is maintained on <a href=\"%(team)s\">this " -"page</a>." +"For real-time chat, there is an IRC network within I2P. Please join the #i2p-dev IRC channel (on\n" +"irc.freenode.net, irc.oftc.net, or within I2P on irc.echelon.i2p, irc.dg.i2p or irc.postman.i2p).\n" +"Other contact information is maintained on <a href=\"%(team)s\">this page</a>." msgstr "" #: i2p2www/pages/site/get-involved/index.html:16 @@ -222,8 +196,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:27 msgid "" -"We need help in many areas, and you don't need to know Java to " -"contribute.\n" +"We need help in many areas, and you don't need to know Java to contribute.\n" "Here's a list to help get you started." msgstr "" @@ -237,12 +210,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:34 msgid "" -"Tell people about I2P on forums, blogs, and comments to articles. Fix up " -"the\n" -"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in" -" your language</a>. Tell your friends, and more\n" -"importantly, use I2P to communicate with your friends. We have many tools" -" that\n" +"Tell people about I2P on forums, blogs, and comments to articles. Fix up the\n" +"<a href=\"https://wikipedia.org/wiki/I2P\">Wikipedia article about I2P in your language</a>. Tell your friends, and more\n" +"importantly, use I2P to communicate with your friends. We have many tools that\n" "can help you keep your private conversations private." msgstr "" @@ -253,10 +223,8 @@ msgstr "Përkthim" #: i2p2www/pages/site/get-involved/index.html:41 #, python-format msgid "" -"Help translate the website and the software into your language. " -"Translators are\n" -"a very important part of this decentralized project and your work is " -"always\n" +"Help translate the website and the software into your language. Translators are\n" +"a very important part of this decentralized project and your work is always\n" "appreciated.\n" "See the <a href=\"%(newtrans)s\">new translator's guide</a> for details." msgstr "" @@ -267,17 +235,12 @@ msgstr "Dokumentim" #: i2p2www/pages/site/get-involved/index.html:48 msgid "" -"Suggest changes to the website, or help fix the parts of the website that" -" you\n" -"notice are outdated or incomplete. Web Site development has been fully " -"migrated to\n" +"Suggest changes to the website, or help fix the parts of the website that you\n" +"notice are outdated or incomplete. Web Site development has been fully migrated to\n" "git, you can participate by creating an account on our project Gitlab\n" -"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network" -" here</a> or \n" -"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private " -"internet here</a>. We also always \n" -"appreciate our wonderful translators, join one of our Transifex teams and" -" help\n" +"<a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a> or \n" +"<a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>. We also always \n" +"appreciate our wonderful translators, join one of our Transifex teams and help\n" "translate pages into other languages." msgstr "" @@ -288,16 +251,11 @@ msgstr "Testim" #: i2p2www/pages/site/get-involved/index.html:58 #, python-format msgid "" -"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a " -"recent\n" -"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial " -"github mirror</a>\n" -"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-" -"hackers/i2p.www\">inside the I2P network here</a>\n" -"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-" -"private internet here</a>.\n" -"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still" -" acceptable." +"Run the latest builds from <a href=\"%(monotone)s\">monotone</a> or a recent\n" +"build from the <a href=\"https://github.com/i2p/i2p.i2p\">unofficial github mirror</a>\n" +"and report results on Gitlab <a href=\"http://git.idk.i2p/i2p-hackers/i2p.www\">inside the I2P network here</a>\n" +"or <a href=\"https://i2pgit.org/i2p-hackers/i2p.www\"> on the non-private internet here</a>.\n" +"For existing bugs, <a href=\"http://%(trac)s/report/1\">Trac</a> is still acceptable." msgstr "" #: i2p2www/pages/site/get-involved/index.html:67 @@ -310,14 +268,10 @@ msgstr "Shërbime" #: i2p2www/pages/site/get-involved/index.html:70 msgid "" -"Self-hosting almost anything, from an SSH server for yourself to an " -"ActivityPub\n" -"forum for everyone and anything in between, is helpful to the I2P " -"network,\n" -"especially if you write down instructions for others. Almost anything you" -" can\n" -"think of can be made to work with I2P, and your service is valuable to " -"the network." +"Self-hosting almost anything, from an SSH server for yourself to an ActivityPub\n" +"forum for everyone and anything in between, is helpful to the I2P network,\n" +"especially if you write down instructions for others. Almost anything you can\n" +"think of can be made to work with I2P, and your service is valuable to the network." msgstr "" #: i2p2www/pages/site/get-involved/index.html:76 @@ -327,9 +281,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/index.html:77 #, python-format msgid "" -"Getting new users onto the network is a very important task, and that " -"task is handled by our reseed servers. The more reseed servers we have, " -"the more de-centralized and redundant our infrastructure is. It's a big " +"Getting new users onto the network is a very important task, and that task " +"is handled by our reseed servers. The more reseed servers we have, the more " +"de-centralized and redundant our infrastructure is. It's a big " "responsibility, but it's pretty easy to set up a reseed server for new " "routers to bootstrap from. Detailed instructions are on our <a " "href=\"%(reseed)s\">reseed server page</a>." @@ -373,8 +327,7 @@ msgstr "Analizë" msgid "" "Study or test the code to look for vulnerabilities.\n" "Both anonymity vulnerabilities from the various\n" -"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other " -"weaknesses due\n" +"<a href=\"%(threatmodel)s\">threat models</a>, and DOS and other weaknesses due\n" "to security holes, benefit from ongoing research." msgstr "" @@ -382,7 +335,7 @@ msgstr "" msgid "Roadmap" msgstr "Plan" -#: i2p2www/pages/site/get-involved/roadmap.html:309 +#: i2p2www/pages/site/get-involved/roadmap.html:210 #, python-format msgid "" "Please see the <a href=\"%(todo)s\">TODO</a> list for more detailed info " @@ -443,84 +396,61 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:36 #, python-format msgid "" -"Below is a more detailed (yet still incomplete) discussion of the major " -"areas\n" -"of future development on the core I2P network, spanning the plausibly " -"planned\n" -"releases. This does not include stego transports, porting to wireless " -"devices,\n" -"or tools to secure the local machine, nor does it include client " -"applications\n" -"that will be essential in I2P's success. There are probably other things " -"that\n" -"will come up, especially as I2P gets more peer review, but these are the " -"main\n" -"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to " -"help?\n" +"Below is a more detailed (yet still incomplete) discussion of the major areas\n" +"of future development on the core I2P network, spanning the plausibly planned\n" +"releases. This does not include stego transports, porting to wireless devices,\n" +"or tools to secure the local machine, nor does it include client applications\n" +"that will be essential in I2P's success. There are probably other things that\n" +"will come up, especially as I2P gets more peer review, but these are the main\n" +"'big things'. See also <a href=\"%(roadmap)s\">the roadmap</a>. Want to help?\n" "<a href=\"%(volunteer)s\">Get involved</a>!" msgstr "" #: i2p2www/pages/site/get-involved/todo.html:53 msgid "" -"Within the current network database and profile management " -"implementation, \n" +"Within the current network database and profile management implementation, \n" "we have taken the liberty of some practical shortcuts. For instance, we \n" "don't have the code to drop peer references from the K-buckets, as we \n" "don't have enough peers to even plausibly fill any of them, so instead, \n" -"we just keep the peers in whatever bucket is appropriate. Another example" -" \n" -"deals with the peer profiles - the memory required to maintain each " -"peer's \n" -"profile is small enough that we can keep thousands of full blown profiles" -" \n" +"we just keep the peers in whatever bucket is appropriate. Another example \n" +"deals with the peer profiles - the memory required to maintain each peer's \n" +"profile is small enough that we can keep thousands of full blown profiles \n" "in memory without problems. While we have the capacity to use trimmed \n" "down profiles (which we can maintain 100s of thousands in memory), we \n" -"don't have any code to deal with moving a profile from a \"minimal " -"profile\" \n" -"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to" -" simply \n" +"don't have any code to deal with moving a profile from a \"minimal profile\" \n" +"to a \"full profile\", a \"full profile\" to a \"minimal profile\", or to simply \n" "eject a profile altogether. It just wouldn't be practical to write that \n" "code yet, since we aren't going to need it for a while." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:68 msgid "" -"That said, as the network grows we are going to want to keep these " -"considerations \n" +"That said, as the network grows we are going to want to keep these considerations \n" "in mind. We will have some work to do, but we can put it off for later." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:80 msgid "" -"The restricted route functionality described before was simply a " -"functional \n" +"The restricted route functionality described before was simply a functional \n" "issue - how to let peers who would not otherwise be able to communicate \n" -"do so. However, the concept of allowing restricted routes includes " -"additional \n" -"capabilities. For instance, if a router absolutely cannot risk " -"communicating \n" -"directly with any untrusted peers, they can set up trusted links through" -" \n" +"do so. However, the concept of allowing restricted routes includes additional \n" +"capabilities. For instance, if a router absolutely cannot risk communicating \n" +"directly with any untrusted peers, they can set up trusted links through \n" "those peers, using them to both send and receive all of its messages. \n" "Those hidden peers who want to be completely isolated would also refuse \n" "to connect to peers who attempt to get them to (as demonstrated by the \n" -"garlic routing technique outlined before) - they can simply take the " -"garlic \n" +"garlic routing technique outlined before) - they can simply take the garlic \n" "clove that has a request for delivery to a particular peer and tunnel \n" -"route that message out one of the hidden peer's trusted links with " -"instructions \n" +"route that message out one of the hidden peer's trusted links with instructions \n" "to forward it as requested." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:99 #, python-format msgid "" -"Within the network, we will want some way to deter people from consuming" -" \n" -"too many resources or from creating so many peers to mount a <a " -"href=\"%(link)s\">Sybil</a> \n" -"attack. Traditional techniques such as having a peer see who is " -"requesting \n" +"Within the network, we will want some way to deter people from consuming \n" +"too many resources or from creating so many peers to mount a <a href=\"%(link)s\">Sybil</a> \n" +"attack. Traditional techniques such as having a peer see who is requesting \n" "a resource or running a peer aren't appropriate for use within I2P, as \n" "doing so would compromise the anonymity of the system. Instead, we want \n" "to make certain requests \"expensive\"." @@ -529,17 +459,12 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:107 msgid "" "<a href=\"http://www.hashcash.org/\">Hashcash</a> is one technique that \n" -"we can use to anonymously increase the \"cost\" of doing certain " -"activities, \n" -"such as creating a new router identity (done only once on installation)," -" \n" +"we can use to anonymously increase the \"cost\" of doing certain activities, \n" +"such as creating a new router identity (done only once on installation), \n" "creating a new destination (done only once when creating a service), or \n" -"requesting that a peer participate in a tunnel (done often, perhaps 2-300" -" \n" -"times per hour). We don't know the \"correct\" cost of each type of " -"certificate \n" -"yet, but with some research and experimentation, we could set a base " -"level \n" +"requesting that a peer participate in a tunnel (done often, perhaps 2-300 \n" +"times per hour). We don't know the \"correct\" cost of each type of certificate \n" +"yet, but with some research and experimentation, we could set a base level \n" "that is sufficiently expensive while not an excessive burden for people \n" "with few resources." msgstr "" @@ -547,29 +472,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/todo.html:118 msgid "" "There are a few other algorithms that we can explore for making those \n" -"requests for resources \"nonfree\", and further research on that front is" -" \n" +"requests for resources \"nonfree\", and further research on that front is \n" "appropriate." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:128 #, python-format msgid "" -"To powerful passive external observers as well as large colluding " -"internal \n" -"observers, standard tunnel routing is vulnerable to traffic analysis " -"attacks \n" -"- simply watching the size and frequency of messages being passed between" -" \n" +"To powerful passive external observers as well as large colluding internal \n" +"observers, standard tunnel routing is vulnerable to traffic analysis attacks \n" +"- simply watching the size and frequency of messages being passed between \n" "routers. To defend against these, we will want to essentially turn some \n" "of the tunnels into its own mix cascade - delaying messages received at \n" "the gateway and passing them in batches, reordering them as necessary, \n" -"and injecting dummy messages (indistinguishable from other \"real\" " -"tunnel \n" +"and injecting dummy messages (indistinguishable from other \"real\" tunnel \n" "messages by peers in the path). There has been a significant amount of \n" "<a href=\"%(pdf)s\">research</a> \n" -"on these algorithms that we can lean on prior to implementing the various" -" \n" +"on these algorithms that we can lean on prior to implementing the various \n" "tunnel mixing strategies." msgstr "" @@ -577,42 +496,33 @@ msgstr "" msgid "" "In addition to the anonymity aspects of more varied tunnel operation, \n" "there is a functional dimension as well. Each peer only has a certain \n" -"amount of data they can route for the network, and to keep any particular" -" \n" +"amount of data they can route for the network, and to keep any particular \n" "tunnel from consuming an unreasonable portion of that bandwidth, they \n" -"will want to include some throttles on the tunnel. For instance, a tunnel" -" \n" +"will want to include some throttles on the tunnel. For instance, a tunnel \n" "may be configured to throttle itself after passing 600 messages (1 per \n" "second), 2.4MB (4KBps), or exceeding some moving average (8KBps for the \n" "last minute). Excess messages may be delayed or summarily dropped. With \n" -"this sort of throttling, peers can provide ATM-like QoS support for their" -" \n" +"this sort of throttling, peers can provide ATM-like QoS support for their \n" "tunnels, refusing to agree to allocate more bandwidth than the peer has \n" "available." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:154 msgid "" -"In addition, we may want to implement code to dynamically reroute tunnels" -" \n" +"In addition, we may want to implement code to dynamically reroute tunnels \n" "to avoid failed peers or to inject additional hops into the path. This \n" -"can be done by garlic routing a message to any particular peer in a " -"tunnel \n" +"can be done by garlic routing a message to any particular peer in a tunnel \n" "with instructions to redefine the next-hop in the tunnel." msgstr "" #: i2p2www/pages/site/get-involved/todo.html:165 msgid "" "Beyond the per-tunnel batching and mixing strategy, there are further \n" -"capabilities for protecting against powerful attackers, such as allowing" -" \n" +"capabilities for protecting against powerful attackers, such as allowing \n" "each step in a garlic routed path to define a delay or window in which \n" -"it should be forwarded on. This would enable protections against the long" -" \n" -"term intersection attack, as a peer could send a message that looks " -"perfectly \n" -"standard to most peers that pass it along, except at any peers where the" -" \n" +"it should be forwarded on. This would enable protections against the long \n" +"term intersection attack, as a peer could send a message that looks perfectly \n" +"standard to most peers that pass it along, except at any peers where the \n" "clove exposed includes delay instructions." msgstr "" @@ -656,72 +566,52 @@ msgstr "Filloni të zhvilloni - një udhërrëfyes i thjeshtë" msgid "" "There are multiple ways to use applications in I2P.\n" "Using <a href=\"%(i2ptunnel)s\">I2PTunnel</a>,\n" -"you can use regular applications without needing to program explicit I2P " -"support.\n" +"you can use regular applications without needing to program explicit I2P support.\n" "This is very effective for client-server scenario's,\n" "where you need to connect to a single website.\n" -"You can simply create a tunnel using I2PTunnel to connect to that " -"website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." +"You can simply create a tunnel using I2PTunnel to connect to that website, as shown in <a href=\"#tunnel.serverclient\">Figure 1</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:25 msgid "" -"If your application is distributed, it will require connections to a " -"large amount of peers.\n" -"Using I2PTunnel, you will need to create a new tunnel for each peer you " -"want to contact,\n" +"If your application is distributed, it will require connections to a large amount of peers.\n" +"Using I2PTunnel, you will need to create a new tunnel for each peer you want to contact,\n" "as shown in <a href=\"#tunnel.peertopeer\">Figure 2</a>.\n" -"This process can of course be automated, but running a lot of I2PTunnel " -"instances creates a large amount of overhead.\n" +"This process can of course be automated, but running a lot of I2PTunnel instances creates a large amount of overhead.\n" "In addition, with many protocols you will need to force everyone to \n" -"use the same set of ports for all peers - e.g. if you want to reliably " -"run DCC \n" -"chat, everyone needs to agree that port 10001 is Alice, port 10002 is " -"Bob, port \n" -"10003 is Charlie, and so on, since the protocol includes TCP/IP specific " -"information\n" +"use the same set of ports for all peers - e.g. if you want to reliably run DCC \n" +"chat, everyone needs to agree that port 10001 is Alice, port 10002 is Bob, port \n" +"10003 is Charlie, and so on, since the protocol includes TCP/IP specific information\n" "(host and port)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:36 msgid "" -"General network applications often send a lot of additional data that " -"could be used to identify users.\n" -"Hostnames, port numbers, time zones, character sets, etc. are often sent " -"without informing the user.\n" -"As such, designing the network protocol specifically with anonymity in " -"mind\n" +"General network applications often send a lot of additional data that could be used to identify users.\n" +"Hostnames, port numbers, time zones, character sets, etc. are often sent without informing the user.\n" +"As such, designing the network protocol specifically with anonymity in mind\n" "can avoid compromising user identities." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:42 msgid "" -"There are also efficiency considerations to review when determining how " -"to \n" -"interact on top of I2P. The streaming library and things built on top of" -" it\n" -"operate with handshakes similar to TCP, while the core I2P protocols " -"(I2NP and I2CP)\n" -"are strictly message based (like UDP or in some instances raw IP). The " -"important\n" -"distinction is that with I2P, communication is operating over a long fat " -"network - \n" -"each end to end message will have nontrivial latencies, but may contain " -"payloads \n" -"of up to several KB. An application that needs a simple request and " -"response can get rid\n" -"of any state and drop the latency incurred by the startup and teardown " -"handshakes\n" -"by using (best effort) datagrams without having to worry about MTU " -"detection or \n" +"There are also efficiency considerations to review when determining how to \n" +"interact on top of I2P. The streaming library and things built on top of it\n" +"operate with handshakes similar to TCP, while the core I2P protocols (I2NP and I2CP)\n" +"are strictly message based (like UDP or in some instances raw IP). The important\n" +"distinction is that with I2P, communication is operating over a long fat network - \n" +"each end to end message will have nontrivial latencies, but may contain payloads \n" +"of up to several KB. An application that needs a simple request and response can get rid\n" +"of any state and drop the latency incurred by the startup and teardown handshakes\n" +"by using (best effort) datagrams without having to worry about MTU detection or \n" "fragmentation of messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:56 #: i2p2www/pages/site/get-involved/develop/applications.html:58 msgid "" -"Creating a server-client connection using I2PTunnel only requires " -"creating a single tunnel." +"Creating a server-client connection using I2PTunnel only requires creating a" +" single tunnel." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:58 @@ -731,8 +621,8 @@ msgstr "Figura 1:" #: i2p2www/pages/site/get-involved/develop/applications.html:63 #: i2p2www/pages/site/get-involved/develop/applications.html:65 msgid "" -"Setting up connections for a peer-to-peer applications requires a very " -"large amount of tunnels." +"Setting up connections for a peer-to-peer applications requires a very large" +" amount of tunnels." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:65 @@ -745,33 +635,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:73 msgid "" -"Creating a large amount of I2PTunnel instances consumes a non-trivial " -"amount of resources,\n" -"which is problematic for distributed applications (a new tunnel is " -"required for each peer)." +"Creating a large amount of I2PTunnel instances consumes a non-trivial amount of resources,\n" +"which is problematic for distributed applications (a new tunnel is required for each peer)." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:77 msgid "" -"General network protocols often send a lot of additional data that can be" -" used to identify users.\n" -"Programming specifically for I2P allows the creation of a network " -"protocol\n" +"General network protocols often send a lot of additional data that can be used to identify users.\n" +"Programming specifically for I2P allows the creation of a network protocol\n" "that does not leak such information, keeping users anonymous and secure." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:82 msgid "" -"Network protocols designed for use on the regular internet can be " -"inefficient\n" +"Network protocols designed for use on the regular internet can be inefficient\n" "on I2P, which is a network with a much higher latency." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:89 #, python-format msgid "" -"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for" -" developers\n" +"I2P supports a standard <a href=\"%(plugins)s\">plugins interface</a> for developers\n" "so that applications may be easily integrated and distributed." msgstr "" @@ -792,76 +676,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:109 msgid "" -"An application running on I2P sends messages from and receives messages " -"to a\n" -"unique cryptographically secure end point - a \"destination\". In TCP or" -" UDP\n" -"terms, a destination could (largely) be considered the equivalent of a " -"hostname\n" +"An application running on I2P sends messages from and receives messages to a\n" +"unique cryptographically secure end point - a \"destination\". In TCP or UDP\n" +"terms, a destination could (largely) be considered the equivalent of a hostname\n" "plus port number pair, though there are a few differences." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:117 msgid "" -"An I2P destination itself is a cryptographic construct - all data sent to" -" one is \n" -"encrypted as if there were universal deployment of IPsec with the " -"(anonymized)\n" -"location of the end point signed as if there were universal deployment of" -" DNSSEC." +"An I2P destination itself is a cryptographic construct - all data sent to one is \n" +"encrypted as if there were universal deployment of IPsec with the (anonymized)\n" +"location of the end point signed as if there were universal deployment of DNSSEC." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:122 msgid "" -"I2P destinations are mobile identifiers - they can be moved from one I2P " -"router\n" -"to another (or it can even \"multihome\" - operate on multiple routers at" -"\n" -"once). This is quite different from the TCP or UDP world where a single " -"end point (port)\n" +"I2P destinations are mobile identifiers - they can be moved from one I2P router\n" +"to another (or it can even \"multihome\" - operate on multiple routers at\n" +"once). This is quite different from the TCP or UDP world where a single end point (port)\n" "must stay on a single host." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:129 msgid "" -"I2P destinations are ugly and large - behind the scenes, they contain a " -"2048 bit ElGamal\n" -"public key for encryption, a 1024 bit DSA public key for signing, and a " -"variable size \n" +"I2P destinations are ugly and large - behind the scenes, they contain a 2048 bit ElGamal\n" +"public key for encryption, a 1024 bit DSA public key for signing, and a variable size \n" "certificate, which may contain proof of work or blinded data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:134 #, python-format msgid "" -"There are existing ways to refer to these large and ugly destinations by " -"short\n" -"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not " -"guarantee\n" -"globally uniqueness (since they're stored locally in a database on each " -"person's machine)\n" -"and the current mechanism is not especially scalable nor secure (updates " -"to the host list are\n" +"There are existing ways to refer to these large and ugly destinations by short\n" +"and pretty names (e.g. \"irc.duck.i2p\"), but those techniques do not guarantee\n" +"globally uniqueness (since they're stored locally in a database on each person's machine)\n" +"and the current mechanism is not especially scalable nor secure (updates to the host list are\n" "managed using \"subscriptions\" to naming services).\n" "There may be some secure, human readable, scalable, and globally \n" -"unique, naming system some day, but applications shouldn't depend upon it" -" being in place,\n" +"unique, naming system some day, but applications shouldn't depend upon it being in place,\n" "since there are those who don't think such a beast is possible.\n" -"<a href=\"%(naming)s\">Further information on the naming system</a> is " -"available." +"<a href=\"%(naming)s\">Further information on the naming system</a> is available." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:148 #, python-format msgid "" "While most applications do not need to distinguish protocols and ports,\n" -"I2P <em>does</em> support them. Complex applications may specify a " -"protocol,\n" +"I2P <em>does</em> support them. Complex applications may specify a protocol,\n" "from port, and to port, on a per-message basis, to multiplex traffic on\n" "a single destination.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" -"Simple applications operate by listening for \"all protocols\" on \"all " -"ports\" of a destination." +"Simple applications operate by listening for \"all protocols\" on \"all ports\" of a destination." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:157 @@ -871,25 +736,18 @@ msgstr "Anonimitet dhe fshehtësi" #: i2p2www/pages/site/get-involved/develop/applications.html:159 msgid "" "I2P has transparent end to end encryption\n" -"and authentication for all data passed over the network - if Bob sends to" -" Alice's destination,\n" -"only Alice's destination can receive it, and if Bob is using the " -"datagrams or streaming \n" -"library, Alice knows for certain that Bob's destination is the one who " -"sent the data." +"and authentication for all data passed over the network - if Bob sends to Alice's destination,\n" +"only Alice's destination can receive it, and if Bob is using the datagrams or streaming \n" +"library, Alice knows for certain that Bob's destination is the one who sent the data." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:166 msgid "" "Of course, I2P transparently anonymizes the\n" -"data sent between Alice and Bob, but it does nothing to anonymize the " -"content of what they\n" -"send. For instance, if Alice sends Bob a form with her full name, " -"government IDs, and \n" -"credit card numbers, there is nothing I2P can do. As such, protocols and" -" applications should \n" -"keep in mind what information they are trying to protect and what " -"information they are willing\n" +"data sent between Alice and Bob, but it does nothing to anonymize the content of what they\n" +"send. For instance, if Alice sends Bob a form with her full name, government IDs, and \n" +"credit card numbers, there is nothing I2P can do. As such, protocols and applications should \n" +"keep in mind what information they are trying to protect and what information they are willing\n" "to expose." msgstr "" @@ -900,29 +758,21 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:177 #, python-format msgid "" -"Applications that use I2P datagrams (either raw or repliable ones) can " -"essentially be thought\n" -"of in terms of UDP - the datagrams are unordered, best effort, and " -"connectionless - but unlike\n" -"UDP, applications don't need to worry about MTU detection and can simply " -"fire off large datagrams.\n" -"While the upper limit is nominally 32 KB, the message is fragmented for " -"transport, thus dropping\n" -"the reliability of the whole. Datagrams over about 10 KB are not " -"currently recommended.\n" +"Applications that use I2P datagrams (either raw or repliable ones) can essentially be thought\n" +"of in terms of UDP - the datagrams are unordered, best effort, and connectionless - but unlike\n" +"UDP, applications don't need to worry about MTU detection and can simply fire off large datagrams.\n" +"While the upper limit is nominally 32 KB, the message is fragmented for transport, thus dropping\n" +"the reliability of the whole. Datagrams over about 10 KB are not currently recommended.\n" "See the <a href=\"%(datagrams)s\">datagram page</a> for details.\n" "For many applications, 10 KB of data is sufficient for an\n" -"entire request or response, allowing them to transparently operate in I2P" -" as a UDP-like \n" +"entire request or response, allowing them to transparently operate in I2P as a UDP-like \n" "application without having to write fragmentation, resends, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:191 msgid "" -"There are several means of sending data over I2P, each with their own " -"pros and cons.\n" -"The streaming lib is the recommended interface, used by the majority of " -"I2P applications." +"There are several means of sending data over I2P, each with their own pros and cons.\n" +"The streaming lib is the recommended interface, used by the majority of I2P applications." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:196 @@ -932,10 +782,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:197 #, python-format msgid "" -"The <a href=\"%(streaming)s\">full streaming library</a> is now the " -"standard\n" -"interface. It allows programming using TCP-like sockets, as explained in " -"the <a href=\"#start.streaming\">Streaming development guide</a>." +"The <a href=\"%(streaming)s\">full streaming library</a> is now the standard\n" +"interface. It allows programming using TCP-like sockets, as explained in the <a href=\"#start.streaming\">Streaming development guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:203 @@ -943,13 +791,10 @@ msgstr "" msgid "" "BOB is the <a href=\"%(bob)s\">Basic Open Bridge</a>,\n" "allowing an application in any language to make streaming connections \n" -"to and from I2P. At this point in time it lacks UDP support, but UDP " -"support\n" +"to and from I2P. At this point in time it lacks UDP support, but UDP support\n" "is planned in the near future. BOB also contains several tools, such as \n" -"destination key generation, and verification that an address conforms to" -" \n" -"I2P specifications. Up to date info and applications that use BOB can be" -" \n" +"destination key generation, and verification that an address conforms to \n" +"I2P specifications. Up to date info and applications that use BOB can be \n" "found at this <a href=\"http://%(boburl)s/\">I2P Site</a>." msgstr "" @@ -960,43 +805,36 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:217 #, python-format msgid "" -"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, " -"allowing an\n" -"application written in any language to talk to a SAM bridge through a " -"plain TCP socket and have\n" -"that bridge multiplex all of its I2P traffic, transparently coordinating " -"the encryption/decryption\n" +"SAM is the <a href=\"%(sam)s\">Simple Anonymous Messaging</a> protocol, allowing an\n" +"application written in any language to talk to a SAM bridge through a plain TCP socket and have\n" +"that bridge multiplex all of its I2P traffic, transparently coordinating the encryption/decryption\n" "and event based handling. SAM supports three styles of operation:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:224 msgid "" -"streams, for when Alice and Bob want to send data to each other reliably " -"and in order" +"streams, for when Alice and Bob want to send data to each other reliably and" +" in order" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:227 msgid "" -"repliable datagrams, for when Alice wants to send Bob a message that Bob " -"can reply to" +"repliable datagrams, for when Alice wants to send Bob a message that Bob can" +" reply to" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:230 msgid "" -"raw datagrams, for when Alice wants to squeeze the most bandwidth and " -"performance as possible,\n" -"and Bob doesn't care whether the data's sender is authenticated or not " -"(e.g. the data transferred\n" +"raw datagrams, for when Alice wants to squeeze the most bandwidth and performance as possible,\n" +"and Bob doesn't care whether the data's sender is authenticated or not (e.g. the data transferred\n" "is self authenticating)" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:236 msgid "" "SAM V3 aims at the same goal as SAM and SAM V2, but does not require\n" -"multiplexing/demultiplexing. Each I2P stream is handled by its own socket" -" between the application\n" -"and the SAM bridge. Besides, datagrams can be sent and received by the " -"application through datagram\n" +"multiplexing/demultiplexing. Each I2P stream is handled by its own socket between the application\n" +"and the SAM bridge. Besides, datagrams can be sent and received by the application through datagram\n" "communications with the SAM bridge." msgstr "" @@ -1011,28 +849,20 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:251 msgid "" -"The I2PTunnel application allows applications to build specific TCP-like " -"tunnels to peers \n" -"by creating either I2PTunnel 'client' applications (which listen on a " -"specific port and connect\n" -"to a specific I2P destination whenever a socket to that port is opened) " -"or I2PTunnel 'server'\n" -"applications (which listen to a specific I2P destination and whenever it " -"gets a new I2P \n" -"connection it outproxies to a specific TCP host/port). These streams are" -" 8-bit clean, and are\n" -"authenticated and secured through the same streaming library that SAM " -"uses, but there is a \n" -"nontrivial overhead involved with creating multiple unique I2PTunnel " -"instances, since each have\n" +"The I2PTunnel application allows applications to build specific TCP-like tunnels to peers \n" +"by creating either I2PTunnel 'client' applications (which listen on a specific port and connect\n" +"to a specific I2P destination whenever a socket to that port is opened) or I2PTunnel 'server'\n" +"applications (which listen to a specific I2P destination and whenever it gets a new I2P \n" +"connection it outproxies to a specific TCP host/port). These streams are 8-bit clean, and are\n" +"authenticated and secured through the same streaming library that SAM uses, but there is a \n" +"nontrivial overhead involved with creating multiple unique I2PTunnel instances, since each have\n" "their own unique I2P destination and their own set of tunnels, keys, etc." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:263 msgid "" "I2P supports a SOCKS V4 and V5 proxy.\n" -"Outbound connections work well. Inbound (server) and UDP functionality " -"may be incomplete\n" +"Outbound connections work well. Inbound (server) and UDP functionality may be incomplete\n" "and untested." msgstr "" @@ -1043,8 +873,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:271 msgid "" "There used to be a simple \"ministreaming\" library,\n" -"but now ministreaming.jar contains only the interfaces for the full " -"streaming library." +"but now ministreaming.jar contains only the interfaces for the full streaming library." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:276 @@ -1058,8 +887,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:278 #, python-format msgid "" -"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-" -"like packets.\n" +"The <a href=\"%(datagrams)s\">Datagram library</a> allows sending UDP-like packets.\n" "It's possible to use:" msgstr "" @@ -1078,14 +906,10 @@ msgstr "Jo të këshilluara" #: i2p2www/pages/site/get-involved/develop/applications.html:289 #, python-format msgid "" -"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, " -"but to implement an I2CP library \n" -"in something other than Java there is a significant amount of code to be " -"written (encryption routines, \n" -"object marshalling, asynchronous message handling, etc). While someone " -"could write an I2CP library in \n" -"C or something else, it would most likely be more useful to use the C SAM" -" library instead." +"<a href=\"%(i2cp)s\">I2CP</a> itself is a language independent protocol, but to implement an I2CP library \n" +"in something other than Java there is a significant amount of code to be written (encryption routines, \n" +"object marshalling, asynchronous message handling, etc). While someone could write an I2CP library in \n" +"C or something else, it would most likely be more useful to use the C SAM library instead." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:296 @@ -1094,17 +918,14 @@ msgstr "Aplikacione Web" #: i2p2www/pages/site/get-involved/develop/applications.html:297 msgid "" -"I2P comes with the Jetty webserver, and configuring to use the Apache " -"server instead is straightforward.\n" +"I2P comes with the Jetty webserver, and configuring to use the Apache server instead is straightforward.\n" "Any standard web app technology should work." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:303 msgid "" -"Developing using I2P requires a working I2P installation and a " -"development environment of your own choice.\n" -"If you are using Java, you can start development with the <a " -"href=\"#start.streaming\">streaming library</a> or datagram library.\n" +"Developing using I2P requires a working I2P installation and a development environment of your own choice.\n" +"If you are using Java, you can start development with the <a href=\"#start.streaming\">streaming library</a> or datagram library.\n" "Using another programming language, SAM or BOB can be used." msgstr "" @@ -1114,8 +935,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:311 msgid "" -"The following example shows how to create TCP-like client and server " -"applications\n" +"The following example shows how to create TCP-like client and server applications\n" "using the streaming library." msgstr "" @@ -1137,32 +957,25 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:325 msgid "" -"You can fetch these from an I2P installation, or add the following " -"dependencies\n" +"You can fetch these from an I2P installation, or add the following dependencies\n" "from Maven Central:" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:334 msgid "" "Network communication requires the usage of I2P network sockets.\n" -"To demonstrate this, we will create an application where a client can " -"send text messages to a server,\n" -"who will print the messages and send them back to the client. In other " -"words, the server will function as an echo." +"To demonstrate this, we will create an application where a client can send text messages to a server,\n" +"who will print the messages and send them back to the client. In other words, the server will function as an echo." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:339 msgid "" -"We will start by initializing the server application. This requires " -"getting an I2PSocketManager\n" +"We will start by initializing the server application. This requires getting an I2PSocketManager\n" "and creating an I2PServerSocket.\n" -"We will not provide the I2PSocketManagerFactory with the saved keys for " -"an existing Destination,\n" +"We will not provide the I2PSocketManagerFactory with the saved keys for an existing Destination,\n" "so it will create a new Destination for us.\n" -"So we will ask the I2PSocketManager for an I2PSession, so we can find out" -" the Destination that\n" -"was created, as we will need to copy and paste that information later so " -"the client can connect to us." +"So we will ask the I2PSocketManager for an I2PSession, so we can find out the Destination that\n" +"was created, as we will need to copy and paste that information later so the client can connect to us." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:370 @@ -1171,47 +984,39 @@ msgstr "Shembull kodi 1: gatitja e aplikacionit shërbyes." #: i2p2www/pages/site/get-involved/develop/applications.html:372 msgid "" -"Once we have an I2PServerSocket, we can create I2PSocket instances to " -"accept connections from clients.\n" -"In this example, we will create a single I2PSocket instance, that can " -"only handle one client at a time.\n" +"Once we have an I2PServerSocket, we can create I2PSocket instances to accept connections from clients.\n" +"In this example, we will create a single I2PSocket instance, that can only handle one client at a time.\n" "A real server would have to be able to handle multiple clients.\n" -"To do this, multiple I2PSocket instances would have to be created, each " -"in separate threads.\n" -"Once we have created the I2PSocket instance, we read data, print it and " -"send it back to the client.\n" +"To do this, multiple I2PSocket instances would have to be created, each in separate threads.\n" +"Once we have created the I2PSocket instance, we read data, print it and send it back to the client.\n" "The bold code is the new code we add." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:456 -msgid "Code example 2: accepting connections from clients and handling messages." +msgid "" +"Code example 2: accepting connections from clients and handling messages." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:460 msgid "" -"When you run the above server code, it should print something like this " -"(but without the line endings, it should just be\n" +"When you run the above server code, it should print something like this (but without the line endings, it should just be\n" "one huge block of characters):" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:474 msgid "" -"This is the base64-representation of the server Destination. The client " -"will need this string to reach the server." +"This is the base64-representation of the server Destination. The client will" +" need this string to reach the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:478 msgid "" -"Now, we will create the client application. Again, a number of steps are " -"required for initialization.\n" +"Now, we will create the client application. Again, a number of steps are required for initialization.\n" "Again, we will need to start by getting an I2PSocketManager.\n" "We won't use an I2PSession and an I2PServerSocket this time.\n" -"Instead, we will use the server Destination string to start our " -"connection.\n" -"We will ask the user for the Destination string, and create an I2PSocket " -"using this string.\n" -"Once we have an I2PSocket, we can start sending and receiving data to and" -" from the server." +"Instead, we will use the server Destination string to start our connection.\n" +"We will ask the user for the Destination string, and create an I2PSocket using this string.\n" +"Once we have an I2PSocket, we can start sending and receiving data to and from the server." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:562 @@ -1223,12 +1028,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:564 msgid "" "Finally, you can run both the server and the client application.\n" -"First, start the server application. It will print a Destination string " -"(like shown <a href=\"#start.streaming.destination\">above</a>).\n" -"Next, start the client application. When it requests a Destination " -"string, you can enter the string printed by the server.\n" -"The client will then send 'Hello I2P!' (along with a newline) to the " -"server, who will print the message and send it back to the client." +"First, start the server application. It will print a Destination string (like shown <a href=\"#start.streaming.destination\">above</a>).\n" +"Next, start the client application. When it requests a Destination string, you can enter the string printed by the server.\n" +"The client will then send 'Hello I2P!' (along with a newline) to the server, who will print the message and send it back to the client." msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:570 @@ -1253,8 +1055,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:601 msgid "" -"Jabber server - there have been some in the past, and there is one at the" -" moment, with access to the public internet" +"Jabber server - there have been some in the past, and there is one at the " +"moment, with access to the public internet" msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:604 @@ -1273,8 +1075,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/applications.html:614 msgid "" -"Web-based applications - The sky is the limit for hosting web-server-" -"based\n" +"Web-based applications - The sky is the limit for hosting web-server-based\n" "applications such as blogs, pastebins, storage, tracking, feeds, etc.\n" "Any web or CGI technology such as Perl, PHP, Python, or Ruby will work." msgstr "" @@ -1303,20 +1104,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:9 msgid "" -"<a href=\"#transport\">Transport Keys</a> to push changes to remote " -"servers." +"<a href=\"#transport\">Transport Keys</a> to push changes to remote servers." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:12 #, python-format msgid "" "Everyone that uses Monotone to checkout the I2P codebase will need to\n" -"<a href=\"%(monotone)s#obtaining-and-deploying-developers-" -"keys\">import</a> the\n" -"developer commit keys, but only Monotone <a " -"href=\"%(monotone)s#operating-a-monotone-server\">\n" -"server operators</a> will need to import the <a " -"href=\"#transport\">transport keys</a>." +"<a href=\"%(monotone)s#obtaining-and-deploying-developers-keys\">import</a> the\n" +"developer commit keys, but only Monotone <a href=\"%(monotone)s#operating-a-monotone-server\">\n" +"server operators</a> will need to import the <a href=\"#transport\">transport keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/develop/developers-keys.html:19 @@ -1341,9 +1138,7 @@ msgstr "Marrëveshje Licencimi" #: i2p2www/pages/site/get-involved/develop/license-agreements.html:5 #, python-format msgid "For more information see <a href=\"%(licenses)s\">the licenses page</a>." -msgstr "" -"Për më tepër të dhëna, shihni <a href=\"%(licenses)s\">faqen e " -"licencave</a>." +msgstr "Për më tepër të dhëna, shihni <a href=\"%(licenses)s\">faqen e licencave</a>." #: i2p2www/pages/site/get-involved/develop/license-agreements.html:8 msgid "" @@ -1390,8 +1185,7 @@ msgstr "përdorim pa tarifë" #: i2p2www/pages/site/get-involved/develop/licenses.html:24 msgid "" -"use with no restrictions on how, when, where, why, or by whom is running " -"it" +"use with no restrictions on how, when, where, why, or by whom is running it" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:25 @@ -1404,24 +1198,15 @@ msgstr "modifikime te burimi" #: i2p2www/pages/site/get-involved/develop/licenses.html:29 msgid "" -"Most of the software guarantees much more - the ability of <b>anyone</b> " -"to \n" -"distribute the modified source however they choose. However, not all of " -"the \n" -"software bundled provides this freedom - the GPL restricts the ability of" -" \n" -"developers who wish to integrate I2P with their own applications that are" -" not \n" -"themselves open source applications. While we applaud the noble goals of" -" \n" -"increasing the resources in the commons, I2P is best served by removing " -"any\n" -"barriers that stand in the way of its adoption - if a developer " -"considering whether\n" -"they can integrate I2P with their application has to stop and check with " -"their lawyer,\n" -"or conduct a code audit to make sure their own source can be released as " -"GPL-compatible,\n" +"Most of the software guarantees much more - the ability of <b>anyone</b> to \n" +"distribute the modified source however they choose. However, not all of the \n" +"software bundled provides this freedom - the GPL restricts the ability of \n" +"developers who wish to integrate I2P with their own applications that are not \n" +"themselves open source applications. While we applaud the noble goals of \n" +"increasing the resources in the commons, I2P is best served by removing any\n" +"barriers that stand in the way of its adoption - if a developer considering whether\n" +"they can integrate I2P with their application has to stop and check with their lawyer,\n" +"or conduct a code audit to make sure their own source can be released as GPL-compatible,\n" "we lose out." msgstr "" @@ -1431,22 +1216,14 @@ msgstr "Licenca përbërësish" #: i2p2www/pages/site/get-involved/develop/licenses.html:43 msgid "" -"The I2P distribution contains several resources, reflecting the " -"partitioning of \n" -"the source code into components. Each component has its own license, " -"which all \n" -"developers who contribute to it agree to - either by explicitly declaring" -" the release\n" -"of code committed under a license compatible with that component, or by " -"implicitly\n" -"releasing the code committed under the component's primary license. Each" -" of these \n" -"components has a lead developer who has the final say as to what license " -"is compatible\n" -"with the component's primary license, and the I2P project manager has the" -" final say as\n" -"to what licenses meet the above four guarantees for inclusion in the I2P " -"distribution." +"The I2P distribution contains several resources, reflecting the partitioning of \n" +"the source code into components. Each component has its own license, which all \n" +"developers who contribute to it agree to - either by explicitly declaring the release\n" +"of code committed under a license compatible with that component, or by implicitly\n" +"releasing the code committed under the component's primary license. Each of these \n" +"components has a lead developer who has the final say as to what license is compatible\n" +"with the component's primary license, and the I2P project manager has the final say as\n" +"to what licenses meet the above four guarantees for inclusion in the I2P distribution." msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:56 @@ -1482,21 +1259,16 @@ msgstr "Përjashtim GPL + Java" msgid "" "While it may be redundant, just for clarity the\n" "<a href=\"%(gpl)s\">GPL</a>'ed code included within\n" -"I2PTunnel and other apps must be released under the GPL with an " -"additional \"exception\"\n" +"I2PTunnel and other apps must be released under the GPL with an additional \"exception\"\n" "explicitly authorizing the use of Java's standard libraries:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:292 msgid "" -"All source code under each component will by default be licensed under " -"the\n" -"primary license, unless marked otherwise in the code. All of the above " -"is\n" -"summary of the license terms - please see the specific license for the " -"component\n" -"or source code in question for authoritative terms. Component source " -"locations and\n" +"All source code under each component will by default be licensed under the\n" +"primary license, unless marked otherwise in the code. All of the above is\n" +"summary of the license terms - please see the specific license for the component\n" +"or source code in question for authoritative terms. Component source locations and\n" "resource packaging may be changed if the repository is reorganized." msgstr "" @@ -1520,10 +1292,8 @@ msgstr "" msgid "" "However, to have changes included in a release, developers\n" "must be trusted by the release manager (currently zzz).\n" -"In addition, they must explicitly agree with the above terms to be " -"trusted.\n" -"That means that they must send one of the release managers a signed " -"message affirming that:" +"In addition, they must explicitly agree with the above terms to be trusted.\n" +"That means that they must send one of the release managers a signed message affirming that:" msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:322 @@ -1534,8 +1304,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:326 msgid "" -"If specified in the source, the code may be explicitly licensed under one" -"\n" +"If specified in the source, the code may be explicitly licensed under one\n" "of the component's alternate licenses" msgstr "" @@ -1548,10 +1317,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/licenses.html:336 #, python-format msgid "" -"If anyone is aware of any instances where the above conditions are not " -"met,\n" -"please contact the component lead and/or an I2P release manager with " -"further\n" +"If anyone is aware of any instances where the above conditions are not met,\n" +"please contact the component lead and/or an I2P release manager with further\n" "information.\n" "<a href=\"%(licenseagreements)s\">See developers' license agreements</a>." msgstr "" @@ -1561,7 +1328,8 @@ msgid "Release Signing Key" msgstr "Kyç Nënshkrimi Hedhjesh Në Qarkullim" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:4 -msgid "Windows installers for releases 0.9.38 and later are signed by zlatinb." +msgid "" +"Windows installers for releases 0.9.38 and later are signed by zlatinb." msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:7 @@ -1582,7 +1350,8 @@ msgid "Download PGP public key" msgstr "Shkarkoni kyç PGP publik" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:209 -msgid "Releases from 0.9.9 could be signed by str4d. His current public key is:" +msgid "" +"Releases from 0.9.9 could be signed by str4d. His current public key is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:582 @@ -1590,13 +1359,14 @@ msgid "str4d has signed the following releases:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:590 -msgid "Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" +msgid "" +"Releases 0.7.6 through 0.9.12 were signed by zzz with the following key:" msgstr "" #: i2p2www/pages/site/get-involved/develop/release-signing-key.html:626 msgid "" -"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public " -"key is:" +"Releases 0.6.1.31 through 0.7.5 were signed by Complication. His public key " +"is:" msgstr "" #: i2p2www/pages/site/get-involved/develop/security-key.html:2 @@ -1604,7 +1374,8 @@ msgid "Security GPG Key" msgstr "Kyç Sigurie GPG" #: i2p2www/pages/site/get-involved/develop/security-key.html:4 -msgid "Following is the GPG key for the security _at_ geti2p.net email address:" +msgid "" +"Following is the GPG key for the security _at_ geti2p.net email address:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:2 @@ -1613,8 +1384,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:4 msgid "" -"Keys for zzz, Complication and welterde are provided clearsigned. The key" -" for jrandom must be\n" +"Keys for zzz, Complication and welterde are provided clearsigned. The key for jrandom must be\n" "verified differently, since he's away, and only left a binary detached\n" "signature for his key." msgstr "" @@ -1646,35 +1416,28 @@ msgstr "Të tjera" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:17 msgid "" -"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key " -"`0xA76E0BED`, with\n" -"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 " -"B310 4155\n" +"<u>Tip:</u> To find zzz's GPG key, on his I2P Site locate the key `0xA76E0BED`, with\n" +"the name `zzz@mail.i2p` and the fingerprint `4456 EBBE C805 63FE 57E6 B310 4155\n" "76BA A76E 0BED`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:49 msgid "" -"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the " -"key\n" -"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720" -" FD81\n" +"<b>Tip:</b> To find welterde's GPG key, on public keyservers locate the key\n" +"`0x62E011A1`, with the name `welterde@arcor.de` and the fingerprint `6720 FD81\n" "3872 6DFC 6016 64D1 EBBC 0374 62E0 11A1`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:81 msgid "" -"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the " -"key\n" -"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint " -"`73CF\n" +"<b>Tip:</b> To find Complication's GPG key, on his I2P Site locate the key\n" +"`0x79FCCE33`, with the name `complication@mail.i2p` and the fingerprint `73CF\n" "2862 87A7 E7D2 19FF DB66 FA1D FC6B 79FC CE33`." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:116 msgid "" -"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public " -"keyservers locate\n" +"<b>Tip:</b> To find jrandom's GPG key for Syndie releases, on public keyservers locate\n" "the key `0x393F2DF9`, with the name `syndie-dist-key@i2p.net` and the\n" "fingerprint `AE89 D080 0E85 72F0 B777 B2ED C2FA 68C0 393F 2DF9`." msgstr "" @@ -1682,29 +1445,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:122 msgid "" "Jrandom had to leave unexpectedly in the end of 2007. His commit key was\n" -"deployed in the Syndie Monotone repository, in a file named `mtn-" -"committers`.\n" -"That file also had a GPG signature, `mtn-committers.sig`, but it was a " -"binary\n" -"detached signature. I am going to supply both files in GPG ASCII-armoured" -" form\n" +"deployed in the Syndie Monotone repository, in a file named `mtn-committers`.\n" +"That file also had a GPG signature, `mtn-committers.sig`, but it was a binary\n" +"detached signature. I am going to supply both files in GPG ASCII-armoured form\n" "below." msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:130 msgid "" -"First, the file `mtn-committers` containing jrandom's Monotone key. Save " -"as\n" -"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers " -"--dearmor\n" +"First, the file `mtn-committers` containing jrandom's Monotone key. Save as\n" +"`mtn-committers.asc` and unpack it using `gpg --output mtn-committers --dearmor\n" "mtn-committers.asc`:" msgstr "" #: i2p2www/pages/site/get-involved/develop/signed-keys.html:151 msgid "" "Now the file `mtn-committers.sig`, containing the GPG signature. Save as\n" -"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-" -"committers.sig\n" +"`mtn-committers.sig.asc` and unpack it using `gpg --output mtn-committers.sig\n" "--dearmor mtn-committers.sig.asc`. Use it to verify the above supplied\n" "`mtn-committers` file:" msgstr "" @@ -1731,12 +1488,10 @@ msgstr "Udhëzime Elementare dhe Stil Kodimi" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:11 msgid "" -"Most of the following should be common sense for anybody who has worked " -"on open source or in a commercial\n" +"Most of the following should be common sense for anybody who has worked on open source or in a commercial\n" "programming envrionment.\n" "The following applies mostly to the main development branch i2p.i2p.\n" -"Guidelines for other branches, plugins, and external apps may be " -"substantially different;\n" +"Guidelines for other branches, plugins, and external apps may be substantially different;\n" "check with the appropriate developer for guidance." msgstr "" @@ -1746,10 +1501,8 @@ msgstr "Bashkësi" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:21 msgid "" -"Please don't just \"write code\". If you can, participate in other " -"development activities, including:\n" -"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; " -"testing;\n" +"Please don't just \"write code\". If you can, participate in other development activities, including:\n" +"development discussions and support on IRC, zzz.i2p, and i2pforum.i2p; testing;\n" "bug reporting and responses; documentation; code reviews; etc." msgstr "" @@ -1771,8 +1524,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:46 msgid "" -"2-3 weeks after previous release: Deadline to propagate major changes " -"from other branches to trunk." +"2-3 weeks after previous release: Deadline to propagate major changes from " +"other branches to trunk." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:49 @@ -1780,13 +1533,14 @@ msgid "4-5 weeks before release: Deadline to request new home page links." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:52 -msgid "3-4 weeks before release: Feature freeze. Deadline for major new features." +msgid "" +"3-4 weeks before release: Feature freeze. Deadline for major new features." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:55 msgid "" -"2-3 weeks before release: Hold project meeting to review new home page " -"link requests, if any." +"2-3 weeks before release: Hold project meeting to review new home page link " +"requests, if any." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:71 @@ -1795,8 +1549,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:80 msgid "" -"Have a basic understanding of distributed source control systems, even if" -" you haven't\n" +"Have a basic understanding of distributed source control systems, even if you haven't\n" "used git before. Ask for help if you need it.\n" "Once pushed, checkins are forever, there is no undo. Please be careful.\n" "If you have not used git before, start with baby steps.\n" @@ -1810,34 +1563,28 @@ msgid "" "use your own development branch\n" "and propagate back to i2p.i2p once it is working well.\n" "Do not break the build. Do not cause regressions.\n" -"In case you do (it happens), please do not vanish for a long period after" -"\n" +"In case you do (it happens), please do not vanish for a long period after\n" "you push your change." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:96 msgid "" -"If your change is non-trivial, or you want people to test it and need " -"good test reports\n" -"to know whether your change was tested or not, add a checkin comment to " -"history.txt\n" +"If your change is non-trivial, or you want people to test it and need good test reports\n" +"to know whether your change was tested or not, add a checkin comment to history.txt\n" "and increment the build revision in RouterVersion.java." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:101 msgid "" -"Ensure that you 'git pull' to the latest revision before you check in and" -" push.\n" +"Ensure that you 'git pull' to the latest revision before you check in and push.\n" "If you inadvertently diverge, merge and push as soon as possible.\n" "Don't routinely make others merge for you." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:106 msgid "" -"Do not check in major changes into the main i2p.i2p branch late in the " -"release cycle.\n" -"If a project will take you more than a couple days, create your own " -"branch in git\n" +"Do not check in major changes into the main i2p.i2p branch late in the release cycle.\n" +"If a project will take you more than a couple days, create your own branch in git\n" "and do the development there so you do not block releases." msgstr "" @@ -1847,61 +1594,49 @@ msgstr "Stil Kodimi" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:115 msgid "" -"Coding style throughout most of the code is 4-spaces for indentation. Do " -"not use tabs.\n" -"Do not reformat code. If your IDE or editor wants to reformat everything," -" get control of it.\n" -"Yes, we know 4 spaces is a pain, but perhaps you can configure your " -"editor appropriately.\n" +"Coding style throughout most of the code is 4-spaces for indentation. Do not use tabs.\n" +"Do not reformat code. If your IDE or editor wants to reformat everything, get control of it.\n" +"Yes, we know 4 spaces is a pain, but perhaps you can configure your editor appropriately.\n" "In some places, the coding style is different.\n" "Use common sense. Emulate the style in the file you are modifying." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:122 msgid "" -"All new public and package-private classes and methods require Javadocs. " -"Add @since release-number.\n" +"All new public and package-private classes and methods require Javadocs. Add @since release-number.\n" "Javadocs for new private methods are desirable." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:126 msgid "" -"For any Javadocs added, there must not be any doclint errors or warnings." -"\n" +"For any Javadocs added, there must not be any doclint errors or warnings.\n" "Run 'ant javadoc' with Oracle Java 14 or higher to check.\n" -"All params must have @param lines, all non-void methods must have @return" -" lines,\n" -"all exceptions declared thrown must have @throws lines, and no HTML " -"errors." +"All params must have @param lines, all non-void methods must have @return lines,\n" +"all exceptions declared thrown must have @throws lines, and no HTML errors." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:132 msgid "" -"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our " -"official API.\n" -"There are several out-of-tree plugins and other applications that rely on" -" this API.\n" +"Classes in core/ (i2p.jar) and portions of i2ptunnel are part of our official API.\n" +"There are several out-of-tree plugins and other applications that rely on this API.\n" "Be careful not to make any changes that break compatibility.\n" "Don't add methods to the API unless they are of general utility.\n" "Javadocs for API methods should be clear and complete.\n" -"If you add or change the API, also update the documentation on the " -"website (i2p.www branch)." +"If you add or change the API, also update the documentation on the website (i2p.www branch)." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:140 msgid "" "Tag strings for translation where appropriate.\n" -"Don't change existing tagged strings unless really necessary, as it will " -"break existing translations.\n" -"Do not add or change tagged strings after the \"tag freeze\" in the " -"release cycle so that\n" +"Don't change existing tagged strings unless really necessary, as it will break existing translations.\n" +"Do not add or change tagged strings after the \"tag freeze\" in the release cycle so that\n" "translators have a chance to update before the release." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:146 msgid "" -"Use generics and concurrent classes where possible. I2P is a highly " -"multi-threaded application." +"Use generics and concurrent classes where possible. I2P is a highly multi-" +"threaded application." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:149 @@ -1928,20 +1663,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:187 msgid "" -"Don't use String.getBytes() without a UTF-8 charset argument. You may " -"also use DataHelper.getUTF8() or DataHelper.getASCII()." +"Don't use String.getBytes() without a UTF-8 charset argument. You may also " +"use DataHelper.getUTF8() or DataHelper.getASCII()." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:190 msgid "" -"Always specify a UTF-8 charset when reading or writing files. The " -"DataHelper utilities may be helpful." +"Always specify a UTF-8 charset when reading or writing files. The DataHelper" +" utilities may be helpful." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:193 msgid "" -"Always specify a locale (for example Locale.US) when using " -"String.toLowerCase() or String.toUpperCase().\n" +"Always specify a locale (for example Locale.US) when using String.toLowerCase() or String.toUpperCase().\n" "Do not use String.equalsIgnoreCase(), as a locale cannot be specified." msgstr "" @@ -1950,14 +1684,14 @@ msgid "Don't use String.split(). Use DataHelper.split()." msgstr "Mos përdorni String.split(). Përdorni DataHelper.split()." #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:203 -msgid "Ensure that InputStreams and OutputStreams are closed in finally blocks." +msgid "" +"Ensure that InputStreams and OutputStreams are closed in finally blocks." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:206 msgid "" "Use {} for all for and while blocks, even if only one line.\n" -"If you use {} for either the if, else, or if-else block, use it for all " -"blocks.\n" +"If you use {} for either the if, else, or if-else block, use it for all blocks.\n" "Put \"} else {\" on a single line." msgstr "" @@ -1967,12 +1701,13 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:214 msgid "" -"Don't store I2PAppContext, RouterContext, Log, or any other references to" -" router or context items in static fields." +"Don't store I2PAppContext, RouterContext, Log, or any other references to " +"router or context items in static fields." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:217 -msgid "Don't start threads in constructors. Use I2PAppThread instead of Thread." +msgid "" +"Don't start threads in constructors. Use I2PAppThread instead of Thread." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:222 @@ -1992,8 +1727,7 @@ msgstr "" msgid "" "If you do obtain approval to add external code or jars,\n" "and binaries are available in any Debian or Ubuntu package,\n" -"you must implement build and packaging options to use the external " -"package instead.\n" +"you must implement build and packaging options to use the external package instead.\n" "Checklist of files to modify:" msgstr "" @@ -2020,12 +1754,9 @@ msgstr "" msgid "" "New developers should start by fixing a bug.\n" "Search for bugs with the 'easy' keyword on trac.\n" -"When you have a fix, attach your patch to the ticket and add the keyword " -"'review-needed'.\n" -"Do not close the ticket until it's been successfully reviewed and you've " -"checked your changes in.\n" -"Once you've done this smoothly for a couple of tickets, you may follow " -"the normal procedure below." +"When you have a fix, attach your patch to the ticket and add the keyword 'review-needed'.\n" +"Do not close the ticket until it's been successfully reviewed and you've checked your changes in.\n" +"Once you've done this smoothly for a couple of tickets, you may follow the normal procedure below." msgstr "" #: i2p2www/pages/site/get-involved/guides/dev-guidelines.html:260 @@ -2044,22 +1775,22 @@ msgstr "Përdorimi i një IDE-je me I2P-në" #: i2p2www/pages/site/get-involved/guides/ides.html:4 msgid "" -"The main I2P development branch (<code>i2p.i2p</code>) has been set up to" -" enable developers to easily set up two of the commonly-used IDEs for " -"Java development: Eclipse and NetBeans." +"The main I2P development branch (<code>i2p.i2p</code>) has been set up to " +"enable developers to easily set up two of the commonly-used IDEs for Java " +"development: Eclipse and NetBeans." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:10 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain build.gradle to enable the branch to be easily set up in " +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain build.gradle to enable the branch to be easily set up in " "Eclipse." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:16 msgid "" -"Make sure you have a recent version of Eclipse. Anything newer than 2017" -" should do." +"Make sure you have a recent version of Eclipse. Anything newer than 2017 " +"should do." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:20 @@ -2076,8 +1807,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:28 msgid "" -"For \"Project root directory:\" choose the directory that the I2P branch " -"was checked out to." +"For \"Project root directory:\" choose the directory that the I2P branch was" +" checked out to." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:32 @@ -2094,14 +1825,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:40 msgid "" -"Done! Your workspace should now contain all projects within the I2P " -"branch, and their build dependencies should be correctly set up." +"Done! Your workspace should now contain all projects within the I2P branch, " +"and their build dependencies should be correctly set up." msgstr "" #: i2p2www/pages/site/get-involved/guides/ides.html:48 msgid "" -"The main I2P development branches (<code>i2p.i2p</code> and branches from" -" it) contain NetBeans project files." +"The main I2P development branches (<code>i2p.i2p</code> and branches from " +"it) contain NetBeans project files." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:2 @@ -2180,34 +1911,26 @@ msgstr "Dallime nën Debian GNU/Linux" #: i2p2www/pages/site/get-involved/guides/monotone.html:35 #, python-format msgid "" -"This is a revised version of <a " -"href=\"%(transitionguide)s\">Complication's original\n" +"This is a revised version of <a href=\"%(transitionguide)s\">Complication's original\n" " guide</a> detailing the use of Monotone in I2P development.\n" -" For basic instructions see the <a href=\"%(newdevs)s\">quick-start " -"guide</a>." +" For basic instructions see the <a href=\"%(newdevs)s\">quick-start guide</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:43 #, python-format msgid "" -"I2P has a distributed development model. The source code is replicated " -"across\n" -" independently administered <a " -"href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" -" Developers with commit rights are able to push their changes to the " -"repository\n" -" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be " -"signed\n" +"I2P has a distributed development model. The source code is replicated across\n" +" independently administered <a href=\"http://www.monotone.ca/\">Monotone</a> (\"MTN\") repositories.\n" +" Developers with commit rights are able to push their changes to the repository\n" +" (a <a href=\"%(licenses)s#commit\">license agreement</a> needs to be signed\n" " before commit rights are granted)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:53 msgid "" "Some of Monotone's noteworthy qualities are: distributed\n" -" version control, cryptographic authentication, access control, its " -"small size, having few\n" -" dependencies, storage of projects in a compressed SQLite database file," -" and\n" +" version control, cryptographic authentication, access control, its small size, having few\n" +" dependencies, storage of projects in a compressed SQLite database file, and\n" " having the ability to resume interrupted synchronization attempts." msgstr "" @@ -2217,20 +1940,16 @@ msgstr "Përdorimi i një Klienti Monotone" #: i2p2www/pages/site/get-involved/guides/monotone.html:67 msgid "" -"A transport key grants you the ability to push your changes to a Monotone" -" repository server.\n" -" In order to commit code into Monotone (in essence signing your code), a" -" commit key is also needed.\n" -" None of the public Monotone servers on I2P currently require a key in " -"order to read (or pull) the source code." +"A transport key grants you the ability to push your changes to a Monotone repository server.\n" +" In order to commit code into Monotone (in essence signing your code), a commit key is also needed.\n" +" None of the public Monotone servers on I2P currently require a key in order to read (or pull) the source code." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:75 msgid "" "Without a transport key, one cannot:\n" " <ul>\n" -" <li>pull code from a server which doesn't allow global read " -"access</li>\n" +" <li>pull code from a server which doesn't allow global read access</li>\n" " <li>push code to any server</li>\n" " <li>run a Monotone server</li>\n" " </ul>" @@ -2247,22 +1966,19 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:95 msgid "" "If you only intend to retrieve code from MTN, feel free to skip to the\n" -" <a href=\"#trust-and-initializing-your-repository\">next section</a>. " -"If you want\n" +" <a href=\"#trust-and-initializing-your-repository\">next section</a>. If you want\n" " to generate keys, read the following." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:103 msgid "" -"By convention keys are named like an e-mail addresses, but a " -"corresponding e-mail\n" +"By convention keys are named like an e-mail addresses, but a corresponding e-mail\n" " address does not need to exist. For example, your keys might be named:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:114 msgid "" -"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in " -"text files which\n" +"Monotone stores keys under <code><b>$HOME/.monotone/keys</b></code> in text files which\n" " are named identically to the keys. For example:" msgstr "" @@ -2274,10 +1990,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:134 msgid "" -"Monotone will prompt you for a password to protect your keys. You are " -"very strongly encouraged to set a password\n" -" for the commit key. Many users will leave an empty password for the " -"transport key, especially those running a\n" +"Monotone will prompt you for a password to protect your keys. You are very strongly encouraged to set a password\n" +" for the commit key. Many users will leave an empty password for the transport key, especially those running a\n" " Monotone server." msgstr "" @@ -2287,38 +2001,30 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:146 msgid "" -"Monotone's security model helps to ensure that nobody can easily " -"impersonate a developer without\n" -" it being noticed. Since developers can make mistakes and become " -"compromised,only manual review can\n" -" ensure quality of code. Monotone's trust model will ensure that you " -"read the right diffs. It does\n" +"Monotone's security model helps to ensure that nobody can easily impersonate a developer without\n" +" it being noticed. Since developers can make mistakes and become compromised,only manual review can\n" +" ensure quality of code. Monotone's trust model will ensure that you read the right diffs. It does\n" " not replace reading diffs." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:156 msgid "" -"A Monotone repository is a single file (a compressed SQLite database) " -"which contains all of the project's source code and history." +"A Monotone repository is a single file (a compressed SQLite database) which " +"contains all of the project's source code and history." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:162 msgid "" -"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the " -"developers' keys into Monotone</a> and\n" -" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust " -"evaluation hooks</a>,\n" -" Monotone will prevent untrusted code from being checked out into your " -"workspace.\n" -" There are commands available to clean untrusted code from your " -"workspace but in practice they've not been\n" +"After <a href=\"#obtaining-and-deploying-developers-keys\">importing the developers' keys into Monotone</a> and\n" +" <a href=\"#setting-up-trust-evaluation-hooks\">setting up trust evaluation hooks</a>,\n" +" Monotone will prevent untrusted code from being checked out into your workspace.\n" +" There are commands available to clean untrusted code from your workspace but in practice they've not been\n" " needed due to the push access policies in place." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:172 msgid "" -"A repository can hold many branches. For example, our repository holds " -"the\n" +"A repository can hold many branches. For example, our repository holds the\n" " following main branches:" msgstr "" @@ -2336,23 +2042,17 @@ msgstr "Syndie, një mjet forumesh të shpërndarë" #: i2p2www/pages/site/get-involved/guides/monotone.html:184 msgid "" -"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>." -" Before pulling\n" -" source code from servers, a database for your repository will need to " -"be initialized.\n" -" To initialize your local repository, change into the directory that you" -" want the\n" -" <code>i2p.mtn</code> file and branch directories to be stored and issue" -" the following\n" +"By convention, the I2P Monotone repository is named <code>i2p.mtn</code>. Before pulling\n" +" source code from servers, a database for your repository will need to be initialized.\n" +" To initialize your local repository, change into the directory that you want the\n" +" <code>i2p.mtn</code> file and branch directories to be stored and issue the following\n" " command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:200 msgid "" -"Keys which developers use to commit code are essential for trust " -"evaluation in\n" -" Monotone. The other developers' transport keys are only required for " -"Monotone server operators.\n" +"Keys which developers use to commit code are essential for trust evaluation in\n" +" Monotone. The other developers' transport keys are only required for Monotone server operators.\n" " " msgstr "" @@ -2366,11 +2066,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:213 #, python-format msgid "" -"To import developers' keys after verifying their authenticity, copy <a " -"href=\"%(devkeys)s\">all of the keys</a> into a new\n" -" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same " -"directory where <code>i2p.mtn</code> is located. Import the keys with the" -" command:" +"To import developers' keys after verifying their authenticity, copy <a href=\"%(devkeys)s\">all of the keys</a> into a new\n" +" file. Create this file (e.g. <code><b>keys.txt</b></code>) in the same directory where <code>i2p.mtn</code> is located. Import the keys with the command:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:223 @@ -2381,34 +2078,27 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:231 msgid "" -"The default Monotone trust policy is way too lax for our requirements: " -"every committer is trusted by default.\n" +"The default Monotone trust policy is way too lax for our requirements: every committer is trusted by default.\n" " That is not acceptable for I2P development." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:238 msgid "" -"Change into the directory <code><b>$HOME/.monotone</b></code> and open " -"the file\n" -" <code>monotonerc</code> with a text editor. Copy and paste the " -"following two functions into this file:" +"Change into the directory <code><b>$HOME/.monotone</b></code> and open the file\n" +" <code>monotonerc</code> with a text editor. Copy and paste the following two functions into this file:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:247 msgid "" -"The first function determines an intersection between two sets, in our " -"case a\n" +"The first function determines an intersection between two sets, in our case a\n" " revision's signers and trusted signers." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:254 msgid "" -"The second function determines trust in a given revision, by calling the " -"first\n" -" function with \"signers\" and \"trusted\" as arguments. If the " -"intersection is\n" -" null, the revision is not trusted. If the intersection is not empty, " -"the\n" +"The second function determines trust in a given revision, by calling the first\n" +" function with \"signers\" and \"trusted\" as arguments. If the intersection is\n" +" null, the revision is not trusted. If the intersection is not empty, the\n" " revision is trusted. Otherwise, the revision is not trusted." msgstr "" @@ -2421,18 +2111,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:271 msgid "" -"I2P is shipped with a pre-configured tunnel pointing to the project " -"Monotone server. Ensure that the tunnel has been started\n" -" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before" -" attempting to pull the source code from 127.0.0.1:8998." +"I2P is shipped with a pre-configured tunnel pointing to the project Monotone server. Ensure that the tunnel has been started\n" +" within <a href=\"http://127.0.0.1:7657/i2ptunnel\">I2PTunnel</a> before attempting to pull the source code from 127.0.0.1:8998." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:278 msgid "" -"Enter the directory where you initialized <code>i2p.mtn</code>. Depending" -" on whether you\n" -" want only I2P sources, or also sources for the I2P website and Syndie, " -"you can\n" +"Enter the directory where you initialized <code>i2p.mtn</code>. Depending on whether you\n" +" want only I2P sources, or also sources for the I2P website and Syndie, you can\n" " perform the <code>pull</code> operation in different ways." msgstr "" @@ -2446,16 +2132,14 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:301 msgid "" -"If the transfer aborts before completing sucessfully, simply repeating " -"the pull command will resume the transfer." +"If the transfer aborts before completing sucessfully, simply repeating the " +"pull command will resume the transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:307 msgid "" -"Pulling in the above examples is done anonymously by specifying an empty " -"transport key.\n" -" If everyone pulls anonymously it will be harder for an attacker who " -"gains control of the server\n" +"Pulling in the above examples is done anonymously by specifying an empty transport key.\n" +" If everyone pulls anonymously it will be harder for an attacker who gains control of the server\n" " to selectively provide some people with tampered data." msgstr "" @@ -2475,67 +2159,57 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:329 msgid "" -"With <code><b>monotonerc</b></code> configured as above, Monotone will no" -" longer trust any committers. Confirm this by changing into the\n" -"directory where <code>i2p.mtn</code> was created and attempt a checkout " -"of the I2P branch:" +"With <code><b>monotonerc</b></code> configured as above, Monotone will no longer trust any committers. Confirm this by changing into the\n" +"directory where <code>i2p.mtn</code> was created and attempt a checkout of the I2P branch:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:339 msgid "" -"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You " -"should encounter many\n" +"A directory named <code>i2p.i2p</code> should <b>not</b> appear. You should encounter many\n" " error messages like:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:356 msgid "" "If you are satisfied with results, restore the backup of\n" -" <code>monotonerc</code> that was created above. If you didn't create a " -"backup\n" -" as advised, re-read <a href=\"#setting-up-trust-evaluation-" -"hooks\">Setting up trust evaluation hooks</a>." +" <code>monotonerc</code> that was created above. If you didn't create a backup\n" +" as advised, re-read <a href=\"#setting-up-trust-evaluation-hooks\">Setting up trust evaluation hooks</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:367 msgid "" -"If you already have a branch checked out, skip to the <a href" -"=\"#updating-your-working-copy-to-the-latest-version\">next\n" +"If you already have a branch checked out, skip to the <a href=\"#updating-your-working-copy-to-the-latest-version\">next\n" " section</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:374 msgid "" -"Change into the directory where <code>i2p.mtn</code> is located. Over " -"there issue:" +"Change into the directory where <code>i2p.mtn</code> is located. Over there " +"issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:383 msgid "" -"The checkout should complete without error messages and a directory named" -"\n" -" <code>i2p.i2p</code> should appear in the current directory. " -"Congratulations! You have\n" +"The checkout should complete without error messages and a directory named\n" +" <code>i2p.i2p</code> should appear in the current directory. Congratulations! You have\n" " successfully checked out the latest I2P sources, ready to be compiled." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:394 msgid "" -"If you haven't done this already, pull fresh code from the server to your" -" local\n" -" Monotone repository. To accomplish this, change into the directory " -"where\n" +"If you haven't done this already, pull fresh code from the server to your local\n" +" Monotone repository. To accomplish this, change into the directory where\n" " <code>i2p.mtn</code> is located and issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:405 -msgid "Now change into your <code>i2p.i2p</code> directory, and over there issue:" +msgid "" +"Now change into your <code>i2p.i2p</code> directory, and over there issue:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:414 msgid "" -"As long as there were no errors…Congratulations! You have " -"successfully updated to the latest I2P sources. They\n" +"As long as there were no errors…Congratulations! You have successfully updated to the latest I2P sources. They\n" " should be ready to compile." msgstr "" @@ -2559,8 +2233,8 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:452 msgid "" -"No one will not be able to push code to your server without permission " -"being explicitly granted. To grant push access:" +"No one will not be able to push code to your server without permission being" +" explicitly granted. To grant push access:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:458 @@ -2576,44 +2250,34 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:469 msgid "" -"Import the transport key(s) into your database. The procedure for " -"importing transport keys is the same as for\n" -"importing commit keys, which is described in the section <a href" -"=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying " -"developers' keys</a>." +"Import the transport key(s) into your database. The procedure for importing transport keys is the same as for\n" +"importing commit keys, which is described in the section <a href=\"#obtaining-and-deploying-developers-keys\">Obtaining and deploying developers' keys</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:479 msgid "" -"A separate database should be used for your Monotone server because " -"monotone will lock the database while it is served to others.\n" +"A separate database should be used for your Monotone server because monotone will lock the database while it is served to others.\n" " Make a copy of your development database, then start the server with:" msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:486 msgid "" -"If your key is protected with a passphrase, Monotone may request the " -"passphrase\n" -" when the first client connects. You can work around this by connecting " -"making the first client connection to your server\n" +"If your key is protected with a passphrase, Monotone may request the passphrase\n" +" when the first client connects. You can work around this by connecting making the first client connection to your server\n" " (or by clearing the password for your transport key)." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:494 msgid "" -"For your server to be accessible for others over I2P, you will need to " -"create a\n" -" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" " -"profile." +"For your server to be accessible for others over I2P, you will need to create a\n" +" server tunnel for it. Use the \"Standard\" tunnel type and \"Bulk\" profile." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:504 msgid "" "Debian (amongst other distributions) has integrated Monotone into their\n" -" framework of daemons/services. Although Monotone servers can still be " -"run\n" -" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may" -" be more straightforward." +" framework of daemons/services. Although Monotone servers can still be run\n" +" \"the ordinary way\" on Debian systems, doing it the \"Debian way\" may be more straightforward." msgstr "" #: i2p2www/pages/site/get-involved/guides/monotone.html:512 @@ -2621,8 +2285,7 @@ msgid "" "Permissions are granted by editing the files\n" " <code>/etc/monotone/read-permissions</code> and\n" " <code>/etc/monotone/write-permissions</code>. You'll also need to edit\n" -" <code>/etc/default/monotone</code> to enable monotone to start at boot " -"or to\n" +" <code>/etc/default/monotone</code> to enable monotone to start at boot or to\n" " customize the host, port, or database location." msgstr "" @@ -2631,64 +2294,59 @@ msgid "New Developer's Guide" msgstr "Udhërrëfyes për Zhvillues të Rinj" #: i2p2www/pages/site/get-involved/guides/new-developers.html:6 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:32 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:31 msgid "Basic study" msgstr "Studim elementar" #: i2p2www/pages/site/get-involved/guides/new-developers.html:7 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:46 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:45 msgid "Getting the I2P code" msgstr "Marrja e kodit për I2P" #: i2p2www/pages/site/get-involved/guides/new-developers.html:9 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:52 msgid "The new way: Git" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:10 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:11 #: i2p2www/pages/site/get-involved/guides/new-developers.html:81 -msgid "The old way: Monotone" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:145 msgid "Building I2P" msgstr "Ndërtimi i I2P-së" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:166 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:12 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:102 msgid "Development ideas" msgstr "Ide zhvillimi" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:174 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:13 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:110 msgid "Making the results available" msgstr "Bërja e përfundimeve të passhme" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:196 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:14 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 msgid "Get to know us!" msgstr "Njihuni me ne!" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:202 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:15 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 msgid "Translations" msgstr "Përkthime" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:17 -#: i2p2www/pages/site/get-involved/guides/new-developers.html:208 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:16 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 msgid "Tools" msgstr "Mjete" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:22 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:21 msgid "" "\n" "So you want to start work on I2P? Great!\n" "Here's a quick guide to getting started\n" -"on contributing to the website or the software, doing development or " -"creating translations." +"on contributing to the website or the software, doing development or creating translations." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:27 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:26 #, python-format msgid "" "\n" @@ -2696,42 +2354,34 @@ msgid "" "Try <a href=\"%(volunteer)s\">getting involved</a> first." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:34 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:33 msgid "" -"Basic development on the I2P router or the embedded applications uses " -"Java as the main development language.\n" -"If you don't have experience with Java, you can always have a look at <a " -"href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." +"Basic development on the I2P router or the embedded applications uses Java as the main development language.\n" +"If you don't have experience with Java, you can always have a look at <a href=\"http://www.mindview.net/Books/TIJ/\">Thinking in Java</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:38 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:37 #, python-format msgid "" "Study the <a href=\"%(intro)s\">how intro</a>,\n" "the <a href=\"%(docs)s\">other \"how\" documents</a>,\n" "the <a href=\"%(techintro)s\">tech intro</a>,\n" "and associated documents.\n" -"These will give you a good overview of how I2P is structured and what " -"different things it does." +"These will give you a good overview of how I2P is structured and what different things it does." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:48 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:47 msgid "" "For development on the I2P router or the embedded applications,\n" "there are two ways to get the source code:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:53 -msgid "The easy way: Git" -msgstr "Rruga e lehtë: Git" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:55 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:54 #, python-format msgid "" -"I2P now has official Git services and accepts contributions via Git at " -"our own gitlab.\n" -"For the time being, issues are still being manged on <a " -"href=\"%(trac)s\">trac</a>." +"I2P now has official Git services and accepts contributions via Git at our own gitlab.\n" +"Trac issues have also been migrated to <a href=\"%(trac)s\">gitlab</a>, however Trac still available for now. Two-way syncing of\n" +"issues between Gitlab and Github is a work-in-progress." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-developers.html:58 @@ -2744,143 +2394,31 @@ msgstr "" msgid "<a href=\"%(i2p_git)s\">GitHub mirror</a></strong>:" msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:84 -msgid "" -"Install <a href=\"http://www.monotone.ca/\">monotone</a>.\n" -"Monotone is a version control system.\n" -"We use it because it allows us to keep track of who does what changes to " -"the source code (and for a lot of complicated things, but 'keeping track " -"of changes' is the basic idea)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:89 -msgid "" -"Skim over the <a " -"href=\"http://www.monotone.ca/docs/Tutorial.html\">monotone tutorial</a>," -" to make sure you understand the concepts." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:93 -msgid "" -"If you want to remain anonymous, you need to do an additional step, to " -"set up a connection to a monotone server over I2P:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:96 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:83 #, python-format msgid "" -"Enable the <a href=\"%(i2ptunnel)s\">i2ptunnel</a> client tunnel on port " -"8998 pointing to mtn.i2p-projekt.i2p." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:100 -msgid "" -"Pick a directory where you want to put all your I2P files, and create a " -"monotone database:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 -msgid "" -"Define the trust list by creating <code>~/.monotone/monotonerc</code> (or" -" <code>_MTN/monotonerc</code> in the i2p.i2p workspace) with the " -"following contents:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:108 -#, python-format -msgid "" -"Copy and paste the <a href=\"%(devkeys)s\">developer's commit keys</a> " -"into a new file (e.g. <code>keys.txt</code>) in the same directory\n" -" that <code>i2p.mtn</code> is in. Import the keys into your database " -"with <br><code><pre> mtn -d i2p.mtn read < keys.txt</pre></code>" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 -msgid "" -"Pull the I2P sources to your machine. This may take a long time, " -"especially if you are doing this over I2P!" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:114 -msgid "Anonymously:" -msgstr "Në mënyrë anonime:" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:117 -msgid "Non-anonymously:" -msgstr "Jo në mënyrë anonime:" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:123 -msgid "" -"All the sources are now present on your machine, in the database file. To" -" make them available in a directory, you need to check them out:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:125 -msgid "" -"The above command creates a directory i2p.i2p, which contains all of the " -"I2P sources." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:129 -msgid "Remarks" -msgstr "Nënvizime" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 -msgid "" -"\n" -"To download the website files instead of the I2P source files, use " -"'i2p.www' instead of 'i2p.i2p'." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:133 -msgid "" -"The initial pull may take several hours using the tunnel.\n" -"If it fails after a partial pull, simply rerun it, it will start where it" -" left off.\n" -"If you are in a hurry, use the non-anonymous access." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 -#, python-format -msgid "" -"A full list of branches, including i2p.i2p and i2p.www can be found on <a" -" href=\"%(viewmtn)s\">viewmtn</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:141 -#, python-format -msgid "" -"A long explanation about using monotone is available on the <a " -"href=\"%(monotone)s\">monotone page</a>." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:147 -#, python-format -msgid "" -"To compile the code, you need the Sun Java Development Kit 6 or higher, " -"or equivalent JDK\n" +"To compile the code, you need the Sun Java Development Kit 6 or higher, or equivalent JDK\n" "(<a href=\"%(sunjdk6)s\">Sun JDK 6</a> strongly recommended) and\n" "<a href=\"http://ant.apache.org/\">Apache ant</a>\n" "version 1.7.0 or higher.\n" -"If you go are working on the main I2P code, you can go into the i2p.i2p " -"directory and run 'ant' to see the build options." +"If you go are working on the main I2P code, you can go into the i2p.i2p directory and run 'ant' to see the build options." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:155 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:91 msgid "" "To build or work on console translations, you need\n" "the xgettext, msgfmt, and msgmerge tools from the\n" "<a href=\"http://www.gnu.org/software/gettext/\">GNU gettext package</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:161 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:97 #, python-format msgid "" "For development on new applications,\n" "see the <a href=\"%(apps)s\">application development guide</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:167 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:103 #, python-format msgid "" "See <a href=\"http://%(zzz)s/forums/3\">zzz's TODO lists</a>,\n" @@ -2889,93 +2427,42 @@ msgid "" "for ideas." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:176 -#, python-format -msgid "" -"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> " -"for\n" -"commit privilege requirements. You need these to put code into i2p.i2p " -"(not required for the website!)." -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:181 -msgid "Short version of how to generate and use keys if you plan to commit:" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:184 -msgid "use an empty passphrase" -msgstr "përdorni një frazëkalim të zbrazët" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:185 -msgid "enter a passphrase" -msgstr "jepni frazëkalim" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:186 -#, python-format -msgid "" -"<a href=\"mailto:%(email)s\">send</a> this to a mtn repo operator to get " -"push privileges" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:187 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:112 #, python-format msgid "" -"send this to <a href=\"mailto:%(email)s\">a release manager</a> to get " -"commit privileges - not required for website" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:188 -msgid "check in with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:189 -msgid "push with this key" -msgstr "" - -#: i2p2www/pages/site/get-involved/guides/new-developers.html:191 -#, python-format -msgid "Long version: see the <a href=\"%(monotone)s\">monotone page</a>." +"See the bottom of <a href=\"%(licenses)s#commit\">the licenses page</a> for\n" +"commit privilege requirements. You need these to put code into i2p.i2p (not required for the website!)." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:197 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:118 #, python-format msgid "" -"The developers hang around on IRC. They can be reached on the Freenode " -"network, OFTC, and on the I2P internal networks. The usual place to look " -"is #i2p-dev. Join the channel and say hi!\n" -"We also have <a href=\"%(guidelines)s\">additional guidelines for regular" -" developers</a>." +"The developers hang around on IRC. They can be reached on the Freenode network, OFTC, and on the I2P internal networks. The usual place to look is #i2p-dev. Join the channel and say hi!\n" +"We also have <a href=\"%(guidelines)s\">additional guidelines for regular developers</a>." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:203 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:124 #, python-format msgid "" -"Website and router console translators: See the <a " -"href=\"%(newtrans)s\">New Translator's Guide</a>\n" +"Website and router console translators: See the <a href=\"%(newtrans)s\">New Translator's Guide</a>\n" "for next steps." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:209 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:130 msgid "" "I2P is open source software that is mostly developed using open sourced\n" -"toolkits. The I2P project recently acquired a license for the YourKit " -"Java\n" -"Profiler. Open source projects are eligible to receive a free license " -"provided\n" -"that YourKit is referenced on the project web site. Please get in touch " -"if you\n" +"toolkits. The I2P project recently acquired a license for the YourKit Java\n" +"Profiler. Open source projects are eligible to receive a free license provided\n" +"that YourKit is referenced on the project web site. Please get in touch if you\n" "are interested in profiling the I2P codebase." msgstr "" -#: i2p2www/pages/site/get-involved/guides/new-developers.html:217 +#: i2p2www/pages/site/get-involved/guides/new-developers.html:138 #, python-format msgid "" -"YourKit is kindly supporting open source projects with its full-featured " -"Java Profiler.\n" -"YourKit, LLC is the creator of innovative and intelligent tools for " -"profiling\n" -"Java and .NET applications. Take a look at YourKit's leading software " -"products:\n" +"YourKit is kindly supporting open source projects with its full-featured Java Profiler.\n" +"YourKit, LLC is the creator of innovative and intelligent tools for profiling\n" +"Java and .NET applications. Take a look at YourKit's leading software products:\n" "<a href=\"%(java)s\">YourKit Java Profiler</a> and\n" "<a href=\"%(dotnet)s\">YourKit .NET Profiler</a>." msgstr "" @@ -2995,11 +2482,9 @@ msgstr "Si të Përkthehet Sajti" #: i2p2www/pages/site/get-involved/guides/new-translators.html:8 #, python-format msgid "" -"Translation of the website is done with .po files. The easiest way by far" -" to\n" +"Translation of the website is done with .po files. The easiest way by far to\n" "translate the website is to sign up for an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3014,10 +2499,8 @@ msgstr "Përgatitje" msgid "" "Come to #i2p-dev on irc and talk to people.\n" "Claim the language -\n" -"To make sure other coworkers don't bump onto the files you are working " -"on,\n" -"please update the translation status on <a href=\"%(url)s\">this wiki " -"page</a>." +"To make sure other coworkers don't bump onto the files you are working on,\n" +"please update the translation status on <a href=\"%(url)s\">this wiki page</a>." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:25 @@ -3037,12 +2520,9 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:38 msgid "" -"Run \"<code>./extract-messages.sh</code>\" to generate a " -"<code>messages.pot</code> in the base directory.\n" -"Edit the header of this file, then run \"<code>./init-new-po.sh " -"locale</code>\" to generate the file\n" -"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. " -"\"<code>mtn add</code>\" this file." +"Run \"<code>./extract-messages.sh</code>\" to generate a <code>messages.pot</code> in the base directory.\n" +"Edit the header of this file, then run \"<code>./init-new-po.sh locale</code>\" to generate the file\n" +"<code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>. \"<code>mtn add</code>\" this file." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:43 @@ -3053,27 +2533,23 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:46 msgid "" -"Add a flag image file to <code>i2p2www/static/images/flags/</code> for " -"the menu (copy from the router)." +"Add a flag image file to <code>i2p2www/static/images/flags/</code> for the " +"menu (copy from the router)." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:52 msgid "" "<b>Edit files:</b>\n" "Edit <code>i2p2www/translations/locale/LC_MESSAGES/messages.po</code>.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:58 #: i2p2www/pages/site/get-involved/guides/new-translators.html:151 msgid "" "<b>Check in:</b>\n" -"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by " -"\"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" -"This collects the diff info of your changed file into your local repo. " -"Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p " -"i2p.i2p</code>\".\n" +"\"<code>mtn pull</code>\", \"<code>mtn update</code>\". Then check in by \"<code>mtn ci -k yourname@mail.i2p file1 file2 ...</code>\"\n" +"This collects the diff info of your changed file into your local repo. Then \"<code>mtn sync mtn.i2p2.de -k yourname-transport@mail.i2p i2p.i2p</code>\".\n" "This synchronizes your local repo with the repo on the target machine." msgstr "" @@ -3089,10 +2565,8 @@ msgstr "Si të Përkthehet Konsola e Rrugëzuesit" #: i2p2www/pages/site/get-involved/guides/new-translators.html:74 #, python-format msgid "" -"The easiest way by far to translate the router console is to sign up for " -"an account at \n" -"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation" -" team. \n" +"The easiest way by far to translate the router console is to sign up for an account at \n" +"<a href=\"%(transifex)s\">Transifex</a> and request to join a translation team. \n" "Alternatively it can be done \"the old way\" as outlined below." msgstr "" @@ -3110,8 +2584,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:101 msgid "" -"Before starting a console translation, better help translate some i2p " -"webpages first.\n" +"Before starting a console translation, better help translate some i2p webpages first.\n" "At least an i2p homepage in your language would be great." msgstr "" @@ -3124,19 +2597,15 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:132 msgid "" "Where xx is your language code like fr/de/ch/zh/...\n" -"There may be or may not be files with your lang code. If not, you can " -"create your own. by copying and renaming other language files you know " -"with your own lang code." +"There may be or may not be files with your lang code. If not, you can create your own. by copying and renaming other language files you know with your own lang code." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:137 msgid "" "<b>Create files:</b>\n" -"If the file for your language does not exist yet, copy another language " -"file to a new file <code>foo_xx.bar</code> for your language.\n" +"If the file for your language does not exist yet, copy another language file to a new file <code>foo_xx.bar</code> for your language.\n" "Then \"<code>mtn add</code>\" the file.\n" -"After creating a .po file, edit the headers. Then run \"<code>ant " -"distclean poupdate</code>\"." +"After creating a .po file, edit the headers. Then run \"<code>ant distclean poupdate</code>\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:144 @@ -3144,15 +2613,13 @@ msgid "" "<b>Start to work:</b>\n" "Edit the HTML files with any text editor.\n" "Be sure not to use an editor in HTML mode that reformats everything.\n" -"To work with .po files efficiently, you may wish to use <a " -"href=\"http://www.poedit.net/download.php\">POEdit</a>" +"To work with .po files efficiently, you may wish to use <a href=\"http://www.poedit.net/download.php\">POEdit</a>" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:163 msgid "" "As you can see, it's not that difficult.\n" -"If you have questions about the meaning of the terms in the console, ask " -"in <code>#i2p-dev</code> on IRC." +"If you have questions about the meaning of the terms in the console, ask in <code>#i2p-dev</code> on IRC." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:169 @@ -3161,8 +2628,8 @@ msgstr "PBR" #: i2p2www/pages/site/get-involved/guides/new-translators.html:171 msgid "" -"Q: Why do I have to install monotone, Java, jsp, learn about .po files " -"and html, etc.? Why can't I just do a translation and email it to you?" +"Q: Why do I have to install monotone, Java, jsp, learn about .po files and " +"html, etc.? Why can't I just do a translation and email it to you?" msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:175 @@ -3178,67 +2645,65 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:182 msgid "" -"We don't have anybody who has time to accept manual contributions and " -"submit them to our source control system on your behalf. Even if we did, " -"it doesn't scale." +"We don't have anybody who has time to accept manual contributions and submit" +" them to our source control system on your behalf. Even if we did, it " +"doesn't scale." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:186 msgid "" "Maybe you are thinking translation is a one-step process. It isn't. You " "can't do it all at once. You will make mistakes. You need to test it and " -"tweak it to make it look right <i>before</i> you submit it. Developers " -"will update or add to the English text, thus requiring a translation " -"update." +"tweak it to make it look right <i>before</i> you submit it. Developers will " +"update or add to the English text, thus requiring a translation update." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:190 msgid "" "Having translators use a source control system directly provides " -"authentication and accountablility - we know who is doing what, and we " -"can track changes, and revert them if necessary." +"authentication and accountablility - we know who is doing what, and we can " +"track changes, and revert them if necessary." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:194 msgid "" -".po files are not difficult. If you don't want to work directly with " -"them, we recommend 'poedit'." +".po files are not difficult. If you don't want to work directly with them, " +"we recommend 'poedit'." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:198 msgid "" -"HTML files are not difficult. Just ignore the html stuff and translate " -"the text." +"HTML files are not difficult. Just ignore the html stuff and translate the " +"text." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:202 msgid "" "Installing and using monotone is not that difficult. Several of the " -"translators and other contributors to I2P are non-programmers, and they " -"use monotone regularly. Monotone is simply a source control system, it is" -" not about \"coding\"." +"translators and other contributors to I2P are non-programmers, and they use " +"monotone regularly. Monotone is simply a source control system, it is not " +"about \"coding\"." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:206 msgid "" "Our items to translate are not \"documents\". They are html files and po " -"files, with a specific format and character encoding (UTF-8) that must be" -" maintained, and not corrupted by email programs or other methods of " +"files, with a specific format and character encoding (UTF-8) that must be " +"maintained, and not corrupted by email programs or other methods of " "transfer." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:210 msgid "" -"We looked at 'pootle' as a front-end for translators. It didn't work " -"well, needed an administrator, and a pootle-based process would suffer " -"from a number of the above flaws." +"We looked at 'pootle' as a front-end for translators. It didn't work well, " +"needed an administrator, and a pootle-based process would suffer from a " +"number of the above flaws." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:215 msgid "" "<b>In summary:</b>\n" -"Yes, we know it is somewhat of a hurdle to get started. It's really the " -"only possible way we can do it. Give it a try, it really isn't that hard." +"Yes, we know it is somewhat of a hurdle to get started. It's really the only possible way we can do it. Give it a try, it really isn't that hard." msgstr "" #: i2p2www/pages/site/get-involved/guides/new-translators.html:220 @@ -3263,10 +2728,8 @@ msgstr "Përmbledhje" #: i2p2www/pages/site/get-involved/guides/reseed.html:8 msgid "" "Thank you for volunteering to run an I2P reseed server.\n" -"\"Reseeding\" is our term for bootstrapping new routers into the network." -"\n" -"New routers fetch a bundle of peer references, or \"router infos\", from " -"one or more of a hardcoded list of HTTPS URLs." +"\"Reseeding\" is our term for bootstrapping new routers into the network.\n" +"New routers fetch a bundle of peer references, or \"router infos\", from one or more of a hardcoded list of HTTPS URLs." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:14 @@ -3275,21 +2738,17 @@ msgstr "Domosdoshmëri" #: i2p2www/pages/site/get-involved/guides/reseed.html:16 msgid "" -"At its simplest, a reseed server consists of a Java I2P router, an HTTPS " -"web server,\n" +"At its simplest, a reseed server consists of a Java I2P router, an HTTPS web server,\n" "and some scripts that periodically gather router infos from the router,\n" -"bundle and sign them into a custom file format, and deliver these files " -"over HTTPS.\n" -"In practice, it's a bit more complex, and a reseed operator must be " -"fairly competent and attentive.\n" -"A reseed server is not appropriate for a residential internet connection." -" The complexities include:" +"bundle and sign them into a custom file format, and deliver these files over HTTPS.\n" +"In practice, it's a bit more complex, and a reseed operator must be fairly competent and attentive.\n" +"A reseed server is not appropriate for a residential internet connection. The complexities include:" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:25 msgid "" -"You must have a secure SSL setup with either a self-signed certificate or" -" a cert that chains up to a standard CA" +"You must have a secure SSL setup with either a self-signed certificate or a " +"cert that chains up to a standard CA" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:28 @@ -3312,8 +2771,7 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:37 msgid "" -"The reseed servers are under periodic attacks and DDoS attempts, and from" -" other buggy I2P implementations and botnets.\n" +"The reseed servers are under periodic attacks and DDoS attempts, and from other buggy I2P implementations and botnets.\n" "This necessitates that you run fail2ban or an equivalent solution." msgstr "" @@ -3323,18 +2781,13 @@ msgstr "Informacion i Domosdoshëm" #: i2p2www/pages/site/get-involved/guides/reseed.html:45 msgid "" -"When your setup is complete and ready for testing, we will need the HTTPS" -" URL,\n" +"When your setup is complete and ready for testing, we will need the HTTPS URL,\n" "the SSL public key certificate, and the \"su3\" bundle public key.\n" -"After testing is complete, these will be added to the hardcoded entries " -"in the Java and C++ routers in the next release,\n" +"After testing is complete, these will be added to the hardcoded entries in the Java and C++ routers in the next release,\n" "and you will start seeing traffic.\n" -"We also will need your email address so we may continue to contact you " -"about reseed administration issues.\n" -"The email will not be made public but will be known to the other reseed " -"operators.\n" -"You should expect that your nick or name and its association with that " -"URL or IP will become public." +"We also will need your email address so we may continue to contact you about reseed administration issues.\n" +"The email will not be made public but will be known to the other reseed operators.\n" +"You should expect that your nick or name and its association with that URL or IP will become public." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:55 @@ -3344,10 +2797,8 @@ msgstr "Rregulla Privatësie" #: i2p2www/pages/site/get-involved/guides/reseed.html:57 msgid "" "A reseed operator is a trusted role in the network.\n" -"While we do not yet have a formal privacy policy, you must ensure the " -"privacy of our users\n" -"by not publicizing logs or IPs found in those logs, except as necessary " -"to discuss administration issues with the I2P reseed team." +"While we do not yet have a formal privacy policy, you must ensure the privacy of our users\n" +"by not publicizing logs or IPs found in those logs, except as necessary to discuss administration issues with the I2P reseed team." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:63 @@ -3356,17 +2807,15 @@ msgstr "Përkrahje Financiare" #: i2p2www/pages/site/get-involved/guides/reseed.html:65 msgid "" -"Modest financial support may be available to those running reseed " -"servers.\n" +"Modest financial support may be available to those running reseed servers.\n" "This support would be in partial reimbursement for your server costs.\n" -"Support will not be paid in advance and will probably not cover all your " -"expenses.\n" -"Support is only available to those who have been running reseed servers " -"in good standing for several months, and is based on actual need." +"Support will not be paid in advance and will probably not cover all your expenses.\n" +"Support is only available to those who have been running reseed servers in good standing for several months, and is based on actual need." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:72 -msgid "If you would like to discuss support, please contact echelon and CC: zzz" +msgid "" +"If you would like to discuss support, please contact echelon and CC: zzz" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:77 @@ -3375,10 +2824,8 @@ msgstr "Si T’ia Fillohet" #: i2p2www/pages/site/get-involved/guides/reseed.html:79 msgid "" -"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at " -"mail.i2p or zzz at i2pmail.org.\n" -"Unfortunately, he is not generally on IRC. The reseed setup is somewhat " -"specialized, and you should direct most questions to him." +"Our reseed coordinator is \"zzz\" and he may be contacted at zzz at mail.i2p or zzz at i2pmail.org.\n" +"Unfortunately, he is not generally on IRC. The reseed setup is somewhat specialized, and you should direct most questions to him." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:84 @@ -3389,18 +2836,16 @@ msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:89 msgid "" -"A Go implementation that includes the web server and all the scripts. " -"This is the recommended solution." +"A Go implementation that includes the web server and all the scripts. This " +"is the recommended solution." msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:95 msgid "" -"For further information, read the information at the following links, and" -" then contact zzz.\n" +"For further information, read the information at the following links, and then contact zzz.\n" "Thank you!" msgstr "" #: i2p2www/pages/site/get-involved/guides/reseed.html:110 msgid "Detailed Instructions" msgstr "Udhëzime të Hollësishme" - diff --git a/i2p2www/translations/sq/LC_MESSAGES/priority.po b/i2p2www/translations/sq/LC_MESSAGES/priority.po index 2e7d5108d86902872286410932858f10d8ab17ac..1b5190c38e07ac893b4a8e7835d2952b95ee5856 100644 --- a/i2p2www/translations/sq/LC_MESSAGES/priority.po +++ b/i2p2www/translations/sq/LC_MESSAGES/priority.po @@ -1,22 +1,25 @@ -# Albanian translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Besnik Bleta <besnik@programeshqip.org>, 2018 +# Besnik Bleta <besnik@programeshqip.org>, 2018 +# Besnik Bleta <besnik@programeshqip.org>, 2018 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-10-11 16:27+0000\n" -"PO-Revision-Date: 2021-10-12 09:24+0000\n" -"Last-Translator: Besnik Bleta <besnik@programeshqip.org>\n" +"PO-Revision-Date: 2013-02-03 00:02+0000\n" +"Last-Translator: Besnik Bleta <besnik@programeshqip.org>, 2018\n" "Language-Team: Albanian (http://www.transifex.com/otf/I2P/language/sq/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: sq\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/blog/category.html:2 msgid "Blog Category" @@ -55,10 +58,8 @@ msgstr "Autor:" #: i2p2www/pages/downloads/browser-content.html:1 msgid "" -"Your web browser will need to be configured in order to browse web sites " -"on I2P\n" -"and to utilize the outproxies available within I2P. Below are " -"walkthroughs for\n" +"Your web browser will need to be configured in order to browse web sites on I2P\n" +"and to utilize the outproxies available within I2P. Below are walkthroughs for\n" "some of the most popular browsers." msgstr "" @@ -69,15 +70,13 @@ msgstr "Profil Firefox për Windows" #: i2p2www/pages/downloads/browser-content.html:8 #, python-format msgid "" -"If you are using Windows, the recommended way of accessing I2P is using " -"the\n" +"If you are using Windows, the recommended way of accessing I2P is using the\n" "<a href='%(profile)s'>Firefox profile</a>." msgstr "" #: i2p2www/pages/downloads/browser-content.html:12 msgid "" -"If you do not wish to use that profile or are not on Windows, you need to" -"\n" +"If you do not wish to use that profile or are not on Windows, you need to\n" "configure your browser yourself. Read below on how to that." msgstr "" @@ -98,26 +97,21 @@ msgstr "Formësim eksperimental, bazuar në zgjerime" #: i2p2www/pages/downloads/browser-content.html:30 msgid "" "A new way of automatically configuring the I2P Browser is\n" -"currently being tested. It uses the Firefox's \"Container Tabs\" to build" -" private\n" +"currently being tested. It uses the Firefox's \"Container Tabs\" to build private\n" "browsing tools for use with I2P and I2P applications." msgstr "" #: i2p2www/pages/downloads/browser-content.html:33 msgid "" "It does pre-configuration of your browser by enabling some of\n" -"the privacy Browser Settings like ResistFingerprinting, and enforces " -"WebRTC proxy\n" -"obedience. It also contains menus, shortcuts, and monitoring tools " -"improving\n" -"Firefox's integration with I2P. It is a by-product of the I2P Browser " -"project.\n" +"the privacy Browser Settings like ResistFingerprinting, and enforces WebRTC proxy\n" +"obedience. It also contains menus, shortcuts, and monitoring tools improving\n" +"Firefox's integration with I2P. It is a by-product of the I2P Browser project.\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:38 msgid "" -"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon" -"/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" +"The extension, <a href=\"https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/\">I2P in Private Browsing</a>,\n" "can be obtained from the Mozilla addon store.\n" msgstr "" @@ -128,8 +122,7 @@ msgstr "Udhëzime për Firefox 57 dhe më të madh:" #: i2p2www/pages/downloads/browser-content.html:42 msgid "" "From the Menu button in the top right, select <em>Preferences</em>.\n" -"Scroll down until you see the <em>Network Proxy</em> section, as shown in" -" the\n" +"Scroll down until you see the <em>Network Proxy</em> section, as shown in the\n" "screenshot below. Click on <em>Settings</em>" msgstr "" @@ -141,8 +134,7 @@ msgstr "Mundësi Rrjeti për Firefox57" msgid "" "In the <em>Connection Settings</em> pop-up, select <em>Manual proxy\n" " configuration</em>. Set both the HTTP and SSL Proxy to address\n" -"<code>127.0.0.1</code> with port <code>4444</code> as shown in the " -"following\n" +"<code>127.0.0.1</code> with port <code>4444</code> as shown in the following\n" "screenshot." msgstr "" @@ -150,9 +142,7 @@ msgstr "" msgid "" "Firefox57\n" "Connection Settings" -msgstr "" -"Rregullime Lidhjeje\n" -"për Firefox57" +msgstr "Rregullime Lidhjeje\npër Firefox57" #: i2p2www/pages/downloads/browser-content.html:57 msgid "Firefox57 Connection Settings" @@ -181,17 +171,11 @@ msgstr " Chrome " #: i2p2www/pages/downloads/browser-content.html:69 msgid "" "An experimental, partially-automated configuration process for\n" -"Chrome is available. In order to configure it, create a new " -"<em>Profile</em>\n" -"especially for your I2P browsing, separate from the default profile. Then" -" install\n" -"this <a " -"href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a>" -" in your newly-created profile. This profile\n" -"is now configured to use I2P. Highly detailed instructions are available " -"at the\n" -"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-" -"Chromium\">homepage.</a>\n" +"Chrome is available. In order to configure it, create a new <em>Profile</em>\n" +"especially for your I2P browsing, separate from the default profile. Then install\n" +"this <a href=\"https://chrome.google.com/webstore/detail/i2pchromejs/ikdjcmomgldfciocnpekfndklkfgglpe\"><em>Extension</em></a> in your newly-created profile. This profile\n" +"is now configured to use I2P. Highly detailed instructions are available at the\n" +"<a href=\"https://eyedeekay.github.io/I2P-Configuration-For-Chromium\">homepage.</a>\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:76 @@ -200,14 +184,10 @@ msgstr "Krejt versionet Chrome" #: i2p2www/pages/downloads/browser-content.html:77 msgid "" -"Chromium-Based Browsers like Chrome have slightly different places for " -"their\n" -"proxy settings depending on variant and platform. These instructions may " -"be\n" -"slightly different in Brave or Iridium, for instance. From the " -"<em>Main</em>\n" -"menu, navigate to the <em>Settings</em>, and search for the <em></em> " -"menu item.\n" +"Chromium-Based Browsers like Chrome have slightly different places for their\n" +"proxy settings depending on variant and platform. These instructions may be\n" +"slightly different in Brave or Iridium, for instance. From the <em>Main</em>\n" +"menu, navigate to the <em>Settings</em>, and search for the <em></em> menu item.\n" "Clicking it will open the right settings for your platform." msgstr "" @@ -217,10 +197,8 @@ msgstr "Mundësi Ndërmjetësi për Chrome-in" #: i2p2www/pages/downloads/browser-content.html:85 msgid "" -"On Windows, this button will launch you into the shared proxy settings " -"used\n" -"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure" -" it by\n" +"On Windows, this button will launch you into the shared proxy settings used\n" +"by <a href=\"#ie8\"><em>Internet Explorer</em></a>, and you can configure it by\n" "following the Internet Explorer 8 guide." msgstr "" @@ -235,42 +213,29 @@ msgstr "Formësim me bazë zgjerime" #: i2p2www/pages/downloads/browser-content.html:94 msgid "" "Modern Firefoxes(The \"Fenix\" based Firefoxes) do not generally have\n" -"an about:config page for you to configure proxy settings manually. It is " -"further\n" -"not possible to use most extensions in Fenix-based Firefoxes. It is " -"possible to\n" -"enable support about:config and enable more extensions in Firefox Nightly" -" at the time \n" -"of this writing, but it's a manual and difficult process. " -"<em>IceRaven</em> is a fork\n" -"of Firefox which enables a collection of extensions while Mozilla and the" -" Mozilla\n" -"Community work on adding support for extensions to Firefox for Android. " -"It provides\n" -"the easiest way of configuring a modern Firefox-based Browser for " -"Android. It does\n" -"not come from Mozilla and carries no guarantees from them. <em>Installing" -" the extension\n" +"an about:config page for you to configure proxy settings manually. It is further\n" +"not possible to use most extensions in Fenix-based Firefoxes. It is possible to\n" +"enable support about:config and enable more extensions in Firefox Nightly at the time \n" +"of this writing, but it's a manual and difficult process. <em>IceRaven</em> is a fork\n" +"of Firefox which enables a collection of extensions while Mozilla and the Mozilla\n" +"Community work on adding support for extensions to Firefox for Android. It provides\n" +"the easiest way of configuring a modern Firefox-based Browser for Android. It does\n" +"not come from Mozilla and carries no guarantees from them. <em>Installing the extension\n" "in IceRaven will proxy all your IceRaven browsing over I2P.</em>" msgstr "" #: i2p2www/pages/downloads/browser-content.html:104 msgid "" -"If you have not installed IceRaven yet, go to the next step. If you have " -"been\n" -"using IceRaven for a while, go to the main menu, select the History tab, " -"and make\n" -"sure that you have cleared information about your past browsing by " -"tapping the\n" +"If you have not installed IceRaven yet, go to the next step. If you have been\n" +"using IceRaven for a while, go to the main menu, select the History tab, and make\n" +"sure that you have cleared information about your past browsing by tapping the\n" "\"Delete History\" button." msgstr "" #: i2p2www/pages/downloads/browser-content.html:108 msgid "" -"Open the IceRaven main menu, and scroll to the top until you see the " -"\"Add-Ons\"\n" -"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. " -"Install\n" +"Open the IceRaven main menu, and scroll to the top until you see the \"Add-Ons\"\n" +"submenu. Tap the \"Add-Ons Manager\" option in the \"Add-Ons\" submenu. Install\n" "the extension named <em>I2P Proxy for Android and other Systems</em>.\n" msgstr "" @@ -282,23 +247,19 @@ msgstr "" msgid "" "This extension also works in pre-Fenix(Pre-Firefox-68) Firefox based\n" "web browsers, if installed from the following addons.mozilla.org URL.\n" -"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-" -"proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" +"<em><a href=\"https://addons.mozilla.org/en-US/android/addon/i2p-proxy/\">I2P Proxy for Android and Other Systems</a><em>\n" msgstr "" #: i2p2www/pages/downloads/browser-content.html:118 msgid "" -"This extension is identical to the Chromium extension and is built from " -"the same source." +"This extension is identical to the Chromium extension and is built from the " +"same source." msgstr "" #: i2p2www/pages/downloads/browser-content.html:119 msgid "" -"In order to enable extension support in Firefox Nightly, you should " -"follow\n" -"the steps provided by Mozilla on their <a " -"href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-" -"support-in-firefox-for-android-nightly/\">Blog</a>" +"In order to enable extension support in Firefox Nightly, you should follow\n" +"the steps provided by Mozilla on their <a href=\"https://blog.mozilla.org/addons/2020/09/29/expanded-extension-support-in-firefox-for-android-nightly/\">Blog</a>" msgstr "" #: i2p2www/pages/downloads/browser-content.html:124 @@ -307,8 +268,7 @@ msgstr "Internet Explorer" #: i2p2www/pages/downloads/browser-content.html:125 msgid "" -"In the start menu search for the the \"Network and Internet Settings\" to" -" open the\n" +"In the start menu search for the the \"Network and Internet Settings\" to open the\n" "settings. The last entry in the menu is the Proxy Settings, click it to\n" "your proxy to connect to I2P." msgstr "" @@ -319,14 +279,10 @@ msgstr "Mundësi Internet për IE-n" #: i2p2www/pages/downloads/browser-content.html:131 msgid "" -"Now set the checkmark at \"use a proxy server for your LAN\" and at the " -"\"Bypass\n" -"proxy server for local addresses\". With a click on Advanced-button you " -"open the\n" -"window to open the ports. Enter the values like on the picture, IP " -"127.0.0.1\n" -"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save " -"the\n" +"Now set the checkmark at \"use a proxy server for your LAN\" and at the \"Bypass\n" +"proxy server for local addresses\". With a click on Advanced-button you open the\n" +"window to open the ports. Enter the values like on the picture, IP 127.0.0.1\n" +"and port 4444 for HTTP, port 4445 for HTTPS. With clicks on OK you save the\n" "settings and your browser is set to use the I2P proxy." msgstr "" @@ -336,18 +292,15 @@ msgstr "Rregullime Ndërmjetësi për IE-n" #: i2p2www/pages/downloads/browser-content.html:143 msgid "" -"Remember: I2P was not designed for creating proxies to the outer " -"Internet.\n" +"Remember: I2P was not designed for creating proxies to the outer Internet.\n" "Instead, it is meant to be used as an internal network." msgstr "" #: i2p2www/pages/downloads/browser-content.html:147 msgid "" -"<p><b>The I2P project itself does not run any proxies to the " -"Internet.</b>\n" +"<p><b>The I2P project itself does not run any proxies to the Internet.</b>\n" "The only outproxy is a service from the privacy solutions project.\n" -"Consider donating to them for a continued stable service. Increased " -"funding will\n" +"Consider donating to them for a continued stable service. Increased funding will\n" "allow them to improve this service. </p>\n" "<a href=\"http://privacysolutions.no\"\n" " target=\"_blank\">http://privacysolutions.no</a>" @@ -356,10 +309,8 @@ msgstr "" #: i2p2www/pages/downloads/browser-content.html:155 #, python-format msgid "" -"By default, I2P comes with two outproxies configured: " -"<code>%(http)s</code>\n" -"and <code>%(https)s</code>. Even the domain names are different, it's the" -" same outproxy you hit.\n" +"By default, I2P comes with two outproxies configured: <code>%(http)s</code>\n" +"and <code>%(https)s</code>. Even the domain names are different, it's the same outproxy you hit.\n" "(multi-homed/keyed for better performance)" msgstr "" @@ -367,15 +318,13 @@ msgstr "" msgid "" "Filtering is active on these outproxies (for example, mibbit and torrent\n" "tracker access is blocked). I2P Sites\n" -"that are accessible via .i2p addresses are also not allowed via the " -"outproxies.\n" +"that are accessible via .i2p addresses are also not allowed via the outproxies.\n" "As a convenience, the outproxy blocks ad servers." msgstr "" #: i2p2www/pages/downloads/browser-content.html:166 msgid "" -"<a href=\"https://www.torproject.org\">Tor</a> is a good application to " -"use as an\n" +"<a href=\"https://www.torproject.org\">Tor</a> is a good application to use as an\n" "outproxy to the Internet." msgstr "" @@ -393,13 +342,10 @@ msgstr "Debian Buster, Ubuntu Bionic, dhe të mëvonshëm" #: i2p2www/pages/downloads/debian.html:7 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have " -"older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +"However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" "If you are not running Debian Sid or the latest Ubuntu release,\n" -"use our Debian repo or Launchpad PPA to ensure you're running the latest " -"I2P version." +"use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/debian.html:14 @@ -421,8 +367,7 @@ msgstr "<a href=\"#debian\">Debian Linux</a> (Wheezy dhe më të ri)" #: i2p2www/pages/downloads/debian.html:23 #, python-format msgid "" -"The I2P packages <em>may</em> work on systems not listed above. Please " -"report any issues\n" +"The I2P packages <em>may</em> work on systems not listed above. Please report any issues\n" "with these packages on <a href=\"%(trac)s\">Trac</a> at\n" "<a href=\"%(trac)s\">https://trac.i2p2.de</a>." msgstr "" @@ -431,9 +376,7 @@ msgstr "" msgid "" "Option 1: <a href=\"#ubuntu\">Recent versions</a> of Ubuntu and its " "derivatives (<em>Try this if you're not using Debian)</em>" -msgstr "" -"Mundësia 1: <a href=\"#ubuntu\">Versione së fundi</a> të Ubuntu-së dhe " -"derivatesh të tij (<em>Provojeni nëse nuk gjendeni nën Debian)</em>" +msgstr "Mundësia 1: <a href=\"#ubuntu\">Versione së fundi</a> të Ubuntu-së dhe derivatesh të tij (<em>Provojeni nëse nuk gjendeni nën Debian)</em>" #: i2p2www/pages/downloads/debian.html:30 msgid "Option 2: <a href=\"#debian\">Debian</a> (including Debian-derivatives)" @@ -479,38 +422,35 @@ msgstr "Shtim PPA-sh Duke Përdorur Synaptic-un" #: i2p2www/pages/downloads/debian.html:61 msgid "" -"Open Synaptic (System -> Administration -> Synaptic Package " -"Manager)." +"Open Synaptic (System -> Administration -> Synaptic Package Manager)." msgstr "" #: i2p2www/pages/downloads/debian.html:66 msgid "" -"Once Synaptic opens, select <em>Repositories</em> from the " -"<em>Settings</em> menu." +"Once Synaptic opens, select <em>Repositories</em> from the <em>Settings</em>" +" menu." msgstr "" #: i2p2www/pages/downloads/debian.html:71 msgid "" "Click the <em>Other Sources</em> tab and click <em>Add</em>. Paste " "<code>ppa:i2p-maintainers/i2p</code> into the APT-line field and click " -"<em>Add Source</em>. Click the <em>Close</em> button then " -"<em>Reload</em>." +"<em>Add Source</em>. Click the <em>Close</em> button then <em>Reload</em>." msgstr "" #: i2p2www/pages/downloads/debian.html:76 msgid "" "In the Quick Filter box, type in <code>i2p</code> and press enter. When " "<code>i2p</code> is returned in the results list, right click " -"<code>i2p</code> and select <em>Mark for Installation</em>. After doing " -"so you may see a <em>Mark additional required changes?</em> popup. If so," -" click <em>Mark</em> then <em>Apply</em>." +"<code>i2p</code> and select <em>Mark for Installation</em>. After doing so " +"you may see a <em>Mark additional required changes?</em> popup. If so, click" +" <em>Mark</em> then <em>Apply</em>." msgstr "" #: i2p2www/pages/downloads/debian.html:82 msgid "" "After the installation process completes you can move on to the next\n" -"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring " -"it for your system." +"part of <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your system." msgstr "" #: i2p2www/pages/downloads/debian.html:87 @@ -523,10 +463,8 @@ msgstr "Arkitektura të mbuluara aktualisht" #: i2p2www/pages/downloads/debian.html:91 msgid "" -"Note: The steps below should be performed with root access (i.e., " -"switching\n" -"user to root with <code>su</code> or by prefixing each command with " -"<code>sudo</code>)." +"Note: The steps below should be performed with root access (i.e., switching\n" +"user to root with <code>su</code> or by prefixing each command with <code>sudo</code>)." msgstr "" #: i2p2www/pages/downloads/debian.html:96 @@ -539,8 +477,7 @@ msgstr "" #, python-format msgid "" "\n" -" Check which version of Debian you are using on this page at the <a " -"href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" +" Check which version of Debian you are using on this page at the <a href=\"https://wiki.debian.org/LTS/\" target=\"_blank\">Debian wiki</a>\n" " and verify with <code>%(file2)s</code> on your system.\n" " Then, add lines like the following to <code>%(file)s</code>." msgstr "" @@ -571,23 +508,21 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:175 msgid "" "This command will retrieve the latest list of software from every\n" -"repository enabled on your system, including the I2P repository added in " -"step\n" +"repository enabled on your system, including the I2P repository added in step\n" "1." msgstr "" #: i2p2www/pages/downloads/debian.html:181 msgid "" -"You are now ready to install I2P! Installing the <code>i2p-keyring</code>" -"\n" +"You are now ready to install I2P! Installing the <code>i2p-keyring</code>\n" "package will ensure that you receive updates to the repository's GPG key." msgstr "" #: i2p2www/pages/downloads/debian.html:191 msgid "" -"After the installation process completes you can move on to the next part" -" of <a href=\"#Post-install_work\">starting I2P</a> and configuring it " -"for your system." +"After the installation process completes you can move on to the next part of" +" <a href=\"#Post-install_work\">starting I2P</a> and configuring it for your" +" system." msgstr "" #: i2p2www/pages/downloads/debian.html:196 @@ -603,19 +538,15 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:204 msgid "" -""on demand" using the i2prouter script. Simply run " -""<code>i2prouter\n" -"start</code>" from a command prompt. (Note: Do " -"<strong><u>not</u></strong> use\n" +""on demand" using the i2prouter script. Simply run "<code>i2prouter\n" +"start</code>" from a command prompt. (Note: Do <strong><u>not</u></strong> use\n" "sudo or run it as root!)" msgstr "" #: i2p2www/pages/downloads/debian.html:211 msgid "" -""on demand" without the <a " -"href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" -"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-" -"nowrapper</code>\".\n" +""on demand" without the <a href=\"http://wrapper.tanukisoftware.com/\">java service wrapper</a>\n" +"(needed on non-Linux/non-x86 systems) by running \"<code>i2prouter-nowrapper</code>\".\n" "(Note: Do <strong><u>not</u></strong>\n" "use sudo or run it as root!)" msgstr "" @@ -623,30 +554,23 @@ msgstr "" #: i2p2www/pages/downloads/debian.html:219 msgid "" "as a service that automatically runs when your system boots, even\n" -"before logging in. The service can be enabled with \"<code>dpkg-" -"reconfigure\n" -"i2p</code>\" as root or using sudo. This is the recommended means of " -"operation." +"before logging in. The service can be enabled with \"<code>dpkg-reconfigure\n" +"i2p</code>\" as root or using sudo. This is the recommended means of operation." msgstr "" #: i2p2www/pages/downloads/debian.html:227 msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" -"if you can. The ports to forward can be found on the <a " -"href=\"http://127.0.0.1:7657/confignet\">\n" -"network configuration page</a> in the router console. If guidance with " -"respect to forwarding ports is needed,\n" -"you may find <a href=\"http://portforward.com\">portforward.com</a> to be" -" helpful." +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" +"if you can. The ports to forward can be found on the <a href=\"http://127.0.0.1:7657/confignet\">\n" +"network configuration page</a> in the router console. If guidance with respect to forwarding ports is needed,\n" +"you may find <a href=\"http://portforward.com\">portforward.com</a> to be helpful." msgstr "" #: i2p2www/pages/downloads/debian.html:234 msgid "" "Please review and <b>adjust the bandwidth settings</b> on the\n" "<a href=\"http://127.0.0.1:7657/config.jsp\">configuration page</a>,\n" -"as the default settings of 96 KB/s down / 40 KB/s up are fairly " -"conservative." +"as the default settings of 96 KB/s down / 40 KB/s up are fairly conservative." msgstr "" #: i2p2www/pages/downloads/debian.html:240 @@ -654,8 +578,7 @@ msgstr "" #, python-format msgid "" "If you want to reach I2P Sites via your browser, have a look on the <a " -"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy " -"howto." +"href=\"%(browserconfig)s\">browser proxy setup</a> page for an easy howto." msgstr "" #: i2p2www/pages/downloads/docker.html:5 @@ -690,9 +613,9 @@ msgstr "" #: i2p2www/pages/downloads/docker.html:24 msgid "" -"<p>Note that this quick-start approach is not suitable for production " -"use. If you want to use I2P in production please read all the " -"instructions on this page." +"<p>Note that this quick-start approach is not suitable for production use. " +"If you want to use I2P in production please read all the instructions on " +"this page." msgstr "" #: i2p2www/pages/downloads/docker.html:25 @@ -716,8 +639,8 @@ msgstr "Vëllime" #: i2p2www/pages/downloads/docker.html:30 msgid "" -"The container requires a volume for the configuration data to be mounted." -" Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " +"The container requires a volume for the configuration data to be mounted. " +"Optionally, you can mount a separate volume for torrent (“i2psnarkâ€) " "downloads. See the example below." msgstr "" @@ -738,8 +661,8 @@ msgstr "Porta" #: i2p2www/pages/downloads/docker.html:34 msgid "" -"There are several ports which are exposed by the image. You can choose " -"which ones to publish depending on your specific needs." +"There are several ports which are exposed by the image. You can choose which" +" ones to publish depending on your specific needs." msgstr "" #: i2p2www/pages/downloads/docker.html:38 @@ -813,11 +736,10 @@ msgstr "TCP dhe UDP" #: i2p2www/pages/downloads/docker.html:96 msgid "" "You probably want at least the Router Console (7657) and the HTTP Proxy " -"(4444). If you want I2P to be able to receive incoming connections from " -"the internet, and hence not think it’s firewalled, publish the I2NP " -"Protocol port (12345) - but make sure you publish to a different random " -"port, otherwise others may be able to guess you’re running I2P in a " -"Docker image." +"(4444). If you want I2P to be able to receive incoming connections from the " +"internet, and hence not think it’s firewalled, publish the I2NP Protocol " +"port (12345) - but make sure you publish to a different random port, " +"otherwise others may be able to guess you’re running I2P in a Docker image." msgstr "" #: i2p2www/pages/downloads/docker.html:97 @@ -827,9 +749,9 @@ msgstr "Shembull" #: i2p2www/pages/downloads/docker.html:98 msgid "" "Here is an example container that mounts <code>i2phome</code> as home " -"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, " -"IRC, Router Console and I2NP Protocols. It also limits the memory " -"available to the JVM to 256MB." +"directory, <code>i2ptorrents</code> for torrents, and opens HTTP Proxy, IRC," +" Router Console and I2NP Protocols. It also limits the memory available to " +"the JVM to 256MB." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:6 @@ -840,17 +762,12 @@ msgstr "" #: i2p2www/pages/downloads/easyinstall.html:7 #, python-format msgid "" -"This is an \"All-in-One\" installer for Windows 10 which includes the " -"complete I2P\n" -"desktop software and all of its dependencies in a single, easy-to-install" -"\n" -"package. It is built on the premise that I2P should be easy, and that we " -"should\n" -"help our users get their initial configuration in place instead of " -"requiring an\n" +"This is an \"All-in-One\" installer for Windows 10 which includes the complete I2P\n" +"desktop software and all of its dependencies in a single, easy-to-install\n" +"package. It is built on the premise that I2P should be easy, and that we should\n" +"help our users get their initial configuration in place instead of requiring an\n" "elaborate install process. To learn more about the Firefox profile that\n" -"comes bundled with this installer, visit <a href=\"%(firefox)s\">The " -"Firefox\n" +"comes bundled with this installer, visit <a href=\"%(firefox)s\">The Firefox\n" "Profile Page</a>." msgstr "" @@ -865,12 +782,9 @@ msgstr "Thjesht Firefox (Ose Shfletuesin Tor)." #: i2p2www/pages/downloads/easyinstall.html:19 #, python-format msgid "" -"This installer still requires Firefox to be installed on the system, it " -"does not\n" -"bundle a Firefox installer of its own. Please obtain Firefox from " -"Mozilla, or\n" -"Tor Browser from the Tor Project or one of their mirrors. If you would " -"like to\n" +"This installer still requires Firefox to be installed on the system, it does not\n" +"bundle a Firefox installer of its own. Please obtain Firefox from Mozilla, or\n" +"Tor Browser from the Tor Project or one of their mirrors. If you would like to\n" "discuss supporting other browsers, please join the discussionon the\n" "<a href=\"%(issueurl)s\">Gitlab Issue</a>. This is a Windows-only\n" "product." @@ -883,17 +797,12 @@ msgstr "Pse do të duhej ta përdor?" #: i2p2www/pages/downloads/easyinstall.html:28 msgid "" -"This installer package reduces the number of steps required to install an" -" I2P\n" -"router on Windows from about 30 to a matter of completing a single, " -"familiar\n" -"installer process, combining the I2P installation and Browser " -"configuration into\n" +"This installer package reduces the number of steps required to install an I2P\n" +"router on Windows from about 30 to a matter of completing a single, familiar\n" +"installer process, combining the I2P installation and Browser configuration into\n" "the same steps. Besides that, it launches the user directly into the\n" -"automatically configured I2P browser with their applications ready-to-" -"use, with\n" -"no need to refer to potentially unhelpful system-wide Windows settings. " -"The I2P\n" +"automatically configured I2P browser with their applications ready-to-use, with\n" +"no need to refer to potentially unhelpful system-wide Windows settings. The I2P\n" "it uses is otherwise identical to the \"regular\" I2P." msgstr "" @@ -907,32 +816,24 @@ msgstr "Si ta përdor?" #, python-format msgid "" "First, download and install <a href=\"%(firefox)s\">Firefox</a>, then,\n" -"just download and install <a href=\"%(postfilename)s\">this " -"installer</a>. To\n" +"just download and install <a href=\"%(postfilename)s\">this installer</a>. To\n" "start an installer, \"double-click\" the downloaded .exe file." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:43 msgid "" -"Running the installer will create a shortcut to start browsing I2P in " -"your start\n" -"menu and on your desktop. Clicking this shortcut will start I2P if " -"necessary,\n" -"then start an I2P Browser. On the first run, you will also be promted " -"with the\n" -"bandwidth wizard in your browser window. You will also see a \"Toopie\" " -"icon in\n" -"your taskbar to indicate that I2P is working when the browser window is " -"closed." +"Running the installer will create a shortcut to start browsing I2P in your start\n" +"menu and on your desktop. Clicking this shortcut will start I2P if necessary,\n" +"then start an I2P Browser. On the first run, you will also be promted with the\n" +"bandwidth wizard in your browser window. You will also see a \"Toopie\" icon in\n" +"your taskbar to indicate that I2P is working when the browser window is closed." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:50 msgid "" "I2P Browsing uses a separate, I2P-Only Firefox\n" -"profile, so it won't interfere with your regular Firefox use or require " -"any\n" -"special configuration. You don't even need to close existing Firefox " -"windows." +"profile, so it won't interfere with your regular Firefox use or require any\n" +"special configuration. You don't even need to close existing Firefox windows." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:65 @@ -972,10 +873,8 @@ msgstr "" #: i2p2www/pages/downloads/firefox.html:73 msgid "" "The I2P router is \"jpackaged\" which means that it includes all\n" -"the required Java components it needs to run successfully. It does not " -"require\n" -"a separate Java installation, because it bundles a Java 16 Runtime which " -"is only\n" +"the required Java components it needs to run successfully. It does not require\n" +"a separate Java installation, because it bundles a Java 16 Runtime which is only\n" "used for I2P." msgstr "" @@ -987,16 +886,11 @@ msgstr "Zgjerime Shfletuesi:" #: i2p2www/pages/downloads/easyinstall.html:95 #: i2p2www/pages/downloads/firefox.html:80 msgid "" -"The browser profile also includes both the NoScript and HTTPSEverywhere " -"plugin for\n" -"better protection Javascript based attacks and HTTPS support where " -"available. It\n" -"also keeps your I2P search activity separate from your visible internet " -"search\n" -"activity. The profile configures the I2P Proxy for all sites and browser " -"features.\n" -"I2P In Private Browsing is used to provide I2P-Specific browser " -"integrations." +"The browser profile also includes both the NoScript and HTTPSEverywhere plugin for\n" +"better protection Javascript based attacks and HTTPS support where available. It\n" +"also keeps your I2P search activity separate from your visible internet search\n" +"activity. The profile configures the I2P Proxy for all sites and browser features.\n" +"I2P In Private Browsing is used to provide I2P-Specific browser integrations." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:101 @@ -1007,19 +901,16 @@ msgstr "Kod Burim dhe Ndjekje Problemesh" #: i2p2www/pages/downloads/easyinstall.html:102 #: i2p2www/pages/downloads/firefox.html:87 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" -"find it on i2pgit.org or github.com. The license for each respective " -"component\n" -"can be found in the license directory of the <code>i2p.firefox</code> " -"project." +"If you would like to examine the source code for individual components, you may\n" +"find it on i2pgit.org or github.com. The license for each respective component\n" +"can be found in the license directory of the <code>i2p.firefox</code> project." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:107 #: i2p2www/pages/downloads/easyinstall.html:115 #: i2p2www/pages/downloads/firefox.html:92 -#: i2p2www/pages/downloads/firefox.html:100 i2p2www/pages/downloads/mac.html:79 -#: i2p2www/pages/downloads/mac.html:86 +#: i2p2www/pages/downloads/firefox.html:100 +#: i2p2www/pages/downloads/mac.html:79 i2p2www/pages/downloads/mac.html:86 msgid "Gitlab Repository" msgstr "Depo GitLab" @@ -1031,11 +922,9 @@ msgstr "Depo GitHub" #: i2p2www/pages/downloads/easyinstall.html:109 #: i2p2www/pages/downloads/firefox.html:94 msgid "" -"If you wish to file an issue about the Firefox profile, please use Gitlab" -" to\n" +"If you wish to file an issue about the Firefox profile, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at least Reporter access\"\n" +"\"This issue is confidential and should only be visible to team members with at least Reporter access\"\n" "option when filing the issue." msgstr "" @@ -1047,50 +936,34 @@ msgstr "Ku ndryshon nga Shfletuesi Tor?" #: i2p2www/pages/downloads/easyinstall.html:117 #: i2p2www/pages/downloads/firefox.html:102 msgid "" -"This is not a fork of Firefox. Instead, it is a browser profile with pre-" -"configured\n" -"settings, combined with an I2P router and some launcher scripts. That " -"means that\n" -"it requires Firefox(Or Tor Browser) to be installed before you can use " -"it. This\n" -"is for security reasons, it is important that you are able to recieve " -"reliable\n" +"This is not a fork of Firefox. Instead, it is a browser profile with pre-configured\n" +"settings, combined with an I2P router and some launcher scripts. That means that\n" +"it requires Firefox(Or Tor Browser) to be installed before you can use it. This\n" +"is for security reasons, it is important that you are able to recieve reliable\n" "updates from a trustworthy vendor." msgstr "" #: i2p2www/pages/downloads/easyinstall.html:124 #: i2p2www/pages/downloads/firefox.html:109 msgid "" -"I2P routers are designed to have long uptimes, and so unlike Tor Browser," -" the\n" -"lifetime of your I2P Router is not tied to the lifetime of your I2P " -"browsing\n" -"session. The browser profile will manage your history, your browser's " -"local\n" -"storage and cache, and your browsing context but it will never stop your " -"I2P\n" -"router on its own. You may stop the router using the web interface on the" -"\n" +"I2P routers are designed to have long uptimes, and so unlike Tor Browser, the\n" +"lifetime of your I2P Router is not tied to the lifetime of your I2P browsing\n" +"session. The browser profile will manage your history, your browser's local\n" +"storage and cache, and your browsing context but it will never stop your I2P\n" +"router on its own. You may stop the router using the web interface on the\n" "router console homepage." msgstr "" #: i2p2www/pages/downloads/firefox.html:7 #, python-format msgid "" -"The I2P Firefox Browser Profile has been expanded into the new I2P Easy " -"Install\n" -"Bundle, which is in Beta. If you already have an I2P Router installed, it" -" is\n" -"still safe to use this installer to configure your I2P Browser. Your " -"existing\n" -"I2P Settings will be left untouched. If you do not have an I2P router " -"installed,\n" -"then you do not need to install I2P. This package will install I2P at the" -" same\n" -"time it installs the browser profile. This page has been kept to document" -" the\n" -"motivations and design of the included Firefox profile. To learn more " -"about the\n" +"The I2P Firefox Browser Profile has been expanded into the new I2P Easy Install\n" +"Bundle, which is in Beta. If you already have an I2P Router installed, it is\n" +"still safe to use this installer to configure your I2P Browser. Your existing\n" +"I2P Settings will be left untouched. If you do not have an I2P router installed,\n" +"then you do not need to install I2P. This package will install I2P at the same\n" +"time it installs the browser profile. This page has been kept to document the\n" +"motivations and design of the included Firefox profile. To learn more about the\n" "new bundle, visit <a href=\"%(nsis)s\">The Easy Install Bundle Page</a>." msgstr "" @@ -1100,30 +973,20 @@ msgstr "Profil I2P Shfletuesi Firefox" #: i2p2www/pages/downloads/firefox.html:18 msgid "" -"Now that you have joined the I2P network, you will want to see I2P Sites " -"and and \n" -"other content that is hosted on the network. The Firefox browser profile " -"is \n" -"pre-configured to allow you to access the content available on the " -"network." +"Now that you have joined the I2P network, you will want to see I2P Sites and and \n" +"other content that is hosted on the network. The Firefox browser profile is \n" +"pre-configured to allow you to access the content available on the network." msgstr "" #: i2p2www/pages/downloads/firefox.html:24 msgid "" -"Browsers are highly complex and powerful engines for executing code and " -"displaying\n" -"information obtained mainly from strangers on the internet. By default, " -"they\n" -"tend to leak a great deal of information about the person using them to " -"the servers\n" -"they retrieve information from. Using this browser profile allows you to " -"become\n" -"part of a \"common\" set of very similar browser users, instead of " -"appearing unique\n" -"or revealing details of your hardware or software. Because this involves " -"disabling \n" -"some browser features, this also reduces the attack surface available to " -"outsiders. \n" +"Browsers are highly complex and powerful engines for executing code and displaying\n" +"information obtained mainly from strangers on the internet. By default, they\n" +"tend to leak a great deal of information about the person using them to the servers\n" +"they retrieve information from. Using this browser profile allows you to become\n" +"part of a \"common\" set of very similar browser users, instead of appearing unique\n" +"or revealing details of your hardware or software. Because this involves disabling \n" +"some browser features, this also reduces the attack surface available to outsiders. \n" "This keeps you safer while browsing the Invisible Web." msgstr "" @@ -1156,8 +1019,7 @@ msgstr "" #, python-format msgid "" "\n" -"If you would like to try the latest experimental I2P projects, visit the " -"<a href = \"%(lab)s\">I2P Lab</a>\n" +"If you would like to try the latest experimental I2P projects, visit the <a href = \"%(lab)s\">I2P Lab</a>\n" msgstr "" #: i2p2www/pages/downloads/list.html:26 @@ -1182,8 +1044,7 @@ msgstr "Instaloni Java: " #, python-format msgid "" " I2P is written in Java and requires\n" -"a Java system to be installed to run. In addition to the I2P download, " -"you need to install Java if you do not have it \n" +"a Java system to be installed to run. In addition to the I2P download, you need to install Java if you do not have it \n" "already installed. I2P requires Java Runtime Version 7 or higher.\n" "(<a href=\"%(java)s\">Oracle</a>,\n" "<a href=\"%(openjdk)s\">OpenJDK</a>, or\n" @@ -1194,8 +1055,7 @@ msgid "" "<br />\n" "<a href=\"%(detectjre)s\">Determine your installed Java version here</a>\n" "or type <tt>java -version</tt> at your command prompt.\n" -"Only two platforms do not require Java to be installed before I2P is " -"installed, those platforms are:" +"Only two platforms do not require Java to be installed before I2P is installed, those platforms are:" msgstr "" #: i2p2www/pages/downloads/list.html:50 @@ -1205,8 +1065,7 @@ msgstr "Android: " #: i2p2www/pages/downloads/list.html:50 msgid "" "Android comes with a Java virtual machine\n" -"as part of the platform, which I2P for Android uses. Therefore it is not " -"necessary to install Java to use\n" +"as part of the platform, which I2P for Android uses. Therefore it is not necessary to install Java to use\n" "I2P for Android." msgstr "" @@ -1217,8 +1076,7 @@ msgstr "Debian dhe Ubuntu: " #: i2p2www/pages/downloads/list.html:53 msgid "" "On Debian and Ubuntu when using\n" -"a .deb package to install, the system will automatically install and " -"configure a Java environment for you." +"a .deb package to install, the system will automatically install and configure a Java environment for you." msgstr "" #: i2p2www/pages/downloads/list.html:56 @@ -1238,8 +1096,7 @@ msgstr "Instaloni/Formësoni një Shfletues(Në daçi): " #: i2p2www/pages/downloads/list.html:58 msgid "" "Finally, you'll need to\n" -"configure applications to use I2P. Many applications can use I2P, but the" -" first application most people configure is a Web\n" +"configure applications to use I2P. Many applications can use I2P, but the first application most people configure is a Web\n" "Browser for browsing I2P sites. Detailed instructions are available on the" msgstr "" @@ -1286,10 +1143,8 @@ msgstr "Paketë “Instalim i Kollajshëm†(Beta)" #: i2p2www/pages/downloads/list.html:106 msgid "" "It's now possible to install all I2P components using\n" -" a single package(<strong>No Java Required</strong>). To try out the" -" new installer, click here.\n" -" This bundle can also be used to configure a Firefox Profile. It " -"will not\n" +" a single package(<strong>No Java Required</strong>). To try out the new installer, click here.\n" +" This bundle can also be used to configure a Firefox Profile. It will not\n" " interfere with an existing I2P installation if one exists.\n" " " msgstr "" @@ -1304,8 +1159,8 @@ msgstr "Udhërrëfyes i Hollësishëm Instalimi" #: i2p2www/pages/downloads/list.html:116 msgid "" -"Here is a helpful guide to installing I2P for Windows using a separate " -"Java installation and the classic installer." +"Here is a helpful guide to installing I2P for Windows using a separate Java " +"installation and the classic installer." msgstr "" #: i2p2www/pages/downloads/list.html:120 @@ -1315,14 +1170,10 @@ msgstr "I2P për Mac OSX" #: i2p2www/pages/downloads/list.html:122 i2p2www/pages/downloads/list.html:150 #, python-format msgid "" -"The most reliable way to launch the installer is from a terminal like " -"this:\n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will " -"launch the GUI installer.\n" -" Depending on how your computer is set up, you may be able to start " -"the\n" -" installer by double-clicking the " -""i2pinstall_%(i2pversion)s.jar" file or\n" +"The most reliable way to launch the installer is from a terminal like this:\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar</code>. This will launch the GUI installer.\n" +" Depending on how your computer is set up, you may be able to start the\n" +" installer by double-clicking the "i2pinstall_%(i2pversion)s.jar" file or\n" " right-clicking the file and selecting "Open with Java".\n" " Unfortunately, this behaviour is difficult to predict." msgstr "" @@ -1334,13 +1185,10 @@ msgstr "Instalim nga rresht urdhri (headless):" #: i2p2www/pages/downloads/list.html:132 i2p2www/pages/downloads/list.html:160 #, python-format msgid "" -"I2P can also be installed in a terminal environment, which may be " -"especially\n" -" useful for servers, containers, or certain virtual machines. If you " -"wish to\n" +"I2P can also be installed in a terminal environment, which may be especially\n" +" useful for servers, containers, or certain virtual machines. If you wish to\n" " use the installer without a GUI, you can use the command \n" -" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to " -"follow\n" +" <code>java -jar i2pinstall_%(i2pversion)s.jar -console</code> to follow\n" " the install procedure in your terminal." msgstr "" @@ -1366,13 +1214,10 @@ msgstr "Ka paketa të gatshme për Debian & Ubuntu." #: i2p2www/pages/downloads/list.html:174 msgid "" -"I2P is available in the official repositories for Ubuntu Bionic and " -"later, and Debian Buster and Sid.\n" -" However, Debian Buster and Ubuntu Bionic (LTS) distributions will " -"have older I2P versions.\n" +"I2P is available in the official repositories for Ubuntu Bionic and later, and Debian Buster and Sid.\n" +" However, Debian Buster and Ubuntu Bionic (LTS) distributions will have older I2P versions.\n" " If you are not running Debian Sid or the latest Ubuntu release,\n" -" use our Debian repo or Launchpad PPA to ensure you're running the " -"latest I2P version." +" use our Debian repo or Launchpad PPA to ensure you're running the latest I2P version." msgstr "" #: i2p2www/pages/downloads/list.html:182 @@ -1381,10 +1226,8 @@ msgstr "I2P për Android" #: i2p2www/pages/downloads/list.html:185 msgid "" -"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier " -"installed\n" -" I2P, unfortunately this release fixes some IPC issues which will " -"force you to uninstall your current installation before installing this." +"Requires Android 4.0 (Ice Cream Sandwich) or higher. If you earlier installed\n" +" I2P, unfortunately this release fixes some IPC issues which will force you to uninstall your current installation before installing this." msgstr "" #: i2p2www/pages/downloads/list.html:189 @@ -1393,10 +1236,8 @@ msgstr "" #: i2p2www/pages/downloads/list.html:192 msgid "" -"The releases are not compatible with eachother, as they have different " -"signatures. Uninstall them\n" -" completely before installing any other version. The apk's from " -"download.i2p2.de are signed by idk." +"The releases are not compatible with eachother, as they have different signatures. Uninstall them\n" +" completely before installing any other version. The apk's from download.i2p2.de are signed by idk." msgstr "" #: i2p2www/pages/downloads/list.html:199 @@ -1414,31 +1255,27 @@ msgid "docker pull geti2p/i2p" msgstr "" #: i2p2www/pages/downloads/list.html:219 -msgid "Additional instructions for configuring your container can be found here." +msgid "" +"Additional instructions for configuring your container can be found here." msgstr "" #: i2p2www/pages/downloads/list.html:224 #, python-format msgid "" -"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s" -"#getting-the-i2p-code\">monotone</a>\n" -" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a " -"href=\"%(github)s\">Github</a>.\n" +"Alternately, you can fetch the source from <a href=\"%(monotoneurl)s#getting-the-i2p-code\">monotone</a>\n" +" or via Git from <a href=\"%(gitrepo)s\">git.repo.i2p</a> or <a href=\"%(github)s\">Github</a>.\n" " <br />\n" -" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd " -"i2p-%(i2pversion)s ; ant pkg)</code> then either\n" +" Run <code>(tar xjvf i2psource_%(i2pversion)s.tar.bz2 ; cd i2p-%(i2pversion)s ; ant pkg)</code> then either\n" " run the GUI installer or headless install as above." msgstr "" #: i2p2www/pages/downloads/list.html:234 #, python-format msgid "" -"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-" -"code\">git</a>\n" +"Android source is in <a href=\"%(monotoneurl)s#getting-the-i2p-code\">git</a>\n" " and on <a href=\"%(github)s\">Github</a>.\n" " Android builds require the I2P source.\n" -" See the documentation in the Android source for additional build " -"requirements and instructions." +" See the documentation in the Android source for additional build requirements and instructions." msgstr "" #: i2p2www/pages/downloads/list.html:251 @@ -1451,8 +1288,7 @@ msgstr "" #: i2p2www/pages/downloads/list.html:257 #, python-format msgid "" -"The Mac OS X native installer is signed by %(signer)s with his Apple " -"Developer ID certificate,\n" +"The Mac OS X native installer is signed by %(signer)s with his Apple Developer ID certificate,\n" "<a href=\"%(signingkey)s\">whose key is here</a>." msgstr "" @@ -1467,17 +1303,14 @@ msgstr "" #: i2p2www/pages/downloads/list.html:270 msgid "" "If you are running 0.7.5 or later, your router should detect the\n" -"new release. To upgrade simply click the 'Download Update' button on your" -" router console\n" +"new release. To upgrade simply click the 'Download Update' button on your router console\n" "when it appears." msgstr "" #: i2p2www/pages/downloads/list.html:276 msgid "" -"Since 0.9.23, some releases are signed by str4d, whose signing key has " -"been in the router\n" -"since 0.9.9. Routers older than 0.9.9 will fail to verify update files " -"signed by str4d,\n" +"Since 0.9.23, some releases are signed by str4d, whose signing key has been in the router\n" +"since 0.9.9. Routers older than 0.9.9 will fail to verify update files signed by str4d,\n" "and will need to be manually updated using the process below." msgstr "" @@ -1485,8 +1318,7 @@ msgstr "" msgid "" "Download the file to your I2P\n" " installation directory and <b>rename as i2pupdate.zip</b>.\n" -" (alternately, you can get the source as above and run \"ant " -"updater\", then copy the\n" +" (alternately, you can get the source as above and run \"ant updater\", then copy the\n" " resulting i2pupdate.zip to your I2P installation directory). You do\n" " NOT need to unzip the file." msgstr "" @@ -1513,20 +1345,15 @@ msgstr "Hedhje të Mëparshme Në Qarkullim" #: i2p2www/pages/downloads/list.html:316 #, python-format msgid "" -"Previous releases are available on <a " -"href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google " -"Code</a>\n" +"Previous releases are available on <a href=\"http://code.google.com/p/i2p/downloads/list?can=1\">Google Code</a>\n" "and <a href=\"https://launchpad.net/i2p/trunk\">Launchpad</a>\n" -"and within the I2P network on <a " -"href=\"http://%(echelon)s/\">%(echelon)s</a>." +"and within the I2P network on <a href=\"http://%(echelon)s/\">%(echelon)s</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:7 msgid "" -"We are excited to offer you a DMG bundle for Mac OS. It installs and " -"behaves\n" -"the same way many other Mac OS applications do and does not require a " -"Java\n" +"We are excited to offer you a DMG bundle for Mac OS. It installs and behaves\n" +"the same way many other Mac OS applications do and does not require a Java\n" "Runtime Environment to be available." msgstr "" @@ -1534,61 +1361,44 @@ msgstr "" #, python-format msgid "" "This bundle is built for <code>x86_64(Intel)</code> Macs. It will run on\n" -"<code>ARM(M1)</code> Macs in emulated mode, but the performance is " -"unknown. M1 Mac\n" -"users should report results to us at the <a href=\"%(perf)s\">Gitlab " -"Repository</a>." +"<code>ARM(M1)</code> Macs in emulated mode, but the performance is unknown. M1 Mac\n" +"users should report results to us at the <a href=\"%(perf)s\">Gitlab Repository</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:18 msgid "" -"Double-Click on the .dmg file, which you may download from this page. " -"When a\n" -"window appears with the I2P application inside it, \"drag\" the " -"application to the\n" -"\"Applications\" side of the window to install it. Once you're finished, " -"I2P is\n" -"installed and can be launched from Finder. This procedure is the same as " -"any\n" -"other Mac application. When you launch I2P, the I2P icon will appear on " -"the Dock\n" -"and a few seconds later a browser will open with the I2P console page, " -"inviting\n" +"Double-Click on the .dmg file, which you may download from this page. When a\n" +"window appears with the I2P application inside it, \"drag\" the application to the\n" +"\"Applications\" side of the window to install it. Once you're finished, I2P is\n" +"installed and can be launched from Finder. This procedure is the same as any\n" +"other Mac application. When you launch I2P, the I2P icon will appear on the Dock\n" +"and a few seconds later a browser will open with the I2P console page, inviting\n" "you to complete the bandwidth setup wizard." msgstr "" #: i2p2www/pages/downloads/mac.html:27 #, python-format msgid "" -"If you want to browse hidden websites ('eepsites') on the I2P network, " -"you need\n" -"to configure your browser. Instructions for configuring a range of " -"browsers are\n" +"If you want to browse hidden websites ('eepsites') on the I2P network, you need\n" +"to configure your browser. Instructions for configuring a range of browsers are\n" "available on <a href=\"%(browser)s\">the browser configuration\n" "page</a>." msgstr "" #: i2p2www/pages/downloads/mac.html:34 msgid "" -"Two important reasons, 1) because this package is a .dmg, it can be " -"signed with\n" -"a certificate which will be recognized by your computer. This means that " -"your\n" -"computer can automatically make sure that you've obtained I2P from the " -"I2P\n" -"Project, rather than a potentially altered or \"fake\" installer, and 2) " -"because\n" -"it makes I2P easier to install and work with on Apple computers by using " -"tools\n" +"Two important reasons, 1) because this package is a .dmg, it can be signed with\n" +"a certificate which will be recognized by your computer. This means that your\n" +"computer can automatically make sure that you've obtained I2P from the I2P\n" +"Project, rather than a potentially altered or \"fake\" installer, and 2) because\n" +"it makes I2P easier to install and work with on Apple computers by using tools\n" "that are familiar and built-into the operating system." msgstr "" #: i2p2www/pages/downloads/mac.html:61 msgid "" -"Download that file and double-click on it. Accept the License Agreement," -" then\n" -"drag the <code>I2P</code> icon on top of the <code>Applications</code> " -"icon.\n" +"Download that file and double-click on it. Accept the License Agreement, then\n" +"drag the <code>I2P</code> icon on top of the <code>Applications</code> icon.\n" "Launch I2P from Finder." msgstr "" @@ -1598,18 +1408,14 @@ msgstr "Kufizime" #: i2p2www/pages/downloads/mac.html:69 msgid "" -"I2P will not install any launch agents on your Mac. If you want I2P to " -"start on\n" -"system startup, you need to configure a launch agent yourself. You can " -"configure\n" -"I2P to launch when your user logs in by right-clicking on the I2P Dock " -"icon." +"I2P will not install any launch agents on your Mac. If you want I2P to start on\n" +"system startup, you need to configure a launch agent yourself. You can configure\n" +"I2P to launch when your user logs in by right-clicking on the I2P Dock icon." msgstr "" #: i2p2www/pages/downloads/mac.html:75 msgid "" -"If you would like to examine the source code for individual components, " -"you may\n" +"If you would like to examine the source code for individual components, you may\n" "find it on i2pgit.org." msgstr "" @@ -1617,46 +1423,36 @@ msgstr "" msgid "" "If you wish to file an issue about the DMG Bundle, please use Gitlab to\n" "contact us. For security-sensitive issues, please remember to check the\n" -"\"This issue is confidential and should only be visible to team members " -"with at\n" +"\"This issue is confidential and should only be visible to team members with at\n" "least Reporter access\" option when filing the issue." msgstr "" #: i2p2www/pages/downloads/post-install.html:3 msgid "" -"After running the installer on windows, simply click on the \"Start I2P\"" -" button\n" -"which will bring up the <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>,\n" +"After running the installer on windows, simply click on the \"Start I2P\" button\n" +"which will bring up the <a href=\"http://localhost:7657/index.jsp\">router console</a>,\n" "which has further instructions." msgstr "" #: i2p2www/pages/downloads/post-install.html:9 msgid "" "On Unix-like systems, I2P can be started as a service\n" -"using the \"i2prouter\" script, located in the directory you selected for" -" I2P.\n" -"Changing to that directory in a console and issuing \"sh i2prouter " -"status\"\n" -"should tell you the router's status. The arguments \"start\", \"stop\" " -"and \"restart\"\n" -"control the service. The <a " -"href=\"http://localhost:7657/index.jsp\">router console</a>\n" +"using the \"i2prouter\" script, located in the directory you selected for I2P.\n" +"Changing to that directory in a console and issuing \"sh i2prouter status\"\n" +"should tell you the router's status. The arguments \"start\", \"stop\" and \"restart\"\n" +"control the service. The <a href=\"http://localhost:7657/index.jsp\">router console</a>\n" "can be accessed at its usual location.\n" -"For users on OpenSolaris and other systems for which the wrapper (i2psvc)" -" is not supported,\n" +"For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported,\n" "start the router with \"sh runplain.sh\" instead." msgstr "" #: i2p2www/pages/downloads/post-install.html:20 #, python-format msgid "" -"When installing for the first time, please remember to <b>adjust your " -"NAT/firewall</b>\n" +"When installing for the first time, please remember to <b>adjust your NAT/firewall</b>\n" "if you can, bearing in mind the Internet-facing ports I2P uses,\n" "<a href=\"%(faq)s#ports\">described here</a> among other ports.\n" -"If you have successfully opened your port to inbound TCP, also enable " -"inbound TCP on the\n" +"If you have successfully opened your port to inbound TCP, also enable inbound TCP on the\n" "<a href=\"http://localhost:7657/confignet.jsp\">configuration page</a>." msgstr "" @@ -1698,12 +1494,9 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:7 msgid "" -"This is the long way of installing I2P for Windows, using the IzPack " -"based\n" -"installer and a separate Java Virtual Machine installed on the host. If " -"you're new to I2P, you may\n" -"want to try the Beta installer, which requires fewer total steps and " -"automatically configures a JVM,\n" +"This is the long way of installing I2P for Windows, using the IzPack based\n" +"installer and a separate Java Virtual Machine installed on the host. If you're new to I2P, you may\n" +"want to try the Beta installer, which requires fewer total steps and automatically configures a JVM,\n" "I2P, and sets up a Firefox Profile in a single step." msgstr "" @@ -1713,12 +1506,9 @@ msgstr "Ndiqni këtë lidhje për te instaluesi i beta-s" #: i2p2www/pages/downloads/windows.html:14 msgid "" -"This is a detailed, step-by-step guide to installing and configuring I2P," -" including\n" -"all dependencies and setting up a browser, on a new Windows 10 system. " -"Many users\n" -"will be able to skip steps if they already have Java 8 or Firefox " -"installed." +"This is a detailed, step-by-step guide to installing and configuring I2P, including\n" +"all dependencies and setting up a browser, on a new Windows 10 system. Many users\n" +"will be able to skip steps if they already have Java 8 or Firefox installed." msgstr "" #: i2p2www/pages/downloads/windows.html:18 @@ -1751,10 +1541,8 @@ msgstr "Pjesa e Parë: Instalim i Java-s" #: i2p2www/pages/downloads/windows.html:31 msgid "" -"In order to use I2P, you will need a suitable Java environment. On " -"Windows, users should\n" -"probably choose Oracle's Java 8 implementation. Please install it by " -"following the\n" +"In order to use I2P, you will need a suitable Java environment. On Windows, users should\n" +"probably choose Oracle's Java 8 implementation. Please install it by following the\n" "instructions below:" msgstr "" @@ -1764,15 +1552,13 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:38 msgid "" -"I2P requires Java to run, if you don't have Java installed, you will get " -"an error\n" +"I2P requires Java to run, if you don't have Java installed, you will get an error\n" "that looks like this:" msgstr "" #: i2p2www/pages/downloads/windows.html:43 msgid "" -"We appreciate that you have a wide range of choices in Java software, but" -" the Oracle\n" +"We appreciate that you have a wide range of choices in Java software, but the Oracle\n" "Java software is the easiest to install and use with I2P on Windows." msgstr "" @@ -1782,15 +1568,13 @@ msgstr "Shkarkojeni prej" #: i2p2www/pages/downloads/windows.html:52 msgid "" -"Double-click the Java Installer you just downloaded. Don't set a custom " -"path, just\n" +"Double-click the Java Installer you just downloaded. Don't set a custom path, just\n" "use the default one." msgstr "" #: i2p2www/pages/downloads/windows.html:57 msgid "" -"Java will show you some information about what it is and where it runs " -"while you\n" +"Java will show you some information about what it is and where it runs while you\n" "wait for it to finish installing." msgstr "" @@ -1815,7 +1599,8 @@ msgid "https://geti2p.net" msgstr "https://geti2p.net" #: i2p2www/pages/downloads/windows.html:79 -msgid "'I2P is available in many languages. Pick one that is familiar to you.'" +msgid "" +"'I2P is available in many languages. Pick one that is familiar to you.'" msgstr "" #: i2p2www/pages/downloads/windows.html:83 @@ -1824,22 +1609,19 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:87 msgid "" -"I2P is mostly public domain software, with permissive licenses and a " -"small amount of GPL2'ed\n" +"I2P is mostly public domain software, with permissive licenses and a small amount of GPL2'ed\n" "Free Software." msgstr "" #: i2p2www/pages/downloads/windows.html:92 msgid "" -"You should probably leave I2P installed at the default path, as it is " -"easiest to work with this\n" +"You should probably leave I2P installed at the default path, as it is easiest to work with this\n" "way." msgstr "" #: i2p2www/pages/downloads/windows.html:97 msgid "" -"Don't bother running it as a Windows service for now, an easy-to-use " -"shortcut will be added to\n" +"Don't bother running it as a Windows service for now, an easy-to-use shortcut will be added to\n" "the start menu for you to control I2P with." msgstr "" @@ -1849,8 +1631,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:106 msgid "" -"I2P is now installed! You can start it using the \"Start I2P\" entries in" -" your Start Menu and on your Desktop." +"I2P is now installed! You can start it using the \"Start I2P\" entries in " +"your Start Menu and on your Desktop." msgstr "" #: i2p2www/pages/downloads/windows.html:109 @@ -1859,18 +1641,15 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:111 msgid "" -"If you already have either Firefox or Tor Browser installed, skip the " -"first 2 steps." +"If you already have either Firefox or Tor Browser installed, skip the first " +"2 steps." msgstr "" #: i2p2www/pages/downloads/windows.html:113 msgid "" -"Unfortunately for Windows users, Microsoft Edge does not have proxy " -"settings that are safe to use with I2P. The browser\n" -"that is easiest to configure with I2P in a reasonably good way is " -"Firefox(Although Chrome is possible, this procedure\n" -"is only recommended for experts). I2P participants who want to browse I2P" -" Sites can follow these steps to install\n" +"Unfortunately for Windows users, Microsoft Edge does not have proxy settings that are safe to use with I2P. The browser\n" +"that is easiest to configure with I2P in a reasonably good way is Firefox(Although Chrome is possible, this procedure\n" +"is only recommended for experts). I2P participants who want to browse I2P Sites can follow these steps to install\n" "and configure Firefox for I2P." msgstr "" @@ -1900,10 +1679,8 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:142 msgid "" -"The Profile Bundle incorporates lots of external software, so it has a " -"detailed license \n" -"document. All of the external software is Free and Open Source, with the " -"license included." +"The Profile Bundle incorporates lots of external software, so it has a detailed license \n" +"document. All of the external software is Free and Open Source, with the license included." msgstr "" #: i2p2www/pages/downloads/windows.html:147 @@ -1916,8 +1693,7 @@ msgstr "" #: i2p2www/pages/downloads/windows.html:153 msgid "" -"When you visit the I2P router console for the first time, it will " -"automatically direct you to the bandwidth\n" +"When you visit the I2P router console for the first time, it will automatically direct you to the bandwidth\n" "configuration wizard." msgstr "" @@ -1936,22 +1712,20 @@ msgid "Here we have an overview of the applications." msgstr "" #: i2p2www/pages/downloads/windows.html:170 -msgid "Now you have your bandwidth configured to efficiently contribute to I2P." +msgid "" +"Now you have your bandwidth configured to efficiently contribute to I2P." msgstr "" #: i2p2www/pages/downloads/windows.html:176 msgid "" -"If you want to re-run the welcome wizard after completing it, you can " -"visit the page\n" +"If you want to re-run the welcome wizard after completing it, you can visit the page\n" "on" msgstr "" #: i2p2www/pages/downloads/windows.html:179 msgid "" -"That's it! You're now ready to use I2P. You can browse I2P Sites, " -"download files, host services,\n" -"e-mail and chat anonymously. Visit the <a " -"href=\"https://localhost:7657/home\">router console homepage</a> to\n" +"That's it! You're now ready to use I2P. You can browse I2P Sites, download files, host services,\n" +"e-mail and chat anonymously. Visit the <a href=\"https://localhost:7657/home\">router console homepage</a> to\n" "get started." msgstr "" @@ -1961,8 +1735,8 @@ msgstr "S’u gjet" #: i2p2www/pages/global/error_404.html:9 msgid "" -"Yep... the resource, you were searching for, is named differently, " -"doesn't exist or was removed." +"Yep... the resource, you were searching for, is named differently, doesn't " +"exist or was removed." msgstr "" #: i2p2www/pages/global/error_500.html:5 @@ -2374,8 +2148,7 @@ msgstr "Prurje ATOM për Takime mbi I2P-në" #: i2p2www/pages/meetings/index.html:7 #, python-format msgid "" -"Regularly scheduled project meetings are held on the first Tuesday of " -"every month at 8 PM UTC.\n" +"Regularly scheduled project meetings are held on the first Tuesday of every month at 8 PM UTC.\n" "Anyone can schedule and\n" "run a meeting, by posting the agenda in\n" "<a href=\"%(mtgforum)s\">the meetings forum</a>." @@ -2384,10 +2157,8 @@ msgstr "" #: i2p2www/pages/meetings/index.html:14 #, python-format msgid "" -"If you have something to discuss, please find the developers on IRC in " -"#i2p-dev.\n" -"<a href=\"%(blogindex)s\">Status updates</a> from developers are also " -"available." +"If you have something to discuss, please find the developers on IRC in #i2p-dev.\n" +"<a href=\"%(blogindex)s\">Status updates</a> from developers are also available." msgstr "" #: i2p2www/pages/meetings/show.html:2 @@ -2453,9 +2224,9 @@ msgstr "" #, python-format msgid "" "Most of the discussion about I2P's development happens on the <a " -"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from " -"within I2P network). This is usually the best place to start with " -"inquiries, if the dev IRC channel is inactive." +"href=\"http://%(zzz)s\">I2P developer forum</a> (only reachable from within " +"I2P network). This is usually the best place to start with inquiries, if the" +" dev IRC channel is inactive." msgstr "" #: i2p2www/pages/site/contact.html:30 @@ -2465,25 +2236,18 @@ msgstr "Media Shoqërore" #: i2p2www/pages/site/contact.html:32 msgid "" "<ul>\n" -" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - " -"https://mastodon.social/@i2p</a></li>\n" -" <li><a href=\"https://twitter.com/GetI2P\">Twitter - " -"https://twitter.com/GetI2P</a></li>\n" -" <li><a href=\"https://old.reddit.com/i2p\">Reddit - " -"https://old.reddit.com/i2p</a></li>\n" +" <li><a href=\"https://mastodon.social/@i2p\">Mastodon - https://mastodon.social/@i2p</a></li>\n" +" <li><a href=\"https://twitter.com/GetI2P\">Twitter - https://twitter.com/GetI2P</a></li>\n" +" <li><a href=\"https://old.reddit.com/i2p\">Reddit - https://old.reddit.com/i2p</a></li>\n" "</ul>" msgstr "" #: i2p2www/pages/site/contact.html:41 msgid "" -"Our primary IRC network is the Irc2P network within I2P; a default tunnel" -" to this network is set up with new router installs.\n" -" We are also present on multiple standard networks like <a " -"href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" -" <a href=\"http://www.einirc.de/\">EIN</a> and <a " -"href=\"http://freenode.net/\">Freenode</a>.\n" -" All I2P-related channels on all these network are linked to the main " -"channels on Irc2P via relay bots." +"Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs.\n" +" We are also present on multiple standard networks like <a href=\"http://www.oftc.net/oftc/OFTC\">OFTC</a>,\n" +" <a href=\"http://www.einirc.de/\">EIN</a> and <a href=\"http://freenode.net/\">Freenode</a>.\n" +" All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots." msgstr "" #: i2p2www/pages/site/contact.html:49 @@ -2525,8 +2289,8 @@ msgstr "" #: i2p2www/pages/site/contact.html:71 i2p2www/pages/site/contact.html:75 msgid "" -"General I2P discussion - anything that doesn't fit in a different list " -"goes here" +"General I2P discussion - anything that doesn't fit in a different list goes " +"here" msgstr "" #: i2p2www/pages/site/contact.html:80 @@ -2698,7 +2462,8 @@ msgid "Product Development" msgstr "Zhvillim Produkti" #: i2p2www/pages/site/contact.html:186 -msgid "supervises projects from the early planning stages to project completion" +msgid "" +"supervises projects from the early planning stages to project completion" msgstr "" #: i2p2www/pages/site/contact.html:189 @@ -2945,7 +2710,8 @@ msgid "jbigi development, wiki migration, doc cleanup" msgstr "zhvillim i jbigi-it, migrim wiki, pastrim dokumentimi" #: i2p2www/pages/site/contact.html:393 -msgid "java debugging and client development on I2PTunnel and the router console" +msgid "" +"java debugging and client development on I2PTunnel and the router console" msgstr "" #: i2p2www/pages/site/contact.html:397 @@ -2998,16 +2764,11 @@ msgstr "Përfshirje" #: i2p2www/pages/site/contact.html:475 msgid "" -"I2P welcomes all kinds of people, as long as they are friendly and " -"helpful to each other.<br>\n" +"I2P welcomes all kinds of people, as long as they are friendly and helpful to each other.<br>\n" "We disgrace hate, anger, racism, and bad speaking towards anyone.<br>\n" -"We do support LBGT, suppressed minorites and other people, wether they " -"need help in kind of our I2P software or not.<br>\n" -"We work together to build a free world without hate, racism and " -"violence.<br>\n" -"The I2P router software was created in this spirit and should be used to " -"help repressed people to regain their freedom of speech, while not " -"suppressing others." +"We do support LBGT, suppressed minorites and other people, wether they need help in kind of our I2P software or not.<br>\n" +"We work together to build a free world without hate, racism and violence.<br>\n" +"The I2P router software was created in this spirit and should be used to help repressed people to regain their freedom of speech, while not suppressing others." msgstr "" #: i2p2www/pages/site/faq.html:2 @@ -3028,8 +2789,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:10 msgid "" -"What is an \"I2P Site\" and how do I configure my browser so I can use " -"them?" +"What is an \"I2P Site\" and how do I configure my browser so I can use them?" msgstr "" #: i2p2www/pages/site/faq.html:11 i2p2www/pages/site/faq.html:109 @@ -3043,8 +2803,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:13 i2p2www/pages/site/faq.html:117 msgid "" -"I am opposed to certain types of content. How do I keep from " -"distributing, storing, or accessing them?" +"I am opposed to certain types of content. How do I keep from distributing, " +"storing, or accessing them?" msgstr "" #: i2p2www/pages/site/faq.html:14 @@ -3103,8 +2863,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:29 i2p2www/pages/site/faq.html:558 msgid "" -"How can I access the web console from my other machines or password " -"protect it?" +"How can I access the web console from my other machines or password protect " +"it?" msgstr "" #: i2p2www/pages/site/faq.html:30 i2p2www/pages/site/faq.html:622 @@ -3117,8 +2877,7 @@ msgstr "A është e mundur të përdoret I2P-ja si një ndërmjetës SOCKS?" #: i2p2www/pages/site/faq.html:32 i2p2www/pages/site/faq.html:648 msgid "" -"How do I access IRC, BitTorrent, or other services on the regular " -"Internet?" +"How do I access IRC, BitTorrent, or other services on the regular Internet?" msgstr "" #: i2p2www/pages/site/faq.html:34 @@ -3155,8 +2914,8 @@ msgstr "A është i parrezik përdorimi i I2P-së?" #: i2p2www/pages/site/faq.html:44 i2p2www/pages/site/faq.html:685 msgid "" -"I see IP addresses of all other I2P nodes in the router console. Does " -"that mean my IP address is visible by others?" +"I see IP addresses of all other I2P nodes in the router console. Does that " +"mean my IP address is visible by others?" msgstr "" #: i2p2www/pages/site/faq.html:45 i2p2www/pages/site/faq.html:704 @@ -3187,8 +2946,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:55 i2p2www/pages/site/faq.html:963 msgid "" -"What makes downloads, torrents, web browsing, and everything else slower " -"on I2P as compared to the regular internet?" +"What makes downloads, torrents, web browsing, and everything else slower on " +"I2P as compared to the regular internet?" msgstr "" #: i2p2www/pages/site/faq.html:59 i2p2www/pages/site/faq.html:1036 @@ -3202,41 +2961,31 @@ msgstr "Kam një pyetje!" #: i2p2www/pages/site/faq.html:69 #, python-format msgid "" -"I2P is written in the <a href=\"%(java)s\">Java programming language</a>." -" \n" +"I2P is written in the <a href=\"%(java)s\">Java programming language</a>. \n" "It has been tested on Windows, Linux, FreeBSD and OSX. \n" "An <a href=\"%(android)s\">Android port</a> is also available." msgstr "" #: i2p2www/pages/site/faq.html:76 msgid "" -"In terms of memory usage, I2P is configured to use 128 MB of RAM by " -"default. \n" -"This is sufficient for browsing and IRC usage. However, other activities " -"may require greater memory allocation. \n" -"For example, if one wishes to run a high-bandwidth router, participate in" -" I2P torrents or serve high-traffic hidden services, \n" +"In terms of memory usage, I2P is configured to use 128 MB of RAM by default. \n" +"This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. \n" +"For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, \n" "a higher amount of memory is required." msgstr "" #: i2p2www/pages/site/faq.html:81 #, python-format msgid "" -"In terms of CPU usage, I2P has been tested to run on modest systems such " -"as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board " -"computers.\n" -"As I2P makes heavy use of cryptographic techniques, a stronger CPU will " -"be better suited to handle the workload generated by I2P as well as tasks" -" \n" -"related to the rest of the system (i.e. Operating System, GUI, Other " -"processes e.g. Web Browsing)." +"In terms of CPU usage, I2P has been tested to run on modest systems such as the <a href=\"%(rpi)s\">Raspberry Pi</a> range of single-board computers.\n" +"As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks \n" +"related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing)." msgstr "" #: i2p2www/pages/site/faq.html:86 #, python-format msgid "" -"A comparison of some of the available Java Runtime Environments (JRE) is " -"available here: \n" +"A comparison of some of the available Java Runtime Environments (JRE) is available here: \n" "<a href=\"%(chart)s\">%(chart)s</a>.\n" "\n" "Using Sun/Oracle Java or OpenJDK is recommended." @@ -3245,8 +2994,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:95 #, python-format msgid "" -"While the main I2P client implementation requires Java, there are several" -"\n" +"While the main I2P client implementation requires Java, there are several\n" "<a href=\"%(alt)s\">alternative clients</a> which don't require Java." msgstr "" @@ -3257,36 +3005,22 @@ msgstr "Ç’është një “Sajt I2Pâ€?" #: i2p2www/pages/site/faq.html:103 #, python-format msgid "" -"Formerly called an eepSite, an I2P Site is a website that is hosted " -"anonymously, a hidden service which is accessible through your web " -"browser. \n" -"It can be accessed by setting your web browser's HTTP proxy to use the " -"I2P web proxy (typically it listens on localhost port 4444), and browsing" -" to the site. Detailed instructions for configuring your browse can be " -"found on the <a href=\"%(browsers)s\">browser configuration page</a>." +"Formerly called an eepSite, an I2P Site is a website that is hosted anonymously, a hidden service which is accessible through your web browser. \n" +"It can be accessed by setting your web browser's HTTP proxy to use the I2P web proxy (typically it listens on localhost port 4444), and browsing to the site. Detailed instructions for configuring your browse can be found on the <a href=\"%(browsers)s\">browser configuration page</a>." msgstr "" #: i2p2www/pages/site/faq.html:111 msgid "" -"x is the number of peers you've sent or received a message from " -"successfully in the last minute, y is the number of peers seen in the " -"last hour or so. \n" -"Try hovering your cursor over the other lines of information for a brief " -"description." +"x is the number of peers you've sent or received a message from successfully in the last minute, y is the number of peers seen in the last hour or so. \n" +"Try hovering your cursor over the other lines of information for a brief description." msgstr "" #: i2p2www/pages/site/faq.html:119 msgid "" -"I2P is an anonymous network - it is designed to withstand attempts at " -"blocking or censoring of content, thus providing a means for " -"communication that anyone can use. \n" -"I2P traffic that transits through your router is encrypted with several " -"layers of encryption. \n" -"Except in the case of a serious security vulnerability (of which none are" -" currently known), \n" -"it is not possible to know what the contents of the traffic are and thus " -"not possible to distinguish between traffic which one is opposed to or " -"not opposed to. \n" +"I2P is an anonymous network - it is designed to withstand attempts at blocking or censoring of content, thus providing a means for communication that anyone can use. \n" +"I2P traffic that transits through your router is encrypted with several layers of encryption. \n" +"Except in the case of a serious security vulnerability (of which none are currently known), \n" +"it is not possible to know what the contents of the traffic are and thus not possible to distinguish between traffic which one is opposed to or not opposed to. \n" "\n" " We consider the 3 parts of the question:" msgstr "" @@ -3294,50 +3028,34 @@ msgstr "" #: i2p2www/pages/site/faq.html:129 msgid "" "<b>Distribution</b><br> \n" -"All traffic on I2P is encrypted in multiple layers. You don't know a " -"message's contents, source, or destination.\n" -"All traffic you route is internal to the I2P network, you are not an <a " -"href=\"#exit\">exit node</a> (referred to as an outproxy in our " -"documentation).\n" -"Your only alternative is to refuse to route <i>any</i> traffic, by " -"setting your share bandwidth or maximum participating tunnels to 0 (see " -"above).\n" -"It would be nice if you didn't do this, you should help the network by " -"routing traffic for others.\n" +"All traffic on I2P is encrypted in multiple layers. You don't know a message's contents, source, or destination.\n" +"All traffic you route is internal to the I2P network, you are not an <a href=\"#exit\">exit node</a> (referred to as an outproxy in our documentation).\n" +"Your only alternative is to refuse to route <i>any</i> traffic, by setting your share bandwidth or maximum participating tunnels to 0 (see above).\n" +"It would be nice if you didn't do this, you should help the network by routing traffic for others.\n" "Over 95% of users route traffic for others." msgstr "" #: i2p2www/pages/site/faq.html:139 msgid "" "<b>Storage</b><br> \n" -"I2P does not do distributed storage of content, this has to be " -"specifically installed and configured by the user (with Tahoe-LAFS, for " -"example). \n" -"That is a feature of a different anonymous network, <a " -"href=\"http://freenetproject.org/\">Freenet</a>.\n" +"I2P does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). \n" +"That is a feature of a different anonymous network, <a href=\"http://freenetproject.org/\">Freenet</a>.\n" "By running I2P, you are not storing content for anyone." msgstr "" #: i2p2www/pages/site/faq.html:147 msgid "" "<b>Access</b><br>\n" -"If there are hidden services which you dislike, you may refrain from " -"visiting them.\n" -"Your router will not request any content without your specific " -"instruction to do so." +"If there are hidden services which you dislike, you may refrain from visiting them.\n" +"Your router will not request any content without your specific instruction to do so." msgstr "" #: i2p2www/pages/site/faq.html:155 msgid "" -"Yes, by far the easiest and most common way is by blocking bootstrap, or " -"\"Reseed\" servers. Completely blocking all obfuscated traffic\n" -"would work as well (although it would break many, many other things that " -"are not I2P and most are not willing to go this far).\n" -"In the case of reseed blocking, there is a reseed bundle on Github, " -"blocking it will also block Github.\n" -"You can reseed over a proxy (many can be found on Internet if you do not " -"want to use Tor) or share reseed bundles on a friend-to-friend basis " -"offline." +"Yes, by far the easiest and most common way is by blocking bootstrap, or \"Reseed\" servers. Completely blocking all obfuscated traffic\n" +"would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far).\n" +"In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github.\n" +"You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline." msgstr "" #: i2p2www/pages/site/faq.html:161 @@ -3348,9 +3066,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:163 msgid "" -"Often this error will occur with any network enabled java software on " -"some systems that are configured to use IPv6 by default. There are a few " -"ways to solve this:" +"Often this error will occur with any network enabled java software on some " +"systems that are configured to use IPv6 by default. There are a few ways to " +"solve this:" msgstr "" #: i2p2www/pages/site/faq.html:168 @@ -3365,8 +3083,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:174 msgid "" -"If the lines are there, uncomment them by removing the \"#\"s. If the " -"lines are not there, add them without the \"#\"s." +"If the lines are there, uncomment them by removing the \"#\"s. If the lines " +"are not there, add them without the \"#\"s." msgstr "" #: i2p2www/pages/site/faq.html:177 @@ -3377,8 +3095,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:181 msgid "" -"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> " -"to take effect, you must completely\n" +"<strong>WARNING</strong>: For any changes to <code>wrapper.config</code> to take effect, you must completely\n" "stop the router and the wrapper. Clicking <em>Restart</em> on your\n" "router console will NOT reread this file! You must\n" "click <em>Shutdown</em>, wait 11 minutes, then start I2P." @@ -3387,11 +3104,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:191 #, python-format msgid "" -"If you consider every I2P Site that has ever been created, yes, most of " -"them are down.\n" +"If you consider every I2P Site that has ever been created, yes, most of them are down.\n" "People and I2P Sites come and go.\n" -"A good way to get started in I2P is check out a list of I2P Sites that " -"are currently up.\n" +"A good way to get started in I2P is check out a list of I2P Sites that are currently up.\n" "<a href=\"%(eepstatus)s\">%(eepstatus)s</a> tracks active I2P Sites." msgstr "" @@ -3401,13 +3116,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:201 msgid "" -"The Tanuki java service wrapper that we use opens this port —bound " -"to localhost— in order to communicate with software running inside " -"the JVM. \n" -"When the JVM is launched it is given a key so it can connect to the " -"wrapper. \n" -"After the JVM establishes its connection to the wrapper, the wrapper " -"refuses any additional connections." +"The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. \n" +"When the JVM is launched it is given a key so it can connect to the wrapper. \n" +"After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections." msgstr "" #: i2p2www/pages/site/faq.html:206 @@ -3420,47 +3131,32 @@ msgstr "" #: i2p2www/pages/site/faq.html:215 #, python-format msgid "" -"The proxy config for different browsers is on a <a " -"href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" -"More advanced configs with external tools, such as the browser plug-in " -"FoxyProxy or the proxy server Privoxy, are possible but could introduce " -"leaks in your setup." +"The proxy config for different browsers is on a <a href=\"%(browserconfig)s\"> separate page</a> with screenshots. \n" +"More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup." msgstr "" #: i2p2www/pages/site/faq.html:223 msgid "" "\n" -"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is" -" installed (see the <a " -"href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel " -"configuration page</a>), and is automatically started when the I2P router" -" starts. \n" -"To connect to it, tell your IRC client to connect to <code>localhost " -"6668</code>. \n" -"HexChat-like client users can create a new network with the server " -"<code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if " -"you have a proxy server configured).\n" +"A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the <a href=\"http://localhost:7657/i2ptunnel/index.jsp\">I2PTunnel configuration page</a>), and is automatically started when the I2P router starts. \n" +"To connect to it, tell your IRC client to connect to <code>localhost 6668</code>. \n" +"HexChat-like client users can create a new network with the server <code>localhost/6668</code> (remember to tick \"Bypass proxy server\" if you have a proxy server configured).\n" "Weechat users can use the following command to add a new network:" msgstr "" #: i2p2www/pages/site/faq.html:238 msgid "" -"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the " -"top of your router console for instructions." +"Click on the <a href=\"http://localhost:7658/\">Website</a> link at the top " +"of your router console for instructions." msgstr "" #: i2p2www/pages/site/faq.html:243 msgid "" -"If you're hosting a personal blog or doing something otherwise non-" -"sensitive, then you are obviously in little danger.\n" -"If you have privacy needs that are basically non-specific, you are in " -"little danger. If you are hosting something sensitive, then\n" -"your services will go down at the same time that your router goes down. " -"Someone who observes your downtime and correlates it to\n" -"real-world events could probably de-anonymize you with enough effort. I2P" -" has defenses available against this like multihoming or\n" -"Tahoe-LAFS, but they require additional set up and are only appropriate " -"for some threat models. There is no magic solution, protecting\n" +"If you're hosting a personal blog or doing something otherwise non-sensitive, then you are obviously in little danger.\n" +"If you have privacy needs that are basically non-specific, you are in little danger. If you are hosting something sensitive, then\n" +"your services will go down at the same time that your router goes down. Someone who observes your downtime and correlates it to\n" +"real-world events could probably de-anonymize you with enough effort. I2P has defenses available against this like multihoming or\n" +"Tahoe-LAFS, but they require additional set up and are only appropriate for some threat models. There is no magic solution, protecting\n" "yourself from a real threat will take real consideration in any case." msgstr "" @@ -3474,23 +3170,23 @@ msgstr "" #: i2p2www/pages/site/faq.html:254 msgid "" -"You cannot add an address without knowing at least the base32 or base64 " -"of the site you want to visit. The \"hostname\" which is human-readable " -"is only an alias for the cryptographic address, which corresponds to the " -"base32 or base64. Without the cryptographic address, there is no way to " -"access an I2P Site, this is by design. Distributing the address to people" -" who do not know it yet is usually the responsibility of the Jump service" -" provider. Visiting an I2P Site which is unknown will trigger the use of " -"a Jump service. stats.i2p is the most reliable Jump service." +"You cannot add an address without knowing at least the base32 or base64 of " +"the site you want to visit. The \"hostname\" which is human-readable is only" +" an alias for the cryptographic address, which corresponds to the base32 or " +"base64. Without the cryptographic address, there is no way to access an I2P " +"Site, this is by design. Distributing the address to people who do not know " +"it yet is usually the responsibility of the Jump service provider. Visiting " +"an I2P Site which is unknown will trigger the use of a Jump service. " +"stats.i2p is the most reliable Jump service." msgstr "" #: i2p2www/pages/site/faq.html:256 msgid "" -"If you're hosting a site via i2ptunnel, then it won't have a registration" -" with a jump service yet. To give it a URL locally, then visit the " +"If you're hosting a site via i2ptunnel, then it won't have a registration " +"with a jump service yet. To give it a URL locally, then visit the " "configuration page and click the button that says \"Add to Local Address " -"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper" -" URL and share it." +"Book.\" Then go to http://127.0.0.1:7657/dns to look up the addresshelper " +"URL and share it." msgstr "" #: i2p2www/pages/site/faq.html:261 @@ -3513,12 +3209,9 @@ msgstr "Këto përshkruhen hollësisht më poshtë." #: i2p2www/pages/site/faq.html:275 msgid "" -"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not " -"use port 8887; \n" -" a random port between 9000 and 31000 is selected when the program is " -"run for the first time. \n" -" The selected port is shown on the router <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." +"Internet-facing ports<br> Note: Since release 0.7.8, new installs do not use port 8887; \n" +" a random port between 9000 and 31000 is selected when the program is run for the first time. \n" +" The selected port is shown on the router <a href=\"http://127.0.0.1:7657/confignet\">configuration page</a>." msgstr "" #: i2p2www/pages/site/faq.html:278 @@ -3528,8 +3221,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:280 msgid "" "UDP from the random port listed on the <a " -"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to " -"arbitrary remote UDP ports, allowing for replies" +"href=\"http://127.0.0.1:7657/confignet\">configuration page</a> to arbitrary" +" remote UDP ports, allowing for replies" msgstr "" #: i2p2www/pages/site/faq.html:281 @@ -3539,9 +3232,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:282 msgid "" "Outbound UDP on port 123, allowing for replies. \n" -" This is necessary for I2P's internal time sync (via SNTP - " -"querying a random SNTP host in pool.ntp.org or another server you " -"specify)" +" This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)" msgstr "" #: i2p2www/pages/site/faq.html:285 @@ -3594,133 +3285,100 @@ msgstr "" #: i2p2www/pages/site/faq.html:324 msgid "" -"A higher level socket API for clients. Disabled by default. May be " -"enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients. Disabled by default. May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the bob.config file." msgstr "" #: i2p2www/pages/site/faq.html:336 i2p2www/pages/site/faq.html:347 #: i2p2www/pages/site/faq.html:358 msgid "" -"May be disabled or changed on the i2ptunnel page in the router console. " -"May also be configured to be bound to a specific interface or all " -"interfaces." +"May be disabled or changed on the i2ptunnel page in the router console. May " +"also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:369 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.HTTPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +" May be changed with advanced config <code>i2np.upnp.HTTPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." msgstr "" #: i2p2www/pages/site/faq.html:382 msgid "" "Binds to the LAN address. \n" -" May be changed with advanced config " -"<code>i2np.upnp.SSDPPort=nnnn</code>. \n" -" May be disabled on <a " -"href=\"http://127.0.0.1:7657/confignet\">confignet</a>." +" May be changed with advanced config <code>i2np.upnp.SSDPPort=nnnn</code>. \n" +" May be disabled on <a href=\"http://127.0.0.1:7657/confignet\">confignet</a>." msgstr "" #: i2p2www/pages/site/faq.html:395 msgid "" "Used by client apps. \n" -" May be changed to a different port on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this " -"is not recommended. \n" -" May be to bind to a different interface or all interfaces, or " -"disabled, on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>." +" May be changed to a different port on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a> but this is not recommended. \n" +" May be to bind to a different interface or all interfaces, or disabled, on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>." msgstr "" #: i2p2www/pages/site/faq.html:408 msgid "" -"A higher level socket API for clients Only opened when a SAM V3 client " -"requests a UDP session. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" -" May be changed in the <code>clients.config</code> file with the" -" SAM command line option <code>sam.udp.port=nnnn</code>." +"A higher level socket API for clients Only opened when a SAM V3 client requests a UDP session. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +" May be changed in the <code>clients.config</code> file with the SAM command line option <code>sam.udp.port=nnnn</code>." msgstr "" #: i2p2www/pages/site/faq.html:421 msgid "" -"A higher level socket API for clients Disabled by default for new " -"installs as of release 0.6.5. \n" -" May be enabled/disabled on <a " -"href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" +"A higher level socket API for clients Disabled by default for new installs as of release 0.6.5. \n" +" May be enabled/disabled on <a href=\"http://127.0.0.1:7657/configclients\">configclients</a>. \n" " May be changed in the <code>clients.config</code> file." msgstr "" #: i2p2www/pages/site/faq.html:434 msgid "" "May be disabled in the <code>clients.config</code>file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in that file." +" May also be configured to be bound to a specific interface or all interfaces in that file." msgstr "" #: i2p2www/pages/site/faq.html:446 msgid "" "May be disabled in the <code>clients.config</code> file. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces in the <code>jetty.xml</code> file." +" May also be configured to be bound to a specific interface or all interfaces in the <code>jetty.xml</code> file." msgstr "" #: i2p2www/pages/site/faq.html:458 i2p2www/pages/site/faq.html:470 #: i2p2www/pages/site/faq.html:482 msgid "" "May be disabled or changed on the i2ptunnel page in the router console. \n" -" May also be configured to be bound to a specific interface or " -"all interfaces." +" May also be configured to be bound to a specific interface or all interfaces." msgstr "" #: i2p2www/pages/site/faq.html:494 msgid "" "Outbound to 32000 only, does not listen on this port. \n" -" Starts at 31000 and will increment until 31999 looking for a " -"free port. \n" -" To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +" Starts at 31000 and will increment until 31999 looking for a free port. \n" +" To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." msgstr "" #: i2p2www/pages/site/faq.html:508 msgid "" -"To change, see the <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/prop-" -"port.html\">wrapper documentation</a>. \n" +"To change, see the <a href=\"http://wrapper.tanukisoftware.com/doc/english/prop-port.html\">wrapper documentation</a>. \n" " For more information see <a href=\"#port32000\">below</a>." msgstr "" #: i2p2www/pages/site/faq.html:516 msgid "" -"The local I2P ports and the I2PTunnel ports do not need to be reachable " -"from \n" -"remote machines, but *should* be reachable locally. You can also create" -" \n" -"additional ports for I2PTunnel instances via " -"http://localhost:7657/i2ptunnel/ \n" -"(and in turn, would need to get your firewall to allow you local access, " -"but \n" +"The local I2P ports and the I2PTunnel ports do not need to be reachable from \n" +"remote machines, but *should* be reachable locally. You can also create \n" +"additional ports for I2PTunnel instances via http://localhost:7657/i2ptunnel/ \n" +"(and in turn, would need to get your firewall to allow you local access, but \n" "not remote access, unless desired)." msgstr "" #: i2p2www/pages/site/faq.html:524 msgid "" -"So, to summarize, nothing needs to be reachable by unsolicited remote " -"peers, but\n" -"if you can configure your NAT/firewall to allow inbound UDP and TCP the " -"<a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll" -"\n" -"get better performance. You will also need to be able to send outbound " -"UDP packets\n" -"to arbitrary remote peers (blocking IPs randomly with something like " -"PeerGuardian\n" +"So, to summarize, nothing needs to be reachable by unsolicited remote peers, but\n" +"if you can configure your NAT/firewall to allow inbound UDP and TCP the <a href=\"http://localhost:7657/config\">outbound facing port</a>, you'll\n" +"get better performance. You will also need to be able to send outbound UDP packets\n" +"to arbitrary remote peers (blocking IPs randomly with something like PeerGuardian\n" "only hurts you - don't do it)." msgstr "" @@ -3736,22 +3394,16 @@ msgstr "" #: i2p2www/pages/site/faq.html:540 msgid "" -"Human-readable addresses such as <i>http://website.i2p</i> are references" -" to a long, random string known as a <b>destination</b>. \n" -" These references are registered and stored at address book services " -"such as stats.i2p, which is run by zzz. \n" -" You will often encounter a \"b32\" address. A \"b32\" is a hash " -"(specifically, a <a " -"href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" -" destination. This hash is appended with \".b32.i2p\" and serves as a " -"convenient way to link to your hidden service, without requiring any " -"registration on an address book service." +"Human-readable addresses such as <i>http://website.i2p</i> are references to a long, random string known as a <b>destination</b>. \n" +" These references are registered and stored at address book services such as stats.i2p, which is run by zzz. \n" +" You will often encounter a \"b32\" address. A \"b32\" is a hash (specifically, a <a href=\"https://en.wikipedia.org/wiki/SHA-2\">SHA256</a> hash) of the \n" +" destination. This hash is appended with \".b32.i2p\" and serves as a convenient way to link to your hidden service, without requiring any registration on an address book service." msgstr "" #: i2p2www/pages/site/faq.html:544 msgid "" -"It is possible to add subscriptions to your router's configuration which " -"may reduce the frequency of these messages." +"It is possible to add subscriptions to your router's configuration which may" +" reduce the frequency of these messages." msgstr "" #: i2p2www/pages/site/faq.html:545 @@ -3760,8 +3412,8 @@ msgstr "Ç’është pajtimi te një libër adresash?" #: i2p2www/pages/site/faq.html:546 msgid "" -"This is a list of files hosted on various I2P websites each of which " -"contain a list of I2P hosts and their associated destinations." +"This is a list of files hosted on various I2P websites each of which contain" +" a list of I2P hosts and their associated destinations." msgstr "" #: i2p2www/pages/site/faq.html:547 @@ -3781,8 +3433,7 @@ msgstr "Mund të provoni sa vijon:" #: i2p2www/pages/site/faq.html:560 msgid "" -"For security purposes, the router's admin console by default only listens" -" for connections on the local interface. \n" +"For security purposes, the router's admin console by default only listens for connections on the local interface. \n" "\n" "There are two methods for accessing the console remotely:" msgstr "" @@ -3803,17 +3454,14 @@ msgstr "Këto jepen hollësisht më poshtë:" #: i2p2www/pages/site/faq.html:573 msgid "" -"If you are running a Unix-like Operating System, this is the easiest " -"method for remotely accessing your I2P console. \n" -" (Note: SSH server software is available for systems running " -"Windows, for example <a " -"href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" +"If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. \n" +" (Note: SSH server software is available for systems running Windows, for example <a href=\"https://github.com/PowerShell/Win32-OpenSSH\">https://github.com/PowerShell/Win32-OpenSSH</a>)" msgstr "" #: i2p2www/pages/site/faq.html:575 msgid "" -"Once you have configured SSH access to your system, the '-L' flag is " -"passed to SSH with appropriate arguments - for example:" +"Once you have configured SSH access to your system, the '-L' flag is passed " +"to SSH with appropriate arguments - for example:" msgstr "" #: i2p2www/pages/site/faq.html:593 @@ -3822,114 +3470,84 @@ msgstr "" #: i2p2www/pages/site/faq.html:607 msgid "" -"Go to <a " -"href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a>" -" and add a console username and password if desired - \n" -" Adding a username & password is highly recommended to secure " -"your I2P console from tampering, which could lead to de-anonymization." +"Go to <a href=\"http://localhost:7657/configui\">http://localhost:7657/configui</a> and add a console username and password if desired - \n" +" Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization." msgstr "" #: i2p2www/pages/site/faq.html:609 msgid "" -"Go to <a " -"href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and " -"hit \"Graceful restart\", \n" +"Go to <a href=\"http://localhost:7657/index\">http://localhost:7657/index</a> and hit \"Graceful restart\", \n" " which restarts the JVM and reloads the client applications" msgstr "" #: i2p2www/pages/site/faq.html:612 msgid "" -"After that fires up, you should now be able to reach your console " -"remotely. \n" -" Load the router console at <code>http://(System_IP):7657</code> and" -" you will be prompted for the username and password you specified in step" -" 2 above if your browser supports the authentication popup." +"After that fires up, you should now be able to reach your console remotely. \n" +" Load the router console at <code>http://(System_IP):7657</code> and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup." msgstr "" #: i2p2www/pages/site/faq.html:615 msgid "" "NOTE: You can specify 0.0.0.0 in the above configuration. \n" " This specifies an interface, not a network or netmask. \n" -" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on" -" 127.0.0.1:7657 as well as any LAN/WAN IP. \n" -" Be careful when using this option as the console will be available " -"on ALL addresses configured on your system." +" 0.0.0.0 means \"bind to all interfaces\", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. \n" +" Be careful when using this option as the console will be available on ALL addresses configured on your system." msgstr "" #: i2p2www/pages/site/faq.html:624 msgid "" -"Please see the previous answer for instructions on using SSH Port " -"Forwarding, and also see this page in your console: \n" -"<a " -"href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" +"Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: \n" +"<a href=\"http://localhost:7657/configi2cp\">http://localhost:7657/configi2cp</a>" msgstr "" #: i2p2www/pages/site/faq.html:632 msgid "" -"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are" -" supported. \n" -"I2P does not have a SOCKS outproxy so it is limited to use within I2P " -"only." +"The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. \n" +"I2P does not have a SOCKS outproxy so it is limited to use within I2P only." msgstr "" #: i2p2www/pages/site/faq.html:636 msgid "" -"Many applications leak sensitive information that could identify you on " -"the Internet and this is a risk that one should be aware of when using " -"the I2P SOCKS proxy. \n" -"I2P only filters connection data, but if the program you intend to run " -"sends this information as content, I2P has no way to protect your " -"anonymity. \n" -"For example, some mail applications will send the IP address of the " -"machine they are running on to a mail server. \n" -"There is no way for I2P to filter this, thus using I2P to 'socksify' " -"existing applications is possible, but extremely dangerous." +"Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. \n" +"I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. \n" +"For example, some mail applications will send the IP address of the machine they are running on to a mail server. \n" +"There is no way for I2P to filter this, thus using I2P to 'socksify' existing applications is possible, but extremely dangerous." msgstr "" #: i2p2www/pages/site/faq.html:642 #, python-format msgid "" -"If you would like more information on the socks proxy application anyway," -"\n" +"If you would like more information on the socks proxy application anyway,\n" "there are some helpful hints on the <a href=\"%(socks)s\">socks page</a>." msgstr "" #: i2p2www/pages/site/faq.html:650 msgid "" -"Unless an outproxy has been specifically set up for the service you want " -"to connect to, this cannot be done. \n" -"There are only three types of outproxies running right now: HTTP, HTTPS, " -"and email. Note that there is no SOCKS outproxy. \n" +"Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. \n" +"There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. \n" "If this type of service is required, we recommend that you use Tor. \n" "\n" -"Please be aware that the Tor project <a " -"href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-" -"idea\">recommends against using BitTorrent over Tor</a>, \n" +"Please be aware that the Tor project <a href=\"https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea\">recommends against using BitTorrent over Tor</a>, \n" "as there are serious anonymity-related issues associated with doing so." msgstr "" #: i2p2www/pages/site/faq.html:662 msgid "" -"Is my router an \"exit node\" to the regular Internet? I don't want it to" -" be." +"Is my router an \"exit node\" to the regular Internet? I don't want it to " +"be." msgstr "" #: i2p2www/pages/site/faq.html:664 #, python-format msgid "" -"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit " -"nodes\" - or \"outproxies\" as they are referred to on the I2P network -" -" \n" +"No. Unlike <a href=\"https://www.torproject.org/\">Tor</a>, \"exit nodes\" - or \"outproxies\" as they are referred to on the I2P network - \n" "are not an inherent part of the network. \n" -"Only volunteers who specifically set up and run separate applications " -"will relay traffic to the regular Internet. \n" +"Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. \n" "There are very, very few of these.\n" "\n" -"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a " -"single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" +"By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh.\n" "\n" -"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our " -"forums, if you would like to learn more about running an outproxy." +"There is an <a href=\"%(outproxy)s\">outproxy guide</a> available on our forums, if you would like to learn more about running an outproxy." msgstr "" #: i2p2www/pages/site/faq.html:679 @@ -3939,157 +3557,118 @@ msgstr "" #: i2p2www/pages/site/faq.html:681 msgid "" " It may be dangerous to use I2P in what the project calls \"Strict " -"Countries\" where the law may not be clear on anonymizing software and " -"where risks are judged to be fairly high. Most I2P peers are not in those" -" strict countries and the ones that are, are placed in \"Hidden Mode\" " -"where they interact with the rest of the network in more limited ways, so" -" that they are less visible to network observers.\n" +"Countries\" where the law may not be clear on anonymizing software and where" +" risks are judged to be fairly high. Most I2P peers are not in those strict " +"countries and the ones that are, are placed in \"Hidden Mode\" where they " +"interact with the rest of the network in more limited ways, so that they are" +" less visible to network observers.\n" msgstr "" #: i2p2www/pages/site/faq.html:687 msgid "" -"Yes, and this is how a fully distributed peer-to-peer network works. " -"Every node participates in routing packets for others, so your IP address" -" must be known to establish connections." +"Yes, and this is how a fully distributed peer-to-peer network works. Every " +"node participates in routing packets for others, so your IP address must be " +"known to establish connections." msgstr "" #: i2p2www/pages/site/faq.html:691 msgid "" -"While the fact that your computer runs I2P is public, nobody can see your" -" activities in it. You can't say if a user behind this IP address is " -"sharing files, hosting a website, doing research or just running a node " -"to contribute bandwidth to the project." +"While the fact that your computer runs I2P is public, nobody can see your " +"activities in it. You can't say if a user behind this IP address is sharing " +"files, hosting a website, doing research or just running a node to " +"contribute bandwidth to the project." msgstr "" #: i2p2www/pages/site/faq.html:696 msgid "" -"It can be deduced that somebody is using the I2P network with some " -"reliability, but it is a little difficult to know for sure.\n" -"The most reliable way to know for sure would be to have a computer with a" -" fairly stable IP address that you suspect is an I2P user, and a\n" -"bunch of computers you control on different networks all running I2P. " -"When one of them connects to your suspected computer, you will be able\n" -"to see their I2P router in the netDB. This might take time, and it might " -"never happen. You could also try blocking all obfuscated traffic\n" -"on a particular network until you're sure every I2P router on that " -"network has lost all of it's peers. At that point, they'll reach out\n" -"to reseed servers to get more peers, which a network administrator can " -"probably observe." +"It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure.\n" +"The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a\n" +"bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able\n" +"to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic\n" +"on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out\n" +"to reseed servers to get more peers, which a network administrator can probably observe." msgstr "" #: i2p2www/pages/site/faq.html:706 msgid "" -"I2P does not encrypt the Internet, neither does Tor - for example, " -"through <a " -"href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport" -" Layer Security (TLS)</a>. \n" -"I2P and Tor both aim to transport your traffic as-is securely and " -"anonymously over the corresponding network, to its destination. \n" -"Any unencrypted traffic generated at your system will arrive at the " -"outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" -"This means that you are vulnerable to snooping by the outproxy operators." -" \n" -"One way to protect your outproxy traffic against this is to ensure that " -"any traffic that will be handled by the outproxy is encrypted with TLS." +"I2P does not encrypt the Internet, neither does Tor - for example, through <a href=\"https://en.wikipedia.org/wiki/Transport_Layer_Security\">Transport Layer Security (TLS)</a>. \n" +"I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. \n" +"Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. \n" +"This means that you are vulnerable to snooping by the outproxy operators. \n" +"One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS." msgstr "" #: i2p2www/pages/site/faq.html:714 msgid "" -"For more information, you may read the Tor FAQ's answer to this question:" -"\n" -"<a " -"href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" +"For more information, you may read the Tor FAQ's answer to this question:\n" +"<a href=\"https://www.torproject.org/docs/faq#CanExitNodesEavesdrop\">https://www.torproject.org/docs/faq#CanExitNodesEavesdrop</a>" msgstr "" #: i2p2www/pages/site/faq.html:719 #, python-format msgid "" -"In addition, you may be vulnerable to collusion between the outproxy " -"operator\n" -"and operators of other I2P services, if you use the same tunnels " -"(\"shared clients\").\n" -"There is additional discussion about this on <a " -"href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" -"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our " -"forums</a> as well." +"In addition, you may be vulnerable to collusion between the outproxy operator\n" +"and operators of other I2P services, if you use the same tunnels (\"shared clients\").\n" +"There is additional discussion about this on <a href=\"http://%(zzz)s/topics/217\">%(zzz)s</a>.\n" +"This discussion has been <a href=\"%(i2pforum)s\">mirrored on our forums</a> as well." msgstr "" #: i2p2www/pages/site/faq.html:726 #, python-format msgid "" "\n" -"Ultimately, this is a question that only you can answer because the " -"correct answer depends on your browsing behaviour, \n" -"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you " -"choose to trust the outproxy operator." +"Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, \n" +"your <a href=\"%(threatmodel)s\">threat model</a>, and how much you choose to trust the outproxy operator." msgstr "" #: i2p2www/pages/site/faq.html:734 msgid "" -"Reducing anonymity is typically done by A) identifying characteristics " -"that are consistent across anonymous identities or\n" -"B) identifying ephemeral characteristics of repeated connections. We say " -"\"reducing\" anonymity because many of these characteristics\n" -"are shared by many of our users, making these anonymity \"sets,\" the " -"smaller the anonymity set and the more small sets you belong to,\n" +"Reducing anonymity is typically done by A) identifying characteristics that are consistent across anonymous identities or\n" +"B) identifying ephemeral characteristics of repeated connections. We say \"reducing\" anonymity because many of these characteristics\n" +"are shared by many of our users, making these anonymity \"sets,\" the smaller the anonymity set and the more small sets you belong to,\n" "the more brittle your anonymity." msgstr "" #: i2p2www/pages/site/faq.html:741 msgid "" -"Attacks on I2P in the past have relied on correlating NetDB storage and " -"verification, by randomizing \n" -"the delay between storage and verification, we reduce the consistency " -"with which that verification can be linked to I2P activity,\n" +"Attacks on I2P in the past have relied on correlating NetDB storage and verification, by randomizing \n" +"the delay between storage and verification, we reduce the consistency with which that verification can be linked to I2P activity,\n" "thereby limiting the utility of that data point." msgstr "" #: i2p2www/pages/site/faq.html:746 msgid "" -"Attacks on software configured to work with I2P are out of scope for I2P " -"to solve. When browsing I2P or hosting\n" -"I2P services, it's is the responsibility of the user to consider their " -"threat model. Browsers are particularly problematic\n" -"due to fingerprinting attacks, and the wide variety of information that " -"can be gleaned from them. Using a standardized browsing\n" +"Attacks on software configured to work with I2P are out of scope for I2P to solve. When browsing I2P or hosting\n" +"I2P services, it's is the responsibility of the user to consider their threat model. Browsers are particularly problematic\n" +"due to fingerprinting attacks, and the wide variety of information that can be gleaned from them. Using a standardized browsing\n" "profile is thought to help mitigate the impact of fingerprinting." msgstr "" #: i2p2www/pages/site/faq.html:757 msgid "" -"New installations of I2P carry out the reseeding process automatically, " -"as well as when the number of known peers falls to a drastically low " -"value. \n" -"If you need to carry out a reseed of your router, please see the <a " -"href=\"#manual_reseed\">reseed instructions</a>." +"New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. \n" +"If you need to carry out a reseed of your router, please see the <a href=\"#manual_reseed\">reseed instructions</a>." msgstr "" #: i2p2www/pages/site/faq.html:765 msgid "" -"An I2P router only needs to be seeded once, to join the network for the " -"first\n" -"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled " -"into a\n" +"An I2P router only needs to be seeded once, to join the network for the first\n" +"time. Reseeding involves fetching multiple \"RouterInfo\" files (bundled into a\n" "signed zip-file) from at least two predefined server URLs picked from a\n" "volunteer-run group of non-private internet HTTPS servers." msgstr "" #: i2p2www/pages/site/faq.html:772 msgid "" -"A typical symptom of a failed reseed is the \"Known\" indicator (on the " -"left\n" -"sidebar of the router console) displaying a very small value (often less " -"than\n" -"5) which does not increase. This can occur, among other things, if your " -"local\n" -"firewall limits outbound traffic or if the reseed request is blocked " -"entirely." +"A typical symptom of a failed reseed is the \"Known\" indicator (on the left\n" +"sidebar of the router console) displaying a very small value (often less than\n" +"5) which does not increase. This can occur, among other things, if your local\n" +"firewall limits outbound traffic or if the reseed request is blocked entirely." msgstr "" #: i2p2www/pages/site/faq.html:779 msgid "" -"If you are stuck behind an ISP firewall or filter, you can use the " -"following\n" +"If you are stuck behind an ISP firewall or filter, you can use the following\n" "manual method (non-automated technical solution) to join the I2P network." msgstr "" @@ -4097,10 +3676,8 @@ msgstr "" #, python-format msgid "" "\n" -"As of release 0.9.33, you may also configure your router to reseed " -"through a proxy.\n" -"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, " -"hostname, and port." +"As of release 0.9.33, you may also configure your router to reseed through a proxy.\n" +"Go to <a href=\"%(url)s\">%(url)s</a> and configure the proxy type, hostname, and port." msgstr "" #: i2p2www/pages/site/faq.html:789 @@ -4109,18 +3686,12 @@ msgstr "" #: i2p2www/pages/site/faq.html:790 msgid "" -"Please contact a known trustworthy friend who has a running I2P router, " -"and ask\n" -"them for help with reseeding your I2P router. Request that they send you " -"a\n" -"reseed file exported from their running I2P router. It is vital that the " -"file is\n" -"exchanged over a secure channel, e.g. encrypted to avoid external " -"tampering (PGP\n" -"Sign, Encrypt and Verified with a trusted public key). The file itself is" -"\n" -"unsigned, so please accept files only from known trusted friends. Never " -"import\n" +"Please contact a known trustworthy friend who has a running I2P router, and ask\n" +"them for help with reseeding your I2P router. Request that they send you a\n" +"reseed file exported from their running I2P router. It is vital that the file is\n" +"exchanged over a secure channel, e.g. encrypted to avoid external tampering (PGP\n" +"Sign, Encrypt and Verified with a trusted public key). The file itself is\n" +"unsigned, so please accept files only from known trusted friends. Never import\n" "a reseed file if you can not verify its source." msgstr "" @@ -4158,8 +3729,8 @@ msgstr "" #: i2p2www/pages/site/faq.html:812 msgid "" -"For trusted friends you can use your local I2P router to give them a jump" -" start:" +"For trusted friends you can use your local I2P router to give them a jump " +"start:" msgstr "" #: i2p2www/pages/site/faq.html:815 @@ -4174,12 +3745,9 @@ msgstr "" #: i2p2www/pages/site/faq.html:818 msgid "" "Do not reveal this file in any case to unknown users, since it contains\n" -"sensitive private data (100 RouterInfo) from your own I2P router! In " -"order to\n" -"protect your anonymity: you may wait a few random hours/days before you " -"share\n" -"the file with your trusted friend. It is also advisable to use this " -"procedure\n" +"sensitive private data (100 RouterInfo) from your own I2P router! In order to\n" +"protect your anonymity: you may wait a few random hours/days before you share\n" +"the file with your trusted friend. It is also advisable to use this procedure\n" "sparingly (< 2 per week)." msgstr "" @@ -4189,12 +3757,13 @@ msgstr "" #: i2p2www/pages/site/faq.html:828 msgid "" -"Do not publicly publish the reseed file or share these files with a " -"friend of a friend!" +"Do not publicly publish the reseed file or share these files with a friend " +"of a friend!" msgstr "" #: i2p2www/pages/site/faq.html:829 -msgid "This file should be used only for a very limited number of friends (< 3)!" +msgid "" +"This file should be used only for a very limited number of friends (< 3)!" msgstr "" #: i2p2www/pages/site/faq.html:830 @@ -4203,52 +3772,33 @@ msgstr "" #: i2p2www/pages/site/faq.html:839 msgid "" -"I2P is primarily not intended, nor designed, to be used as a proxy to the" -" regular internet. \n" -"With that said, there are services which are provided by volunteers that " -"act as proxies to non-private internet based content - these are referred" -" to as \"outproxies\" on the I2P network. \n" -"There is an outproxy configured by default in I2P's HTTP client tunnel - " -"false.i2p. \n" -"While this service does currently exist, there is no guarantee that it " -"will always be there as it is not an official service provided by the I2P" -" project. \n" -"If your main requirement from an anonymous network is the ability to " -"access non-private internet resources, we would recommend using <a " -"href=\"https://www.torproject.org/\">Tor</a>." +"I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. \n" +"With that said, there are services which are provided by volunteers that act as proxies to non-private internet based content - these are referred to as \"outproxies\" on the I2P network. \n" +"There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. \n" +"While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. \n" +"If your main requirement from an anonymous network is the ability to access non-private internet resources, we would recommend using <a href=\"https://www.torproject.org/\">Tor</a>." msgstr "" #: i2p2www/pages/site/faq.html:852 msgid "" "Within I2P, there is no requirement to use HTTPS. \n" -" All traffic is encrypted end-to-end, any further encryption, e.g. " -"with the use of HTTPS, doesn't create any further anonymity-related " -"benefits.\n" +" All traffic is encrypted end-to-end, any further encryption, e.g. with the use of HTTPS, doesn't create any further anonymity-related benefits.\n" "\n" -" However, if one would like to use HTTPS or has a requirement to do " -"so, the existing default I2P HTTP Proxy has support for HTTPS traffic." -" \n" -" Any hidden service operator would have to specifically set up and " -"enable HTTPS access." +" However, if one would like to use HTTPS or has a requirement to do so, the existing default I2P HTTP Proxy has support for HTTPS traffic. \n" +" Any hidden service operator would have to specifically set up and enable HTTPS access." msgstr "" #: i2p2www/pages/site/faq.html:861 msgid "" "FTP is not supported for technical reasons.\n" "\n" -" There are no FTP \"outproxies\" to the Internet—it may not even be " -"possible to set up one. \n" -" Any other kind of outproxy may work if it's set up with a standard " -"tunnel. \n" -" If you would like to set up some type of outproxy, carefully research" -" the potential risks. \n" -" The I2P community may or may not be able to help with the technical " -"aspects, feel free to ask.\n" +" There are no FTP \"outproxies\" to the Internet—it may not even be possible to set up one. \n" +" Any other kind of outproxy may work if it's set up with a standard tunnel. \n" +" If you would like to set up some type of outproxy, carefully research the potential risks. \n" +" The I2P community may or may not be able to help with the technical aspects, feel free to ask.\n" "\n" -" As explained several times above, any existing outproxy isn't a core " -"part of the network. \n" -" They are services run by individuals and they may or may not be " -"operational at any given time." +" As explained several times above, any existing outproxy isn't a core part of the network. \n" +" They are services run by individuals and they may or may not be operational at any given time." msgstr "" #: i2p2www/pages/site/faq.html:876 @@ -4265,10 +3815,8 @@ msgstr "Java Runtime Environment" #: i2p2www/pages/site/faq.html:883 msgid "" -"Try to use either OpenJDK or Sun/Oracle Java if it's available for your " -"system. \n" -"You can check which version of java you have installed by typing " -"<code>java -version</code> at a command/shell prompt. \n" +"Try to use either OpenJDK or Sun/Oracle Java if it's available for your system. \n" +"You can check which version of java you have installed by typing <code>java -version</code> at a command/shell prompt. \n" "Performance tends to suffer with other implementations of java." msgstr "" @@ -4278,8 +3826,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:889 msgid "" -"Are you running a BitTorrent client over I2P? Try reducing the number of " -"torrents, the bandwidth limits,\n" +"Are you running a BitTorrent client over I2P? Try reducing the number of torrents, the bandwidth limits,\n" "or try turning it off completely to see if that helps." msgstr "" @@ -4289,10 +3836,8 @@ msgstr "Rregullime Gjerësie të madhe Bande" #: i2p2www/pages/site/faq.html:896 msgid "" -"Are your bandwidth limits set too high? It is possible that too much " -"traffic is going through your I2P router and it is overloaded. \n" -"Try reducing the setting for <em>share bandwidth percentage</em> on the " -"<a href=\"http://localhost:7657/config\">configuration</a> page." +"Are your bandwidth limits set too high? It is possible that too much traffic is going through your I2P router and it is overloaded. \n" +"Try reducing the setting for <em>share bandwidth percentage</em> on the <a href=\"http://localhost:7657/config\">configuration</a> page." msgstr "" #: i2p2www/pages/site/faq.html:901 @@ -4301,8 +3846,8 @@ msgstr "Version I2P-e" #: i2p2www/pages/site/faq.html:902 msgid "" -"Make sure that you're running the latest version of I2P to get the " -"benefits of increased performance and bug fixes." +"Make sure that you're running the latest version of I2P to get the benefits " +"of increased performance and bug fixes." msgstr "" #: i2p2www/pages/site/faq.html:907 @@ -4311,12 +3856,9 @@ msgstr "Shpërndarje kujtese" #: i2p2www/pages/site/faq.html:908 msgid "" -"Has enough memory been set aside for use by I2P? Look at the memory graph" -" on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" -"to see if the memory usage is \"pegged\"—the JVM is spending most " -"of its time in garbage collection. \n" -"Increase the setting <code>wrapper.java.maxmemory</code> in the file " -"<code>wrapper.config</code>." +"Has enough memory been set aside for use by I2P? Look at the memory graph on <a href=\"http://localhost:7657/graphs\">the graphs page</a> \n" +"to see if the memory usage is \"pegged\"—the JVM is spending most of its time in garbage collection. \n" +"Increase the setting <code>wrapper.java.maxmemory</code> in the file <code>wrapper.config</code>." msgstr "" #: i2p2www/pages/site/faq.html:915 @@ -4326,8 +3868,7 @@ msgstr "" #: i2p2www/pages/site/faq.html:916 msgid "" -"Is the CPU usage simply higher than you would like, or is it pegged at " -"100% for a long time?\n" +"Is the CPU usage simply higher than you would like, or is it pegged at 100% for a long time?\n" "If it is pegged, this could be a bug. Look in the logs for clues." msgstr "" @@ -4338,11 +3879,8 @@ msgstr "Të lidhura me Java-n" #: i2p2www/pages/site/faq.html:923 #, python-format msgid "" -"You may be using the Java-based BigInteger library instead of the native " -"version, especially if you are running on a new or unusual OS or hardware" -" (OpenSolaris, mipsel, etc.).\n" -"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on " -"diagnosing, building, and testing methods." +"You may be using the Java-based BigInteger library instead of the native version, especially if you are running on a new or unusual OS or hardware (OpenSolaris, mipsel, etc.).\n" +"See the <a href=\"%(jbigi)s\">jbigi page</a> for instructions on diagnosing, building, and testing methods." msgstr "" #: i2p2www/pages/site/faq.html:929 @@ -4351,154 +3889,107 @@ msgstr "Tunele pjesëmarrjeje" #: i2p2www/pages/site/faq.html:930 msgid "" -"If your native jbigi library is working fine, the biggest user of CPU may" -" be routing traffic for participating tunnels. \n" -"This uses CPU because at each hop a layer of encryption must be decoded. " -"You can limit participating traffic in two ways -\n" -"by reducing the share bandwidth on the <a " -"href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" -"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a " -"href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> " -"page." +"If your native jbigi library is working fine, the biggest user of CPU may be routing traffic for participating tunnels. \n" +"This uses CPU because at each hop a layer of encryption must be decoded. You can limit participating traffic in two ways -\n" +"by reducing the share bandwidth on the <a href=\"http://localhost:7657/confignet.jsp\">confignet</a> page,\n" +"or by setting <tt>router.maxParticipatingTunnels=nnn</tt> on the <a href=\"http://localhost:7657/configadvanced.jsp\">configadvanced</a> page." msgstr "" #: i2p2www/pages/site/faq.html:942 msgid "" "If your router has 10 or more active peers, everything is fine. \n" "The router should maintain connections to a few peers at all times. \n" -"The best way to stay \"better-connected\" to the network is to share more" -" bandwidth. \n" -"The amount of bandwidth that is shared by the router can be changed on " -"the configuration page: \n" -" <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" +"The best way to stay \"better-connected\" to the network is to share more bandwidth. \n" +"The amount of bandwidth that is shared by the router can be changed on the configuration page: \n" +" <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a>" msgstr "" #: i2p2www/pages/site/faq.html:953 msgid "" "No, there isn't anything wrong. \n" "This is normal behavior. \n" -"All routers adjust dynamically to changing network conditions and " -"demands. \n" -"Routers come online and go offline depending on whether the system it is " -"installed on is operational or not, as well as whether there is an " -"available network connection. \n" +"All routers adjust dynamically to changing network conditions and demands. \n" +"Routers come online and go offline depending on whether the system it is installed on is operational or not, as well as whether there is an available network connection. \n" "Your router is constantly updating its local Network Database. \n" -"Tunnels which your router is participating in expire every 10 minutes and" -" may or may not be rebuilt through your router." +"Tunnels which your router is participating in expire every 10 minutes and may or may not be rebuilt through your router." msgstr "" #: i2p2www/pages/site/faq.html:965 msgid "" -"The encryption and routing within the I2P network adds a substantial " -"amount of overhead and limits bandwidth. \n" +"The encryption and routing within the I2P network adds a substantial amount of overhead and limits bandwidth. \n" "\n" "We can try to clarify this with the aid of a diagram:" msgstr "" #: i2p2www/pages/site/faq.html:973 msgid "" -"In this diagram, the path that some I2P traffic takes as it travels " -"through the network is traced. \n" -"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden " -"Service (for example, the http://stats.i2p website) is labelled as 'B'." -" \n" -"Both the client and the server are using 3-hop tunnels, these hops are " -"represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', " -"'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." +"In this diagram, the path that some I2P traffic takes as it travels through the network is traced. \n" +"A user's I2P router is denoted by the box labeled 'A' and an I2P Hidden Service (for example, the http://stats.i2p website) is labelled as 'B'. \n" +"Both the client and the server are using 3-hop tunnels, these hops are represented by the boxes labelled 'P', 'Q', 'R', 'X', 'Y', 'Z', 'P_1', 'Q_1', 'R'_1, 'X_1', 'Y_1' and 'Z_1'." msgstr "" #: i2p2www/pages/site/faq.html:979 msgid "" -"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A " -"while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel" -" for 'B'. \n" -"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound " -"tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent " -"an inbound tunnel for 'A'. \n" +"The boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for A while the boxes labelled 'X_1', 'Y_1', 'Z_1' represent an outbound tunnel for 'B'. \n" +"Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. \n" "The arrows in between the boxes show the direction of traffic. \n" -"The text above and below the arrows detail some example bandwidth between" -" a pair of hops as well as example latencies." +"The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies." msgstr "" #: i2p2www/pages/site/faq.html:986 msgid "" -"When both client and server are using 3-hop tunnels throughout, a total " -"of 12 other I2P routers are involved in relaying traffic. \n" -"6 peers relay traffic from the client to the server which is split into a" -" 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound " -"tunnel to 'B' ('X', 'Y', 'Z'). \n" +"When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. \n" +"6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). \n" "Similarly, 6 peers relay traffic from the server to back to the client." msgstr "" #: i2p2www/pages/site/faq.html:992 msgid "" -"First, we can consider latency - the time that it takes for a request " -"from a client to traverse the I2P network, reach the the server and " -"traverse back to the client. \n" +"First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. \n" "Adding up all latencies we see that:" msgstr "" #: i2p2www/pages/site/faq.html:1006 msgid "" -"The total round-trip time in our example adds up to 740 ms - certainly " -"much higher than what one would normally see while browsing regular " -"internet websites." +"The total round-trip time in our example adds up to 740 ms - certainly much " +"higher than what one would normally see while browsing regular internet " +"websites." msgstr "" #: i2p2www/pages/site/faq.html:1010 msgid "" "Second, we can consider available bandwidth. \n" -"This is determined through the slowest link between hops from the client " -"and server as well as when traffic is being transmitted by the server to " -"the client. \n" -"For traffic going from the client to the server, we see that the " -"available bandwidth in our example between hops 'R' & 'X' as well as " -"hops 'X' & 'Y' is 32 KB/s. \n" -"Despite higher available bandwidth between the other hops, these hops " -"will act as a bottleneck and will limit the maximum available bandwidth " -"for traffic from 'A' to 'B' at 32 KB/s. \n" -"Similarly, tracing the path from server to client shows that there is " -"maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' &" -" 'X_1' and 'Q_1' & 'P_1'." +"This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. \n" +"For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. \n" +"Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. \n" +"Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'." msgstr "" #: i2p2www/pages/site/faq.html:1018 msgid "" "We recommend increasing your bandwidth limits. \n" -"This helps the network by increasing the amount of available bandwidth " -"which will in turn improve your I2P experience. \n" -"Bandwidth settings are located on the <a " -"href=\"http://localhost:7657/config\">http://localhost:7657/config</a> " -"page. \n" -"Please be aware of your internet connection's limits as determined by " -"your ISP, and adjust your settings accordingly." +"This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. \n" +"Bandwidth settings are located on the <a href=\"http://localhost:7657/config\">http://localhost:7657/config</a> page. \n" +"Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly." msgstr "" #: i2p2www/pages/site/faq.html:1025 msgid "" -"We also recommend setting a sufficient amount of shared bandwidth - this " -"allows for participating tunnels to be routed through your I2P router. \n" -"Allowing participating traffic keeps your router well-integrated in the " -"network and improves your transfer speeds." +"We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. \n" +"Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds." msgstr "" #: i2p2www/pages/site/faq.html:1030 #, python-format msgid "" -"I2P is a work in progress. Lots of improvements and fixes are being " -"implemented, and, generally speaking, running the latest release will " -"help your performance.\n" -"If you haven't, <a href=\"%(downloadslist)s\">install the latest " -"release</a>." +"I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance.\n" +"If you haven't, <a href=\"%(downloadslist)s\">install the latest release</a>." msgstr "" #: i2p2www/pages/site/faq.html:1038 msgid "" -"You may report any bugs/issues that you encounter on our bugtracker, " -"which is available over both non-private internet and I2P. \n" -"We have a discussion forum, also available on I2P and non-private " -"internet. You can join our IRC channel as well: \n" +"You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. \n" +"We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: \n" "either through our IRC network, IRC2P, or on Freenode." msgstr "" @@ -4520,14 +4011,10 @@ msgstr "Forumet tona:" #: i2p2www/pages/site/faq.html:1050 msgid "" -"You may paste any interesting logs to a paste service such as the non-" -"private internet services listed on the \n" -" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-" -"Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" -" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this" -" \n" -" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and" -" follow up on IRC in #i2p<" +"You may paste any interesting logs to a paste service such as the non-private internet services listed on the \n" +" <a href=\"https://github.com/PrivateBin/PrivateBin/wiki/PrivateBin-Directory\">PrivateBin Wiki</a>, or an I2P paste service such as this \n" +" <a href=\"http://paste.crypthost.i2p\">PrivateBin instance</a> or this \n" +" <a href=\"http://pasta-nojs.i2p\">Javascript-free paste service</a> and follow up on IRC in #i2p<" msgstr "" #: i2p2www/pages/site/faq.html:1054 @@ -4536,13 +4023,10 @@ msgstr "" #: i2p2www/pages/site/faq.html:1058 msgid "" -"Please include relevant information from the router logs page which is " -"available at: \n" +"Please include relevant information from the router logs page which is available at: \n" "<a href=\"http://127.0.0.1:7657/logs\">http://127.0.0.1:7657/logs</a>.\n" -"We request that you share all of the text under the 'I2P Version and " -"Running Environment' \n" -"section as well as any errors or warnings displayed in the various logs " -"displayed on the page." +"We request that you share all of the text under the 'I2P Version and Running Environment' \n" +"section as well as any errors or warnings displayed in the various logs displayed on the page." msgstr "" #: i2p2www/pages/site/faq.html:1070 @@ -4553,8 +4037,7 @@ msgid "" " <li>on <code>irc.freenode.net</code> channel <code>#i2p</code></li>\n" " <li>on <code>IRC2P</code> channel <code>#i2p</code></li>\n" "</ul>\n" -"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it " -"here (with the answer, hopefully)." +"or post to <a href=\"http://%(forum)s/\">the forum</a> and we'll post it here (with the answer, hopefully)." msgstr "" #: i2p2www/pages/site/impressum.html:4 @@ -4568,8 +4051,8 @@ msgstr "Rrjeti Anonim I2P" #: i2p2www/pages/site/index.html:4 msgid "" "Anonymous peer-to-peer distributed communication layer built with open " -"source tools and designed to run any traditional Internet service such as" -" email, IRC or web hosting." +"source tools and designed to run any traditional Internet service such as " +"email, IRC or web hosting." msgstr "" #: i2p2www/pages/site/index.html:8 @@ -4578,8 +4061,7 @@ msgstr "Mirë se vini te Interneti i Padukshëm" #: i2p2www/pages/site/index.html:9 msgid "" -"The Invisible Internet is a privacy by design, people-powered network. It" -" is a truly free and anonymizing Internet alternative. Get I2P.\n" +"The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P.\n" " " msgstr "" @@ -4595,14 +4077,10 @@ msgstr "Ç’është I2P-ja?" #: i2p2www/pages/site/index.html:17 msgid "" "\n" -" The Invisible Internet Project (I2P) is a fully encrypted private" -" network layer.\n" -" It protects your activity and location. Every day people use the " -"network to connect\n" -" with people without worry of being tracked or their data being " -"collected. In some\n" -" cases people rely on the network when they need to be discrete or" -" are doing sensitive work." +" The Invisible Internet Project (I2P) is a fully encrypted private network layer.\n" +" It protects your activity and location. Every day people use the network to connect\n" +" with people without worry of being tracked or their data being collected. In some\n" +" cases people rely on the network when they need to be discrete or are doing sensitive work." msgstr "" #: i2p2www/pages/site/index.html:23 @@ -4612,13 +4090,13 @@ msgstr "I2P-ja Kujdeset Për Privatësinë" #: i2p2www/pages/site/index.html:25 msgid "" "I2P hides the server from the user and the user from the server. All I2P " -"traffic is internal to the I2P network. Traffic inside I2P does not " -"interact with the Internet directly. It is a layer on top of the " -"Internet. It uses encrypted unidirectional tunnels between you and your " -"peers. No one can see where traffic is coming from, where it is going, or" -" what the contents are. Additionally I2P offers resistance to pattern " -"recognition and blocking by censors. Because the network relies on peers " -"to route traffic, location blocking is also reduced." +"traffic is internal to the I2P network. Traffic inside I2P does not interact" +" with the Internet directly. It is a layer on top of the Internet. It uses " +"encrypted unidirectional tunnels between you and your peers. No one can see " +"where traffic is coming from, where it is going, or what the contents are. " +"Additionally I2P offers resistance to pattern recognition and blocking by " +"censors. Because the network relies on peers to route traffic, location " +"blocking is also reduced." msgstr "" #: i2p2www/pages/site/index.html:27 @@ -4632,8 +4110,8 @@ msgstr "" #: i2p2www/pages/site/index.html:33 msgid "" "The network is people powered . Peers make a portion of their resources, " -"particularly bandwidth, available to other network participants. This " -"allows the network to function without relying on centralized servers." +"particularly bandwidth, available to other network participants. This allows" +" the network to function without relying on centralized servers." msgstr "" #: i2p2www/pages/site/index.html:33 @@ -4682,12 +4160,8 @@ msgstr "Lidhje & Burime të Këshilluara" #, python-format msgid "" "See also the page with\n" -"<a href=\"%(media)s\">links to presentations, videos, and tutorials about" -" I2P</a>." -msgstr "" -"Shihni edhe faqen me\n" -"<a href=\"%(media)s\">lidhje për te paraqitje, video, dhe përkujdesore " -"mbi I2P-në</a>." +"<a href=\"%(media)s\">links to presentations, videos, and tutorials about I2P</a>." +msgstr "Shihni edhe faqen me\n<a href=\"%(media)s\">lidhje për te paraqitje, video, dhe përkujdesore mbi I2P-në</a>." #: i2p2www/pages/site/links.html:12 msgid "I2P on the web" @@ -4712,4 +4186,3 @@ msgstr "Borde, sajt lajmesh, të tjera" #: i2p2www/pages/site/links.html:51 msgid "Very Old Stuff" msgstr "Gjëra Shumë të Vjetra" - diff --git a/i2p2www/translations/sv/LC_MESSAGES/research.po b/i2p2www/translations/sv/LC_MESSAGES/research.po index 8b695ce60148852fc0538e5a93841c3e1580c27f..b84ef114aa1c6f3536928b032568ec9e023d5bcc 100644 --- a/i2p2www/translations/sv/LC_MESSAGES/research.po +++ b/i2p2www/translations/sv/LC_MESSAGES/research.po @@ -1,7 +1,7 @@ -# Swedish translations for I2P. +# Translations template for I2P. # Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Anders Nilsson <anders@devode.se>, 2015 # cacapo <handelsehorisont@gmail.com>, 2015 @@ -12,18 +12,18 @@ # Martin Svensson <digitalmannen@gmail.com>, 2014 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" "POT-Creation-Date: 2021-04-26 14:51+0000\n" -"PO-Revision-Date: 2021-11-29 20:19+0000\n" -"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>\n" -"Language-Team: Swedish (Sweden) " -"(http://www.transifex.com/otf/I2P/language/sv_SE/)\n" -"Plural-Forms: nplurals=2; plural=(n != 1)\n" +"PO-Revision-Date: 2013-07-15 12:01+0000\n" +"Last-Translator: Jonatan Nyberg <jonatan@autistici.org>, 2016-2017,2021\n" +"Language-Team: Swedish (Sweden) (http://www.transifex.com/otf/I2P/language/sv_SE/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: sv_SE\n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -44,16 +44,11 @@ msgstr "" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." msgstr "" @@ -61,44 +56,27 @@ msgstr "" #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" -msgstr "" -"\n" -"Det finns en stor forskargrupp som undersöker en mängd aspekter av\n" -"anonymitet. För en aktuell och omfattande lista av relevanta " -"publikationer, se \n" -"<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P drar nytta av mycket av forskingen kring Tor och onion routing, men " -"det finns\n" -"ringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar " -"nätverket ger. Detta ger en unik möjlighet till ny forskning. \n" +msgstr "\nDet finns en stor forskargrupp som undersöker en mängd aspekter av\nanonymitet. För en aktuell och omfattande lista av relevanta publikationer, se \n<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\nI2P drar nytta av mycket av forskingen kring Tor och onion routing, men det finns\nringa riktat intresse mot teorin bakom I2P, och dom val och nackdelar nätverket ger. Detta ger en unik möjlighet till ny forskning. \n" #: i2p2www/pages/site/research/index.html:29 #, python-format msgid "" "A list of known published papers about I2P is available <a " "href=\"%(papers)s\">here</a>." -msgstr "" -"En lista av tidigare kända artiklar om I2P finns tillgänglig <a " -"href=\"%(papers)s\">här</a>." +msgstr "En lista av tidigare kända artiklar om I2P finns tillgänglig <a href=\"%(papers)s\">här</a>." #: i2p2www/pages/site/research/index.html:34 msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" msgstr "" @@ -112,16 +90,12 @@ msgstr "" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" @@ -132,27 +106,17 @@ msgstr "" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"<b>please</b> \n" -"<a href=\"%(contact)s\">communicate your ideas</a> to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to <b>please</b> \n" +"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" @@ -168,13 +132,11 @@ msgstr "" msgid "" "<ol>\n" " <li>\n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" " </li>\n" " <li>\n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" " </li>\n" " <li>\n" @@ -182,10 +144,8 @@ msgid "" " collecting data about yourself\n" " </li>\n" " <li>\n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" " </li>\n" " <li>\n" @@ -193,10 +153,8 @@ msgid "" " publication and collect as little as possible\n" " </li>\n" " <li>\n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is <b><i>not</i></b> intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is <b><i>not</i></b> intended to be private by the\n" " originator\n" " </li>\n" "</ol>" @@ -208,32 +166,24 @@ msgstr "" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n" "router.config before starting." msgstr "" @@ -244,13 +194,10 @@ msgstr "" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please <a " -"href=\"%(contact)s\">contact\n" +"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n" " us</a> before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -260,35 +207,23 @@ msgstr "" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -343,8 +278,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." +"This process is subject to change. Please refer to this page for the current VRP." msgstr "" #: i2p2www/pages/site/research/vrp.html:10 @@ -353,22 +287,15 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:12 msgid "" -"Researchers: while you research/hack, we ask that you refrain from the " -"following: - Performing active exploits or Denial of Service attacks on " -"the\n" -"i2p network - Performing social engineering on i2p development team " -"members - Performing any physical or electronic attempts against i2p " -"property and/or data\n" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" "centers" msgstr "" #: i2p2www/pages/site/research/vrp.html:15 msgid "" -"As i2p is an open-source community, many volunteers and development team " -"members run their own I2P Sites as well as public (“non-private " -"internetâ€) domains. These\n" -"sites/servers are NOT in the scope of the vulnerability assessment / " -"response process, only the underlying code of i2p is." +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internetâ€) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." msgstr "" #: i2p2www/pages/site/research/vrp.html:18 @@ -395,8 +322,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." msgstr "" @@ -409,8 +335,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." msgstr "" @@ -430,8 +355,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." msgstr "" #: i2p2www/pages/site/research/vrp.html:70 @@ -443,8 +368,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Affects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." msgstr "" #: i2p2www/pages/site/research/vrp.html:79 @@ -462,19 +387,18 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." msgstr "" #: i2p2www/pages/site/research/vrp.html:98 -msgid "The notification should list appropriate steps for users to take, if any." +msgid "" +"The notification should list appropriate steps for users to take, if any." msgstr "" #: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." msgstr "" @@ -497,8 +421,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:122 msgid "" "Response Manager works on a patch LOCALLY, patches are shared by the " -"response team via PGP-encrypted e-mail until such a time as it is safe to" -" expose to the public." +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" #: i2p2www/pages/site/research/vrp.html:125 @@ -507,10 +431,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." msgstr "" #: i2p2www/pages/site/research/vrp.html:132 @@ -545,19 +467,14 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." +"Response Manager includes vulnerability announcement draft in release notes." msgstr "" #: i2p2www/pages/site/research/vrp.html:162 msgid "" -"Proceed with the Point or Regular Release. At this time, it is not " -"possible to release an in-network update for only one operating system or" -"\n" -"\t\tarchitecture. In order that all affected products can be released as " -"quickly as possible, the person responsible\n" -"\t\tfor that software should be able to perform necessary release " -"processes in a timely manner. Importantly this should include\n" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" "\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" @@ -567,11 +484,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." msgstr "" #: i2p2www/pages/site/research/vrp.html:179 -msgid "If the Incident Response process in section III is successfully completed:" +msgid "" +"If the Incident Response process in section III is successfully completed:" msgstr "Om processen för incidentrespons i avsnitt III har slutförts:" #: i2p2www/pages/site/research/vrp.html:183 @@ -623,8 +542,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." msgstr "" #: i2p2www/pages/site/research/vrp.html:217 @@ -632,13 +551,14 @@ msgid "If applicable, credits to the original reporter." msgstr "" #: i2p2www/pages/site/research/vrp.html:222 -msgid "Release finalized vulnerability announcement on website and in news feed." +msgid "" +"Release finalized vulnerability announcement on website and in news feed." msgstr "" #: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" msgstr "" #: i2p2www/pages/site/research/vrp.html:238 @@ -647,8 +567,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." msgstr "" #: i2p2www/pages/site/research/vrp.html:250 @@ -659,33 +579,28 @@ msgstr "Om processen för incidentrespons i avsnitt III *inte* har slutförts:" #: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." msgstr "" #: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." msgstr "" #: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." msgstr "" #: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." msgstr "" @@ -700,7 +615,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:282 #: i2p2www/pages/site/research/vrp.html:302 -msgid "Response Team and developers should coordinate to work on the following:" +msgid "" +"Response Team and developers should coordinate to work on the following:" msgstr "" #: i2p2www/pages/site/research/vrp.html:286 @@ -729,15 +645,13 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." +"If results are not sensitive, share with the public via IRC or public Trac." msgstr "" #: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." msgstr "" @@ -747,10 +661,8 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" msgstr "" @@ -760,8 +672,7 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." msgstr "" @@ -798,4 +709,3 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "" - diff --git a/i2p2www/translations/tr/LC_MESSAGES/docs.po b/i2p2www/translations/tr/LC_MESSAGES/docs.po index 35b65bf902703d9d70e77343fac85d6b15ba983e..4f33438f6fff816efdefd3361a131bec96564d6b 100644 --- a/i2p2www/translations/tr/LC_MESSAGES/docs.po +++ b/i2p2www/translations/tr/LC_MESSAGES/docs.po @@ -8497,13 +8497,13 @@ msgstr "Ä°letileri ÅŸifreleyebilmek için (tünelden göndermek ve hedefe ulaÅŸm msgid "" "Routers themselves send their routerInfo to the netDb directly, while leaseSets are sent through outbound tunnels\n" "(leaseSets need to be sent anonymously, to avoid correlating a router with his leaseSets)." -msgstr "" +msgstr "Yönelticiler, Yöneltici Bilgilerini doÄŸrudan AÄŸ Veritabanına gönderirken, Kiralama Kümeleri giden tüneller üzerinden \ngönderilir (bir yönelticinin kendi Kiralama Kümesi ile iliÅŸkilendirilmesini önlemek için Kiralama Kümelerinin anonim olarak gönderilmesi gerekir)." #: i2p2www/pages/site/docs/how/tech-intro.html:160 msgid "" "We can combine the above concepts to build successful connections in the " "network." -msgstr "" +msgstr "AÄŸda baÅŸarılı baÄŸlantılar kurmak için yukarıdaki kavramları birleÅŸtirebiliriz." #: i2p2www/pages/site/docs/how/tech-intro.html:164 msgid "" @@ -8511,19 +8511,19 @@ msgid "" "This way, she gathers lists of peers she can use as hops in her tunnels.\n" "She can then send a build message to the first hop, requesting the construction of a tunnel and asking\n" "that router to send the construction message onward, until the tunnel has been constructed." -msgstr "" +msgstr "Alice, kendi gelen ve giden tünellerini oluÅŸturmak için Yöneltici Bilgilerini toplamak amacıyla AÄŸ Veritabanı üzerinde bir arama yapar.\nBöylece, tünellerinde sıçrama olarak kullanabileceÄŸi eÅŸlerin listelerini toplar.\nDaha sonra ilk sıçramaya bir oluÅŸturma iletisi gönderebilir, bir tünel oluÅŸturulmasını isteyebilir ve \nyönelticiden tünel oluÅŸturulana kadar oluÅŸturma iletisini göndermesini isteyebilir." #: i2p2www/pages/site/docs/how/tech-intro.html:171 msgid "Request information on other routers" -msgstr "" +msgstr "DiÄŸer yönelticiler hakkında bilgi istenir" #: i2p2www/pages/site/docs/how/tech-intro.html:173 msgid "Build tunnel using router information" -msgstr "" +msgstr "Yöneltici bilgileri kullanılarak tünel oluÅŸturulur" #: i2p2www/pages/site/docs/how/tech-intro.html:175 msgid "Figure 2: Router information is used to build tunnels." -msgstr "" +msgstr "Åžekil 2: Tünelleri oluÅŸturmak için kullanılan yöneltici bilgileri." #: i2p2www/pages/site/docs/how/tech-intro.html:178 msgid "" @@ -8541,7 +8541,7 @@ msgid "" "Alice may also cut down on the response time by bundling her most \n" "recent LeaseSet with the message so that Bob doesn't need to do a netDb lookup \n" "for it when he wants to reply, but this is optional." -msgstr "" +msgstr "Alice, Bob'a bir ileti göndermek istediÄŸinde, önce Bob'un Kiralama Kümesini \nbulmak için AÄŸ Veritabanında bir arama yapar ve ona var olan gelen tünel \naÄŸ geçitlerini öğrenir. Ardından, giden tünellerinden birini seçer ve iletiyi Bob'un \ngelen tünel aÄŸ geçitlerinden birine iletmek için giden tünelin uç noktası için \nyönergelerle birlikte aÅŸağıya gönderir. Giden tünel uç noktası bu yönergeleri \naldığında, iletiyi istendiÄŸi gibi iletir ve Bob'un gelen tünel aÄŸ geçidi bunu aldığında, \ntünelden Bob'un yönelticisine iletilir. Alice, Bob'un iletiyi yanıtlayabilmesini istiyorsa, \nkendi hedefini iletinin bir parçası olarak açıkça iletmelidir. Bu, <a href=\"#app.streaming\">streaming</a> \nkitaplığında yapılan daha yüksek düzeyle bir katman sunularak yapılabilir.\nAlice ayrıca, Bob'un yanıt vermek istemesi durumunda AÄŸ Veritabanı araması \nyapmasına gerek kalmaması için en son Kiralama Kümesini iletiye katarak \nyanıt süresini kısaltabilir. Ancak bu seçenek isteÄŸe baÄŸlıdır." #: i2p2www/pages/site/docs/how/tech-intro.html:195 msgid "Connect tunnels using LeaseSets" @@ -8569,7 +8569,7 @@ msgid "" "end to end communication between Alice and Bob, the garlic will be encrypted \n" "to the public key published in Bob's leaseSet, allowing the message to be \n" "encrypted without giving out the public key to Bob's own router." -msgstr "" +msgstr "Tünellerin kendileri, aÄŸ içindeki eÅŸlere karşı izinsiz açığa çıkmalarını önlemek için \nkatmanlı ÅŸifreleme kullansa da (aÄŸ dışındaki eÅŸlere izin açığa çıkmayı önlemek için \ntaşıma katmanının yaptığı gibi), giden tünel uç noktasından ve gelen tünel aÄŸ geçidinden \ngelen iletiyi gizlemek için ek bir uçtan uca ÅŸifreleme katmanı eklemek gerekir. Bu \n\"<a href=\"#op.garlic\">garlicf ÅŸifrelemesi</a>\", Alice'in yönelticisinin birden çok iletiyi tek bir \n\"garlic iletisine\" sarmalaması ve belirli bir ortak anahtarla ÅŸifrelemesini saÄŸlar. \nBöylece aracı eÅŸler garlic içinde kaç ileti olduÄŸunu, bu iletilerin ne söylediÄŸini \nveya bu iletilerin nerede olduÄŸunu ya da bu diÅŸin hangi hedefe gönderildiÄŸini belirleyemez. \nAlice ve Bob arasında tipik uçtan uca iletiÅŸim için, garlic Bob'un Kiralama Kümesinde \nyayınlanan ortak anahtarla ÅŸifrelenir. Böylece herkese açık anahtar Bob'un kendi \nyönelticisine verilmeden iletinin ÅŸifrelenmesi saÄŸlanır." #: i2p2www/pages/site/docs/how/tech-intro.html:215 msgid "" @@ -8579,7 +8579,7 @@ msgid "" "control and reliability needs, but most would be best served by reusing the \n" "provided <a href=\"#app.streaming\">streaming</a> library to view I2P as a streams \n" "based network." -msgstr "" +msgstr "Akılda tutulması gereken bir diÄŸer önemli durum, I2P uygulamasının tamamen \nileti temelli olduÄŸu ve yol boyunca bazı iletilerin kaybolabileceÄŸidir. I2P kullanan \nuygulamalar, ileti odaklı arayüzleri kullanabilir ve kendi tıkanıklık denetimi ile \ngüvenilirlik gereksinimlerini karşılayabilir. Ancak çoÄŸunun en iyi ÅŸekilde hizmet\nsaÄŸlaması için, I2P uygulamasını akış temelli bir aÄŸ olarak görüntülemek için \nsaÄŸlanan <a href=\"#app.streaming\">akış</a> kitaplığını yeniden kullanması gerekir." #: i2p2www/pages/site/docs/how/tech-intro.html:225 msgid "" @@ -8595,7 +8595,7 @@ msgid "" "while for outbound tunnels, the creator is the gateway and they pre-decrypt \n" "all of the layers so that after all of the layers of per-hop encryption are \n" "added, the message arrives in the clear at the tunnel endpoint." -msgstr "" +msgstr "Hem gelen hem de giden tüneller benzer ilkelerle çalışır.\nTünel aÄŸ geçidi, bir dizi tünel iletisi biriktirir ve sonunda bunları tünel aktarımı \niçin bir ÅŸeye önceden iÅŸler. Ardından, aÄŸ geçidi önceden iÅŸlenmiÅŸ verileri ÅŸifreler \nve ilk sıçramaya iletir. Bu eÅŸ ve sonraki tünel katılımcıları, bir sonraki eÅŸe iletmeden \nönce kopya olmadığını doÄŸruladıktan sonra bir ÅŸifreleme katmanı ekler. Sonunda ileti, \niletilerin yeniden bölündüğü ve istendiÄŸi gibi iletildiÄŸi uç noktaya ulaşır. Fark, tüneli \noluÅŸturanın yaptığı iÅŸte ortaya çıkar. Gelen tünellerde, oluÅŸturucu uç noktadır ve \neklenen tüm katmanların ÅŸifresini çözer. Giden tünellerde oluÅŸturucu aÄŸ geçididir ve \ntüm katmanların ÅŸifresini önceden çözer. Her sıçrama için ÅŸifrelemenin tüm katmanları \neklendikten sonra, ileti tünel uç noktasına net bir ÅŸekilde ulaşır." #: i2p2www/pages/site/docs/how/tech-intro.html:240 msgid "" @@ -8609,7 +8609,7 @@ msgid "" "threat model. Unfortunately, latency and capacity data is not trivial to gather \n" "anonymously, and depending upon untrusted peers to provide this information \n" "has its own serious anonymity implications." -msgstr "" +msgstr "Ä°letileri iletmek için belirli eÅŸlerin seçilmesi ve bunların özel sıralaması, hem I2P \nanonimliÄŸini hem de baÅŸarım özelliklerini anlamak için önemlidir. AÄŸ veritabanının \n(aÅŸağıda) hangi eÅŸlerin sorgulanıp kayıtları depolayacağını seçmek için kendi ölçütleri \nolsa da, tünel oluÅŸturucular aÄŸdaki herhangi bir eÅŸi herhangi bir sırayla (ve hatta \nherhangi bir sayıda) tek bir tünelde kullanabilir. Mükemmel gecikme ve kapasite \nverileri küresel olarak biliniyor olsaydı, seçim ve sıralama, istemci tehdit modelleri \nve belirli gereksinimleri tarafından yönlendirilirdi. Ne yazık ki, gecikme ve kapasite \nverilerinin anonim olarak toplanması önemsiz deÄŸildir ve bu bilgileri saÄŸlamak için \ngüvenilmeyen eÅŸlere baÄŸlı olmanın anonimlik üzerinde ciddi etkileri vardır." #: i2p2www/pages/site/docs/how/tech-intro.html:253 msgid "" @@ -8623,7 +8623,7 @@ msgid "" "and offers insufficient anonymity. I2P is instead working on offering a range \n" "of peer selection strategies, coupled with anonymity aware measurement code \n" "to organize the peers by their profiles." -msgstr "" +msgstr "Anonimlik açısından en basit yöntem, tüm aÄŸdan rastgele eÅŸler seçmek, \nbunları rastgele sıralamak ve bu eÅŸleri sonsuza kadar bu sırayla kullanmak olur. \nBaÅŸarım açısından bakıldığında, en basit yöntem, gerekli yedek kapasiteye sahip \nen hızlı eÅŸleri seçmek, yükü ÅŸeffaf olarak devretmek için yükü farklı eÅŸler arasında \ndağıtmak ve kapasite bilgileri deÄŸiÅŸtiÄŸinde tüneli yeniden oluÅŸturmak olur. Ä°lki hem \nkırılgan hem de verimsiz iken, ikincisi için eriÅŸilemez bilgiler gerekir ve yetersiz \nanonimlik sunar. Bunun yerine I2P, eÅŸleri profillerine göre düzenlemek için anonimlik \nfarkında ölçüm koduyla birleÅŸtirilmiÅŸ bir dizi eÅŸ seçim stratejisi sunmaya çalışır." #: i2p2www/pages/site/docs/how/tech-intro.html:266 msgid "" @@ -8642,7 +8642,7 @@ msgid "" "routers into four tiers - fast and high capacity, high capacity, not failing, \n" "and failing. The thresholds for those tiers are determined dynamically, and \n" "while they currently use fairly simple algorithms, alternatives exist." -msgstr "" +msgstr "Temel olarak, I2P etkileÅŸimde bulunduÄŸu eÅŸlerin dolaylı davranışlarını sürekli olarak \nölçerek profillerini oluÅŸturur. ÖrneÄŸin, bir eÅŸ 1,3 saniyede bir aÄŸ veritabanı aramasına \nyanıt verdiÄŸinde, bu gidiÅŸ dönüş gecikmesi tüm yönelticilerin profillerine kaydedilerek, \nÄ°stek ve yanıtın geçtiÄŸi iki tünelde (gelen ve giden) ve sorgulanan eÅŸin profilinde yer alır. \nTaşıma katmanı gecikmesi veya tıkanıklık gibi doÄŸrudan ölçümler, manipüle edilebildiÄŸi ve \nölçüm yönelticisi ile iliÅŸkilendirilebileceÄŸinden ve onları önemsiz saldırılara açık \nbırakabileceÄŸinden profilin bir parçası olarak kullanılmaz. Bu profiller toplanırken, baÅŸarımını, \ngecikmesini, çok sayıda etkinliÄŸi iÅŸleme kapasitesini, ÅŸu anda aşırı yüklü olup olmadığını ve \naÄŸ ile ne kadar bütünleÅŸmiÅŸ olduÄŸunu özetlemek için her biri üzerinde bir dizi hesaplama yapılır. \nDaha sonra bu hesaplamalar, yönelticileri hızlı ve yüksek kapasiteli, yüksek kapasiteli, sorunsuz \nve sorunlu olmak üzere dört düzeyde gruplamak için etkin eÅŸleri karşılaÅŸtırmakta kullanılır. \nBu düzeylerin eÅŸikleri devingen olarak belirlenir ve ÅŸu anda oldukça basit algoritmalar kullanır. \nAncak alternatifleri de vardır." #: i2p2www/pages/site/docs/how/tech-intro.html:284 msgid "" @@ -8657,7 +8657,7 @@ msgid "" "router's top tier through predecessor and netDb harvesting attacks. In turn,\n" "several alternatives exist which, while not balancing the load as evenly, will\n" "address the attacks mounted by particular classes of adversaries." -msgstr "" +msgstr "Bu profil verileri kullanılarak, en basit uygun eÅŸ seçimi stratejisi, eÅŸleri üst düzeyden \n(hızlı ve yüksek kapasiteli) rastgele seçmektir. Åžu anda istemci tünelleri bu ÅŸekilde \ndağıtılmaktadır. KeÅŸif tünelleri (aÄŸ veritabanı ve tünel yönetimi için kullanılır) \"sorunsuz\" \ndüzeyinden ('daha iyi\" katmanlardaki yönelticileri de içerir) rastgele eÅŸler seçer. \nEÅŸler arası yönelticileri daha geniÅŸ bir ÅŸekilde örnekleme olanağı saÄŸlar ve aslında \nrastgele <a href=\"https://en.wikipedia.org/wiki/Hill_climbing\">tepe tırmanışı</a> ile eÅŸ seçimini iyileÅŸtirir. Ancak bu stratejiler, öncül \nve aÄŸ veritabanı hasat saldırıları ile yönelticinin en üst düzeyindeki eÅŸler hakkında bilgi \nsızdırır. Buna karşılık, yükü eÅŸit olarak dengelememekle birlikte, belirli düşman sınıfları \ntarafından düzenlenen saldırılara karşı koyacak çeÅŸitli alternatifler vardır." #: i2p2www/pages/site/docs/how/tech-intro.html:298 msgid "" @@ -8678,7 +8678,7 @@ msgid "" "each time. This varies from the XOR based ordering in that the predecessor \n" "and successor of each peer is always the same, while the XOR only makes sure \n" "their order doesn't change." -msgstr "" +msgstr "Rastgele bir anahtar seçerek ve eÅŸleri ondan XOR uzaklıklarına göre sıralayarak, \neÅŸlerin baÅŸarısızlık oranına ve düzeyin karıştırılmasına göre öncül ve hasat saldırılarında \nsızdırılan bilgiler azaltılır. AÄŸ veritabanı hasat saldırılarıyla baÅŸa çıkmak için baÅŸka bir basit \nstrateji, gelen tünel aÄŸ geçitlerini düzeltmek ve aynı zamanda tünellerdeki eÅŸleri daha da \nrastgele hale getirmektir. Ä°stemcinin baÄŸlantı kurduÄŸu düşmanlara yönelik önceki \nsaldırılarla baÅŸa çıkmak için giden tünel uç noktaları da sabit kalır. En çok maruz kalan \nnoktada hangi eÅŸin düzeltileceÄŸinin seçiminin elbette bir süre sınırı olmalıdır. Çünkü \nsonunda tüm eÅŸler baÅŸarısız olur. Böylece diÄŸer yönelticilerin sorunları arasında ölçülen \nortalama süreyi taklit etmek için tepkisel olarak ayarlanabilir ya da etkisel olarak önlenebilir. \nBu iki strateji, sırayla, sabit bir açık eÅŸ ve tüneller arasında bir XOR tabanlı sıralama kullanılarak \nbirleÅŸtirilebilir. Daha katı bir strateji, tam eÅŸleri ve olası bir tünelin sıralamasını düzeltir. Yalnızca \nher biri aynı ÅŸekilde katılmayı kabul ederse tek tek eÅŸler kullanılır. Bu yöntem, XOR tabanlı \nsıralamadan farklıdır, çünkü her bir eÅŸin öncülü ve ardılı her zaman aynıdır. XOR ise yalnızca \nsıralarının deÄŸiÅŸmediÄŸinden emin olur." #: i2p2www/pages/site/docs/how/tech-intro.html:318 #, python-format @@ -8687,7 +8687,7 @@ msgid "" "random strategy above, with XOR-based ordering. A \n" "more detailed discussion of the mechanics involved in tunnel operation, management, \n" "and peer selection can be found in the <a href=\"%(tunnelimpl)s\">tunnel spec</a>." -msgstr "" +msgstr "Daha önce belirtildiÄŸi gibi, I2P ÅŸu anda (sürüm 0.8), XOR tabanlı sıralama \nile yukarıdaki düzeyli rastgele stratejiyi kullanıyor. Tünel iÅŸletimi, yönetimi \nve eÅŸ seçimi ile ilgili mekanizmalar hakkında ayrıntılı bir tartışma \n<a href=\"%(tunnelimpl)s\">tunnel teknik özelliklerinde</a> bulunabilir." #: i2p2www/pages/site/docs/how/tech-intro.html:326 #, python-format @@ -8695,7 +8695,7 @@ msgid "" "As mentioned earlier, I2P's netDb works to share the network's metadata.\n" "This is detailed in <a href=\"%(netdb)s\">the network database</a> page,\n" "but a basic explanation is available below." -msgstr "" +msgstr "Daha önce belirtildiÄŸi gibi, I2P aÄŸ veritabanı ağın üst verilerini paylaÅŸmak için çalışır.\nBu konu, <a href=\"%(netdb)s\">aÄŸ veritabanı</a> sayfasında ayrıntılı olarak açıklanmıştır. \nBununla birlikte basit bir açıklamayı aÅŸağıda bulabilirsiniz." #: i2p2www/pages/site/docs/how/tech-intro.html:332 msgid "" @@ -8703,7 +8703,7 @@ msgid "" "Currently, I2P installations that have a lot of bandwidth and are fast enough,\n" "will appoint themselves as floodfill as soon as the number of existing floodfill routers\n" "drops too low." -msgstr "" +msgstr "I2P kullanıcılarının belirli bir yüzdesi 'otomatik doldurma eÅŸleri' olarak atanır.\nÅžu anda, çok fazla bant geniÅŸliÄŸi olan ve yeterince hızlı I2P kurulumları, \nvar olan otomatik doldurma yönelticilerinin sayısı çok azaldığında kendilerini \notomatik doldurma yönelticisi olarak atar." #: i2p2www/pages/site/docs/how/tech-intro.html:339 #, python-format @@ -8715,23 +8715,23 @@ msgid "" "<a href=\"%(netdb)s#lookup\">security issue</a>.\n" "When a lookup is done, the floodfill router will not forward the lookup to other peers,\n" "but will always answer by itself (if it has the requested data)." -msgstr "" +msgstr "DiÄŸer I2P yönelticileri, otomatik doldurma yönelticilerine basit 'depolama' ve 'arama' \nsorguları göndererek verilerini ve arama bilgilerini depolar.\nBir otomatik doldurma yönelticisi bir 'depolama' sorgusu alırsa, bilgileri \n<a href=\"http://en.wikipedia.org/wiki/Kademlia\">Kademlia algoritmasını</a> kullanarak diÄŸer otomatik doldurma \nyönelticilerine yayar.\n'Arama' sorguları, ÅŸu anda önemli bir <a href=\"%(netdb)s#lookup\">güvenlik sorununu</a> \nönlemek için farklı ÅŸekilde çalışıyor.\nBir arama yapıldığında, otomatik doldurma yönelticisi aramayı diÄŸer eÅŸlere iletmez. \nAncak her zaman kendi kendine yanıt verir (istenilen verilere sahipse)." #: i2p2www/pages/site/docs/how/tech-intro.html:349 msgid "Two types of information are stored in the network database." -msgstr "" +msgstr "AÄŸ veritabanında iki türde bilgi depolanır." #: i2p2www/pages/site/docs/how/tech-intro.html:353 msgid "" "A <b>RouterInfo</b> stores information on a specific I2P router and how to " "contact it" -msgstr "" +msgstr "<b>Yöneltici bilgileri</b> belirli bir I2P yönelticisi ve nasıl baÄŸlantı kurulacağı hakkında bilgileri tutar." #: i2p2www/pages/site/docs/how/tech-intro.html:354 msgid "" "A <b>LeaseSet</b> stores information on a specific destination (e.g. I2P " "website, e-mail server...)" -msgstr "" +msgstr "<b>Kiralama kümesi</b> belirli bir hedefin bilgilerini tutar (I2P web sitesi, e-posta sunucusu gibi)" #: i2p2www/pages/site/docs/how/tech-intro.html:356 msgid "" @@ -8740,7 +8740,7 @@ msgid "" "This is also why I2P bundles the necessary code for maintaining the correct time, occasionally querying some SNTP servers \n" "(the <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin by default)\n" "and detecting skew between routers at the transport layer." -msgstr "" +msgstr "Tüm bu bilgiler, yayınlayan tarafça imzalanır ve bilgileri kullanan veya depolayan herhangi bir I2P yönelticisi tarafından doÄŸrulanır.\nEk olarak, eski kayıtların tutulmasını ve olası saldırıları önlemek için verilerde süre bilgisi bulunur.\nBu aynı zamanda I2P tarafından doÄŸru zamanı korumak, ara sıra bazı SNTP sunucularını sorgulamak \n(varsayılan olarak <a href=\"http://www.pool.ntp.org/\">pool.ntp.org</a> round robin) ve aktarım katmanındaki yönelticiler arasındaki \nsapmayı algılamak için gerekli kodu bir araya getirmekte kullanılır." #: i2p2www/pages/site/docs/how/tech-intro.html:364 msgid "Some additional remarks are also important." @@ -8755,7 +8755,7 @@ msgid "" "One could only want specific people to be able to reach a destination.\n" "This is possible by not publishing the destination in the netDb. You will however have to transmit the destination by other means.\n" "An alternative are the 'encrypted leaseSets'. These leaseSets can only be decoded by people with access to the decryption key." -msgstr "" +msgstr "Bir kiÅŸi yalnızca belirli kiÅŸilerin bir hedefe ulaÅŸabilmesini isteyebilir.\nBu, hedef AÄŸ Veritabanında yayınlanabilir. Ancak hedefi baÅŸka yollarla iletmeniz gerekir.\nBir alternatif, 'Åžifreli Kiralama Kümeleri'dir. Bu Kiralama Kümeleri yalnızca ÅŸifre çözme anahtarına eriÅŸimi olan kiÅŸiler tarafından çözülebilir." #: i2p2www/pages/site/docs/how/tech-intro.html:377 msgid "Bootstrapping:" @@ -8780,7 +8780,7 @@ msgid "" "However, as the network grows, not all routerInfo and leaseSet files will be present\n" "on each netDb router. This will cause a deterioration of the percentage of successful lookups.\n" "Because of this, refinements to the netDb will be done in the next releases." -msgstr "" +msgstr "I2P ağındaki aramalar diÄŸer aÄŸ veritabanı yönelticilerine iletilmez.\nÅžu anda, aÄŸ çok büyük olmadığı için bu büyük bir sorun oluÅŸturmaz.\nAncak aÄŸ büyüdükçe, her aÄŸ veritabanı yönelticisinde yöneltici bilgileri \nve kiralama kümesi dosyalarının tümü bulunmaz ve baÅŸarılı arama oranı düşer.\nBu nedenle, sonraki sürümlerde aÄŸ veritabanında iyileÅŸtirmeler yapılacaktır." #: i2p2www/pages/site/docs/how/tech-intro.html:398 msgid "" @@ -8789,7 +8789,7 @@ msgid "" "is the one who should receive a given message. The particulars of how routers \n" "communicate with other routers aren't critical - three separate protocols \n" "have been used at different points to provide those bare necessities." -msgstr "" +msgstr "Yönelticiler arasındaki iletiÅŸimde, iletiÅŸim kurulan yönelticinin belirli bir iletiyi \nalması gereken yöneltici olduÄŸunu doÄŸrulanırken, dış düşmanlara karşı gizlilik \nve bütünlük saÄŸlanması gerekir. Yönelticilerin diÄŸer yönelticilerle nasıl iletiÅŸim \nkurduÄŸunun ayrıntıları kritik deÄŸildir. Temel gereksinimleri karşılamak için farklı \nnoktalarda üç ayrı iletiÅŸim kuralı kullanılmıştır." #: i2p2www/pages/site/docs/how/tech-intro.html:406 #, python-format @@ -8799,12 +8799,12 @@ msgid "" "(as a number of routers will end up speaking with many others), I2P moved \n" "from a TCP based transport to a <a href=\"%(ssu)s\">UDP-based one</a> - \"Secure \n" "Semireliable UDP\", or \"SSU\"." -msgstr "" +msgstr "I2P, o zamandan beri devre dışı bırakılan TCP tabanlı bir iletiÅŸim kuralı ile baÅŸladı. \nDaha sonra, yüksek düzeyli iletiÅŸim gereksinimini karşılamak için (birkaç yöneltici \ndiÄŸerleriyle konuÅŸacağından), I2P, TCP tabanlı bir taşıyıcıdan \n<a href=\"%(ssu)s\">UDP tabanlı bir taşıyıcıya</a> - \"Güvenli yarı güvenilir UDP\" ya da \"SSU\" \nkullanmaya geçti." #: i2p2www/pages/site/docs/how/tech-intro.html:414 #, python-format msgid "As described in the <a href=\"%(ssu)s\">SSU spec</a>:" -msgstr "" +msgstr "<a href=\"%(ssu)s\">SSU teknik özelliklerinde</a> belirtildiÄŸi ÅŸekilde:" #: i2p2www/pages/site/docs/how/tech-intro.html:418 msgid "" @@ -8815,7 +8815,7 @@ msgid "" "PMTU detection. It should be capable of efficiently moving bulk data at rates \n" "sufficient for home users. In addition, it should support techniques for addressing \n" "network obstacles, like most NATs or firewalls." -msgstr "" +msgstr "Bu iletiÅŸim kuralının amacı, güvenli, kimliÄŸi doÄŸrulanmış, yarı güvenilir ve sıralanmamış \nileti aktarımını saÄŸlamak ve üçüncü tarafların kolayca fark edemeyeceÄŸi kadar az miktarda \nveri ortaya çıkarmaktır. TCP dostu tıkanıklık denetiminin yanında yüksek düzeyli iletiÅŸimi \ndesteklerken PMTU algılamasını da içerebilir. Ev kullanıcıları için toplu verileri yeterli hızlarda \nverimli bir ÅŸekilde aktarabilmelidir. Ayrıca, NAT veya güvenlik duvarı gibi yaygın kullanılan \naÄŸ engellerini ele alan teknikleri desteklemelidir." #: i2p2www/pages/site/docs/how/tech-intro.html:428 #, python-format @@ -8827,7 +8827,7 @@ msgid "" "the external host and port (dyndns/etc is ok) on /config.jsp can receive inbound \n" "connections. As NTCP is NIO based, so it doesn't suffer from the 1 thread \n" "per connection issues of the old TCP transport." -msgstr "" +msgstr "SSU duyurulduktan sonra ve tıkanıklık çökmesi sorunlarının ortaya çıkmasıyla, \n<a href=\"%(ntcp)s\">NTCP</a> adlı yeni bir NIO tabanlı TCP aktarımı uygulandı. Yalnızca giden \nbaÄŸlantılar için varsayılan olarak etkindir. NAT/güvenlik duvarlarını gelen baÄŸlantılara \nizin verecek ÅŸekilde yapılandıranlar ve /config.jsp üzerinde dış sunucu ve kapı \nnumarası (dyndns/etc tamam olan) belirtenler gelen baÄŸlantıları alabilir. NTCP NIO \ntabanlı olduÄŸundan, eski TCP aktarımındaki her baÄŸlantı için 1 iÅŸlem sorunu yaÅŸanmaz." #: i2p2www/pages/site/docs/how/tech-intro.html:438 msgid "" @@ -8836,7 +8836,7 @@ msgid "" "the connection and the relative value of these bids assigns the priority. \n" "Transports may reply with different bids, depending on whether there is already \n" "an established connection to the peer." -msgstr "" +msgstr "I2P, aynı anda birden fazla taşıyıcı kullanılmasını destekler. Giden baÄŸlantı için \nbelirli bir taşıyıcı \"teklifler\" yoluyla seçilir. BaÄŸlantı için her taşıyıcı teklifi ve bu \ntekliflerin göreli deÄŸeri önceliÄŸi belirler.\nTaşıyıcılar, eÅŸ ile daha önce kurulmuÅŸ bir baÄŸlantı olup olmadığına baÄŸlı olarak \nfarklı tekliflerle yanıt verebilir." #: i2p2www/pages/site/docs/how/tech-intro.html:446 #, python-format @@ -8846,7 +8846,7 @@ msgid "" "and inbound connections. Your firewall and your I2P router must be configured \n" "to allow inbound NTCP connections. For further information see the <a href=\"%(ntcp)s\">NTCP \n" "page</a>." -msgstr "" +msgstr "Geçerli uygulama, çoÄŸu durumda giden baÄŸlantılar için en yüksek öncelikli \ntaşıyıcı olarak NTCP deÄŸerlendirmesi yapar. SSU, hem giden hem de gelen \nbaÄŸlantılar için etkinleÅŸtirilir. Güvenlik duvarınız ve I2P yönelticiniz, gelen \nNTCP baÄŸlantılarına izin verecek ÅŸekilde yapılandırılmalıdır. Ayrıntılı bilgi \nalmak için <a href=\"%(ntcp)s\">NTCP sayfasına</a> bakabilirsiniz." #: i2p2www/pages/site/docs/how/tech-intro.html:455 msgid "" @@ -8862,7 +8862,7 @@ msgid "" "at the tunnel endpoint with an additional SHA256 hash. Various other messages \n" "are passed along inside \"garlic messages\", which are encrypted with ElGamal/AES+SessionTags \n" "(explained below)." -msgstr "" +msgstr "I2P üzerinde çeÅŸitli düşmanlara karşı katmanlı savunma saÄŸlamak için en düşük \ndüzeyde ÅŸifreleme öncülleri bir araya getirilir. En düşük düzeyde, yönelticiler arası \niletiÅŸim, aktarım katmanı güvenliÄŸi tarafından korunur - SSU, 2048 bitlik bir Diffie \naracılığıyla kısa ömürlü bir oturum anahtarı üzerinde anlaÅŸtıktan sonra her paketi \nhem açık IV hem de MAC (HMAC-MD5-128) ile AES256/CBC ile ÅŸifreler. Hellman \ndeÄŸiÅŸimi, diÄŸer yönelticinin DSA anahtarıyla istasyondan istasyona kimliÄŸi doÄŸrular \nve ayrıca her aÄŸ iletisinin yerel bütünlük denetimi için kendi karması vardır. \nAktarımlar üzerinden geçirilen <a href=\"#op.tunnels\">Tünel</a> iletileri, açık bir IV ile kendi katmanlı \nAES256/CBC ÅŸifrelemesini kullanır ve tünel uç noktasında ek bir SHA256 karması \nile doÄŸrulanır. ElGamal/AES+SessionTags (aÅŸağıda açıklanmıştır) ile ÅŸifrelenmiÅŸ \n\"garlic iletileri\" içinde çeÅŸitli diÄŸer iletiler aktarılır." #: i2p2www/pages/site/docs/how/tech-intro.html:470 msgid "Garlic messages" @@ -8882,7 +8882,7 @@ msgid "" "will wrap up that data message (alongside some other messages) into a garlic, \n" "encrypt that garlic to the 2048bit ElGamal public key published in the recipient's \n" "leaseSet, and forward it through the appropriate tunnels." -msgstr "" +msgstr "Garlic iletileri, \"onion\" katmanlı ÅŸifrelemenin bir uzantısıdır ve tek bir iletinin içeriÄŸinin \nbirden fazla \"diÅŸ\" içermesini saÄŸlar - kendi aktarım yönergelerinin yanında tam olarak \nbiçimlendirilmiÅŸ iletiler. Ä°leriler aksi durumda bilgiye eriÅŸimi olmaması gereken bir eÅŸten \naçık metin olarak geçtiÄŸinde, iletiler bir garlic iletisine samalanır. ÖrneÄŸin, bir yöneltici \nbaÅŸka bir yönelticiden bir tünele katılmasını istediÄŸinde, istek bir garlic içine samalanır.\nBu garlic alıcı yönelticinin 2048bit ElGamal ortak anahtarına ÅŸifrelenir ve bir tünelden iletilir. \nBaÅŸka bir örnek, bir istemci bir hedefe ileti göndermek istediÄŸinde - göndericinin yönelticisi \nbu veri iletisini (diÄŸer bazı iletilerin yanında bir garlic içine sarmalar. Bu garlic alıcının \nkiralama kümesinde yayınlanan 2048 bit ElGamal ortak anahtarı ile ÅŸifrelenir ve uygun \ntünellerden geçirilir." #: i2p2www/pages/site/docs/how/tech-intro.html:486 msgid "" @@ -8896,7 +8896,7 @@ msgid "" "by wrapping them in garlic messages and forwarding them a number of hops prior \n" "to delivering them to the next hop in the tunnel, but those techniques are \n" "not currently used in the existing implementation." -msgstr "" +msgstr "Åžifreleme katmanının içindeki her bir diÅŸe eklenmiÅŸ \"yönergeler\", diÅŸin yerel olarak, \nuzak bir yönelticiye ya da uzak bir yönelticideki uzak bir tünele aktarılmasını isteme \nyeteneÄŸini bulundurur. Bu yönergelerde, bir eÅŸin aktarımın belirli bir zaman veya koÅŸul \nkarşılanana kadar ertelenmesini istemesini saÄŸlayan alanlar vardır. Ancak bunlar \n<a href=\"#future.variablelatency\">önemsiz gecikmeler</a> dağıtılana kadar kabul edilmez. Garlic iletilerini tünel \noluÅŸturmadan herhangi bir sayıda sıçrama ile açıkta yöneltmek ya da tünel iletilerini \ngarlic iletilerine sararak ve tüneldeki bir sonraki sekmeye iletmeden önce birkaç \nsıçramadan geçirerek yönlendirilebilir. Ancak bu teknikler ÅŸu andaki uygulama \nkullanılmıyor" #: i2p2www/pages/site/docs/how/tech-intro.html:499 msgid "Session tags" @@ -8909,7 +8909,7 @@ msgid "" "and integrity to garlic messages. As a whole, the combination is referred \n" "to as ElGamal/AES+SessionTags, but that is an excessively verbose way to describe \n" "the simple use of 2048bit ElGamal, AES256, SHA256 and 32 byte nonces." -msgstr "" +msgstr "Güvenilmez, sıralı olmayan ileti tabanlı bir sistem olan I2P, garlic iletilerinin veri gizliliÄŸi \nve bütünlüğü saÄŸlamak için asimetrik ve simetrik ÅŸifreleme algoritmalarının basit bir \nkombinasyonunu kullanır. Bir bütün olarak, kombinasyon ElGamal/AES+Oturum etiketi \nolarak anılır. Ancak bu, basit 2048 bit ElGamal, AES256, SHA256 ve 32 bayt nonce \nkullanımını açıklamak için aşırı derecede ayrıntılı bir yoldur." #: i2p2www/pages/site/docs/how/tech-intro.html:539 msgid "" @@ -8920,7 +8920,7 @@ msgid "" "tags are getting through, and if there isn't sufficient communication it may \n" "drop the ones previously assumed to be properly delivered, reverting back \n" "to the full expensive ElGamal encryption." -msgstr "" +msgstr "Oturum etiketlerinin ömürleri kısadır. bu sürenin sonunda kullanılmazlarsa atılır. \nEk olarak, her bir anahtar için depolanan miktar ve anahtarların sayısı sınırlıdır.\nÇok fazla gelirse, yeni veya eski iletiler kaybolabilir Gönderici, oturum etiketlerini \nkullanan iletilerin geçip geçmediÄŸini izler ve yeterli iletiÅŸim yoksa, daha önce \ndüzgün bir ÅŸekilde iletildiÄŸi varsayılanları bırakarak en pahalı ElGamal ÅŸifrelemesine \ngeri dönebilir." #: i2p2www/pages/site/docs/how/tech-intro.html:549 msgid "" @@ -8934,7 +8934,7 @@ msgid "" "cover against internal adversaries, though perhaps by limiting the amount \n" "of times each PRNG is used, any weaknesses can be minimized. At the moment, \n" "there are no immediate plans to move towards these synchronized PRNGs." -msgstr "" +msgstr "Bir alternatif, yalnızca tek bir oturum etiketi iletmek ve bundan, hangi etiketlerin \nkullanılacağını veya bekleneceÄŸini belirlemek için belirleyici bir PRNG tohumlanmasıdır. \nBu PRNG verisini gönderici ve alıcı arasında kabaca eÅŸitlenmiÅŸ olarak tutularak (alıcı\nörneÄŸin sonraki 50 etiketin bir penceresini önceden hesaplar), çok sayıda etiketi düzenli \nolarak gruplamanın yükü ortadan kaldırır ve ek seçenekler ile alan/zaman deÄŸiÅŸ tokuÅŸu \nve belki de gerekli ElGamal ÅŸifrelemelerinin sayısını daha fazla azaltılması saÄŸlanır.\nBununla birlikte, iç düşmanlara karşı gerekli korumayı saÄŸlamak PRNG gücüne baÄŸlı olacaktır. \nAncak belki de her bir PRNG kullanım sürelerini sınırlayarak, herhangi bir zayıflık en aza \nindirilebilir. Åžu anda, eÅŸitlenen PRNG yöntemine doÄŸru ilerlemek için acil bir plan yok." #: i2p2www/pages/site/docs/how/tech-intro.html:562 msgid "Future" @@ -8945,7 +8945,7 @@ msgid "" "While I2P is currently functional and sufficient for many scenarios, there \n" "are several areas which require further improvement to meet the needs of those \n" "facing more powerful adversaries as well as substantial user experience optimization." -msgstr "" +msgstr "I2P ÅŸu anda birçok senaryo için iÅŸlevsel ve yeterli olsa da, daha güçlü rakiplerle \nkarşılaÅŸanların gereksinimleri için daha fazla iyileÅŸtirme ve önemli kullanıcı deneyimi \niyileÅŸtirmesi gereken birkaç alan var." #: i2p2www/pages/site/docs/how/tech-intro.html:569 msgid "Restricted route operation" @@ -9055,19 +9055,19 @@ msgstr "Zamanlama kısıtlamasından nasıl kurtulunur?" #: i2p2www/pages/site/docs/how/tech-intro.html:658 msgid "Can we deal with the sessionTags more efficiently?" -msgstr "" +msgstr "Daha etkin bir sessionTags iÅŸlemesi saÄŸlayabilir miyiz?" #: i2p2www/pages/site/docs/how/tech-intro.html:659 msgid "" "What, if any, batching/mixing strategies should be made available on the " "tunnels?" -msgstr "" +msgstr "Tüneller için herhangi bir toplu iÅŸlem ya da karma stratejisi oluÅŸturmalı mıyız?" #: i2p2www/pages/site/docs/how/tech-intro.html:660 msgid "" "What other tunnel peer selection and ordering strategies should be " "available?" -msgstr "" +msgstr "BaÅŸka tünel eÅŸ seçimi ve sıralama stratejileri neler olabilir?" #: i2p2www/pages/site/docs/how/tech-intro.html:663 msgid "Similar systems" diff --git a/i2p2www/translations/uk/LC_MESSAGES/misc.po b/i2p2www/translations/uk/LC_MESSAGES/misc.po index 9fed3be7d94f0c1ae6fa3721af41906727e579bc..a2d465fccb11f7e6ff74bf8da05fd546b0d11088 100644 --- a/i2p2www/translations/uk/LC_MESSAGES/misc.po +++ b/i2p2www/translations/uk/LC_MESSAGES/misc.po @@ -1,27 +1,24 @@ -# Ukrainian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Greg Koval <gregjsmith@gmx.com>, 2020 # Maxym Mykhalchuk, 2015 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-02-12 00:06+0000\n" -"PO-Revision-Date: 2020-07-23 01:36+0000\n" -"Last-Translator: Greg Koval <gregjsmith@gmx.com>\n" -"Language-Team: Ukrainian (Ukraine) " -"(http://www.transifex.com/otf/I2P/language/uk_UA/)\n" -"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 !=" -" 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n " -"% 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9)" -" || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3)\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:00+0000\n" +"Last-Translator: Greg Koval <gregjsmith@gmx.com>, 2020\n" +"Language-Team: Ukrainian (Ukraine) (http://www.transifex.com/otf/I2P/language/uk_UA/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: uk_UA\n" +"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 != 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n % 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9) || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3);\n" #: i2p2www/pages/site/misc/clt.html:2 msgid "I2P at CLT and PetCon 2009.1" @@ -30,54 +27,37 @@ msgstr "I2P на CLT та PetCon 2009.1" #: i2p2www/pages/site/misc/clt.html:4 msgid "" "Members of I2P will held a talk at CLT and PetCon 2009.1\n" -"Two members of the I2P team will be at two forthcoming Linux day and " -"security convention." -msgstr "" -"Члены I2P виÑтуплÑÑ‚ÑŒ на CLT та PetCon 2009.1\n" -"Два члена команди I2P будуть на двох майбутніх подіÑÑ… - дні Linux та на " -"конвенції з безпеки." +"Two members of the I2P team will be at two forthcoming Linux day and security convention." +msgstr "Члены I2P виÑтуплÑÑ‚ÑŒ на CLT та PetCon 2009.1\nДва члена команди I2P будуть на двох майбутніх подіÑÑ… - дні Linux та на конвенції з безпеки." #: i2p2www/pages/site/misc/clt.html:9 #, python-format msgid "" -"On 14th march of 2009 there will be a short talk about general " -"introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag " -"2009</a> hold by echelon.\n" -"Echelon and some other members of the I2P family will attend to the Linux" -" meeting the whole two days (Saturday and Sunday) and will be " -"recognizable as I2P family members. Meet them, ask them your questions, " -"show them your props! Show your support!" +"On 14th march of 2009 there will be a short talk about general introduction to I2P at the <a href=\"%(chemnitzer)s\">Chemnitz Linux Tag 2009</a> hold by echelon.\n" +"Echelon and some other members of the I2P family will attend to the Linux meeting the whole two days (Saturday and Sunday) and will be recognizable as I2P family members. Meet them, ask them your questions, show them your props! Show your support!" msgstr "" #: i2p2www/pages/site/misc/clt.html:14 #, python-format msgid "" -"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security " -"convention</a> in Dresden will take place.\n" -"Again, echelon will attend this event and hold a short talk about general" -" introduction to I2P. Another talk about the profiling by the I2P clients" -" will be held." +"Just 10 days later the <a href=\"%(petcon)s\">Privacy and Data Security convention</a> in Dresden will take place.\n" +"Again, echelon will attend this event and hold a short talk about general introduction to I2P. Another talk about the profiling by the I2P clients will be held." msgstr "" #: i2p2www/pages/site/misc/cvs.html:4 #, python-format msgid "" -"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a" -" <a href=\"%(monotone)s\">Monotone</a> repository.\n" +"The I2P sourcecode was kept in a CVS repository. Nowadays it is kept in a <a href=\"%(monotone)s\">Monotone</a> repository.\n" "For those who aren't very familiar with CVS, there is a\n" -"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> " -"on the\n" -"subject (developers only need to deal with the first chapter - \"An " -"Overview of\n" -"CVS\", as subsequent chapters go into some nasty details very few ever " -"need to\n" +"<a href=\"http://cvsbook.red-bean.com/cvsbook.html\">fantastic book</a> on the\n" +"subject (developers only need to deal with the first chapter - \"An Overview of\n" +"CVS\", as subsequent chapters go into some nasty details very few ever need to\n" "touch)." msgstr "" #: i2p2www/pages/site/misc/cvs.html:31 msgid "" -"Humorous quote from WinCVS: \"Did you know... Never experiment with new " -"CVS\n" +"Humorous quote from WinCVS: \"Did you know... Never experiment with new CVS\n" "commands on your working repository. Create a sample module instead.\"" msgstr "" @@ -90,7 +70,7 @@ msgstr "ÐœÑ–Ð³Ñ€Ð°Ñ†Ñ–Ñ I2PTunnel" msgid "" "After upgrading to the new architecture, you'll have to do a \n" "little work to get your old I2PTunnel-driven servers running. \n" -"Lets walk through a simple example. For an eepsite with the \n" +"Lets walk through a simple example. For an I2P Site with the \n" "old clientApp configuration, you had:" msgstr "" @@ -108,12 +88,12 @@ msgid "Click on Add new: [Server tunnel] \"GO\"" msgstr "ÐатиÑніть на Add new: [Server tunnel] \"GO\"" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:21 -msgid "For the name: <code>\"eepsite\"</code>" -msgstr "Ð”Ð»Ñ Ñ–Ð¼Ñ:: <code>\"eepsite\"</code>" +msgid "For the name: <code>\"I2P Site\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:22 -msgid "For the description: <code>\"My eepsite, isn't it pretty?\"</code>" -msgstr "Ð”Ð»Ñ Ð¾Ð¿Ð¸Ñ: <code>\"Мій eepite, чи не краÑиво?\"</code>" +msgid "For the description: <code>\"My I2P Site, isn't it pretty?\"</code>" +msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:23 msgid ">For the target host:" @@ -143,14 +123,10 @@ msgstr "ПовернетьÑÑ Ð·:" #: i2p2www/pages/site/misc/i2ptunnel-migration.html:39 msgid "" -"That's it! Creating a new I2PTunnel server works the same way too, " -"except you\n" -"don't need to \"copy the old file\", obviously. Behind the scenes, it is" -" all driven\n" -"by the <code>i2ptunnel.config</code> file, which you may modify " -"externally (if you do,\n" -"hit \"Reload config\" on the I2PTunnel web page, which will tear down all" -" of your \n" +"That's it! Creating a new I2PTunnel server works the same way too, except you\n" +"don't need to \"copy the old file\", obviously. Behind the scenes, it is all driven\n" +"by the <code>i2ptunnel.config</code> file, which you may modify externally (if you do,\n" +"hit \"Reload config\" on the I2PTunnel web page, which will tear down all of your \n" "existing tunnels and rebuild new ones)" msgstr "" @@ -168,7 +144,7 @@ msgid "I2PTunnel services" msgstr "СервіÑи Ñ‚ÑƒÐ½ÐµÐ»ÑŽÐ²Ð°Ð½Ð½Ñ I2P" #: i2p2www/pages/site/misc/i2ptunnel-services.html:4 -msgid "Below is quick copy of aum's eepsite deployment guide." +msgid "Below is quick copy of aum's I2P Site deployment guide." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:8 @@ -184,23 +160,23 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:13 msgid "" -"I recommend the Tiny Httpd web server, thttpd, (windows version available" -" on site) although you can use anything that you feel comfortable with." +"I recommend the Tiny Httpd web server, thttpd, (windows version available on" +" site) although you can use anything that you feel comfortable with." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:16 msgid "" "Another more robust option would be to use EasyPHP, which is also open " "source. It comes with PHP, PHPmyadmin, mySQL, and Apache web server. For " -"newbies who have no experience setting up and hosting content over " -"servers, see the hosting page for help." +"newbies who have no experience setting up and hosting content over servers, " +"see the hosting page for help." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:19 msgid "" -"With the web server you've chosen, configure it to listen on a port of " -"your choice, and serve its documents from a directory of your choice. For" -" this example, we'll assume port 10880." +"With the web server you've chosen, configure it to listen on a port of your " +"choice, and serve its documents from a directory of your choice. For this " +"example, we'll assume port 10880." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:22 @@ -213,8 +189,8 @@ msgstr "" msgid "" "Test the webserver, by pointing your normal browser (the one with the " "\"direct connection\") at <a href=\"http://localhost:10880\" " -"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the " -"port number you have chosen)." +"target=\"_blank\">http://localhost:10880</a> (changing the 10880 to the port" +" number you have chosen)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:28 @@ -229,28 +205,28 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:35 msgid "" -"I2P does not deal in IP addresses. To protect your anonymity, it deals in" -" unique addresses called destination keys." +"I2P does not deal in IP addresses. To protect your anonymity, it deals in " +"unique addresses called destination keys." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:38 msgid "" "A destination key works a lot like a regular IP address, except that it " -"can't be traced to your IP address or physical location. When users place" -" a request to speak with you, your gateways are the ones that answer for " -"you. So the requesting user can only know the IP address of your " -"gateways. However, gateways don't know your IP address, because gateways " -"are the last nodes on your tunnels, and you anonymously create tunnels by" -" way of garlic routing. (So gateways are like puppets that can't see " -"their masters, and everyone communicates through these puppets)" +"can't be traced to your IP address or physical location. When users place a " +"request to speak with you, your gateways are the ones that answer for you. " +"So the requesting user can only know the IP address of your gateways. " +"However, gateways don't know your IP address, because gateways are the last " +"nodes on your tunnels, and you anonymously create tunnels by way of garlic " +"routing. (So gateways are like puppets that can't see their masters, and " +"everyone communicates through these puppets)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:41 msgid "" "To deploy a server on I2P, you create a destination keypair. You use the " -"private key to authenticate your server when connecting it to I2P, and " -"you make the public key (aka destination key) known publicly, so others " -"can connect to your server. (indirectly, through your gateways)" +"private key to authenticate your server when connecting it to I2P, and you " +"make the public key (aka destination key) known publicly, so others can " +"connect to your server. (indirectly, through your gateways)" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:44 @@ -273,9 +249,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:53 msgid "" -"The filenames <code>myWebPrivKey.dat</code> and " -"<code>myWebPubKey.dat</code> are arbitrary - choose whatever you want " -"here, as long as you understand your own choices." +"The filenames <code>myWebPrivKey.dat</code> and <code>myWebPubKey.dat</code>" +" are arbitrary - choose whatever you want here, as long as you understand " +"your own choices." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:56 @@ -286,27 +262,27 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:59 msgid "" -"To convert your myWebPubKey.dat file into shareable base64, type the " -"command <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode " -"myWebPubKey.dat > myWebPubKey.txt</code> (all on one line)." +"To convert your myWebPubKey.dat file into shareable base64, type the command" +" <code>java -cp lib/i2p.jar net.i2p.data.Base64 encode myWebPubKey.dat > " +"myWebPubKey.txt</code> (all on one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:62 msgid "" -"This file you have just generated, <code>myWebPubKey.txt</code>, contains" -" a long base64 string (516 chars at last count), which we call a " -"destination key. All you need to know about this string for now is that " -"it allows remote clients to uniquely pinpoint and connect to your server," -" just the same way as an IP address allows remote machines to pinpoint " -"and connect to your machine." +"This file you have just generated, <code>myWebPubKey.txt</code>, contains a " +"long base64 string (516 chars at last count), which we call a destination " +"key. All you need to know about this string for now is that it allows remote" +" clients to uniquely pinpoint and connect to your server, just the same way " +"as an IP address allows remote machines to pinpoint and connect to your " +"machine." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:65 msgid "" "However, in contrast to an IP address, there is no way to trace your " -"machine's physical location - even though your server can be addressed " -"via I2P, your IP address cannot be traced or associated with this " -"destination key." +"machine's physical location - even though your server can be addressed via " +"I2P, your IP address cannot be traced or associated with this destination " +"key." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:70 @@ -315,9 +291,9 @@ msgstr "3 - Відкрийте \"Тунель\" від I2P до ваш Ñерв #: i2p2www/pages/site/misc/i2ptunnel-services.html:72 msgid "" -"For clients elsewhere in I2P to be able to access your server, you must " -"run a 'bridge' or 'tunnel', which takes connections from these clients " -"and forwards them to your local server." +"For clients elsewhere in I2P to be able to access your server, you must run " +"a 'bridge' or 'tunnel', which takes connections from these clients and " +"forwards them to your local server." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:75 @@ -342,9 +318,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:84 msgid "" -"Within a few seconds, the 'tunnel' should now be active, and remote " -"clients should be able to reach your server anonymously. Remember to let " -"your router \"warm up\" before opening clients to it." +"Within a few seconds, the 'tunnel' should now be active, and remote clients " +"should be able to reach your server anonymously. Remember to let your router" +" \"warm up\" before opening clients to it." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:89 @@ -362,9 +338,9 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:94 msgid "" "Edit your hosts.txt, and add the line myserver.i2p=blahblahblah, where " -"myserver.i2p is an I2P 'domain' you want to associate with your site, and" -" the blahblahblah is the text of the base64 public key you created " -"earlier in the file myWebPubKey.txt" +"myserver.i2p is an I2P 'domain' you want to associate with your site, and " +"the blahblahblah is the text of the base64 public key you created earlier in" +" the file myWebPubKey.txt" msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:97 @@ -398,42 +374,42 @@ msgstr "Ми тепер муÑимо думати дальше ніж тільк #: i2p2www/pages/site/misc/i2ptunnel-services.html:117 msgid "" -"As you grow into I2P and get more of a 'feel' for it, you will want to " -"use all manner of servers and clients." +"As you grow into I2P and get more of a 'feel' for it, you will want to use " +"all manner of servers and clients." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:120 msgid "" -"The beauty of I2P is that it allows standard Internet clients and servers" -" for most protocols to be transparently 'tunneled' through the anonymous " +"The beauty of I2P is that it allows standard Internet clients and servers " +"for most protocols to be transparently 'tunneled' through the anonymous " "network." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:123 msgid "" -"You can run mailservers/clients, nameservers/clients, newsservers/clients" -" - almost anything at all - perhaps even FTP in passive mode." +"You can run mailservers/clients, nameservers/clients, newsservers/clients - " +"almost anything at all - perhaps even FTP in passive mode." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:126 msgid "" -"Now, we'll create a client tunnel. This is like the server tunnel we " -"created earlier, but works in reverse. It listens to a port on your local" -" machine; your local client connects to this port; the connection gets " -"forwarded through I2P to the service on the other end." +"Now, we'll create a client tunnel. This is like the server tunnel we created" +" earlier, but works in reverse. It listens to a port on your local machine; " +"your local client connects to this port; the connection gets forwarded " +"through I2P to the service on the other end." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:129 msgid "" -"To open your client tunnel for your server, type the command <code>java " -"-jar lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client " -"10888 textofbase64key\"</code> (all one line)." +"To open your client tunnel for your server, type the command <code>java -jar" +" lib/i2ptunnel.jar -nogui -e \"config localhost 7654\" -e \"client 10888 " +"textofbase64key\"</code> (all one line)." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:132 msgid "" -"The port 10888 is arbitrary - it just needs to be something other than " -"the physical port your server is listening on." +"The port 10888 is arbitrary - it just needs to be something other than the " +"physical port your server is listening on." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:135 @@ -465,11 +441,10 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:147 msgid "" -"You use the same procedure for using any local client program to access a" -" remote I2P server - just get the base64 public key (called destination " -"key) of the remote server, choose a local port to connect to the remote " -"server, open the tunnel, and just connect with your client to your " -"heart's content." +"You use the same procedure for using any local client program to access a " +"remote I2P server - just get the base64 public key (called destination key) " +"of the remote server, choose a local port to connect to the remote server, " +"open the tunnel, and just connect with your client to your heart's content." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:152 @@ -480,25 +455,25 @@ msgstr "" msgid "" "Using an anonymous medium (eg the one of the I2P IRC servers or ugha's " "wiki), post your domain name (eg <a href=\"http://www.mynick.i2p\" " -"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. " -"Others will then be able to reach your server remotely, without either of" -" you jeopardizing your anonymity." +"target=\"_blank\">www.mynick.i2p</a> as well as your destination key. Others" +" will then be able to reach your server remotely, without either of you " +"jeopardizing your anonymity." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:157 msgid "" -"Remember, you can go to What's on I2P and find the latest public keys " -"linked to their URL. You should also post your own public key and URL " -"their. However, you will want to do this anonymously, of course. " -"Drupal.i2p.net is currently, as of this writing, only accessible from the" -" net. So, to access the outside WWW anonymously from inside of I2P, you " -"will need to start up your script called startSquid. Do it the same way " -"you have been doing these other scripts. Reconfigure your browser to " -"proxy on localhost:5555, as defined in the script, and when the script " -"has generated it's keys, you can access the squid proxy. Put any WWW URL " -"(such as Google or this i2p site) into your browser's address bar and you" -" will be surfing the World Wide Web anonymously. Now you can safely post " -"your public key, and no one can detect your IP address." +"Remember, you can go to What's on I2P and find the latest public keys linked" +" to their URL. You should also post your own public key and URL their. " +"However, you will want to do this anonymously, of course. Drupal.i2p.net is " +"currently, as of this writing, only accessible from the net. So, to access " +"the outside WWW anonymously from inside of I2P, you will need to start up " +"your script called startSquid. Do it the same way you have been doing these " +"other scripts. Reconfigure your browser to proxy on localhost:5555, as " +"defined in the script, and when the script has generated it's keys, you can " +"access the squid proxy. Put any WWW URL (such as Google or this i2p site) " +"into your browser's address bar and you will be surfing the World Wide Web " +"anonymously. Now you can safely post your public key, and no one can detect " +"your IP address." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:162 @@ -507,8 +482,8 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:164 msgid "" -"It would drive most people crazy, going through all these steps every " -"time one sets up an I2P server, and/or deploys a client." +"It would drive most people crazy, going through all these steps every time " +"one sets up an I2P server, and/or deploys a client." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:167 @@ -517,8 +492,8 @@ msgid "" "target=\"_blank\">http://www.freenet.org.nz/i2p/</a> has a script called " "setupServer.py which automates all this nonsense into one simple command " "line . But I respect that people's tastes in user interfaces differ, and " -"trying to write something which satisfies everyone's needs usually " -"results in something so complex that it turns into newbie-repellent." +"trying to write something which satisfies everyone's needs usually results " +"in something so complex that it turns into newbie-repellent." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:170 @@ -529,16 +504,16 @@ msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:173 msgid "" -"Also, you may want to write a script which handles the startup of the I2P" -" Router, the eepProxy, plus any and all tunnels you are using. I've got " -"such a script called startEverything.sh, which gets launched at system " -"startup. (Be sure to search this site for template scripts to automate " -"your I2P commands. If I create a page for one, I'll try to remember to " -"link it here." +"Also, you may want to write a script which handles the startup of the I2P " +"Router, the eepProxy, plus any and all tunnels you are using. I've got such " +"a script called startEverything.sh, which gets launched at system startup. " +"(Be sure to search this site for template scripts to automate your I2P " +"commands. If I create a page for one, I'll try to remember to link it here." msgstr "" #: i2p2www/pages/site/misc/i2ptunnel-services.html:176 -msgid "Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." +msgid "" +"Exercise for Windows users - port setupServer.py into a MS-DOS .BAT file." msgstr "" #: i2p2www/pages/site/misc/invisiblenet.html:2 @@ -547,13 +522,11 @@ msgstr "Старі документи" #: i2p2www/pages/site/misc/invisiblenet.html:5 msgid "" -"Following is a list of documents originally on www.invisiblenet.net/i2p/ " -"and\n" +"Following is a list of documents originally on www.invisiblenet.net/i2p/ and\n" "rescued via the\n" "<a href=\"http://www.archive.org/\">Wayback Machine</a>.\n" "They are quite dated and may or may not be accurate.\n" -"However, the I2CP and I2NP documents in particular have some good " -"information." +"However, the I2CP and I2NP documents in particular have some good information." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:3 @@ -566,8 +539,7 @@ msgstr "ОглÑд" #: i2p2www/pages/site/misc/jbigi.html:7 msgid "" -"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a " -"little\n" +"Using JNI (Java Native Interface), a bit of C code (thanks ugha!), a little\n" "manual work and a piece of chewing gum we have made several\n" "cryptography operations quite a bit faster." msgstr "" @@ -581,18 +553,15 @@ msgid "" "<a href=\"%(func)s\">mpz_powm()</a>\n" "as a replacement for the\n" "<a href=\"%(bigint)s\">Java Math library's BigInteger modPow()</a>.\n" -"As modPow() is a significant computational portion of many crypto " -"operations, this is of significant benefit." +"As modPow() is a significant computational portion of many crypto operations, this is of significant benefit." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:25 #, python-format msgid "" -"The standard I2P installation includes about 20 versions of the library " -"for different platforms,\n" +"The standard I2P installation includes about 20 versions of the library for different platforms,\n" "each about 50KB, inside the jbigi.jar file.\n" -"The initialization of the JBigI library, including CPU identification, " -"selection, and extraction\n" +"The initialization of the JBigI library, including CPU identification, selection, and extraction\n" "of the correct loadable module, is handled by the\n" "<a href=\"%(nativebigint)s\">NativeBigInteger class</a>.\n" "If no module is available for the current platform, the standard\n" @@ -606,8 +575,7 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:39 msgid "" -"Following are the instructions to build a new jbigi library for your own " -"platform\n" +"Following are the instructions to build a new jbigi library for your own platform\n" "and testing its performance." msgstr "" @@ -618,31 +586,25 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:43 msgid "" "This works on Linux, and with a few changes in build.sh probably also on\n" -"other platforms. FreeBSD has also been reported to work too. On Kaffee " -"the\n" -"speedup is very small, because it already uses native BitInteger " -"internally.\n" +"other platforms. FreeBSD has also been reported to work too. On Kaffee the\n" +"speedup is very small, because it already uses native BitInteger internally.\n" "Blackdown seems to cause strange errors. Because you are going to do\n" "compilation, you need JDK; JRE won't work." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:50 msgid "" -"The required code is available in monotone database and the latest source" -" tarball. " +"The required code is available in monotone database and the latest source " +"tarball. " msgstr "" #: i2p2www/pages/site/misc/jbigi.html:51 msgid "" "The GNU MP Bignum library (libgmp) needs to be installed, if it isn't\n" -"included in your OS / distribution or installed already, it can be " -"received from\n" -"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. " -"Even if you\n" -"have already installed it as binary, it might still be worth a try to " -"compile\n" -"GMP yourself, since then it will be able to use the specific instructions" -" of\n" +"included in your OS / distribution or installed already, it can be received from\n" +"<a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>. Even if you\n" +"have already installed it as binary, it might still be worth a try to compile\n" +"GMP yourself, since then it will be able to use the specific instructions of\n" "your processor. The latest GMP may also\n" "be used instead of GMP 5.0.2, but it hasn't been tested by us." msgstr "" @@ -653,8 +615,7 @@ msgstr "ІнÑтрукції крок за крок" #: i2p2www/pages/site/misc/jbigi.html:63 msgid "" -"Look at <a href=\"http://localhost:7657/logs.jsp\">your running " -"environment on the logs.jsp page</a>.\n" +"Look at <a href=\"http://localhost:7657/logs.jsp\">your running environment on the logs.jsp page</a>.\n" "There should be one of two status messages for JBigI - either" msgstr "" @@ -682,27 +643,20 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:78 msgid "" -"Look on <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"to see what the lifetime average values for " -"<code>crypto.elGamal.decrypt</code> and\n" -"<code>crypto.elGamal.encrypt</code> are. The numbers are times in " -"milliseconds. Copy these somewhere so you can compare\n" +"Look on <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"to see what the lifetime average values for <code>crypto.elGamal.decrypt</code> and\n" +"<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare\n" "them later on.\n" "The network average for encrypt time is about 20ms.\n" -"If your encrypt time is less than 50ms for a relatively new processor, or" -" less than 100ms\n" -"for an older processor, and the native BigInteger library was loaded, you" -" are probably fine." +"If your encrypt time is less than 50ms for a relatively new processor, or less than 100ms\n" +"for an older processor, and the native BigInteger library was loaded, you are probably fine." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:87 #, python-format msgid "" "Get the latest released source code of I2P from\n" -"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge " -"source\n" +"<a href=\"%(downloads)s\">the download page</a>, or get the cutting-edge source\n" "out of the monotone database mtn.i2p2.de" msgstr "" @@ -716,18 +670,14 @@ msgid "" "If you have a /usr/lib/libgmp.so file, you do not have to download GMP.\n" "Use the 'dynamic' argument to build.sh.\n" "Otherwise, you must download GMP version 5.0.2 from\n" -"from <a " -"href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, " -"saving it to gmp-5.0.2.tar.bz2.\n" -"If you decide to use a newer version, change the VER= line in " -"<code>core/c/jbigi/build.sh</code>." +"from <a href=\"http://gmplib.org/#DOWNLOAD\">http://gmplib.org/#DOWNLOAD</a>, saving it to gmp-5.0.2.tar.bz2.\n" +"If you decide to use a newer version, change the VER= line in <code>core/c/jbigi/build.sh</code>." msgstr "" #: i2p2www/pages/site/misc/jbigi.html:101 msgid "" "Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>\n" -"environment variable is set and you are using Linux then it might just " -"work.\n" +"environment variable is set and you are using Linux then it might just work.\n" "Otherwise change the settings. Remember, you need the Java SDK installed." msgstr "" @@ -735,17 +685,13 @@ msgstr "" msgid "" "Run <code>build.sh</code> (if you downloaded GMP) or\n" "<code>build.sh dynamic</code> (if you have /usr/lib/libgmp.so).<br/>\n" -"Maybe the build spewed out some errors of missing jni.h and jni_md.h " -"files.\n" -"Either copy these files from your java install into the " -"core/c/jbigi/jbigi/include/ directory,\n" +"Maybe the build spewed out some errors of missing jni.h and jni_md.h files.\n" +"Either copy these files from your java install into the core/c/jbigi/jbigi/include/ directory,\n" "or fix $JAVA_HOME.<br>\n" -"You can run the <code>build.sh</code> from the <code>core/c/</code> " -"directory which will\n" +"You can run the <code>build.sh</code> from the <code>core/c/</code> directory which will\n" "build all available jbigi libs into a jbigi.jar.</br>\n" "A file named <code>libjbigi.so</code> should be created in the current\n" -"directory. If this doesn't happen and/or you get errors then please " -"report\n" +"directory. If this doesn't happen and/or you get errors then please report\n" "them." msgstr "" @@ -773,11 +719,8 @@ msgstr "" #: i2p2www/pages/site/misc/jbigi.html:131 msgid "" -"On <a " -"href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>" -"\n" -"the <code>crypto.elGamal.decrypt</code> and " -"<code>crypto.elGamal.encrypt</code>\n" +"On <a href=\"http://localhost:7657/stats.jsp\">http://localhost:7657/stats.jsp</a>\n" +"the <code>crypto.elGamal.decrypt</code> and <code>crypto.elGamal.encrypt</code>\n" "should be a lot faster." msgstr "" @@ -787,8 +730,7 @@ msgstr "ÐžÐ³Ð¾Ð»Ð¾ÑˆÐµÐ½Ð½Ñ Jrandom" #: i2p2www/pages/site/misc/jrandom-awol.html:4 msgid "" -"The following message was received in mid-November 2007. We have no " -"further information\n" +"The following message was received in mid-November 2007. We have no further information\n" "on jrandom's status." msgstr "" @@ -797,8 +739,7 @@ msgstr "" msgid "" "Subsequently, in an unrelated incident, the hosting company for\n" "all *.i2p.net servers (except forum.i2p.net) suffered a power outage\n" -"on January 13, 2008, and the i2p.net servers did not fully return to " -"service.\n" +"on January 13, 2008, and the i2p.net servers did not fully return to service.\n" "As only jrandom has the credentials required to restore service,\n" "and he could not be contacted,\n" "we moved all public services to <a href=\"%(site)s\">www.i2p2.de</a>\n" @@ -820,33 +761,24 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:6 #, python-format msgid "" -"The installation package for the <a href=\"%(downloads)s\">I2P router</a>" -" comes\n" -"with a Java wrapper for the most common architectures. If your system is " -"not\n" -"supported by our installer—or if you want to update the wrapper to " -"a\n" -"newer version—the following steps describe installing the wrapper " -"manually." +"The installation package for the <a href=\"%(downloads)s\">I2P router</a> comes\n" +"with a Java wrapper for the most common architectures. If your system is not\n" +"supported by our installer—or if you want to update the wrapper to a\n" +"newer version—the following steps describe installing the wrapper manually." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:14 msgid "" -"Check Tanuki Software's <a " -"href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download" -" page</a>\n" +"Check Tanuki Software's <a href=\"http://wrapper.tanukisoftware.com/doc/english/download.jsp#stable\">download page</a>\n" "for your platform. Is your platform listed? If so, you're in\n" -"luck! Download the most recent version of the Community Edition for your " -"OS and\n" +"luck! Download the most recent version of the Community Edition for your OS and\n" "CPU and move to <a href=\"#packaged\">the next step</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:20 msgid "" -"If your platform does not have an already compiled wrapper available, you" -"\n" -"may be able to compile it yourself. If you are willing to have a go at " -"it, move\n" +"If your platform does not have an already compiled wrapper available, you\n" +"may be able to compile it yourself. If you are willing to have a go at it, move\n" "on to <a href=\"#compiling\">compiling</a> the wrapper for your system." msgstr "" @@ -855,7 +787,8 @@ msgid "Using existing binaries" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:28 -msgid "In the steps below, $I2P means <em>the location I2P was installed to</em>." +msgid "" +"In the steps below, $I2P means <em>the location I2P was installed to</em>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:36 @@ -871,8 +804,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:39 #: i2p2www/pages/site/misc/manual-wrapper.html:67 msgid "" -"If this did not work you'll need to use <code>runplain.sh</code> to start" -" I2P." +"If this did not work you'll need to use <code>runplain.sh</code> to start " +"I2P." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:43 @@ -881,16 +814,15 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:44 msgid "" -"These steps worked to compile the wrapper for use on a mipsel system " -"running Debian. The steps <strong>will</strong> need to be altered for " -"your system." +"These steps worked to compile the wrapper for use on a mipsel system running" +" Debian. The steps <strong>will</strong> need to be altered for your system." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:48 msgid "" -"Download the source archive for the community version of the wrapper from" -" <a href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download" -" page</a>." +"Download the source archive for the community version of the wrapper from <a" +" href=\"http://wrapper.tanukisoftware.com/downloads\">wrapper download " +"page</a>." msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:49 @@ -899,8 +831,8 @@ msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:51 msgid "" -"Set environment variables <code>ANT_HOME</code> and " -"<code>JAVA_HOME</code>. For example, in Debian:" +"Set environment variables <code>ANT_HOME</code> and <code>JAVA_HOME</code>. " +"For example, in Debian:" msgstr "" #: i2p2www/pages/site/misc/manual-wrapper.html:54 @@ -939,164 +871,110 @@ msgstr "" #: i2p2www/pages/site/misc/minwww.html:47 msgid "" -"An optimized form, designed to handle only 128KB [1] files and pages, can" -"\n" +"An optimized form, designed to handle only 128KB [1] files and pages, can\n" "operate significantly faster:" msgstr "" #: i2p2www/pages/site/misc/minwww.html:71 msgid "" "The difference in network load and latency is significant - this is\n" -"essentially a UDP version of HTTP. On the normal web, we can't really do" -" that,\n" -"since most HTTP requests and responses are orders of magnitude larger " -"than UDP\n" -"packets functionally support, but in I2P, messages can be large. The " -"savings\n" -"for the network load comes from the fact that we don't need to send any " -"ACK\n" +"essentially a UDP version of HTTP. On the normal web, we can't really do that,\n" +"since most HTTP requests and responses are orders of magnitude larger than UDP\n" +"packets functionally support, but in I2P, messages can be large. The savings\n" +"for the network load comes from the fact that we don't need to send any ACK\n" "messages - rather than the earlier wrap/unwrap request (that bundles a\n" -"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery)," -" the\n" -"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there" -" are no\n" +"DataMessage with a DeliveryStatusMessage to provide guaranteed delivery), the\n" +"MinWWW proxy deals with resends (if necessary - in I2PTunnel today, there are no\n" "resends)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:83 msgid "" -"The data that the MinWWW proxy and server need to wrap is trivial - when " -"the\n" -"proxy wants to send \"GET /\", it prepends it with the I2P Destination " -"sending\n" -"the request, followed by a 4 byte request ID. The MinWWW server receives" -" those\n" -"requests, contacts the appropriate HTTPD, sends the request, waits for " -"the\n" +"The data that the MinWWW proxy and server need to wrap is trivial - when the\n" +"proxy wants to send \"GET /\", it prepends it with the I2P Destination sending\n" +"the request, followed by a 4 byte request ID. The MinWWW server receives those\n" +"requests, contacts the appropriate HTTPD, sends the request, waits for the\n" "response, and sends a reply to the MinWWW proxy containing the response,\n" -"prefixed with the original request ID. That response is taken and passed" -" back\n" +"prefixed with the original request ID. That response is taken and passed back\n" "to the browser and the connection is closed." msgstr "" #: i2p2www/pages/site/misc/minwww.html:93 msgid "" "In addition, the MinWWW proxy can choose the MinWWW server to use from a\n" -"list, going through some round robin or other algorithm, so that there " -"are\n" -"multiple outproxies merged transparently. The bandwidth required for " -"running\n" -"one of these outproxies is also greatly reduced, since it will only " -"handle 128KB\n" +"list, going through some round robin or other algorithm, so that there are\n" +"multiple outproxies merged transparently. The bandwidth required for running\n" +"one of these outproxies is also greatly reduced, since it will only handle 128KB\n" "files (aka no one is going to be downloading porn, warez, etc)." msgstr "" #: i2p2www/pages/site/misc/minwww.html:101 msgid "" -"The functionality /is/ limited, but 128KB of data is a lot for a single " -"HTTP\n" -"request or response. The above diagrams are also unrealistic in their " -"hops -\n" -"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send " -"each\n" -"of the messages through two additional outbound routers, then forwarded " -"to\n" -"two additional inbound routers to ROUTERB, so the lag there is " -"significant -\n" -"while the above only saves 11 steps, 8 of those steps need to traverse " -"the\n" -"entire tunnel path (4+ remote hops each time when tunnels are 2 remote " -"hops\n" -"in each stretch), leaving MinWWW with only two full traversals (one for " -"the\n" +"The functionality /is/ limited, but 128KB of data is a lot for a single HTTP\n" +"request or response. The above diagrams are also unrealistic in their hops -\n" +"ROUTERA will really never talk directly to ROUTERB. ROUTERA will send each\n" +"of the messages through two additional outbound routers, then forwarded to\n" +"two additional inbound routers to ROUTERB, so the lag there is significant -\n" +"while the above only saves 11 steps, 8 of those steps need to traverse the\n" +"entire tunnel path (4+ remote hops each time when tunnels are 2 remote hops\n" +"in each stretch), leaving MinWWW with only two full traversals (one for the\n" "request, one for the response), instead of 10." msgstr "" #: i2p2www/pages/site/misc/minwww.html:113 msgid "" -"Implementing the MinWWW proxy and server should be fairly easy - read an " -"HTTP\n" -"request from the client fully (perhaps only start out with HTTP GET, " -"leaving\n" -"HTTP POST for later), wrap the message, and wait for the response. The " -"server\n" -"in turn simply needs to parse the request to either open a socket or URL," -"\n" -"send the request, wait for the response, and send it back through the " -"network.\n" +"Implementing the MinWWW proxy and server should be fairly easy - read an HTTP\n" +"request from the client fully (perhaps only start out with HTTP GET, leaving\n" +"HTTP POST for later), wrap the message, and wait for the response. The server\n" +"in turn simply needs to parse the request to either open a socket or URL,\n" +"send the request, wait for the response, and send it back through the network.\n" "If someone were to implement this, it would be Good :)" msgstr "" #: i2p2www/pages/site/misc/minwww.html:122 msgid "" -"[1] Why 128KB files? Currently I2CP allows functionally arbitrary " -"message\n" -"size, but that's going to be going away since it involves either " -"excessive memory\n" -"overhead on intermediary routers, or additional implementation details to" -"\n" -"handle. I2PTunnel is currently limited to 128KB and hasn't been a " -"burden,\n" +"[1] Why 128KB files? Currently I2CP allows functionally arbitrary message\n" +"size, but that's going to be going away since it involves either excessive memory\n" +"overhead on intermediary routers, or additional implementation details to\n" +"handle. I2PTunnel is currently limited to 128KB and hasn't been a burden,\n" "so perhaps it could be increased to 256KB when the I2CP spec is updated)" msgstr "" #: i2p2www/pages/site/misc/myi2p.html:4 msgid "" -"There has been discussion about a distributed blogging application for a " -"few\n" -"months now called \"MyI2P\". While the original discussions were lost, " -"we were \n" -"able to retrieve a Google <a " -"href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" -"of it. It isn't pretty, but it includes the basic overview and some " -"discussion\n" +"There has been discussion about a distributed blogging application for a few\n" +"months now called \"MyI2P\". While the original discussions were lost, we were \n" +"able to retrieve a Google <a href=\"http://dev.i2p.net/~jrandom/i2p.net/myi2p.html\">cache</a>\n" +"of it. It isn't pretty, but it includes the basic overview and some discussion\n" "that ensued." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:12 #, python-format msgid "" -"The application itself is not yet implemented, and the ideas behind it " -"have \n" -"been made less ambitious over time, but they are still valid and the " -"current \n" -"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality " -"available \n" -"along side the I2P 1.0 release. That will include a distributed address " -"book\n" -"to enable secure, distributed, and human readable naming by sacrificing " -"the \n" -"need for global uniqueness - basically everyone has their own local " -"address book \n" -"and can 'subscribe' to other people's address books, letting MyI2P " -"periodically\n" -"retrieve new name to destination mappings (leaving conflicts up to the " -"user to\n" -"resolve). In addition to the address book, there will be a distributed " -"blogging\n" +"The application itself is not yet implemented, and the ideas behind it have \n" +"been made less ambitious over time, but they are still valid and the current \n" +"<a href=\"%(roadmap)s\">plan</a> is to have the core MyI2P functionality available \n" +"along side the I2P 1.0 release. That will include a distributed address book\n" +"to enable secure, distributed, and human readable naming by sacrificing the \n" +"need for global uniqueness - basically everyone has their own local address book \n" +"and can 'subscribe' to other people's address books, letting MyI2P periodically\n" +"retrieve new name to destination mappings (leaving conflicts up to the user to\n" +"resolve). In addition to the address book, there will be a distributed blogging\n" "system using a reduced and secured subset of \n" -"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to " -"essentially\n" -"provide an anonymous <a " -"href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" -"a 'friends list' and transparent access control (authenticated by the I2P" -"\n" -"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the " -"address book)." +"<a href=\"http://www.phpbb.com/phpBB/faq.php?mode=bbcode\">bbcode</a> to essentially\n" +"provide an anonymous <a href=\"http://www.livejournal.com/\">LiveJournal</a> with\n" +"a 'friends list' and transparent access control (authenticated by the I2P\n" +"<a href=\"%(datagrams)s\">datagrams</a> with rules defined based on the address book)." msgstr "" #: i2p2www/pages/site/misc/myi2p.html:29 msgid "" -"Additional functionality, such as integration with a DHT backing store or" -" \n" -"swarming file transfers for 'attachments' can be added later. Email may " -"or may\n" -"not get in the first pass either, though its implementation is " -"essentially just\n" -"a blog entry with private access, so perhaps some UI designer can come up" -" with\n" -"something. Exporting the data to RSS or access through ATOM will be an " -"option \n" +"Additional functionality, such as integration with a DHT backing store or \n" +"swarming file transfers for 'attachments' can be added later. Email may or may\n" +"not get in the first pass either, though its implementation is essentially just\n" +"a blog entry with private access, so perhaps some UI designer can come up with\n" +"something. Exporting the data to RSS or access through ATOM will be an option \n" "down the road as well." msgstr "" @@ -1111,8 +989,8 @@ msgstr "" #: i2p2www/pages/site/misc/ratestats.html:7 msgid "" -"The list was gathered using the following command in the top directory of" -" the branch i2p.i2p:" +"The list was gathered using the following command in the top directory of " +"the branch i2p.i2p:" msgstr "" #: i2p2www/pages/site/misc/ratestats.html:10 @@ -1127,18 +1005,15 @@ msgid "" "<a href=\"http://www.monotone.ca/\">Monotone website</a> for information\n" "on monotone.\n" "See\n" -"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p " -"monotone</a>\n" -"for more information on how to get started and check out the source " -"anonymously.\n" +"<a href=\"http://%(forum)s/viewtopic.php?t=2524\">this forum post on i2p monotone</a>\n" +"for more information on how to get started and check out the source anonymously.\n" "There is also a quick-start guide on the\n" "<a href=\"%(newdevs)s\">new developer's page</a>." msgstr "" #: i2p2www/pages/site/misc/transition-guide.html:16 msgid "" -"If you want to get the source non-anonymously, pull from the public " -"server mtn.welterde.de.\n" +"If you want to get the source non-anonymously, pull from the public server mtn.welterde.de.\n" "The i2p source code branch is \"i2p.i2p\"." msgstr "" @@ -1167,24 +1042,20 @@ msgid "" "<a href=\"%(jrandom)s\">has gone AWOL</a>,\n" "we do not have his update signing key or access to\n" "www.i2p[.net] or dev.i2p[.net].\n" -"Complication and zzz have generated new signing keys, and they and Amiga " -"are providing\n" -"update file hosting. These changes must be configured in your router to " -"take effect." +"Complication and zzz have generated new signing keys, and they and Amiga are providing\n" +"update file hosting. These changes must be configured in your router to take effect." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:17 msgid "" -"Make the following configuration changes and your router will " -"automatically install\n" +"Make the following configuration changes and your router will automatically install\n" "the latest release." msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:22 #, python-format msgid "" -"We recommend the automated process as it will verify the key of the " -"signed update file.\n" +"We recommend the automated process as it will verify the key of the signed update file.\n" "If you do not make these changes,\n" "you may manually download the i2pupdate.zip file from\n" "<a href=\"%(downloads)s\">the download page</a>." @@ -1197,8 +1068,8 @@ msgstr "Змініть URL новини до: %(url)s" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:38 msgid "" -"Select ONE of the following new Update URLs at random and enter it into " -"the Update URL box: " +"Select ONE of the following new Update URLs at random and enter it into the " +"Update URL box: " msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:43 @@ -1220,8 +1091,7 @@ msgstr "" #: i2p2www/pages/site/misc/upgrade-0.6.1.30.html:58 msgid "" "You are now ready to automatically receive the release update file,\n" -"either by setting your update policy to \"download and install\" or by " -"clicking on the\n" +"either by setting your update policy to \"download and install\" or by clicking on the\n" "\"update available\" link when it appears." msgstr "" @@ -1230,7 +1100,5 @@ msgstr "" msgid "" "If you would like to verify the trusted update keys, they are also\n" "<a href=\"%(url)s\">posted and signed here</a>.\n" -"Thank you for your support during this transition. For help please " -"contact us on #i2p." +"Thank you for your support during this transition. For help please contact us on #i2p." msgstr "" - diff --git a/i2p2www/translations/uk/LC_MESSAGES/research.po b/i2p2www/translations/uk/LC_MESSAGES/research.po index d9478a4700cdfc089ef0b63016073351d34e26d3..d21ab316833d0617334a2e046da202d59defaac2 100644 --- a/i2p2www/translations/uk/LC_MESSAGES/research.po +++ b/i2p2www/translations/uk/LC_MESSAGES/research.po @@ -1,26 +1,23 @@ -# Ukrainian translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: # Greg Koval <gregjsmith@gmx.com>, 2020 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-06-24 13:48+0000\n" -"PO-Revision-Date: 2020-07-22 04:47+0000\n" -"Last-Translator: Greg Koval <gregjsmith@gmx.com>\n" -"Language-Team: Ukrainian (Ukraine) " -"(http://www.transifex.com/otf/I2P/language/uk_UA/)\n" -"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 !=" -" 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n " -"% 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9)" -" || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3)\n" +"POT-Creation-Date: 2021-04-26 14:51+0000\n" +"PO-Revision-Date: 2013-07-15 12:01+0000\n" +"Last-Translator: Greg Koval <gregjsmith@gmx.com>, 2020\n" +"Language-Team: Ukrainian (Ukraine) (http://www.transifex.com/otf/I2P/language/uk_UA/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: uk_UA\n" +"Plural-Forms: nplurals=4; plural=(n % 1 == 0 && n % 10 == 1 && n % 100 != 11 ? 0 : n % 1 == 0 && n % 10 >= 2 && n % 10 <= 4 && (n % 100 < 12 || n % 100 > 14) ? 1 : n % 1 == 0 && (n % 10 ==0 || (n % 10 >=5 && n % 10 <=9) || (n % 100 >=11 && n % 100 <=14 )) ? 2: 3);\n" #: i2p2www/pages/site/research/index.html:2 msgid "Academic Research" @@ -41,16 +38,11 @@ msgstr "ДоÑÐ»Ñ–Ð´Ð¶ÐµÐ½Ð½Ñ Ð½Ð° мережі I2P" #: i2p2www/pages/site/research/index.html:10 msgid "" -"I2P is a very unique project that unfortunately has not received the " -"wider\n" -"academic attention it deserves. To date, most research focus on anonymous" -" and\n" -"onion-routing technology has been around Tor, and while those papers " -"benefit us\n" -"as well, there is a great need for I2P-focused research. This plays a key" -" role\n" -"in both maintaining the security and integrity of the network, as well as" -"\n" +"I2P is a very unique project that unfortunately has not received the wider\n" +"academic attention it deserves. To date, most research focus on anonymous and\n" +"onion-routing technology has been around Tor, and while those papers benefit us\n" +"as well, there is a great need for I2P-focused research. This plays a key role\n" +"in both maintaining the security and integrity of the network, as well as\n" "opening doors for more impactful future development." msgstr "" @@ -58,17 +50,12 @@ msgstr "" #, python-format msgid "" "\n" -"There is a large research community investigating a wide range of aspects" -" of\n" -"anonymity. For a current and comprehensive list of relevant papers, see " -"the\n" +"There is a large research community investigating a wide range of aspects of\n" +"anonymity. For a current and comprehensive list of relevant papers, see the\n" "<a href=\"%(anonbib)s\">Free Haven Anonymity Bibliography</a>.\n" -"I2P benefits from much of the research into Tor and onion routing, but " -"there is\n" -"little dedicated research interest into the theory behind I2P, and the " -"choices\n" -"and tradeoffs that the network makes. This presents a unique opportunity " -"for\n" +"I2P benefits from much of the research into Tor and onion routing, but there is\n" +"little dedicated research interest into the theory behind I2P, and the choices\n" +"and tradeoffs that the network makes. This presents a unique opportunity for\n" "original research.\n" msgstr "" @@ -83,8 +70,7 @@ msgstr "" msgid "" "\n" "This page aims to outline the most needed fields of research, notes to\n" -"potential researchers, our general safety guidelines as well as an " -"expanding\n" +"potential researchers, our general safety guidelines as well as an expanding\n" "list of open questions that you can begin on at any time.\n" msgstr "" @@ -98,16 +84,12 @@ msgstr "" #: i2p2www/pages/site/research/index.html:44 msgid "" -"While all research on the I2P network is beneficial and appreciated, " -"there are\n" +"While all research on the I2P network is beneficial and appreciated, there are\n" "certain areas which are more in need than others - most so in defensive\n" "research. Most people enjoy coming up with fun ways to launch offensives\n" -"against anonymous software, and this is further reinforced by the " -"incentives in\n" -"academic institutions. While we know it is often not the first choice for" -"\n" -"researchers, We would certainly appreciate any and all work towards ways " -"to\n" +"against anonymous software, and this is further reinforced by the incentives in\n" +"academic institutions. While we know it is often not the first choice for\n" +"researchers, We would certainly appreciate any and all work towards ways to\n" "fortify the network!" msgstr "" @@ -118,27 +100,17 @@ msgstr "" #: i2p2www/pages/site/research/index.html:56 #, python-format msgid "" -"If you've decided on a research topic that aims to hands-on investigate " -"the I2P\n" -"network or solve a problem of large proportions we ask you to " -"<b>please</b> \n" -"<a href=\"%(contact)s\">communicate your ideas</a> to the development " -"team, the\n" -"sooner the better. I2P is under constant development and a significant " -"amount\n" -"of roadmapping occurs, therefore your problem may have already been " -"identified\n" -"and flagged for update or patch. In the unlikely event you are conducting" -"\n" -"testing that overlaps with / would be of interest to another research " -"project\n" -"already in motion, we are also able to make you aware of this (with their" -"\n" -"permission, of course), and possibly open the door for collaboration. " -"There is\n" +"If you've decided on a research topic that aims to hands-on investigate the I2P\n" +"network or solve a problem of large proportions we ask you to <b>please</b> \n" +"<a href=\"%(contact)s\">communicate your ideas</a> to the development team, the\n" +"sooner the better. I2P is under constant development and a significant amount\n" +"of roadmapping occurs, therefore your problem may have already been identified\n" +"and flagged for update or patch. In the unlikely event you are conducting\n" +"testing that overlaps with / would be of interest to another research project\n" +"already in motion, we are also able to make you aware of this (with their\n" +"permission, of course), and possibly open the door for collaboration. There is\n" "also a chance that the test itself may significantly harm the network or\n" -"regular users, and the team may have ideas or suggestions to mitigate " -"that risk\n" +"regular users, and the team may have ideas or suggestions to mitigate that risk\n" "and increase the safety of your testing." msgstr "" @@ -154,13 +126,11 @@ msgstr "Загальні Рекомендації" msgid "" "<ol>\n" " <li>\n" -" Consider the benefits and risks - is there any doubt that the " -"research\n" +" Consider the benefits and risks - is there any doubt that the research\n" " provides more value than danger?\n" " </li>\n" " <li>\n" -" If the research can be done on a test network then that is the " -"preferred\n" +" If the research can be done on a test network then that is the preferred\n" " method\n" " </li>\n" " <li>\n" @@ -168,10 +138,8 @@ msgid "" " collecting data about yourself\n" " </li>\n" " <li>\n" -" If you need 'bigger data', It is recommended to first see if you can " -"use\n" -" data sets from previous experiments or other third party resources is" -"\n" +" If you need 'bigger data', It is recommended to first see if you can use\n" +" data sets from previous experiments or other third party resources is\n" " recommended\n" " </li>\n" " <li>\n" @@ -179,10 +147,8 @@ msgid "" " publication and collect as little as possible\n" " </li>\n" " <li>\n" -" After testing and before publish, review that all data which is to be" -"\n" -" published publicly is <b><i>not</i></b> intended to be private by the" -"\n" +" After testing and before publish, review that all data which is to be\n" +" published publicly is <b><i>not</i></b> intended to be private by the\n" " originator\n" " </li>\n" "</ol>" @@ -194,32 +160,24 @@ msgstr "" #: i2p2www/pages/site/research/index.html:108 msgid "" -"I2P can be run as a separate test network by controlling the locations " -"that a\n" +"I2P can be run as a separate test network by controlling the locations that a\n" "new router reseeds from so that it only finds other test routers.\n" "\n" -"The standard mode of operation is to have one JVM per router instance; " -"hence\n" -"running multiple copies of I2P on a single machine is inadvisable, both " -"due to\n" +"The standard mode of operation is to have one JVM per router instance; hence\n" +"running multiple copies of I2P on a single machine is inadvisable, both due to\n" "the potential resource drain and the certain port conflicts. To better\n" -"facilitate setting up small test networks, I2P has a multirouter mode " -"which\n" +"facilitate setting up small test networks, I2P has a multirouter mode which\n" "enables multiple distinct routers to be run in the same JVM.\n" "\n" -"MultiRouter can be started from the i2p base directory by running the " -"below\n" +"MultiRouter can be started from the i2p base directory by running the below\n" "command." msgstr "" #: i2p2www/pages/site/research/index.html:124 msgid "" -"Additionally, I2P can be started in a virtual network mode. This mode " -"disables\n" -"all transports, allowing the router to be tested in isolation without " -"network\n" -"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to " -"the\n" +"Additionally, I2P can be started in a virtual network mode. This mode disables\n" +"all transports, allowing the router to be tested in isolation without network\n" +"traffic. To enable this mode, add <code>i2p.vmCommSystem=true</code> to the\n" "router.config before starting." msgstr "" @@ -230,13 +188,10 @@ msgstr "" #: i2p2www/pages/site/research/index.html:133 #, python-format msgid "" -"As stated above in the researcher notes, please <a " -"href=\"%(contact)s\">contact\n" +"As stated above in the researcher notes, please <a href=\"%(contact)s\">contact\n" " us</a> before you commence your testing. While we do not discourage\n" -"researchers from responsibly testing their ideas on the live network, if " -"an\n" -"attack becomes apparent and we don't have any line of communication then " -"we\n" +"researchers from responsibly testing their ideas on the live network, if an\n" +"attack becomes apparent and we don't have any line of communication then we\n" "will end up taking countermeasures which could interfere with the test." msgstr "" @@ -246,35 +201,23 @@ msgstr "" #: i2p2www/pages/site/research/index.html:143 msgid "" -"As of release 0.9.25, I2P supports a router family configuration. This " -"provides\n" -"researchers who run multiple routers with the means to publicly identify " -"those\n" -"routers. In turn, this helps the I2P project understand that these " -"routers are\n" -"not running an attack on the network. It also will prevent other routers " -"from\n" -"including multiple routers of the family in a single tunnel, which could " -"lead\n" -"to deanonymization. Routers that appear to be colluding but do not have a" -"\n" -"declared family may be assumed to be an attack on the network, and may be" -"\n" -"blocked. The best way to ensure the success of your research project is " -"to work\n" +"As of release 0.9.25, I2P supports a router family configuration. This provides\n" +"researchers who run multiple routers with the means to publicly identify those\n" +"routers. In turn, this helps the I2P project understand that these routers are\n" +"not running an attack on the network. It also will prevent other routers from\n" +"including multiple routers of the family in a single tunnel, which could lead\n" +"to deanonymization. Routers that appear to be colluding but do not have a\n" +"declared family may be assumed to be an attack on the network, and may be\n" +"blocked. The best way to ensure the success of your research project is to work\n" "with us directly." msgstr "" #: i2p2www/pages/site/research/index.html:155 msgid "" -"A router family shares a private key so that participation in the family " -"cannot\n" -"be spoofed. To configure a router family, click on the 'I2P Internals' " -"link in\n" -"the router console, and then on the 'Family' tab. Follow the instructions" -" there\n" -"to generate the private key for the first router in the family. Then, " -"export\n" +"A router family shares a private key so that participation in the family cannot\n" +"be spoofed. To configure a router family, click on the 'I2P Internals' link in\n" +"the router console, and then on the 'Family' tab. Follow the instructions there\n" +"to generate the private key for the first router in the family. Then, export\n" "the key from that router, and import it to other members of the family." msgstr "" @@ -326,59 +269,67 @@ msgstr "Пов'Ñзані з мережею" msgid "Vulnerability Response Process" msgstr "" -#: i2p2www/pages/site/research/vrp.html:3 -msgid "January 2017" -msgstr "Січень 2017" - #: i2p2www/pages/site/research/vrp.html:6 msgid "" "\n" -"This process is subject to change. Please refer to this page for the " -"current VRP." +"This process is subject to change. Please refer to this page for the current VRP." msgstr "" #: i2p2www/pages/site/research/vrp.html:10 +msgid "This page was last updated in June 2020." +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:12 +msgid "" +"Researchers: while you research/hack, we ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the\n" +"i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data\n" +"centers" +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:15 +msgid "" +"As i2p is an open-source community, many volunteers and development team members run their own I2P Sites as well as public (“non-private internetâ€) domains. These\n" +"sites/servers are NOT in the scope of the vulnerability assessment / response process, only the underlying code of i2p is." +msgstr "" + +#: i2p2www/pages/site/research/vrp.html:18 msgid "Point of Contact for Security Issues" msgstr "" -#: i2p2www/pages/site/research/vrp.html:14 +#: i2p2www/pages/site/research/vrp.html:22 msgid "Security Response Team" msgstr "" -#: i2p2www/pages/site/research/vrp.html:16 -msgid "Only the following members have access to the security point of contact:" +#: i2p2www/pages/site/research/vrp.html:24 +msgid "" +"Echelon is the trusted security point-of-contact. He forwards e-mails to " +"team members as appropriate." msgstr "" -#: i2p2www/pages/site/research/vrp.html:25 +#: i2p2www/pages/site/research/vrp.html:28 msgid "Incident Response" msgstr "" -#: i2p2www/pages/site/research/vrp.html:28 -msgid "Researcher submits report via one or both of two methods:" +#: i2p2www/pages/site/research/vrp.html:31 +msgid "Researcher submits report via:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:32 -msgid "Email" -msgstr "Пошта" - #: i2p2www/pages/site/research/vrp.html:37 msgid "" -"Response Team designates a Response Manager who is in charge of the " -"particular\n" +"Response Team designates a Response Manager who is in charge of the particular\n" "report based on availability and/or knowledge-set." msgstr "" #: i2p2www/pages/site/research/vrp.html:42 #, python-format msgid "" -"In no more than %(limit)s working days, Response Team should gratefully\n" +"In no more than %(limit)s working days, Response Team should\n" "respond to researcher using only encrypted methods." msgstr "" #: i2p2www/pages/site/research/vrp.html:47 msgid "" -"Response Manager makes inquiries to satisfy any needed information and to" -"\n" +"Response Manager makes inquiries to satisfy any needed information and to\n" "confirm if submission is indeed a vulnerability." msgstr "" @@ -398,369 +349,357 @@ msgstr "" #: i2p2www/pages/site/research/vrp.html:62 msgid "" -"Response Manager moves discussion to a new or existing ticket on public " -"Trac if necessary." +"Response Manager moves discussion to a new or existing ticket on public Trac" +" if necessary." msgstr "" #: i2p2www/pages/site/research/vrp.html:70 msgid "" -"If over email, Response Manager opens a HackerOne issue for new " -"submission." -msgstr "" - -#: i2p2www/pages/site/research/vrp.html:74 -msgid "" "\n" "Establish severity of vulnerability:\n" " " msgstr "" -#: i2p2www/pages/site/research/vrp.html:79 +#: i2p2www/pages/site/research/vrp.html:75 msgid "" -"Effects network as a whole, has potential to break entire network or is " -"on a scale of great catastrophe." +"Affects network as a whole, has potential to break entire network or is on a" +" scale of great catastrophe." msgstr "" -#: i2p2www/pages/site/research/vrp.html:83 -msgid "Effects individual routers, or must be carefully exploited." +#: i2p2www/pages/site/research/vrp.html:79 +msgid "Affects individual routers, or must be carefully exploited." msgstr "" -#: i2p2www/pages/site/research/vrp.html:87 +#: i2p2www/pages/site/research/vrp.html:83 msgid "Is not easily exploitable." msgstr "" -#: i2p2www/pages/site/research/vrp.html:93 +#: i2p2www/pages/site/research/vrp.html:89 msgid "Respond according to the severity of the vulnerability:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:97 +#: i2p2www/pages/site/research/vrp.html:93 #, python-format msgid "" -"HIGH severities must be notified on website and news feed within " -"%(limit)s\n" +"HIGH severities must be notified on website and news feed within %(limit)s\n" "working days of classification." msgstr "" -#: i2p2www/pages/site/research/vrp.html:102 -msgid "The notification should list appropriate steps for users to take, if any." +#: i2p2www/pages/site/research/vrp.html:98 +msgid "" +"The notification should list appropriate steps for users to take, if any." msgstr "" -#: i2p2www/pages/site/research/vrp.html:105 +#: i2p2www/pages/site/research/vrp.html:101 msgid "" -"The notification must not include any details that could suggest an " -"exploitation\n" +"The notification must not include any details that could suggest an exploitation\n" "path." msgstr "" -#: i2p2www/pages/site/research/vrp.html:109 +#: i2p2www/pages/site/research/vrp.html:105 msgid "The latter takes precedence over the former." msgstr "" -#: i2p2www/pages/site/research/vrp.html:113 +#: i2p2www/pages/site/research/vrp.html:109 msgid "MEDIUM and HIGH severities will require a Point Release." msgstr "" -#: i2p2www/pages/site/research/vrp.html:116 +#: i2p2www/pages/site/research/vrp.html:112 msgid "LOW severities will be addressed in the next Regular Release." msgstr "" -#: i2p2www/pages/site/research/vrp.html:122 +#: i2p2www/pages/site/research/vrp.html:118 msgid "Response Team applies appropriate patch(es)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:126 +#: i2p2www/pages/site/research/vrp.html:122 msgid "" -"Response Manager designates a PRIVATE monotone \"hotfix branch\" to work " -"in." +"Response Manager works on a patch LOCALLY, patches are shared by the " +"response team via PGP-encrypted e-mail until such a time as it is safe to " +"expose to the public." msgstr "" -#: i2p2www/pages/site/research/vrp.html:129 +#: i2p2www/pages/site/research/vrp.html:125 msgid "Patches are reviewed with the researcher." msgstr "" -#: i2p2www/pages/site/research/vrp.html:132 +#: i2p2www/pages/site/research/vrp.html:128 msgid "" -"Any messages associated with PUBLIC commits during the time of review " -"should not\n" -"make reference to the security nature of the PRIVATE branch or its " -"commits." +"Any messages associated with PUBLIC commits during the time of review should not\n" +"make reference to the security nature of the PRIVATE branch or its commits." msgstr "" -#: i2p2www/pages/site/research/vrp.html:136 +#: i2p2www/pages/site/research/vrp.html:132 msgid "Vulnerability announcement is drafted." msgstr "" -#: i2p2www/pages/site/research/vrp.html:140 +#: i2p2www/pages/site/research/vrp.html:136 msgid "Include severity of vulnerability." msgstr "" -#: i2p2www/pages/site/research/vrp.html:143 +#: i2p2www/pages/site/research/vrp.html:139 msgid "Include systems/apps effected." msgstr "" -#: i2p2www/pages/site/research/vrp.html:146 +#: i2p2www/pages/site/research/vrp.html:142 msgid "Include solutions (if any) if patch cannot be applied." msgstr "" -#: i2p2www/pages/site/research/vrp.html:150 +#: i2p2www/pages/site/research/vrp.html:146 msgid "Release date is discussed." msgstr "ОбговорюєтьÑÑ Ð´Ð°Ñ‚Ð° Ð´Ð»Ñ Ñ€ÐµÐ»Ñ–Ð·." -#: i2p2www/pages/site/research/vrp.html:156 +#: i2p2www/pages/site/research/vrp.html:152 msgid "" "At release date, Response Team coordinates with developers to finalize " "update:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:160 +#: i2p2www/pages/site/research/vrp.html:156 msgid "Response Manager propagates the \"hotfix branch\" to trunk." msgstr "" -#: i2p2www/pages/site/research/vrp.html:163 +#: i2p2www/pages/site/research/vrp.html:159 msgid "" -"Response Manager includes vulnerability announcement draft in release " -"notes." +"Response Manager includes vulnerability announcement draft in release notes." msgstr "" -#: i2p2www/pages/site/research/vrp.html:166 -msgid "Proceed with the Point or Regular Release." +#: i2p2www/pages/site/research/vrp.html:162 +msgid "" +"Proceed with the Point or Regular Release. At this time, it is not possible to release an in-network update for only one operating system or\n" +"\t\tarchitecture. In order that all affected products can be released as quickly as possible, the person responsible\n" +"\t\tfor that software should be able to perform necessary release processes in a timely manner. Importantly this should include\n" +"\t\tconsideration for package maintainers in Debian, Ubuntu and F-Droid." msgstr "" -#: i2p2www/pages/site/research/vrp.html:173 +#: i2p2www/pages/site/research/vrp.html:172 msgid "Post-release Disclosure Process" msgstr "" -#: i2p2www/pages/site/research/vrp.html:176 +#: i2p2www/pages/site/research/vrp.html:175 #, python-format -msgid "Response Team has %(limit)s days to fulfill all points within section III." +msgid "" +"Response Team has %(limit)s days to fulfill all points within section III." msgstr "" -#: i2p2www/pages/site/research/vrp.html:180 -msgid "If the Incident Response process in section III is successfully completed:" +#: i2p2www/pages/site/research/vrp.html:179 +msgid "" +"If the Incident Response process in section III is successfully completed:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:184 +#: i2p2www/pages/site/research/vrp.html:183 msgid "" "Response Manager contacts researcher and asks if researcher wishes for " "credit." msgstr "" -#: i2p2www/pages/site/research/vrp.html:187 +#: i2p2www/pages/site/research/vrp.html:186 msgid "Finalize vulnerability announcement draft and include the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:191 +#: i2p2www/pages/site/research/vrp.html:190 msgid "Project name and URL." msgstr "Ðазва проекту та URL." -#: i2p2www/pages/site/research/vrp.html:194 +#: i2p2www/pages/site/research/vrp.html:193 msgid "Versions known to be affected." msgstr "" -#: i2p2www/pages/site/research/vrp.html:197 +#: i2p2www/pages/site/research/vrp.html:196 msgid "" "Versions known to be not affected (for example, the vulnerable code was " "introduced in a recent version, and older versions are therefore " "unaffected)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:200 +#: i2p2www/pages/site/research/vrp.html:199 msgid "Versions not checked." msgstr "" -#: i2p2www/pages/site/research/vrp.html:203 +#: i2p2www/pages/site/research/vrp.html:202 msgid "Type of vulnerability and its impact." msgstr "" -#: i2p2www/pages/site/research/vrp.html:206 +#: i2p2www/pages/site/research/vrp.html:205 msgid "If already obtained or applicable, a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:209 +#: i2p2www/pages/site/research/vrp.html:208 msgid "The planned, coordinated release date." msgstr "" -#: i2p2www/pages/site/research/vrp.html:212 +#: i2p2www/pages/site/research/vrp.html:211 msgid "" "Mitigating factors (for example, the vulnerability is only exposed in " "uncommon, non-default configurations)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:215 +#: i2p2www/pages/site/research/vrp.html:214 msgid "" -"Workarounds (configuration changes users can make to reduce their " -"exposure to the vulnerability)." +"Workarounds (configuration changes users can make to reduce their exposure " +"to the vulnerability)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:218 +#: i2p2www/pages/site/research/vrp.html:217 msgid "If applicable, credits to the original reporter." msgstr "" -#: i2p2www/pages/site/research/vrp.html:223 -msgid "Release finalized vulnerability announcement on website and in news feed." +#: i2p2www/pages/site/research/vrp.html:222 +msgid "" +"Release finalized vulnerability announcement on website and in news feed." msgstr "" -#: i2p2www/pages/site/research/vrp.html:226 +#: i2p2www/pages/site/research/vrp.html:230 msgid "" -"For HIGH severities, release finalized vulnerability announcement on " -"well-known mailing lists:" +"For HIGH severities, release finalized vulnerability announcement on well-" +"known mailing lists:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:234 +#: i2p2www/pages/site/research/vrp.html:238 msgid "If applicable, developers request a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:238 +#: i2p2www/pages/site/research/vrp.html:242 msgid "" -"The commit that applied the fix is made reference too in a future commit " -"and includes a CVE-ID." +"The commit that applied the fix is made reference too in a future commit and" +" includes a CVE-ID." msgstr "" -#: i2p2www/pages/site/research/vrp.html:246 +#: i2p2www/pages/site/research/vrp.html:250 msgid "" "If the Incident Response process in section III is *not* successfully " "completed:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:250 +#: i2p2www/pages/site/research/vrp.html:254 msgid "" -"Response Team and developers organize an IRC meeting to discuss why/what " -"points\n" -"in section III were not resolved and how the team can resolve them in the" -"\n" +"Response Team and developers organize an IRC meeting to discuss why/what points\n" +"in section III were not resolved and how the team can resolve them in the\n" "future." msgstr "" -#: i2p2www/pages/site/research/vrp.html:255 +#: i2p2www/pages/site/research/vrp.html:259 msgid "" -"Any developer meetings immediately following the incident should include " -"points\n" +"Any developer meetings immediately following the incident should include points\n" "made in section V." msgstr "" -#: i2p2www/pages/site/research/vrp.html:259 +#: i2p2www/pages/site/research/vrp.html:263 msgid "" "If disputes arise about whether or when to disclose information about a\n" -"vulnerability, the Response Team will publicly discuss the issue via IRC " -"and\n" +"vulnerability, the Response Team will publicly discuss the issue via IRC and\n" "attempt to reach consensus." msgstr "" -#: i2p2www/pages/site/research/vrp.html:264 +#: i2p2www/pages/site/research/vrp.html:268 #, python-format msgid "" -"If consensus on a timely disclosure is not met (no later than %(limit)s " -"days),\n" +"If consensus on a timely disclosure is not met (no later than %(limit)s days),\n" "the researcher (after %(limit)s days) has every right to expose the\n" "vulnerability to the public." msgstr "" -#: i2p2www/pages/site/research/vrp.html:273 +#: i2p2www/pages/site/research/vrp.html:277 msgid "Incident Analysis" msgstr "" -#: i2p2www/pages/site/research/vrp.html:276 +#: i2p2www/pages/site/research/vrp.html:280 msgid "Isolate codebase" msgstr "" -#: i2p2www/pages/site/research/vrp.html:278 -#: i2p2www/pages/site/research/vrp.html:298 -msgid "Response Team and developers should coordinate to work on the following:" +#: i2p2www/pages/site/research/vrp.html:282 +#: i2p2www/pages/site/research/vrp.html:302 +msgid "" +"Response Team and developers should coordinate to work on the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:282 +#: i2p2www/pages/site/research/vrp.html:286 msgid "Problematic implementation of classes/libraries/functions, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:285 +#: i2p2www/pages/site/research/vrp.html:289 msgid "Focus on apps/distro packaging, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:288 +#: i2p2www/pages/site/research/vrp.html:292 msgid "Operator/config error, etc." msgstr "" -#: i2p2www/pages/site/research/vrp.html:296 +#: i2p2www/pages/site/research/vrp.html:300 msgid "Auditing" msgstr "" -#: i2p2www/pages/site/research/vrp.html:302 +#: i2p2www/pages/site/research/vrp.html:306 msgid "Auditing of problem area(s) as discussed in point 1." msgstr "" -#: i2p2www/pages/site/research/vrp.html:305 +#: i2p2www/pages/site/research/vrp.html:309 msgid "Generate internal reports and store for future reference." msgstr "" -#: i2p2www/pages/site/research/vrp.html:308 +#: i2p2www/pages/site/research/vrp.html:312 msgid "" -"If results are not sensitive, share with the public via IRC or public " -"Trac." +"If results are not sensitive, share with the public via IRC or public Trac." msgstr "" -#: i2p2www/pages/site/research/vrp.html:316 +#: i2p2www/pages/site/research/vrp.html:320 #, python-format msgid "" -"Response Team has %(limit)s days following completion of section III to " -"ensure\n" +"Response Team has %(limit)s days following completion of section III to ensure\n" "completion of section V." msgstr "" -#: i2p2www/pages/site/research/vrp.html:322 +#: i2p2www/pages/site/research/vrp.html:326 msgid "Resolutions" msgstr "ВирішеннÑ" -#: i2p2www/pages/site/research/vrp.html:324 +#: i2p2www/pages/site/research/vrp.html:328 msgid "" -"Any further questions or resolutions regarding the incident(s) between " -"the\n" -"researcher and response + development team after public disclosure can be" -"\n" +"Any further questions or resolutions regarding the incident(s) between the\n" +"researcher and response + development team after public disclosure can be\n" "addressed via the following:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:338 +#: i2p2www/pages/site/research/vrp.html:341 msgid "Continuous Improvement" msgstr "" -#: i2p2www/pages/site/research/vrp.html:341 +#: i2p2www/pages/site/research/vrp.html:344 msgid "" -"Response Team and developers should hold annual meetings to review the " -"previous\n" +"Response Team and developers should hold annual meetings to review the previous\n" "year's incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:346 +#: i2p2www/pages/site/research/vrp.html:349 msgid "" "Response Team or designated person(s) should give a brief presentation, " "including:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:350 +#: i2p2www/pages/site/research/vrp.html:353 msgid "Areas of I2P affected by the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:353 +#: i2p2www/pages/site/research/vrp.html:356 msgid "Any network downtime or monetary cost (if any) of the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:356 +#: i2p2www/pages/site/research/vrp.html:359 msgid "Ways in which the incidents could have been avoided (if any)." msgstr "" -#: i2p2www/pages/site/research/vrp.html:359 +#: i2p2www/pages/site/research/vrp.html:362 msgid "How effective this process was in dealing with the incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:365 +#: i2p2www/pages/site/research/vrp.html:368 msgid "After the presentation, Response Team and developers should discuss:" msgstr "" -#: i2p2www/pages/site/research/vrp.html:369 +#: i2p2www/pages/site/research/vrp.html:372 msgid "Potential changes to development processes to reduce future incidents." msgstr "" -#: i2p2www/pages/site/research/vrp.html:372 +#: i2p2www/pages/site/research/vrp.html:375 msgid "Potential changes to this process to improve future responses." msgstr "" - diff --git a/i2p2www/translations/zh/LC_MESSAGES/comparison.po b/i2p2www/translations/zh/LC_MESSAGES/comparison.po index 01129534932a946507aee9025181c9bd2a86c8e2..2caed43c85ebecf5b95f3e7ba77e21f577afb341 100644 --- a/i2p2www/translations/zh/LC_MESSAGES/comparison.po +++ b/i2p2www/translations/zh/LC_MESSAGES/comparison.po @@ -1,28 +1,28 @@ -# Chinese translations for I2P. -# Copyright (C) 2018 ORGANIZATION +# Translations template for I2P. +# Copyright (C) 2021 ORGANIZATION # This file is distributed under the same license as the I2P project. -# +# # Translators: -# nobody <oiiu19@yahoo.com>, 2015 -# nobody <oiiu19@yahoo.com>, 2016 +# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2015 +# a7c0396e818c2941c33529bda1f6bf1b_d554568 <93d1ed349b85f9981f2c90624c315cde_129513>, 2016 # Scott Rhodes <starring169@gmail.com>, 2020 # YFdyh000 <yfdyh000@gmail.com>, 2016 # YFdyh000 <yfdyh000@gmail.com>, 2015-2016 # yue gao <gaoyue@iie.ac.cn>, 2017 msgid "" msgstr "" -"Project-Id-Version: I2P\n" +"Project-Id-Version: I2P\n" "Report-Msgid-Bugs-To: http://trac.i2p2.de\n" -"POT-Creation-Date: 2018-08-24 11:47+0000\n" -"PO-Revision-Date: 2020-03-28 05:48+0000\n" -"Last-Translator: Scott Rhodes <starring169@gmail.com>\n" -"Language-Team: Chinese (China) " -"(http://www.transifex.com/otf/I2P/language/zh_CN/)\n" -"Plural-Forms: nplurals=1; plural=0\n" +"POT-Creation-Date: 2021-10-11 16:27+0000\n" +"PO-Revision-Date: 2013-07-15 11:59+0000\n" +"Last-Translator: Scott Rhodes <starring169@gmail.com>, 2020\n" +"Language-Team: Chinese (China) (http://www.transifex.com/otf/I2P/language/zh_CN/)\n" "MIME-Version: 1.0\n" -"Content-Type: text/plain; charset=utf-8\n" +"Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Generated-By: Babel 1.3\n" +"Language: zh_CN\n" +"Plural-Forms: nplurals=1; plural=0;\n" #: i2p2www/pages/site/comparison/freenet.html:2 msgid "I2P Compared to Freenet" @@ -30,57 +30,37 @@ msgstr "I2P 相比 Freenet" #: i2p2www/pages/site/comparison/freenet.html:8 msgid "" -"Freenet is a fully distributed, peer to peer anonymous publishing " -"network, offering \n" -"secure ways to store data, as well as some approaches attempting to " -"address the loads\n" -"of a flash flood. While Freenet is designed as a distributed data store," -" people have\n" -"built applications on top of it to do more generic anonymous " -"communication, such as \n" +"Freenet is a fully distributed, peer to peer anonymous publishing network, offering \n" +"secure ways to store data, as well as some approaches attempting to address the loads\n" +"of a flash flood. While Freenet is designed as a distributed data store, people have\n" +"built applications on top of it to do more generic anonymous communication, such as \n" "static websites and message boards." msgstr "Freenet是一个完全分布å¼çš„P2P匿åå‘布网络,æ供安全的数æ®å˜å‚¨æ–¹å¼ï¼Œä»¥åŠä¸€äº›è¯•å›¾è§£å†³æ´ªæ³›è´Ÿè½½çš„方法。虽然Freenet的设计目的是分布å¼çš„æ•°æ®å˜å‚¨ï¼Œä½†æ˜¯äººä»¬ä¹Ÿåœ¨Freenet之上建立了一些应用程åºï¼Œä½¿å¾—更通用的匿å通信æˆä¸ºå¯èƒ½ï¼Œå¦‚é™æ€ç½‘站和留言æ¿ç‰ã€‚" #: i2p2www/pages/site/comparison/freenet.html:16 #, python-format msgid "" -"Compared to I2P, Freenet offers some substantial benefits - it is a " -"distributed data\n" -"store, while I2P is not, allowing people to retrieve the content " -"published by others \n" -"even when the publisher is no longer online. In addition, it should be " -"able to \n" -"distribute popular data fairly efficiently. I2P itself does not and will" -" not provide \n" -"this functionality. On the other hand, there is overlap for users who " -"simply want to \n" -"communicate with each other anonymously through websites, message boards," -" file sharing\n" -"programs, etc. There have also been some attempts to develop a " -"distributed data \n" +"Compared to I2P, Freenet offers some substantial benefits - it is a distributed data\n" +"store, while I2P is not, allowing people to retrieve the content published by others \n" +"even when the publisher is no longer online. In addition, it should be able to \n" +"distribute popular data fairly efficiently. I2P itself does not and will not provide \n" +"this functionality. On the other hand, there is overlap for users who simply want to \n" +"communicate with each other anonymously through websites, message boards, file sharing\n" +"programs, etc. There have also been some attempts to develop a distributed data \n" "store to run on top of I2P,\n" "(most recently a port of <a href=\"%(tahoe)s\">Tahoe-LAFS</a>)\n" "but nothing is yet ready for general use." -msgstr "" -"相比于I2P,Freenetæ供了一些实质性的好处——它是一个分布å¼çš„æ•°æ®å˜å‚¨ç½‘络,而I2P并ä¸æ˜¯ï¼ŒFreenetå…许用户检索已å‘布的内容,å³ä¾¿å†…容的å‘布者已ç»ç¦»çº¿äº†ã€‚æ¤å¤–,Freenet应该能够高效地分å‘æµè¡Œæ•°æ®ã€‚I2P本身ä¸æä¾›æ¤åŠŸèƒ½ã€‚å¦ä¸€æ–¹é¢ï¼Œå¯¹äºŽé‚£äº›åªæƒ³é€šè¿‡ç½‘ç«™ã€ç•™è¨€æ¿ã€æ–‡ä»¶å…±äº«ç¨‹åºç‰æ–¹å¼åŒ¿å交æµçš„用户æ¥è¯´ï¼Œè¿™æ˜¯æœ‰é‡å 的。I2P也进行了一些å°è¯•ä»¥æ”¯æŒåˆ†å¸ƒå¼æ•°æ®å˜å‚¨ï¼Œ(最近的是<a" -" href=\"%(tahoe)s\">Tahoe-LAFS</a>的移æ¤) 但还没有准备好全é¢ä½¿ç”¨ã€‚" +msgstr "相比于I2P,Freenetæ供了一些实质性的好处——它是一个分布å¼çš„æ•°æ®å˜å‚¨ç½‘络,而I2P并ä¸æ˜¯ï¼ŒFreenetå…许用户检索已å‘布的内容,å³ä¾¿å†…容的å‘布者已ç»ç¦»çº¿äº†ã€‚æ¤å¤–,Freenet应该能够高效地分å‘æµè¡Œæ•°æ®ã€‚I2P本身ä¸æä¾›æ¤åŠŸèƒ½ã€‚å¦ä¸€æ–¹é¢ï¼Œå¯¹äºŽé‚£äº›åªæƒ³é€šè¿‡ç½‘ç«™ã€ç•™è¨€æ¿ã€æ–‡ä»¶å…±äº«ç¨‹åºç‰æ–¹å¼åŒ¿å交æµçš„用户æ¥è¯´ï¼Œè¿™æ˜¯æœ‰é‡å 的。I2P也进行了一些å°è¯•ä»¥æ”¯æŒåˆ†å¸ƒå¼æ•°æ®å˜å‚¨ï¼Œ(最近的是<a href=\"%(tahoe)s\">Tahoe-LAFS</a>的移æ¤) 但还没有准备好全é¢ä½¿ç”¨ã€‚" #: i2p2www/pages/site/comparison/freenet.html:29 msgid "" -"However, even ignoring any implementations issues, there are some " -"concerns \n" -"about Freenet's algorithms from both a scalability and anonymity " -"perspective, owing \n" -"largely to Freenet's heuristic driven routing. The interactions of " -"various techniques \n" -"certainly may successfully deter various attacks, and perhaps some " -"aspects of the \n" -"routing algorithms will provide the hoped for scalability. " -"Unfortunately, not much\n" -"analysis of the algorithms involved has resulted in positive results, but" -" there is still\n" -"hope. At the very least, Freenet does provide substantial anonymity " -"against an attacker\n" +"However, even ignoring any implementations issues, there are some concerns \n" +"about Freenet's algorithms from both a scalability and anonymity perspective, owing \n" +"larg